Secure Login Using Multi-Tier Authentication Schemes in Fog Computing
Journal Title: EAI Endorsed Transactions on Internet of Things - Year 2017, Vol 3, Issue 11
Abstract
Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, their vulnerabilities, security threats and their solution proposed over the period of 2012-2016. We compare the performance of existing multi-tier authentication schemes on three parameters, i.e., cost, usability and level of security. Multi-tier authentication schemes have been categorized into groups according to the factors involved in the authentication process. Lastly, we aim to provide an easy and concise view of the underlying authentication model adapted by each approach
Authors and Affiliations
Awais Manzoor, Abdul Wahid, Munam Ali Shah, Adnan Akhunzada, Faisal Fayyaz Qureshi
Towards Smart and Sustainable Future Cities Based on Internet of Things for Developing Countries: What Approach for Africa?
This article aims first at reviewing and discussing previous works on Internet of Things based sustainable smart cities. Secondly, it proposes an ideological and technical framework that better suits communities in futur...
Internet of Things Enabled In-Home Health Monitoring System Using Early Warning Score
Early warning score (EWS) is an approach to detect the deterioration of a patient. It is based on a fact that there are several changes in the physiological parameters prior a clinical deterioration of a patient. Current...
An analytical model of information spreading through conjugation in bacterial nanonetworks
Molecular communications are a powerful tool to implement communication functionalities in environments where the use of electromagnetic waves becomes critical, e.g. in the human body. Molecules such as proteins, DNA, RN...
SAND: Smart and Adaptable Networking Design Using Virtual Slicing over Software-Defined Network
The importance of reliable and adaptable networks has become increasingly relevant with the escalation of connectivity in our lives. The growth of streaming of entertainment and development of always online software has...
A heuristic procedure for compact Markov representation of PH distributions
The minimal Markovian representation of PH distributions is an open research problem, which was actively investigated during the last two decades. We present a numerical method for finding small Markovian representation...