Many authors focus on the problem of defining SA
protocols and verifying their security properties. For
instance, in (DeFigueiredo, 2011) the authors carry
out a security evaluation of two-factor authentication
on mobile devices. A similar reasoning is presented in
(Hagalisletto, 2007), but explicitly considering phish-
ing attacks. In (Armando et al., 2013), the authors use
model checking to automatically verify SA protocols.
The FIDO (Fast Identity Online) Alliance (FIDO,
2017) is a prominent initiative for the standardization
of the SA mechanisms. Several important stakehold-
ers, e.g., Google, Paypal and Bank of America, joined
the initiative. Interestingly, however, no EU banks
participate in the FIDO alliance.
Methodology. Our goal is to identify and discuss
the key concepts related to the SA mechanisms and
their features. To do that, we proceeded from abstract
to concrete. In particular, we started from the analysis
of EU directives and recommendations. As a matter
of fact, these documents provide the general defini-
tions and social requirements of the SA mechanisms.
Our presentation follows the temporal evolution of the
key concepts appearing in the documentation.
The analysis of the EU regulations allowed us to
analyze the actual SA implementations and critically
discuss their features against the directives. Thus, we
carried out a systematic review of the SA implemen-
tations used by 26 important international banks cho-
sen among the world top 100 in terms of asset (Rel-
banks, 2016). Banks were selected by considering
their (i) turnover, (ii) number of customers and (iii)
geographical distribution. In particular, we privileged
EU banks (17 out of 26) in order to understand how
they met the EU directives. For each of these banks
we parsed the available documentation referring to the
SA mechanisms, e.g., used for online payments. Such
a documentation included specifications, handbooks
and guidelines. The full list of considered documents
is available at https://sites.google.com/fbk.eu/strong-
auth-banks-survey/.
This paper is structured as follows. In Section 2,
we discuss the main EU regulations related to SA and
online payments. In Section 3, we present the data
collected about the implementations of SA mecha-
nisms. In Sections 4, we provide an overview of the
lesson learned. Section 5 concludes the paper.
2 EU REGULATIONS
In this section we present the history and evolution of
the EU directives and recommendations referring to
SA and related topics, e.g., online payments.
Payment Services Directives in the European
Community (PSD). PSD (EBA, 2007) was pub-
lished by the European Central Bank (ECB) in 2007,
with the aim of creating the basis for a unique area of
payment in the whole EU (the so-called Single Euro
Payments Area). Among those definitions, the PSD
presented the first proposal for EU rules concerning
the Payment Services which are defined as business
activities that allow people
(D1 – PS) to deposit or withdraw cash on or
from a payment account, as well as the opera-
tion of that account; execute payment transactions
(e.g., standing orders, direct debits, etc.) both
on payment accounts or by electronic means; is-
sue and/or receive payment instructions; execute
money remittance [. . . ].
Noticeably, no distinction between traditional
payments (e.g., through a point of sale) and online
payments (i.e. only using the internet) is provided.
Recommendations for the Security of Internet
Payments (RSIP). RSIP (ECB, 2013a) was re-
leased in 2013 and officially became law in 2015. In-
terestingly, it was the first document with a clear def-
inition of Internet Payments (IPs). Indeed, they are
defined as
(D2 – IP) the execution of card payments on the
internet, including virtual card payments, the exe-
cution of credit transfers (CTs) on the internet, the
issuance and amendment of direct debit electronic
mandates and the transfers of electronic money
between two e-money accounts via the internet.
The document also states that IPs should be pro-
tected through a mechanism of Strong Customer Au-
thentication (i.e. SA applied to banking customers).
In this context, SA is defined as
(D3 – SA) a procedure based on the use of two
or more of the following elements—categorised
as knowledge, ownership and inherence: i) some-
thing only the user knows, e.g., static password,
code, personal identification number; ii) some-
thing only the user possesses, e.g., token, smart
card, mobile phone; iii) something the user is, e.g.
biometric characteristic, such as a fingerprint. In
addition, the elements selected must be mutually
independent [. . . ].
It is worth noticing that this definition explicitly
defines the three types of elements (hereafter Authen-
tication Elements, AEs in short) that one can adopt to
achieve SA. In addition, the definition states that the
adopted AEs must be mutually independent, i.e. two
AEs cannot be compromised by a single action.
Strong Authentication for e-Banking: A Survey on European Regulations and Implementations
481