A multifactor multilevel and interaction based (m2i) authentication framework for internet of things (iot) applications
S AlJanah, N Zhang, SW Tay - IEEE Access, 2022 - ieeexplore.ieee.org
… authentication for IoT by proposing a multi-factor multi-level and interaction based (M2I)
authentication … Evaluation results also show that the two factor authentication option costs twice …
authentication … Evaluation results also show that the two factor authentication option costs twice …
[PDF][PDF] Decentralized Identity Management for Industrial Internet of Things Utilizing Blockchain-Enhanced Multi-Factor Authentication
M Al Qurashi - International Journal of Computer Networks and …, 2024 - ijcna.org
… by using a Decentralised Identity Management System with … identity management that involves
a private Blockchain network along … , and tamper-proof system. The approach is evaluated …
a private Blockchain network along … , and tamper-proof system. The approach is evaluated …
Secure multi‐factor remote user authentication scheme for Internet of Things environments
PK Dhillon, S Kalra - … Journal of Communication Systems, 2017 - Wiley Online Library
… , as it proposes a lightweight multi-factor authentication protocol for use with smart
devices. Furthermore, for biometrics digest value generation, we use a more efficient block-Discrete …
devices. Furthermore, for biometrics digest value generation, we use a more efficient block-Discrete …
[HTML][HTML] An effective multifactor authentication mechanism based on combiners of hash function over internet of things
… the cyberattacks over IoT networks. The aim of this paper is to provide an effective
multifactor authentication solution that tackles the aforementioned problems over IoT Network. …
multifactor authentication solution that tackles the aforementioned problems over IoT Network. …
Authentication systems in internet of things
T Borgohain, A Borgohain, U Kumar… - arXiv preprint arXiv …, 2015 - arxiv.org
… multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet
of Things, … He has 17 years of experience in engineering large complex software system for …
of Things, … He has 17 years of experience in engineering large complex software system for …
Application of multi factor authentication in internet of things domain
U Gupta - arXiv preprint arXiv:1506.03753, 2015 - arxiv.org
… security which if overlooked allows unauthorized users to access systems and steal data. …
for multi-factor authentication has come up and how it can be deployed in various systems is …
for multi-factor authentication has come up and how it can be deployed in various systems is …
Blockchain-based multi-factor authentication: A systematic literature review
MS Almadani, S Alotaibi, H Alsobhi, OK Hussain… - Internet of Things, 2023 - Elsevier
… Thus, such systems must have effective authentication … of using blockchain technology
with multi-factor authentication … proposes a blockchain-based multi-factor authentication-as-a- …
with multi-factor authentication … proposes a blockchain-based multi-factor authentication-as-a- …
Multi-factor Authentication for the Internet of Things
… schemes for real-time data access directly from sensor nodes in Hierarchical Wireless
Sensor Networks (HWSN) remains a very challenging problem. Two two-factor authentication …
Sensor Networks (HWSN) remains a very challenging problem. Two two-factor authentication …
A review of multi-factor authentication in the Internet of Healthcare Things
… the legitimate user of a system. Often passwords are used in combination with two-factor
authentication (2FA) or MFA, namely two or more factors of authentication are used to enhance …
authentication (2FA) or MFA, namely two or more factors of authentication are used to enhance …
Lightweight multi-factor mutual authentication protocol for IoT devices
… A multi-factor authentication protocol The proposed scheme is based on multiple factors to
… mutual multi-factor authentication protocol is proposed for IoT systems. The proposed sche…
… mutual multi-factor authentication protocol is proposed for IoT systems. The proposed sche…