How many FIDO protocols are needed? Analysing the technology, security and compliance

Author:

Angelogianni Anna1ORCID,Politis Ilias2ORCID,Xenakis Christos3ORCID

Affiliation:

1. Digital Systems, University of Piraeus, Piraeus, Greece

2. InQbit Innovations SRL, Bucharest Romania

3. University of Piraeus, Piraeus Greece

Abstract

To overcome the security vulnerabilities caused by weak passwords, thus bridge the gap between user friendly interfaces and advanced security features, the Fast IDentity Online (FIDO) alliance defined a number of authentication protocols. The existing literature leverages all versions of the FIDO protocols, without indicating the reasons behind the choice of each individual FIDO protocol (i.e., U2F, UAF, FIDO2). Inevitably, the question “which protocol is more suitable per case” becomes significant. To provide an answer to the previous question, this article performs a thorough comparative analysis on the different protocol specifications and their technological and market support, to identify whether any protocol has become obsolete. To reach to a conclusion, the proposed approach (i) explores the existing literature, (ii) analyses the specifications released by the FIDO Alliance, elaborating on the security characteristics, (iii) inspects the technical adoption by the industry and (iv) investigates the compliance of the FIDO with standards, regulations and other identity verification protocols. Our results indicate that FIDO2 is the most widely adopted solution; however, U2F remains supported by numerous web services as a two-factor authentication (2FA) choice, while UAF continues to be utilised in mobile clients seeking to offer the Transaction Confirmation feature.

Publisher

Association for Computing Machinery (ACM)

Reference148 articles.

1. 2021. Can I use: WebAuthn. Retrieved 14 April 2024 from https://caniuse.com/?search=webauthn

2. 2015. USB-Dongle Authentication. Retrieved 14 April 2024 from https://www.dongleauth.info/

3. Dipankar Dasgupta Arunava Roy and Abhijit Nag. 2016. Toward the design of adaptive selection strategies for multi-factor authentication. Computers & Security 63 (2016) 85–116. 10.1016/j.cose.2016.09.004

4. Poster

5. FIDO Alliance. 2023. Conformance Self-Validation Testing. Retrieved 14 April 2024 from https://fidoalliance.org/certification/functional-certification/conformance/

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3