2019
DOI: 10.3390/cryptography3030024
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator’s Fingerprint and Smart Mobile Device

Abstract: In an era of tremendous development in information technology and the Internet of Things (IoT), security plays a key role in safety devices connected with the Internet. Authentication is vital in the security field, and to achieve a strong authentication scheme, there are several systems using a Multi-Factor Authentication (MFA) scheme based on a smart card, token, and biometric. However, these schemes have suffered from the extra cost; lost, stolen or broken factor, and malicious attacks. In this paper, we de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…It is the successor step after one has entered their credentials, which corresponds to something they know (traditionally a password and a username), so even though an attacker steals or guesses a user's password, they must compromise the user's phone or steal a physical device to gain access to the account [ 7 ]. As a result, compromising an account protected by a second authentication factor is far more difficult for a remote attacker [ 8 , 9 ]. However, these technologies still reside in an external gadget that might be stolen and hence exploit the technology.…”
Section: Introductionmentioning
confidence: 99%
“…It is the successor step after one has entered their credentials, which corresponds to something they know (traditionally a password and a username), so even though an attacker steals or guesses a user's password, they must compromise the user's phone or steal a physical device to gain access to the account [ 7 ]. As a result, compromising an account protected by a second authentication factor is far more difficult for a remote attacker [ 8 , 9 ]. However, these technologies still reside in an external gadget that might be stolen and hence exploit the technology.…”
Section: Introductionmentioning
confidence: 99%
“…In this scenario using BYOD, people today feel reluctant to lend their own mobile device, even for a short time. (Mohammed & Yassin, 2019) specific attendance systems. Number of factors means the four factors used in this paper, including s1 for something you know, s2 for something you have, s3 for something you are, and s4 for somewhere you are.…”
Section: Discussionmentioning
confidence: 99%
“…A number of research studies have attempted to introduce new authentication methods in multi-factor authentication. A CCTV and smartphone-based multi-factor authentication framework using face detection/recognition and unique hardware identification has been proposed ( Kwon, Sharma & Park, 2019 ) as well as a combination of the use of mobile device and fingerprint ( Mohammed & Yassin, 2019 ) methods. In an online examination regarding something you know , the scheme involves people sharing information prior to the exam date and answering questions relating to the shared information just before the exam ( Ullah, Xiao & Barker, 2018 ).…”
Section: Related Workmentioning
confidence: 99%
“…Various authentication stages were described in previous approaches, as they did with the knowledge-based methods in the authentication stage. The security mechanism for usernames and passwords that can easily be accessed through guessing and password based attacks [41][42]. There is also a possibility to develop user authentication methods for multi-factor implementations.…”
Section: Discussion and Analysismentioning
confidence: 99%