Robust Multi-Factor Authentication for WSNs With Dynamic Password Recovery

被引:0
|
作者
Zhu, Liufu [1 ,2 ,3 ,4 ]
Wang, Ding [1 ,2 ,3 ,4 ]
机构
[1] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[2] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[3] Nankai Univ, Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
[4] Minist Educ, Key Lab Data & Intelligent Syst Secur NKU, Tianjin 300350, Peoples R China
基金
中国国家自然科学基金;
关键词
Passwords; Authentication; Security; Wireless sensor networks; Impersonation attacks; Smart cards; Privacy; Multi-factor authentication; password recovery; provable security; random oracle model; KEY AGREEMENT SCHEME; 2-FACTOR USER AUTHENTICATION; MUTUAL AUTHENTICATION; 3-FACTOR AUTHENTICATION; SMART CARDS; EFFICIENT; INTERNET; NETWORKS; EXCHANGE; PROTOCOL;
D O I
10.1109/TIFS.2024.3451364
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-factor authentication (MFA) is crucial for Wireless Sensor Networks (WSNs) to ensure secure communication in security-critical applications such as smart homes, industrial control, and military defense due to the open nature of WSNs. Considerable efforts have been made to propose various MFA schemes with varied security goals and desirable properties. However, little attention has been given to the property of dynamic password recovery, and it still remains a question of how to construct a robust MFA scheme with the desirable property of dynamic password recovery for WSNs. In this paper, we first review two representative multi-factor authentication schemes proposed by Li-Tian (at IEEE Syst J'22) and Fatima et al. (at ACM TOSN'23) as case studies, and reveal that these two schemes fail to resist some known attacks and pay little attention to password forgetting and leakage issues. Accordingly, we employ the techniques of the honeywords method, fuzzy-verifier technique, and public key cryptosystem to construct a novel MFA scheme. Particularly, we propose the first dynamic password recovery method for MFA to address password forgetting and leakage issues. Key rotation is implemented to ensure the security of the long-term secret key. Our scheme is provably secure under the Random Oracle Model. Comparison results show the superiority of our new scheme.
引用
收藏
页码:8398 / 8413
页数:16
相关论文
共 50 条
  • [1] Dynamic Multi-factor Authentication for Smartphone
    Yohan, Alexander
    Lo, Nai-Wei
    Lie, Henry Roes
    2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 2448 - 2453
  • [2] Robust Multi-Factor Authentication for Fragile Communications
    Huang, Xinyi
    Xiang, Yang
    Bertino, Elisa
    Zhou, Jianying
    Xu, Li
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (06) : 568 - 581
  • [3] Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential
    Nozaki, Shinnosuke
    Serizawa, Ayumi
    Yoshihira, Mizuho
    Fujita, Masahiro
    Shibata, Yoichi
    Yamanaka, Tadakazu
    Matsuda, Nori
    Ohki, Tetsushi
    Nishigaki, Masakatsu
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2022, 2022, 526 : 201 - 211
  • [4] MULTI-FACTOR AUTHENTICATION MODELLING
    Dostalek, L.
    Safarik, J.
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2020, (02) : 106 - 116
  • [5] Multi-Factor Authentication as a Service
    Shah, Yogendra
    Choyi, Vinod
    Schmidt, Andreas U.
    Subramanian, Lakshmi
    2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 144 - 150
  • [6] Multi-Factor Authentication: A Survey
    Ometov, Aleksandr
    Bezzateev, Sergey
    Makitalo, Niko
    Andreev, Sergey
    Mikkonen, Tommi
    Koucheryavy, Yevgeni
    CRYPTOGRAPHY, 2018, 2 (01) : 1 - 31
  • [7] Multi-Factor Authentication Modeling
    Dostalek, Libor
    2019 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT'2019), 2019, : 443 - 446
  • [8] Bypassing Multi-Factor Authentication
    Russell S.
    ITNOW, 2023, 65 (01) : 42 - 45
  • [9] Mobile Multi-Factor Authentication
    Bissada, Andrew
    Olmsted, Aspen
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 210 - 211
  • [10] Multi-Factor Authentication on Cloud
    Khan, Salman H.
    Akbar, M. Ali
    2015 INTERNATIONAL CONFERENCE ON DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2015, : 548 - 554