Deep Learning-Based Multi-Factor Authentication: A Survey of Biometric and Smart Card Integration Approaches
- URL: http://arxiv.org/abs/2510.05163v1
- Date: Sat, 04 Oct 2025 18:34:16 GMT
- Title: Deep Learning-Based Multi-Factor Authentication: A Survey of Biometric and Smart Card Integration Approaches
- Authors: Abdelilah Ganmati, Karim Afdel, Lahcen Koutti,
- Abstract summary: Multi-Factor Authentication (MFA) combines knowledge-based factors (passwords, PINs), possession-based factors (smart cards, tokens), and inherence-based factors (biometric traits)<n>Recent breakthroughs in deep learning have transformed the capabilities of biometric systems.<n>Smart card technologies have evolved to include on-chip biometric verification, cryptographic processing, and secure storage.
- Score: 4.345882429229813
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In the era of pervasive cyber threats and exponential growth in digital services, the inadequacy of single-factor authentication has become increasingly evident. Multi-Factor Authentication (MFA), which combines knowledge-based factors (passwords, PINs), possession-based factors (smart cards, tokens), and inherence-based factors (biometric traits), has emerged as a robust defense mechanism. Recent breakthroughs in deep learning have transformed the capabilities of biometric systems, enabling higher accuracy, resilience to spoofing, and seamless integration with hardware-based solutions. At the same time, smart card technologies have evolved to include on-chip biometric verification, cryptographic processing, and secure storage, thereby enabling compact and secure multi-factor devices. This survey presents a comprehensive synthesis of recent work (2019-2025) at the intersection of deep learning, biometrics, and smart card technologies for MFA. We analyze biometric modalities (face, fingerprint, iris, voice), review hardware-based approaches (smart cards, NFC, TPMs, secure enclaves), and highlight integration strategies for real-world applications such as digital banking, healthcare IoT, and critical infrastructure. Furthermore, we discuss the major challenges that remain open, including usability-security tradeoffs, adversarial attacks on deep learning models, privacy concerns surrounding biometric data, and the need for standardization in MFA deployment. By consolidating current advancements, limitations, and research opportunities, this survey provides a roadmap for designing secure, scalable, and user-friendly authentication frameworks.
Related papers
- A Comprehensive Survey on Smart Home IoT Fingerprinting: From Detection to Prevention and Practical Deployment [6.063895419883398]
We provide a comprehensive analysis of IoT fingerprinting specifically in the context of smart homes.<n>We review existing techniques, e.g., network traffic analysis or machine learning-based schemes, highlighting their applicability and limitations.<n>We outline open research directions that can advance reliable and privacy-preserving fingerprinting for next-generation smart home ecosystems.
arXiv Detail & Related papers (2025-10-09T18:12:40Z) - Addressing Weak Authentication like RFID, NFC in EVs and EVCs using AI-powered Adaptive Authentication [0.0]
The rapid expansion of the Electric Vehicles (EVs) and Electric Vehicle Charging Systems (EVCs) has introduced new cybersecurity challenges.<n>Traditional authentication mechanisms like Radio Frequency Identification (RFID) and Near Field Communication (NFC) rely on static identifiers and weak encryption.<n>This study explores an AI-powered adaptive authentication framework designed to overcome these shortcomings by integrating machine learning, anomaly detection, behavioral analytics, and contextual risk assessment.
arXiv Detail & Related papers (2025-08-26T22:54:24Z) - A Systematic Survey of Model Extraction Attacks and Defenses: State-of-the-Art and Perspectives [65.3369988566853]
Recent studies have demonstrated that adversaries can replicate a target model's functionality.<n>Model Extraction Attacks pose threats to intellectual property, privacy, and system security.<n>We propose a novel taxonomy that classifies MEAs according to attack mechanisms, defense approaches, and computing environments.
arXiv Detail & Related papers (2025-08-20T19:49:59Z) - Deep Learning Models for Robust Facial Liveness Detection [56.08694048252482]
This study introduces a robust solution through novel deep learning models addressing the deficiencies in contemporary anti-spoofing techniques.<n>By innovatively integrating texture analysis and reflective properties associated with genuine human traits, our models distinguish authentic presence from replicas with remarkable precision.
arXiv Detail & Related papers (2025-08-12T17:19:20Z) - Zero-Trust Foundation Models: A New Paradigm for Secure and Collaborative Artificial Intelligence for Internet of Things [61.43014629640404]
Zero-Trust Foundation Models (ZTFMs) embed zero-trust security principles into the lifecycle of foundation models (FMs) for Internet of Things (IoT) systems.<n>ZTFMs can enable secure, privacy-preserving AI across distributed, heterogeneous, and potentially adversarial IoT environments.
arXiv Detail & Related papers (2025-05-26T06:44:31Z) - AMB-FHE: Adaptive Multi-biometric Fusion with Fully Homomorphic Encryption [3.092212810857262]
We present an adaptive multi-biometric fusion with fully homomorphic encryption (AMB-FHE)<n>AMB-FHE is benchmarked against a bimodal biometric database consisting of the CASIA iris and MCYT fingerprint datasets.
arXiv Detail & Related papers (2025-03-31T11:00:08Z) - Multi-modal biometric authentication: Leveraging shared layer architectures for enhanced security [0.0]
We introduce a novel multi-modal biometric authentication system that integrates facial, vocal, and signature data to enhance security measures.
Our model architecture incorporates dual shared layers alongside modality-specific enhancements for comprehensive feature extraction.
Our approach demonstrates significant improvements in authentication accuracy and robustness, paving the way for advanced secure identity verification solutions.
arXiv Detail & Related papers (2024-11-04T14:27:10Z) - Blockchain-based Zero Trust on the Edge [5.323279718522213]
This paper proposes a novel approach based on Zero Trust Architecture (ZTA) extended with blockchain to further enhance security.
The blockchain component serves as an immutable database for storing users' requests and is used to verify trustworthiness by analyzing and identifying potentially malicious user activities.
We discuss the framework, processes of the approach, and the experiments carried out on a testbed to validate its feasibility and applicability in the smart city context.
arXiv Detail & Related papers (2023-11-28T12:43:21Z) - Accelerated Fingerprint Enhancement: A GPU-Optimized Mixed Architecture
Approach [47.87570819350573]
This document presents a preliminary approach to latent fingerprint enhancement, fundamentally designed around a mixed Unet architecture.
It combines the capabilities of the Resnet-101 network and Unet encoder, aiming to form a potentially powerful composite.
One innovative element of this approach includes a novel Fingerprint Enhancement Gabor layer, specifically designed for GPU computations.
arXiv Detail & Related papers (2023-06-01T01:19:32Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - When Physical Unclonable Function Meets Biometrics [0.5156484100374058]
Electrocardiogram (ECG) based biometric has become popular as it can authenticate patients and monitor the patient's vital signs.
volatile memory-based (NVM) PUF can be easily placed in the device to avoid counterfeit.
Our aim is to provide a comprehensive study on the state-of-the-art developments papers based on biometrics enabled hardware security.
arXiv Detail & Related papers (2020-12-14T20:00:40Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.