IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2018
DOI: 10.1109/infcomw.2018.8406952
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight multi-factor mobile user authentication scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 18 publications
0
13
0
Order By: Relevance
“…This protocol takes into account the connection of user data with data used for device identification (IMEI/IMSI) [15]. User credentials and biometry were used in the next authentication scheme, which assumes obtaining two-way authentication [16]. This scheme generates hashes of values obtained on the basis of reader biometric features.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…This protocol takes into account the connection of user data with data used for device identification (IMEI/IMSI) [15]. User credentials and biometry were used in the next authentication scheme, which assumes obtaining two-way authentication [16]. This scheme generates hashes of values obtained on the basis of reader biometric features.…”
Section: Related Workmentioning
confidence: 99%
“…The use of fixed IMEI and IMSI values allows one to confirm that the authentication request comes from a device associated with the user during the registration process; however, these are values that can be read by any application installed on the mobile device. For other schemes, such as those presented in [16]- [19], according to section 2.3.1 of Regulation [1] relating to the authentication mechanism, a high level of trust is required from the scheme used to implement dynamic authentication. Within such a process, the factor that serves as evidence of the identity of the user must be changed whenever authentication is attempted.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Nevertheless, the disadvantage of this system is that it deals with limited security threats, and the accuracy of recognition technology based on biometric was not good. Sun et al [33] presented a scheme based on user biometrics with smartphone information using a fuzzy extractor. This system does not store raw information for biometric measurements, thus, depending on the offline method to change the biometrics or password, it does resist some attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In fact, if there are no such restrictions, we can directly employ those authentications proved to be secure in CK model. On the other hand, we also note the security of some protocols 24,28,[42][43][44][45][46][47][48] are discussed with the BAN logic or AVISPA. However, the BAN logic and AVISPA also cannot guarantee the security of the protocol.…”
Section: Security Analysismentioning
confidence: 99%