Explore chapters and articles related to this topic
Functional Architectures for Authorization and Asset Management
Published in Denise Bedford, Knowledge Architectures, 2020
Authentication begins when a user tries to access information. First, the user must prove his access rights and identity. If the requester or consumer has no known identity or does not provide authenticated information, they are assigned to a group of users commonly labeled ‘Guest’ or ‘Anonymous.’ Anonymous consumers or guests have no requirement to authenticate. We confer limited authorization privileges on these consumers. Most authentication, though, is multifaceted and can require several levels or forms of identification. Most authentication strategies are multifaceted, meaning that they rely on more than one form of identification. And, most authentication systems begin with a baseline of ‘no identification’ or ‘anonymous requester.’ Multi-factor authentication (MFA) is a method of logon verification where at least two different factors of proof are required. MFA is also referred to as 2FA, which stands for two-factor authentication. MFA helps protect your data (email, financial accounts, health records, etc.) or assets by adding an extra layer of security. There are generally three recognized types of authentication factors, depending on (1) something you know; (2) something you have; or (3) something you are. It is the easiest way to think about the architectures your organization likely has in the ‘built’ environment.
Recent Trends of IoT and Big Data in Research Problem-Solving
Published in Shivani Agarwal, Sandhya Makkar, Duc-Tan Tran, Privacy Vulnerabilities and Data Security Challenges in the IoT, 2020
Pham Thi Viet Huong, Tran Anh Vu
Multi-factor authentication strategies, which require more than one method of authentication to confirm the user’s identity for a login or other transaction, give additional security to communications between devices and systems. Multi-factor authentication may comprise a MAC address, ID, password of mobile devices and MAC address, or Ipv6 address of controlled objects [42]. These variables are finger-printed and changed into a unique value, which plays a critical part in identifying the subjects for the proper access control in the IoT environment. Another possibility is a two-factor authentication protocol based on two-way authentication for RFID systems [43].
Design of a Secure Infrastructure for Cognitive IoT Platforms and Applications
Published in Pethuru Raj, Anupama C. Raman, Harihara Subramanian, Cognitive Internet of Things, 2022
Pethuru Raj, Anupama C. Raman, Harihara Subramanian
Another authentication mechanism which is commonly used is called multi-factor authentication. Multi-factor authentication is a special authentication technique which uses a combination of multiple parameters to verify a user’s credentials. An example of multi-factor authentication mechanism is described below:
MAKA: Multi-Factor Authentication and Key Agreement Scheme for LoRa-Based Smart Grid Communication Services
Published in IETE Journal of Research, 2023
Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel
Whenever a new smart meter is introduced to a LoRa network there is a need for activation of the smart meter. There are two methods available in the literature to carry out LoRa-based network activation. The activation methods are named as an Over The Air Activation (OTAA) and an Activation By Personalization (ABP) [8]. In the OTAA, mode there is a security issue i.e. if the LoRa end device (smart meter) gets compromised then the attacker gets access to the session keys. In the ABP, all the session keys are stored inside the end device (SM) at the time of manufacturing. So, the manufacturer is aware of all the session keys and there is a possibility of security attack. Hence, there is a need to revise the activation method of LoRa-based network to maintain the privacy of the end devices and to securely exchange the session keys among the communication entities. In this work, we focus on multi-factor authentication of end devices with the help of device fingerprinting. We proposed to use unique device feature and generate fingerprint for the end device. The proposed Multi-factor Authentication and Key Agreement (MAKA) scheme succeed to maintain the anonymity of the end device and ensures secure key sharing within the LoRa-based smart grid communication services.
Data Hiding in Iris Image for Privacy Protection
Published in IETE Technical Review, 2018
Sheng Li, Xin Chen, Zichi Wang, Zhenxing Qian, Xinpeng Zhang
Jain et al. [8] proposed two scenarios for biometric data protection. In the first scenario, the fingerprint minutiae data is hidden in a cover image to protect the fingerprint minutiae before the image is transmitted through a public channel. In the other scenario, face information is embedded into a fingerprint image as watermarking and then registered on a smart card. At the phase of authentication, the fingerprint image and the reconstructed face image can be extracted for multi-factor authentication. In [9], Vatsa et al. proposed a 3-layer RDWT bio-watermarking algorithm to embed biometric Mel Frequency Cepstral Coefficients (MFCC) coefficients into colour face images. In this way, the robustness and safety of system are enhanced. It firstly uses phase consistency to detect the location of human face features. Furthermore, these key feature areas in the watermark algorithm are skipped, so that the accuracy of the face recognition system is slightly affected.
Blockchain based Sensor System Design For Embedded IoT
Published in Journal of Computer Information Systems, 2023
B. J. Praveena, Arivazhagan N, P. Vijaya Pal Reddy
Melki et al.78 proposed an IoT device with a lightweight multi-factor mutual authentication protocol. This work proposes a lightweight and secure multi-factor authentication protocol for IoT devices. It consists of two methods, configurable Physical Unclonable Function (PUF) in IoT devices. The performance of the proposed approach enhances the security and efficiency of the proposed protocol with a minimum amount of overhead by reducing the cost of communication and computations. Improving performance does not provide reliable and secure connectivity for IoT networks.