Biometric multi‐factor authentication: On the usability of the FingerPIN scheme

IF 2.1 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Security and Privacy Pub Date : 2022-11-10 DOI:10.1002/spy2.261
Emanuela Marasco, Massimiliano Albanese, Venkata Vamsi Ram Patibandla, Anudeep Vurity, S. Sriram
{"title":"Biometric multi‐factor authentication: On the usability of the FingerPIN scheme","authors":"Emanuela Marasco, Massimiliano Albanese, Venkata Vamsi Ram Patibandla, Anudeep Vurity, S. Sriram","doi":"10.1002/spy2.261","DOIUrl":null,"url":null,"abstract":"Fingerprint‐based authentication has been successfully adopted in a wide range of applications, including law enforcement and immigration, due to its numerous advantages over traditional password‐based authentication. Despite the usability and accuracy of this technology, some significant concerns still exist, which can potentially hinder its further adoption. For instance, a fingerprint is permanently associated with an individual and, once stolen, cannot be replaced, thus compromising biometric‐based authentication. To mitigate this concern, we previously designed a multi‐factor authentication approach that integrates Type‐1 and Type‐3 authentication factors into a fingerprint‐based personal identification number (PIN). To authenticate, a subject is required to present a sequence of fingerprints corresponding to the digits of the PIN, based on a predefined secret mapping between digits and fingers. We conducted a preliminary vulnerability analysis and demonstrated that this approach is robust to the compromise of one or more of the subject's fingerprints. The objective of the work presented in this paper is to identify any usability issues for this FingerPIN scheme, collect qualitative and quantitative data through a user study, and determine the participants' satisfaction with the authentication mechanism. We carried out systematic usability tests, designed suitable performance metrics for assessing authentication usability on an initial cohort of 100 individuals, and performed a comparative analysis of the FingerPIN scheme against traditional sequential multi‐factor authentication schemes.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":2.1000,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/spy2.261","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 2

Abstract

Fingerprint‐based authentication has been successfully adopted in a wide range of applications, including law enforcement and immigration, due to its numerous advantages over traditional password‐based authentication. Despite the usability and accuracy of this technology, some significant concerns still exist, which can potentially hinder its further adoption. For instance, a fingerprint is permanently associated with an individual and, once stolen, cannot be replaced, thus compromising biometric‐based authentication. To mitigate this concern, we previously designed a multi‐factor authentication approach that integrates Type‐1 and Type‐3 authentication factors into a fingerprint‐based personal identification number (PIN). To authenticate, a subject is required to present a sequence of fingerprints corresponding to the digits of the PIN, based on a predefined secret mapping between digits and fingers. We conducted a preliminary vulnerability analysis and demonstrated that this approach is robust to the compromise of one or more of the subject's fingerprints. The objective of the work presented in this paper is to identify any usability issues for this FingerPIN scheme, collect qualitative and quantitative data through a user study, and determine the participants' satisfaction with the authentication mechanism. We carried out systematic usability tests, designed suitable performance metrics for assessing authentication usability on an initial cohort of 100 individuals, and performed a comparative analysis of the FingerPIN scheme against traditional sequential multi‐factor authentication schemes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
生物特征多因素认证:论FingerPIN方案的可用性
基于指纹的身份验证已经成功地应用于广泛的应用,包括执法和移民,由于它比传统的基于密码的身份验证有许多优点。尽管该技术具有可用性和准确性,但仍然存在一些重大问题,这可能会阻碍其进一步采用。例如,指纹与个人永久关联,一旦被盗,就无法替换,从而危及基于生物特征的身份验证。为了减轻这种担忧,我们之前设计了一种多因素身份验证方法,将1型和3型身份验证因素集成到基于指纹的个人识别号码(PIN)中。为了验证身份,受试者需要根据数字和手指之间预定义的秘密映射,提供与PIN数字相对应的指纹序列。我们进行了初步的漏洞分析,并证明这种方法对于一个或多个主体指纹的泄露是稳健的。本文提出的工作目标是确定该FingerPIN方案的可用性问题,通过用户研究收集定性和定量数据,并确定参与者对身份验证机制的满意度。我们进行了系统的可用性测试,设计了合适的性能指标来评估100个人的初始队列认证可用性,并对FingerPIN方案与传统的顺序多因素认证方案进行了比较分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
5.30%
发文量
80
期刊最新文献
Physically secure and privacy‐preserving blockchain enabled authentication scheme for internet of drones A new authentication scheme for dynamic charging system of electric vehicles in fog environment Enhancing android application security: A novel approach using DroidXGB for malware detection based on permission analysis Designing access control security protocol for Industry 4.0 using Blockchain‐as‐a‐Service An efficient lightweight authentication scheme for dew‐assisted IoT networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1