2022 10th International Conference on Information and Communication Technology (ICoICT) 2022
DOI: 10.1109/icoict55009.2022.9914866
|View full text |Cite
|
Sign up to set email alerts
|

Secure Two-Factor Authentication for IoT Device

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…RFID: In the realm of RFID, research papers [65][66][67][68] centre around the authentication and authorization of RFID devices, particularly in supply chain management, access control, and asset tracking. This domain contributes 6% to IoT-based authentication technologies, underscoring its significance in diverse applications.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
See 2 more Smart Citations
“…RFID: In the realm of RFID, research papers [65][66][67][68] centre around the authentication and authorization of RFID devices, particularly in supply chain management, access control, and asset tracking. This domain contributes 6% to IoT-based authentication technologies, underscoring its significance in diverse applications.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
“…This section will delve into the five contribution approaches for each domain, and they have been mapped in Table 7. Among the most popular problems involves addressing the issue of computational constraints associated with authentication processes in IoT, which leads to the proposal of a lightweight authentication framework [7,44,55,59,61,64,65,67,70], especially when integrating blockchain technology [80]. Another problem arose from the risk to personal data (or data privacy), which requires a secure communication protocol to protect the privacy and reliability of IoT communications [10,30,32,33,50,52,53,65,71,77].…”
Section: Rq4 What Is the Contribution Of Authentication In Iot System?mentioning
confidence: 99%
See 1 more Smart Citation
“…These devices are vulnerable to spoofing or impersonation attacks, which can be mitigated through the use of 2FA. Several studies have demonstrated the effectiveness of using 2FA to secure IoT systems from these types of attacks [1]- [6]. For example, [7] presents a 2FA protocol for IoT devices that utilizes physically unclonable functions and the characteristics of the wireless signal emitted by the device to secure it against spoofing and other types of attacks.…”
Section: Related Workmentioning
confidence: 99%
“…((name, feature_importance)) 46 47 # create table of results 48print(" +------------------+-------------------------+" ) 49 print("| Model Name | Feature Importance |") 50 print(" +------------------+-------------------------+" )51 for result in results: 52 print("| " + result[0].ljust(16) + " " + 53 "| " + str(result[1]). ljust(30) + " " + 54 "|")55 print(" +------------------+-------------------------+" ) .sum(feature_importance) 64…”
mentioning
confidence: 99%