Cargando…

Security enhanced multi-factor biometric authentication scheme using bio-hash function

With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the securi...

Descripción completa

Detalles Bibliográficos
Autores principales: Choi, Younsung, Lee, Youngsook, Moon, Jongho, Won, Dongho
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5411053/
https://www.ncbi.nlm.nih.gov/pubmed/28459867
http://dx.doi.org/10.1371/journal.pone.0176250
_version_ 1783232777409265664
author Choi, Younsung
Lee, Youngsook
Moon, Jongho
Won, Dongho
author_facet Choi, Younsung
Lee, Youngsook
Moon, Jongho
Won, Dongho
author_sort Choi, Younsung
collection PubMed
description With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
format Online
Article
Text
id pubmed-5411053
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-54110532017-05-12 Security enhanced multi-factor biometric authentication scheme using bio-hash function Choi, Younsung Lee, Youngsook Moon, Jongho Won, Dongho PLoS One Research Article With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. Public Library of Science 2017-05-01 /pmc/articles/PMC5411053/ /pubmed/28459867 http://dx.doi.org/10.1371/journal.pone.0176250 Text en © 2017 Choi et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Choi, Younsung
Lee, Youngsook
Moon, Jongho
Won, Dongho
Security enhanced multi-factor biometric authentication scheme using bio-hash function
title Security enhanced multi-factor biometric authentication scheme using bio-hash function
title_full Security enhanced multi-factor biometric authentication scheme using bio-hash function
title_fullStr Security enhanced multi-factor biometric authentication scheme using bio-hash function
title_full_unstemmed Security enhanced multi-factor biometric authentication scheme using bio-hash function
title_short Security enhanced multi-factor biometric authentication scheme using bio-hash function
title_sort security enhanced multi-factor biometric authentication scheme using bio-hash function
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5411053/
https://www.ncbi.nlm.nih.gov/pubmed/28459867
http://dx.doi.org/10.1371/journal.pone.0176250
work_keys_str_mv AT choiyounsung securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction
AT leeyoungsook securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction
AT moonjongho securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction
AT wondongho securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction