2019
DOI: 10.1109/mnet.2019.1800240
|View full text |Cite
|
Sign up to set email alerts
|

Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications

Abstract: The unprecedented proliferation of smart devices together with novel communication, computing, and control technologies have paved the way for the Advanced Internet of Things (A-IoT). This development involves new categories of capable devices, such as high-end wearables, smart vehicles, and consumer drones aiming to enable efficient and collaborative utilization within the Smart City paradigm. While massive deployments of these objects may enrich people's lives, unauthorized access to the said equipment is po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 82 publications
(31 citation statements)
references
References 13 publications
(14 reference statements)
0
31
0
Order By: Relevance
“…However, such proof comes in different ways, and it is associated with the identity credentials. There are various types of credentials, usually classified as: knowledge, possession, inherence and context-aware factor [51,52]. Except for the inherence factor, all authentication methods are valid to both human and nonhuman users.…”
Section: Authentication Methodsmentioning
confidence: 99%
“…However, such proof comes in different ways, and it is associated with the identity credentials. There are various types of credentials, usually classified as: knowledge, possession, inherence and context-aware factor [51,52]. Except for the inherence factor, all authentication methods are valid to both human and nonhuman users.…”
Section: Authentication Methodsmentioning
confidence: 99%
“…For instance, we observe different device locking mechanisms in wearables, including fingerprinting and facial recognition techniques. Such specific biometry-related data associated with users is the most sensitive information since passwords can be changed while most of biometry or behaviour factors remain unchanged over life of an individual [208]. It has been observed that most commercially available wearables often have very minimal or no security features due to performance degradation issues since many of the available data encryption and security techniques are compute-intensive for wearables [180].…”
Section: Inefficient Routingmentioning
confidence: 99%
“…Therefore, the proposed model ensures maximum scalability when security is high, and restricts scalability when security is low. In this study, we compare the proposed method with the conventional authentication method [39,40] using a network simulation model.…”
Section: Performance Evaluationmentioning
confidence: 99%