CFP last date
20 January 2025
Reseach Article

Application of Multi Factor Authentication in Internet of Things Domain

by Udit Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 1
Year of Publication: 2015
Authors: Udit Gupta
10.5120/ijca2015905221

Udit Gupta . Application of Multi Factor Authentication in Internet of Things Domain. International Journal of Computer Applications. 123, 1 ( August 2015), 29-31. DOI=10.5120/ijca2015905221

@article{ 10.5120/ijca2015905221,
author = { Udit Gupta },
title = { Application of Multi Factor Authentication in Internet of Things Domain },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 1 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 29-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number1/21924-2015905221/ },
doi = { 10.5120/ijca2015905221 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:11:32.310402+05:30
%A Udit Gupta
%T Application of Multi Factor Authentication in Internet of Things Domain
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 1
%P 29-31
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication forms the gateway to any secure system. Together with integrity, confidentiality and authorization it helps in preventing any sort of intrusions into the system. Up until a few years back password based authentication was the most common form of authentication to any secure network. But with the advent of more sophisticated technologies this form of authentication although still widely used has become insecure. Furthermore, with the rise of ‘Internet of Things’ where the number of devices would grow manifold it would be infeasible for user to remember innumerable passwords. Therefore, it’s important to address this concern by devising ways in which multiple forms of authentication would be required to gain access to any smart devices and at the same time its usability would be high. In this paper, a methodology is discussed as to what kind of authentication mechanisms could be deployed in internet of things (IOT).

References
  1. Manoj Rameshchandra Thakur, Sugata Sanyal, “A Multi-Dimensional approach towards Intrusion Detection System”, International Journal of Computer Applications, Vol. 48, No. 5, pp. 34-41, June 2012
  2. Manoj Rameshchandra Thakur, Divye Raj Khilnani, Kushagra Gupta, Sandeep Jain,Vineet Agarwal, Suneeta Sane, Sugata Sanyal, Prabhakar S. Dhekne; "Detection and Prevention of Botnets and malware in an enterprise network"; International Journal of Wireless and Mobile Computing; Editor-in-Chief: Zhihua Cui; Vol.5, Nos. 2, 2012, pp. 144-153
  3. Zoltan Gyongi, Hector Garcia-Molina, Jan Pedersen, “Combating web spam with trustbank”, VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30, Pages 576-587, 2004
  4. Ayu Tiwari, Sudip Sanyal, Ajith Abraham, Svein Johan Knapskog, Sugata Sanyal, “A Multifactor Security Protocol For Wireless Payment-Secure Web Authentication using Mobile Devices arXiv preprint arXiv:1111.3010, 2011/11/13
  5. Sugata Sanyal, Ayu Tiwari and Sudip Sanyal, A Multifactor Secure Authentication System for Wireless Payment , Emergent Web Intelligence: Advanced Information Retrieval Book Series: Advanced Information and Knowledge Processing, Ed: Chbeir Richard et al, First Edition, 2010, Chapter 13, pp. 341-369, XVI, Springer Verlag London Limited, 2010 M. Burrows, M. Abadi and R. M. Needham, “A logic of authentication”, University of Cambridge Computer Laboratory, http://www.hpl.hp.com/techreports/Compaq-DEC
  6. Leslie Lamport, “Password authentication with insecure communication”, Communications of the ACM, Volume 24 Issue 11, Pages 770-772, Nov 1981
  7. Min-Shiang Hwang, Li-Hua Li, “A new remote user authentication scheme using smart cards”, IEEE Transactions on Consumer Electronics, Volume 46, Issue 1, Pages 28-30, Feb 2000
  8. BC Neuman, T Ts’ O, “Kerberos: An authentication service for computer networks”, Communications Magazine, IEEE, 1994, http://gost.isi.edu/publications/kerberos-neuman-tso.html
  9. S. P. Miller , B. C. Neuman , J. I. Schiller , J. H. Saltzer, “Kerberos authentication and authorization system (1987)”, In Project Athena Technical Plan, 1987, http://web.mit.edu/saltzer/www/publications/athenaplan/e.2.1. pdf
  10. Feng Xia, Laurence T.Yang, Lizhe Wang and Alexey Vinel, “Internet of Things”, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, Volume 25, Issue 9, pages 1101-1102, September 2012
  11. Kevin Ashton, “That ‘Internet of Things’ Thing”, RFID journal, June 2009, http://www.rfidjournal.com/articles/view?4986
  12. Kortuem G, Kawsar F Fitton D, Sundramoorthy V, “Smart objects as building blocks for internet of things”, Internet Computing IEEE, Volume 14, Issue 1, Pages 44-51, Feb 2010.
  13. ST Dispensa, “Multi factor authentication”, US Patent, Publication number US8365258 B2, Jan 29 2013, http://www.google.co.in/patents/US8365258
  14. Abhilasha Bhargav-Spantzel, Anna Squicciarini, Elisa Bertino, "Privacy preserving multi-factor authentication with biometrics", Proceedings of the second ACM workshop on Digital identity management, Pages 63-72, 2006, http://docs.lib.purdue.edu/ccpubs/313/.
Index Terms

Computer Science
Information Sciences

Keywords

Data integrity authentication multi factor authentication internet of things (IOT) authorization confidentiality usability speed efficiency memorability learnability voice based authentication facial recognition fingerprint recognition location based authentication