Multi-Factor Biometrics for Authentication: A False Sense of Security

被引:0
|
作者
Al-Assam, Hisham [1 ]
Sellahewa, Harin [1 ]
Jassim, Sabah [1 ]
机构
[1] Univ Buckingham, Dept Appl Comp, Buckingham MK18 1EG, England
关键词
Multi-factor biometrics; authentication; cancellable biometrics; security analysis; face recognition; fingerprint recognition;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multi-factor biometric recently to strengthen systems in addition to authentications have been proposed security and/or privacy of biometric enhancing authentication accuracy. An important approach to multi-factor biometric authentication is to apply User-Based Transformations (UBTs) on biometric features. Typically, UBTs rely on generating user-based transformation keys from a password/PIN or retrieved from a token. One significant advantage of employing UBTs is its ability to achieve zero or near zero Equal Error Rate (EER) i.e. a clear separation of genuine and imposter distributions. However, the effect of compromised transforrmation keys on authentication accuracy has not been tested rigorously. In this paper, we challenge the myth that has been repotted in the literature that in the case of stolen transformation key(s), accuracy drops but remains close to the accuracy of biometric only system. Moreover, we shall show that a multi-factor authentication system setup to operate at a zero EER has a serious security lapse in the event of stolen or compromised keys. In such a scenario, the False Acceptance Rate (FAR) of the system reaches unacceptable levels. We shall demonstrate this by experiments conducted on face and fingerprint biometrics, and show that an imposter with a stolen key needs no more than two attempts on average to be falsely accepted by the biometric system.
引用
收藏
页码:81 / 87
页数:7
相关论文
共 50 条
  • [41] Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret
    Obi M. Ogbanufe
    Corey Baham
    Information Systems Frontiers, 2023, 25 : 897 - 916
  • [42] Cyber-Physical Systems Security through Multi-Factor Authentication and Data Analytics
    Vegh, Laura
    2018 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2018, : 1369 - 1374
  • [43] AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication
    Preuveneers, Davy
    Joos, Sander
    Joosen, Wouter
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (TRUSTBUS 2021), 2021, 12927 : 155 - 170
  • [44] Multi-factor authentication using threshold cryptography
    1694, Institute of Electrical and Electronics Engineers Inc., United States
  • [45] Internet Banking Login with Multi-Factor Authentication
    Boonkrong, Sirapat
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (01): : 511 - 535
  • [46] Revolutionizing IoT Security: Integrating Audio Data Transfer and Multi-Factor Authentication with Smartphones
    Lawrence, Mark
    Wang, Yong
    2024 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY, EIT 2024, 2024, : 310 - 315
  • [47] Security analysis and improvement of a multi-factor biometric-based remote authentication scheme
    Boonkrong, Sirapat
    IAENG International Journal of Computer Science, 2019, 46 (04): : 1 - 12
  • [48] Multi-Factor Authentication in Key Management Systems
    de Souza, Rick Lopes
    Lung, Lau Cheuk
    Custodio, Ricardo Felipe
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 746 - 752
  • [49] Multi-factor authentication for shibboleth identity providers
    de Mello, Emerson Ribeiro
    Wangham, Michelle Silva
    Loli, Samuel Bristot
    da Silva, Carlos Eduardo
    da Silva, Gabriela Cavalcanti
    de Chaves, Shirlei Aparecida
    Loli, Bruno Bristot
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2020, 11 (01)
  • [50] A Systematic Review on Multi-Factor Authentication Framework
    Syahreen, Muhammad
    Hafizah, Noor
    Maarop, Nurazean
    Maslinan, Mayasarah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 1043 - 1050