Security enhanced multi-factor biometric authentication scheme using bio-hash function.

With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the securi...

Full description

Bibliographic Details
Main Authors: Younsung Choi, Youngsook Lee, Jongho Moon, Dongho Won
Format: Article
Language:English
Published: Public Library of Science (PLoS) 2017-01-01
Series:PLoS ONE
Online Access:http://europepmc.org/articles/PMC5411053?pdf=render
_version_ 1819177780084998144
author Younsung Choi
Youngsook Lee
Jongho Moon
Dongho Won
author_facet Younsung Choi
Youngsook Lee
Jongho Moon
Dongho Won
author_sort Younsung Choi
collection DOAJ
description With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
first_indexed 2024-12-22T21:32:05Z
format Article
id doaj.art-e813e0c5297d44339e43665f73e488bc
institution Directory Open Access Journal
issn 1932-6203
language English
last_indexed 2024-12-22T21:32:05Z
publishDate 2017-01-01
publisher Public Library of Science (PLoS)
record_format Article
series PLoS ONE
spelling doaj.art-e813e0c5297d44339e43665f73e488bc2022-12-21T18:11:54ZengPublic Library of Science (PLoS)PLoS ONE1932-62032017-01-01125e017625010.1371/journal.pone.0176250Security enhanced multi-factor biometric authentication scheme using bio-hash function.Younsung ChoiYoungsook LeeJongho MoonDongho WonWith the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.http://europepmc.org/articles/PMC5411053?pdf=render
spellingShingle Younsung Choi
Youngsook Lee
Jongho Moon
Dongho Won
Security enhanced multi-factor biometric authentication scheme using bio-hash function.
PLoS ONE
title Security enhanced multi-factor biometric authentication scheme using bio-hash function.
title_full Security enhanced multi-factor biometric authentication scheme using bio-hash function.
title_fullStr Security enhanced multi-factor biometric authentication scheme using bio-hash function.
title_full_unstemmed Security enhanced multi-factor biometric authentication scheme using bio-hash function.
title_short Security enhanced multi-factor biometric authentication scheme using bio-hash function.
title_sort security enhanced multi factor biometric authentication scheme using bio hash function
url http://europepmc.org/articles/PMC5411053?pdf=render
work_keys_str_mv AT younsungchoi securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction
AT youngsooklee securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction
AT jonghomoon securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction
AT donghowon securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction