2021
DOI: 10.1007/s11227-021-04022-w
|View full text |Cite
|
Sign up to set email alerts
|

A low-area design of two-factor authentication using DIES and SBI for IoT security

Abstract: Internet of things (IoTs) is an integration of heterogeneous physical devices which are interconnected and communicated over the physical Internet. The design of secure, lightweight and an effective authentication protocol is required, because the information is transmitted among the remote user and numerous sensing devices over the IoT network. Recently, two-factor authentication (TFA) scheme is developed for providing the security among the IoT devices. But, the performances of the IoT network are affected d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 25 publications
0
3
0
1
Order By: Relevance
“…An improved IoT security architecture for authorization and authentication, which includes MFA, is presented by Al-Refai [29] to fend against various sorts of threats. With the goal of enhancing efficiency and resource management, Sudha [30] suggests a low-area design of two-factor authentication utilizing the substitution-box-based inverter and Data Inverting Encoding Scheme (DIES) for IoT security.…”
Section: Overview Of Iot Authentication Mechanismsmentioning
confidence: 99%
“…An improved IoT security architecture for authorization and authentication, which includes MFA, is presented by Al-Refai [29] to fend against various sorts of threats. With the goal of enhancing efficiency and resource management, Sudha [30] suggests a low-area design of two-factor authentication utilizing the substitution-box-based inverter and Data Inverting Encoding Scheme (DIES) for IoT security.…”
Section: Overview Of Iot Authentication Mechanismsmentioning
confidence: 99%
“…Therefore, it is unable to apply frequency hopping communication and unable to implement heavy weighted cryptographic scheme for security, making it very difficult to set up security protection system. Meanwhile attacks from the external network such as denial of service (DoS) also bring new security problems [55]. On the other hand, sensor data still require protection for integrity, authenticity and confidentiality; therefore, a lightweight cryptographic scheme such as ECC can be deployed with key agreement protocol.…”
Section: Securing the Perceptual Layer Of Iotmentioning
confidence: 99%
“…A brute-force támadások elleni védekezés legfontosabb eszközei a tűzfalak és az IDS rendszerek, de használatuk mellett is be kell tartani a gyakori jelszócserére és bejelentkezési próbálkozások számának korlátozására vonatkozó általános szabályokat, ajánlott a rendszeres szoftverfrissítés, VPN és erős titkosítás alkalmazása valamint a kétfaktoros hitelesítés bevezetése [25].…”
Section: ][4][5][6][20][21]unclassified