A multifactor multilevel and interaction based (m2i) authentication framework for internet of things (iot) applications

S AlJanah, N Zhang, SW Tay - IEEE Access, 2022 - ieeexplore.ieee.org
authentication for IoT by proposing a multi-factor multi-level and interaction based (M2I)
authentication … Evaluation results also show that the two factor authentication option costs twice …

[PDF][PDF] Decentralized Identity Management for Industrial Internet of Things Utilizing Blockchain-Enhanced Multi-Factor Authentication

M Al Qurashi - International Journal of Computer Networks and …, 2024 - ijcna.org
… by using a Decentralised Identity Management System with … identity management that involves
a private Blockchain network along … , and tamper-proof system. The approach is evaluated …

Secure multifactor remote user authentication scheme for Internet of Things environments

PK Dhillon, S Kalra - … Journal of Communication Systems, 2017 - Wiley Online Library
… , as it proposes a lightweight multi-factor authentication protocol for use with smart
devices. Furthermore, for biometrics digest value generation, we use a more efficient block-Discrete …

[HTML][HTML] An effective multifactor authentication mechanism based on combiners of hash function over internet of things

AA Ahmed, WA Ahmed - Sensors, 2019 - mdpi.com
… the cyberattacks over IoT networks. The aim of this paper is to provide an effective
multifactor authentication solution that tackles the aforementioned problems over IoT Network. …

Authentication systems in internet of things

T Borgohain, A Borgohain, U Kumar… - arXiv preprint arXiv …, 2015 - arxiv.org
multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet
of Things, … He has 17 years of experience in engineering large complex software system for …

Application of multi factor authentication in internet of things domain

U Gupta - arXiv preprint arXiv:1506.03753, 2015 - arxiv.org
… security which if overlooked allows unauthorized users to access systems and steal data. …
for multi-factor authentication has come up and how it can be deployed in various systems is …

Blockchain-based multi-factor authentication: A systematic literature review

MS Almadani, S Alotaibi, H Alsobhi, OK Hussain… - Internet of Things, 2023 - Elsevier
… Thus, such systems must have effective authentication … of using blockchain technology
with multi-factor authentication … proposes a blockchain-based multi-factor authentication-as-a- …

Multi-factor Authentication for the Internet of Things

AS Cvetković, V Radojčić, S Adamović - 2021 - doisrpska.nub.rs
… schemes for real-time data access directly from sensor nodes in Hierarchical Wireless
Sensor Networks (HWSN) remains a very challenging problem. Two two-factor authentication

A review of multi-factor authentication in the Internet of Healthcare Things

T Suleski, M Ahmed, W Yang, E Wang - Digital Health, 2023 - journals.sagepub.com
… the legitimate user of a system. Often passwords are used in combination with two-factor
authentication (2FA) or MFA, namely two or more factors of authentication are used to enhance …

Lightweight multi-factor mutual authentication protocol for IoT devices

R Melki, HN Noura, A Chehab - International Journal of Information …, 2020 - Springer
… A multi-factor authentication protocol The proposed scheme is based on multiple factors to
… mutual multi-factor authentication protocol is proposed for IoT systems. The proposed sche…