Multi-Factor Biometrics for Authentication: A False Sense of Security

被引:0
|
作者
Al-Assam, Hisham [1 ]
Sellahewa, Harin [1 ]
Jassim, Sabah [1 ]
机构
[1] Univ Buckingham, Dept Appl Comp, Buckingham MK18 1EG, England
关键词
Multi-factor biometrics; authentication; cancellable biometrics; security analysis; face recognition; fingerprint recognition;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multi-factor biometric recently to strengthen systems in addition to authentications have been proposed security and/or privacy of biometric enhancing authentication accuracy. An important approach to multi-factor biometric authentication is to apply User-Based Transformations (UBTs) on biometric features. Typically, UBTs rely on generating user-based transformation keys from a password/PIN or retrieved from a token. One significant advantage of employing UBTs is its ability to achieve zero or near zero Equal Error Rate (EER) i.e. a clear separation of genuine and imposter distributions. However, the effect of compromised transforrmation keys on authentication accuracy has not been tested rigorously. In this paper, we challenge the myth that has been repotted in the literature that in the case of stolen transformation key(s), accuracy drops but remains close to the accuracy of biometric only system. Moreover, we shall show that a multi-factor authentication system setup to operate at a zero EER has a serious security lapse in the event of stolen or compromised keys. In such a scenario, the False Acceptance Rate (FAR) of the system reaches unacceptable levels. We shall demonstrate this by experiments conducted on face and fingerprint biometrics, and show that an imposter with a stolen key needs no more than two attempts on average to be falsely accepted by the biometric system.
引用
收藏
页码:81 / 87
页数:7
相关论文
共 50 条
  • [21] Security analysis and enhancements of an improved multi-factor biometric authentication scheme
    Park, YoHan
    Park, KiSung
    Lee, KyungKeun
    Song, Hwangjun
    Park, YoungHo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (08):
  • [22] Security for Ambient Assisted Living Multi-factor Authentication in the Internet of Things
    Griffin, Phillip H.
    2015 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2015,
  • [23] Multi-Factor Security Enhanced Authentication Protocol for Wireless Sensor Networks
    Zhang L.
    Liang H.
    Deng D.
    Liu Y.
    Tang C.
    Chang Z.
    Gui S.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2023, 52 (05): : 699 - 708
  • [24] Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices
    Wang, Qingxuan
    Wang, Ding
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 597 - 612
  • [25] ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics
    Shrestha, Babins
    Mohamed, Manar
    Saxena, Nitesh
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 170 - 179
  • [26] Beyond passwords: A multi-factor authentication approach for robust digital security
    Simha, R. Keerthan
    Raghavan, H. K.
    Prabhu, Akshatha
    Joshi, Pallavi
    INTERNET TECHNOLOGY LETTERS, 2025, 8 (02)
  • [27] Implementing multi-factor authentication (MFA) for robust network access security
    De, Indrajit
    Agarwal, Ambuj Kumar
    Bhushan, Bharat
    Kalnawat, Aarti
    Mathurkar, Piyush
    Garg, Amit
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 821 - 832
  • [28] Understanding security failures of multi-factor authentication schemes for multi-server environments
    Wang, Ding
    Zhang, Xizhe
    Zhang, Zijian
    Wang, Ping
    COMPUTERS & SECURITY, 2020, 88
  • [29] Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
    Mostafa, Ayman Mohamed
    Ezz, Mohamed
    Elbashir, Murtada K.
    Alruily, Meshrif
    Hamouda, Eslam
    Alsarhani, Mohamed
    Said, Wael
    APPLIED SCIENCES-BASEL, 2023, 13 (19):
  • [30] Multi-factor authentication at jagged peak
    Gill G.
    Jones J.
    2016, Informing Science Institute (05) : 1 - 16