A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System

B Baruah, S Dhal - Computers & Security, 2018 - Elsevier
Smart Home is an emerging key-element of the advantages of Internet of Things (IoT), which
facilitates an individual to have control over the smart devices of his house through the …

Analysis of vulnerabilities that can occur when generating one-time password

H Kim, J Han, C Park, O Yi - Applied Sciences, 2020 - mdpi.com
Featured Application Cryptography; Random Number analysis. Abstract A one-time
password (OTP) is a password that is valid for only one login session or transaction, in IT …

Pick location security: Seamless integrated multi-factor authentication

KI Ramatsakane, WS Leung - 2017 IST-Africa Week …, 2017 - ieeexplore.ieee.org
Authentication is one of the key aspects of securing applications and systems alike. While in
most existing systems this is achieved using usernames and passwords it has been …

Analysis of Distinguishable Security between the One-Time Password Extraction Function Family and Random Function Family

H Kim, O Yi - Applied Sciences, 2023 - mdpi.com
Featured Application Cryptography; Random Number analysis. Abstract A one-time
password is a security system that uses a password that is only used once for authentication …

Secure three-tier authentication approach for agricultural internet of things

R Lama, S Karmakar - Cyber-Physical Systems, 2024 - Taylor & Francis
ABSTRACT The Agricultural Internet of Things (AIOT) transforms food production by
integrating IoT and IFTTT services in farming. Devices gather data on temperature, humidity …

M2U2: Multifactor Mobile Based Unique User Authentication Mechanism

R Bhalla, N Jeyanthi - Intelligent Systems Design and Applications: 18th …, 2020 - Springer
Identifying and validating the user is a major concern in a heterogeneous network domain.
Conventional algorithms and mechanisms could authenticate the users/messages, but with …

A Composite Vulnerability Assessment Tool for Authentication Factor Multiplicity Technologies

A English - 2020 - search.proquest.com
This study explored the relationship between authentication factor multiplicity and composite
vulnerability exposures, providing a novel instrument to compute composite vulnerability …

[PDF][PDF] NOVEL APPROACH FOR END USER SECURITY ACCESS IN CYBER PHYSICAL SYSTEM USING MULTILAYER AUTHENTICATION

M Maranco, V Manikandan - ijcse.com
The exponential growth of cyber-physical systems (CPS), new security challenges have
emerged. In this manuscript, we propose and systematize existing research on CPS security …

[PDF][PDF] An approach to implement secure user authentication scheme using secret values extracted from private information and unique biometric images of user …

R Das, A Chakraborty, S Nandi, S Dutta - Int. J. Appl. Eng. Res, 2017 - academia.edu
Proposed system introduces a numeric OTP (one time password) based authentication
system where a secured value extracted from user private information (user id, password …

[引用][C] Auth4app: Protocols for identification and authentication using mobile applications

D Kreutz, R Fernandes, G Paz, T Jenuario… - Anais do XX Simpósio …, 2020 - SBC