Challenges of multi-factor authentication for securing advanced IoT applications

A Ometov, V Petrov, S Bezzateev, S Andreev… - IEEE …, 2019 - ieeexplore.ieee.org
… when coining novel authentication schemes, and we review … , since the user is not required
to perform any explicit action. … camera nearby to participate in the authentication process. …

Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems

S Challa, AK Das, P Gope, N Kumar, F Wu… - … Computer Systems, 2020 - Elsevier
… and security is important in such environments. In this paper, we design a new authentication
scheme … some mathematical preliminaries required in detailing the proposed scheme. …

A lightweight anonymous user authentication and key establishment scheme for wearable devices

A Gupta, M Tripathi, TJ Shaikh, A Sharma - Computer Networks, 2019 - Elsevier
… a new lightweight anonymous user authentication scheme for … scheme is based on five-step
authentication model where a user initiates an authentication phase by contacting a required

Blockchain-based authentication and authorization for smart city applications

C Esposito, M Ficco, BB Gupta - Information Processing & Management, 2021 - Elsevier
… Such a multi-tenant deployment model is required to lower the … security policy and attributes
within the security systems … As, when data are changed, all the participants see such a …

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi… - Computer Networks, 2020 - Elsevier
… The security of transmitted messages between these participants is a paramount concern; …
u , R g , R s which satisfy required security length and are generated by three different sources …

Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles

Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… factor authentication cannot provide sufficient security required for … entities are permitted to
participate in the CAV systems. … Liao, “Security enhancement on a new authentication scheme

Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication

SG Lyastani, M Schilling, M Neumayr… - … on Security and …, 2020 - ieeexplore.ieee.org
… as the incumbent web authentication scheme is the FIDO2 … Through hands-on tasks our
participants gather first-hand … Because a physical object is required for authentication, the …

A decentralized scalable security framework for end‐to‐end authentication of future IoT communication

PSF Sheron, KP Sridhar, S Baskar… - Transactions on …, 2020 - Wiley Online Library
… The robustness of the authentication scheme is verified … , nodes, and users participating in
the communication. The … The required devices for verification are hence retained other than …

Encouraging users to improve password security and memorability

M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
… more secure and memorable passwords than the participants in … authentication schemes
which aim at aligning security and … passwords, users are typically required to adhere to a set of …

Iot passport: A blockchain-based trust framework for collaborative internet-of-things

B Tang, H Kang, J Fan, Q Li, R Sandhu - … of the 24th ACM symposium on …, 2019 - dl.acm.org
… of participating platforms and end users, and opens new avenues … , which is commonly
required in most commodity user scenarios. … -based authentication system for IoT. Computers & …