2022
DOI: 10.1109/access.2022.3170844
|View full text |Cite
|
Sign up to set email alerts
|

A Multifactor Multilevel and Interaction Based (M2I) Authentication Framework for Internet of Things (IoT) Applications

Abstract: Existing authentication solutions proposed for Internet of Things (IoT) provide a single Level of Assurance (LoA) regardless of the sensitivity levels of the resources or interactions between IoT devices being protected. For effective (with adequate level of protection) and efficient (with as low overhead costs as possible) protections, it may be desirable to tailor the protection level in response to the sensitivity level of the resources, as a stronger protection level typically imposes a higher level of ove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 47 publications
0
2
0
1
Order By: Relevance
“…An example use case is a smart air conditioner (ControllerActuator) that makes an automated decision based on the room temperature data received from a temperature sensor (Sensor), and switches itself on when the temperature exceeds a threshold. In our previous work [62,63], we have identified three types of device-to-device interactions showing three communication patterns, i.e., one-to-one, many-to-one, and one-to-many communication patterns. In this work, we expand this concept of interactions in two ways.…”
Section: ) Automation Rolesmentioning
confidence: 99%
“…An example use case is a smart air conditioner (ControllerActuator) that makes an automated decision based on the room temperature data received from a temperature sensor (Sensor), and switches itself on when the temperature exceeds a threshold. In our previous work [62,63], we have identified three types of device-to-device interactions showing three communication patterns, i.e., one-to-one, many-to-one, and one-to-many communication patterns. In this work, we expand this concept of interactions in two ways.…”
Section: ) Automation Rolesmentioning
confidence: 99%
“…Цікавою є система автентифікації для додатків Інтернету речей, що реалізована як багатофакторна та багаторівнева і ґрунтується на взаємодії між пристроями ІоТ [9]. В праці [10] розглянуто метод автентифікації для регенерації JWT (веб-токен JSON) при кожному клієнтському запиті на основі випадкових значень мітки часу для підвищення автентичності клієнта на сервері. Багатофакторна автентифікація розгорнута новим механізмом на основі браузера, що використовує відбитки пальців і графічні паролі [11].…”
Section: вступunclassified
“…They found out that their new scheme performed better than other relevant schemes for maintaining efficient performance, meanwhile satisfying the security criteria. Similarly, [3] is concerned about a high security level that normally imposes a greater degree of overhead costs of any IoT authentication solution. As a result, they suggested a framework for multi-factor, multi-level, and interaction-based (M2I) authentication.…”
Section: Related Workmentioning
confidence: 99%