Applied Sciences (Mar 2023)

A Robust and Effective Two-Factor Authentication (2FA) Protocol Based on ECC for Mobile Computing

  • Kaijun Liu,
  • Zhou Zhou,
  • Qiang Cao,
  • Guosheng Xu,
  • Chenyu Wang,
  • Yuan Gao,
  • Weikai Zeng,
  • Guoai Xu

DOI
https://doi.org/10.3390/app13074425
Journal volume & issue
Vol. 13, no. 7
p. 4425

Abstract

Read online

The rapid development of mobile computing (e.g., mobile health, mobile payments, and smart homes) has brought great convenience to our lives. It is well-known that the security and privacy of user information from these applications and services is critical. Without the prevention provided by an authentication mechanism, safety vulnerabilities may accumulate, such as illegal intrusion access resulting in data leakage and fraudulent abuse. Luckily, the two-factor authentication (2FA) protocols can secure access and communication for mobile computing. As we understand it, existing 2FA authentication protocols weaken security in the pursuit of high efficiency. How efficiency can be achieved while preserving the protocol’s security remains a challenge. In this study, we designed a robust and effective 2FA protocol based on elliptic curve cryptography (ECC) for authentication of users and service providers. We proved the robustness (respectively, the effectiveness) of the presented protocol with the heuristic analysis and security verification provided by the ProVerif tool (respectively, with a performance comparison based on six schemes). Performance comparisons in terms of message rounds, communication, and computation overheads showed that our scheme was superior to the exiting schemes or comparable as a whole; i.e., only two rounds, 1376 bits, and 1.818 ms were required in our scheme, respectively. The evaluation results showed that the proposed 2FA protocol provides a better balance between security and availability compared to state-of-the-art protocols.

Keywords