Multifactor Authentication Protocol in a Mobile Environment

被引:20
作者
Maciej, Bartlomiejczyk [1 ]
Imed, El Fray [1 ]
Kurkowski, Miroslaw [2 ]
机构
[1] West Pomeranian Univ Technol, Fac Comp Sci & Informat Technol, PL-70310 Szczecin, Poland
[2] Cardinal Stefan Wyszynski Univ Warsaw, Inst Comp Sci, PL-01815 Warsaw, Poland
关键词
Authentication; electronic identification; electronic transactions; mobile platform; multifactor authentication; smartphone; three-factor authentication; 3-FACTOR AUTHENTICATION; USER AUTHENTICATION; SECURITY PROTOCOLS; MODEL CHECKING; SCHEME; FRAMEWORK; INTERNET; TOOL;
D O I
10.1109/ACCESS.2019.2948922
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The implementation of services that process confidential data in a mobile environment requires an adequate level of security with the strictest possible mechanisms of information protection. The dominance of mobile devices as client applications of distributed systems has led to the development of new techniques that combine traditional methods of protection with protocols leveraging the potential of numerous interfaces available from a smartphone. For this reason, an upward trend in the use of biometricsbased methods and dynamically generated OTP secrets can be observed. Mobile devices are increasingly used in complex business processes that require strong user authentication methods, which, according to the European Commission (Regulation), must use at least two authentication factors belonging to different categories. Therefore, on the basis of the analysis of the solutions presented so far, a distributed protocol has been proposed. It enables user authentication using three authentication factors: possession, knowledge, and inherence. The described authentication scheme refers to the possibility of carrying out the process in the mobile environment of the Android platform with guaranteed authentication support.
引用
收藏
页码:157185 / 157199
页数:15
相关论文
共 43 条
  • [1] Authentication in mobile cloud computing: A survey
    Alizadeh, Mojtaba
    Abolfazli, Saeid
    Zamani, Mazdak
    Baharun, Sabariah
    Sakurai, Kouichi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 : 59 - 80
  • [2] Biometric touchstroke authentication by fuzzy proximity of touch locations
    Alpar, Orcan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 71 - 80
  • [3] [Anonymous], ING NEWS
  • [4] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
  • [5] Basin D., 2013, HDB MODEL CHECKING
  • [6] Briais S., 2005, TRYWORTHY GLOBAL COM
  • [7] Burr William E., 2013, 800632 NIST SP
  • [8] Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
  • [9] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [10] Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing
    Ehatisham-ul-Haq, Muhammad
    Azam, Muhammad Awais
    Naeem, Usman
    Amin, Yasar
    Loo, Jonathan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 109 : 24 - 35