2020
DOI: 10.1109/access.2020.2990604
|View full text |Cite
|
Sign up to set email alerts
|

0EISUA: Zero Effort Indoor Secure User Authentication

Abstract: Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor can be one or more of something a user knows (password, or phrase), something a user possesses (smart card, or smartphone), something a user is (fingerprint, or iris), something a user does (keystroke), or somewhere a user is (location). In a conventional 2FA system, a user is required to interacts (e.g., typing a passcode) in order to implement the second layer of authentication, which is not very user-friendly. Nowa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Usability is defined as the degree to which legitimate users can enter the main gate with an acceptable level of efficiency and satisfaction without compromising the proposed security mechanisms and ease of use without falling into recurring problems [9]. User satisfaction addresses several aspects, including approval and acceptance of the system's functionality and efficiency.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Usability is defined as the degree to which legitimate users can enter the main gate with an acceptable level of efficiency and satisfaction without compromising the proposed security mechanisms and ease of use without falling into recurring problems [9]. User satisfaction addresses several aspects, including approval and acceptance of the system's functionality and efficiency.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…Smartphones provide a means for verifying a user's identity. Reference [9] used smartphones to verify user login information. They designed a smart gate that uses broadcast messages from a mobile app that connects to the gate to allow or deny access.…”
Section: ) Smartphone-centered Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…The choice of user verification design hinges on the required security level. Solutions dependent on authorization techniques are typically more susceptible to security threats, including man-in-the-middle attacks, verifier theft, guessing, forgery, and eavesdropping [22]. Conversely, the efficacy of authentication methods is measured by their performance, cost-effectiveness, and user-friendliness.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These systems rely on capturing and analyzing the ambient sound in the user's environment, which may include private conversations or other sensitive information. In 2020, we published a paper that presents an indoor 2FA based on something that is in the user's environment that can be implemented indoors only [2]. It is important for 2FA systems to be able to operate in a wide range of environments (indoor and outdoor).…”
Section: Motivationmentioning
confidence: 99%