Cargando…
Security enhanced multi-factor biometric authentication scheme using bio-hash function
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the securi...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5411053/ https://www.ncbi.nlm.nih.gov/pubmed/28459867 http://dx.doi.org/10.1371/journal.pone.0176250 |
_version_ | 1783232777409265664 |
---|---|
author | Choi, Younsung Lee, Youngsook Moon, Jongho Won, Dongho |
author_facet | Choi, Younsung Lee, Youngsook Moon, Jongho Won, Dongho |
author_sort | Choi, Younsung |
collection | PubMed |
description | With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. |
format | Online Article Text |
id | pubmed-5411053 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-54110532017-05-12 Security enhanced multi-factor biometric authentication scheme using bio-hash function Choi, Younsung Lee, Youngsook Moon, Jongho Won, Dongho PLoS One Research Article With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. Public Library of Science 2017-05-01 /pmc/articles/PMC5411053/ /pubmed/28459867 http://dx.doi.org/10.1371/journal.pone.0176250 Text en © 2017 Choi et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Choi, Younsung Lee, Youngsook Moon, Jongho Won, Dongho Security enhanced multi-factor biometric authentication scheme using bio-hash function |
title | Security enhanced multi-factor biometric authentication scheme using bio-hash function |
title_full | Security enhanced multi-factor biometric authentication scheme using bio-hash function |
title_fullStr | Security enhanced multi-factor biometric authentication scheme using bio-hash function |
title_full_unstemmed | Security enhanced multi-factor biometric authentication scheme using bio-hash function |
title_short | Security enhanced multi-factor biometric authentication scheme using bio-hash function |
title_sort | security enhanced multi-factor biometric authentication scheme using bio-hash function |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5411053/ https://www.ncbi.nlm.nih.gov/pubmed/28459867 http://dx.doi.org/10.1371/journal.pone.0176250 |
work_keys_str_mv | AT choiyounsung securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction AT leeyoungsook securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction AT moonjongho securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction AT wondongho securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction |