Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices

被引:48
|
作者
Wang, Qingxuan [1 ]
Wang, Ding [2 ]
机构
[1] Nankai Univ, Coll Cyber Sci, Tianjin, Peoples R China
[2] Nankai Univ, Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-factor authentication; provable security; mobile devices; random oracle model; KEY AGREEMENT SCHEME; WIRELESS SENSOR NETWORKS; 2-FACTOR USER AUTHENTICATION; MUTUAL AUTHENTICATION; PROVABLY SECURE; ANONYMOUS AUTHENTICATION; 3-FACTOR AUTHENTICATION; PROTOCOL; EFFICIENT; INTERNET;
D O I
10.1109/TIFS.2022.3227753
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-factor authentication is a promising way to enhance the security of password-based authenticated key exchange (PAKE) schemes. It is widely deployed in various daily applications for mobile devices (e.g., e-Bank, smart home, and cloud services) to provide the first line of defense for system security. However, despite intensive research, how to design a secure and efficient multi-factor authentication scheme is still a challenging problem. Hundreds of new schemes have been successfully proposed, and many are even equipped with a formal security proof. However, most of them have been shortly found to be insecure and cannot achieve the claimed security goals. Now a paradox arises: How can a multi-factor scheme that was "formally proven secure" later be found insecure? To answer this seemingly contradicting question, this paper takes a substantial first step towards systematically exploring the security proof failures in multi-factor authentication schemes for mobile devices. We first investigate the root causes of the "provable security" failure in vulnerable multi-factor authentication schemes under the random oracle model, and classify them into eight different types in terms of the five steps of conducting a formal security proof. Then, we elaborate on each type of these eight proof failures by examining three typical vulnerable protocols, and suggest corresponding countermeasures. Finally, we conduct a large-scale comparative measurement of 70 representative multi-factor authentication schemes under our extended evaluation criteria. The schemes we select range from 2009 to 2022, and the comparison results suggest that understanding failures in formal security proofs is helpful to design more secure multi-factor authentication protocols for mobile devices.
引用
收藏
页码:597 / 612
页数:16
相关论文
共 50 条
  • [1] Understanding security failures of multi-factor authentication schemes for multi-server environments
    Wang, Ding
    Zhang, Xizhe
    Zhang, Zijian
    Wang, Ping
    COMPUTERS & SECURITY, 2020, 88
  • [2] Runtime adaptive multi-factor authentication for mobile devices
    Castro, P. C.
    Ligman, J. W.
    Pistoia, M.
    Ponzo, J.
    Thomas, G. S.
    Topkara, U.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2013, 57 (06)
  • [3] Mobile Multi-Factor Authentication
    Bissada, Andrew
    Olmsted, Aspen
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 210 - 211
  • [4] Practical and veritable threshold multi-factor authentication for mobile devices
    Qin, Shihan
    Xiao, Yuting
    Xin, Yansen
    Gao, Birou
    Zhang, Rui
    COMPUTER JOURNAL, 2025,
  • [5] A location-based multi-factor authentication scheme for mobile devices
    Meher, Bimal Kumar
    Amin, Ruhul
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 41 (03) : 181 - 190
  • [6] TDAS: a touch dynamics based multi-factor authentication solution for mobile devices
    Teh, Pin Shen
    Zhang, Ning
    Teoh, Andrew Beng Jin
    Chen, Ke
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2016, 12 (01) : 127 - 153
  • [7] Multi-Factor Biometrics for Authentication: A False Sense of Security
    Al-Assam, Hisham
    Sellahewa, Harin
    Jassim, Sabah
    MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 81 - 87
  • [8] On the Security of Multi-Factor Authentication: Several Instructive Examples
    Huang, Yun
    Xue, Weijia
    Huang, Geshi
    Lai, Xuejia
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 685 - 687
  • [9] CLOUD STORAGE SECURITY USING MULTI-FACTOR AUTHENTICATION
    Nikam, Rushikesh
    Potey, Manish
    2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [10] A lightweight multi-factor mobile user authentication scheme
    Sun, Jianguo
    Zhong, Qi
    Kou, Liang
    Wang, Wenshan
    Da, Qingan
    Lin, Yun
    IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 831 - 836