Secure Login Using Multi-Tier Authentication Schemes in Fog Computing

Journal Title: EAI Endorsed Transactions on Internet of Things - Year 2017, Vol 3, Issue 11

Abstract

Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, their vulnerabilities, security threats and their solution proposed over the period of 2012-2016. We compare the performance of existing multi-tier authentication schemes on three parameters, i.e., cost, usability and level of security. Multi-tier authentication schemes have been categorized into groups according to the factors involved in the authentication process. Lastly, we aim to provide an easy and concise view of the underlying authentication model adapted by each approach

Authors and Affiliations

Awais Manzoor, Abdul Wahid, Munam Ali Shah, Adnan Akhunzada, Faisal Fayyaz Qureshi

Keywords

Related Articles

Parkinson’s disease as a Working Model for Global Healthcare Restructuration: The Internet of Things and Wearables Technologies

With the rapid growth and increased life expectancy of the world’s population, the prevalence of chronic disorders such as Parkinson’s disease (PD) is also increasing. This challenges the current healthcare system in ter...

A Practical Group Authentication Scheme for Smart Devices in IoT

Internet of things (IoT) is used to provide real-time data collection and analysis of the target area by the cooperation of low-cost devices. The authentication towards multiple devices has become the research hot-spot c...

Experiments of An active electrode amplifier using SIP with DC rejection for bio-potential recording

We present a bioelectric amplifier with SIP for active electrode in this paper .The mid-band gain of the amplifier is 39.95dB.The bandwidth extends from a low frequency cutoff of 7.9mHz to a high frequency cutoff of 2.1k...

Correlations between Inertial Body Sensor Measures and Clinical Measures in Multiple Sclerosis

Gait assessment using inertial body sensors is becoming popular as an outcome measure in multiple sclerosis (MS) research, supplementing clinical observations and patient-reported outcomes with precise, objective measure...

A Search Algorithm Based on K-Weighted Search Tree

Aiming at the issue of low efficiency in Peer-to-Peer (P2P) network system, a search algorithm based on K-weighted search tree is proposed. The k-weighted search tree serving the search is constructed. The nodes are rank...

Download PDF file
  • EP ID EP46603
  • DOI http://dx.doi.org/10.4108/eai.26-3-2018.154382
  • Views 310
  • Downloads 0

How To Cite

Awais Manzoor, Abdul Wahid, Munam Ali Shah, Adnan Akhunzada, Faisal Fayyaz Qureshi (2017). Secure Login Using Multi-Tier Authentication Schemes in Fog Computing. EAI Endorsed Transactions on Internet of Things, 3(11), -. https://europub.co.uk/articles/-A-46603