Secure Login Using Multi-Tier Authentication Schemes in Fog Computing
Journal Title: EAI Endorsed Transactions on Internet of Things - Year 2017, Vol 3, Issue 11
Abstract
Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, their vulnerabilities, security threats and their solution proposed over the period of 2012-2016. We compare the performance of existing multi-tier authentication schemes on three parameters, i.e., cost, usability and level of security. Multi-tier authentication schemes have been categorized into groups according to the factors involved in the authentication process. Lastly, we aim to provide an easy and concise view of the underlying authentication model adapted by each approach
Authors and Affiliations
Awais Manzoor, Abdul Wahid, Munam Ali Shah, Adnan Akhunzada, Faisal Fayyaz Qureshi
A new algorithm and routing protocol based on convolutional codes using TCNet: Trellis Coded Network
Currently emerging technologies have taken advantage of the possibility of communication with the World Wide Web to expand to all applications of this technology, among them the Internet of Things – IoT. This work propos...
BER and NCMSE based Estimation algorithms for Underwater Noisy Channels
Channel estimation and equalization of sparse multipath channels is a real matter of concern for researchers in the recent past. Such type of channel impulse response is depicted by a very few significant non-zero taps t...
Internet of Things Enabled In-Home Health Monitoring System Using Early Warning Score
Early warning score (EWS) is an approach to detect the deterioration of a patient. It is based on a fact that there are several changes in the physiological parameters prior a clinical deterioration of a patient. Current...
A Search Algorithm Based on K-Weighted Search Tree
Aiming at the issue of low efficiency in Peer-to-Peer (P2P) network system, a search algorithm based on K-weighted search tree is proposed. The k-weighted search tree serving the search is constructed. The nodes are rank...
FREACSIM - A Framework for Creating and Simulating Real-Time Capable Network on Chip Systems and Applications
This paper presents the new Framework for Real-time capable Embedded system and ArChitecture SIMulation (FREACSIM), a highly configurable full-system simulation environment enabling and easing the modeling, simulation an...