Secure Login Using Multi-Tier Authentication Schemes in Fog Computing

Journal Title: EAI Endorsed Transactions on Internet of Things - Year 2017, Vol 3, Issue 11

Abstract

Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, their vulnerabilities, security threats and their solution proposed over the period of 2012-2016. We compare the performance of existing multi-tier authentication schemes on three parameters, i.e., cost, usability and level of security. Multi-tier authentication schemes have been categorized into groups according to the factors involved in the authentication process. Lastly, we aim to provide an easy and concise view of the underlying authentication model adapted by each approach

Authors and Affiliations

Awais Manzoor, Abdul Wahid, Munam Ali Shah, Adnan Akhunzada, Faisal Fayyaz Qureshi

Keywords

Related Articles

A new algorithm and routing protocol based on convolutional codes using TCNet: Trellis Coded Network

Currently emerging technologies have taken advantage of the possibility of communication with the World Wide Web to expand to all applications of this technology, among them the Internet of Things – IoT. This work propos...

BER and NCMSE based Estimation algorithms for Underwater Noisy Channels

Channel estimation and equalization of sparse multipath channels is a real matter of concern for researchers in the recent past. Such type of channel impulse response is depicted by a very few significant non-zero taps t...

Internet of Things Enabled In-Home Health Monitoring System Using Early Warning Score

Early warning score (EWS) is an approach to detect the deterioration of a patient. It is based on a fact that there are several changes in the physiological parameters prior a clinical deterioration of a patient. Current...

A Search Algorithm Based on K-Weighted Search Tree

Aiming at the issue of low efficiency in Peer-to-Peer (P2P) network system, a search algorithm based on K-weighted search tree is proposed. The k-weighted search tree serving the search is constructed. The nodes are rank...

FREACSIM - A Framework for Creating and Simulating Real-Time Capable Network on Chip Systems and Applications

This paper presents the new Framework for Real-time capable Embedded system and ArChitecture SIMulation (FREACSIM), a highly configurable full-system simulation environment enabling and easing the modeling, simulation an...

Download PDF file
  • EP ID EP46603
  • DOI http://dx.doi.org/10.4108/eai.26-3-2018.154382
  • Views 314
  • Downloads 0

How To Cite

Awais Manzoor, Abdul Wahid, Munam Ali Shah, Adnan Akhunzada, Faisal Fayyaz Qureshi (2017). Secure Login Using Multi-Tier Authentication Schemes in Fog Computing. EAI Endorsed Transactions on Internet of Things, 3(11), -. https://europub.co.uk/articles/-A-46603