FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal

Savio Sciancalepore, Simone Raponi, Daniele Caldarola, Roberto Di Pietro

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Abstract

Multi-Factor Authentication (MFA) schemes currently used for verifying the authenticity of Internet banking transactions rely either on dedicated devices (namely, tokens) or on out-of-band channels—typically, the mobile cellular network. However, when both the dedicated devices and the additional channel are not available and the Primary Authentication Terminal (PAT) is compromised, MFA schemes cannot reliably guarantee transaction authenticity. The afore-mentioned situation is typical, e.g., offshore or on-board of aircraft, when only few untrusted terminals have Internet connection. In this paper, we present FRACTAL, a new scheme providing single-channel transaction MFA through general-purpose additional authentication terminals. Moreover, the proposed solution is also resilient against a potentially-compromised PAT. FRACTAL easily scales up as per the number of multiple authentication factors, and it is extensible beyond the banking scenario, e.g., to unattended and constrained scenarios, by integrating also Internet of Things (IoT) devices as additional authentication terminals. Other than enjoying a formal verification of its security properties via ProVerif, FRACTAL is also supported by an extensive experimental performance assessment. Our real-world Proof-of-Concept scenarios, implemented using Spring micro-services, show that FRACTAL can complete a transaction in about 2 s, independently from the remote server location. The flexibility of use, the guaranteed security, and the striking performance, characterize FRACTAL as a solution with an expected high potential impact in the authentication field, for both Industry and Academia.

Original languageEnglish
Title of host publicationInformation and Communications Security - 24th International Conference, ICICS 2022, Proceedings
EditorsCristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati
PublisherSpringer
Pages201-217
Number of pages17
ISBN (Print)9783031157769
DOIs
Publication statusPublished - 2022
Event24th International Conference on Information and Communications Security, ICICS 2022 - Canterbury, United Kingdom
Duration: 5 Sept 20228 Sept 2022

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13407 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference24th International Conference on Information and Communications Security, ICICS 2022
Country/TerritoryUnited Kingdom
CityCanterbury
Period5/09/228/09/22

Bibliographical note

Funding Information:
Acknowledgements. This work was supported by both the HBKU Technology Development Fund under contract TDF 02-0618-190005 and the NPRP-S-11-0109-180242 from the QNRF-Qatar National Research Fund. Both HBKU and QNRF are members of The Qatar Foundation. This work has been partially supported also by the INTERSCT project, Grant No. NWA.1162.18.301, funded by Netherlands Organisation for Scientific Research (NWO). The findings reported herein are solely responsibility of the authors.

Publisher Copyright:
© 2022, Springer Nature Switzerland AG.

Funding

Acknowledgements. This work was supported by both the HBKU Technology Development Fund under contract TDF 02-0618-190005 and the NPRP-S-11-0109-180242 from the QNRF-Qatar National Research Fund. Both HBKU and QNRF are members of The Qatar Foundation. This work has been partially supported also by the INTERSCT project, Grant No. NWA.1162.18.301, funded by Netherlands Organisation for Scientific Research (NWO). The findings reported herein are solely responsibility of the authors.

Keywords

  • Cryptographic protocols
  • Internet transactions
  • Network security

Fingerprint

Dive into the research topics of 'FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal'. Together they form a unique fingerprint.

Cite this