Abstract
Trusted computing architecture ensures the behavior of software that runs on a user machine by protecting software-level attacks. Due to the potential of exposing a user's private information while accessing a system, many studies have focused on analyzing existing protocols to develop new methods based on biometrics or additional devices to add new layers of security to the authentication process. For a few years, the idea of utilizing the combination of something you know with something you have and a personal authentication device (PAD) has become common in verification protocols. Very recently, a more secure PAD, namely the Offline Personal Authentication Device (OffPAD), was invented to improve the authentication process. This single device can be used to manage the identities of both users and service providers as well as support the authentication process, while being offline most of the time. In this paper, a rigorous vulnerability analysis for OffPAD-based authentication techniques is conducted using an attack tree analysis. Finally, to overcome the vulnerabilities, mitigation techniques are proposed.
| Original language | English |
|---|---|
| Pages (from-to) | 6071-6081 |
| Number of pages | 11 |
| Journal | IEEE Access |
| Volume | 6 |
| DOIs | |
| State | Published - 2 Jan 2018 |
Bibliographical note
Publisher Copyright:© 2013 IEEE.
Keywords
- Data origin authentication
- biometric authentication
- entity authentication
- offline personal authentication device (OffPAD)
- vulnerability analysis
ASJC Scopus subject areas
- General Computer Science
- General Materials Science
- General Engineering