2019
DOI: 10.3390/jsan9010001
|View full text |Cite
|
Sign up to set email alerts
|

D-FAP: Dual-Factor Authentication Protocol for Mobile Cloud Connected Devices

Abstract: Emerging Mobile Cloud Computing (MCC) technologies offer a new world of promise by leveraging the quality of mobile services. With MCC, resource-constrained mobile devices could capitalize on the computation/storage resources of cloud servers via communication networks. While MCC adoption is growing significantly, several challenges need to be addressed to make MCC-based solutions scale and meet the ever-growing demand for more resource intensive applications. Security is a critical problem hindering the adopt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 60 publications
(83 reference statements)
0
3
0
Order By: Relevance
“…Password breaches, whether due to multiple password database leaks or increasingly sophisticated phishing attacks, dramatically increase the risk of authentication credential vulnerability [ 2 ]. Worse, poor user password hygiene, such as using passwords that are easily discovered such as birth dates, names, relatives' names, and phone pins, or repeating them across several accounts, exacerbates these flaws [ 3 ]. Figure 2 depicts the healthcare IT topology for medical devices.…”
Section: Introductionmentioning
confidence: 99%
“…Password breaches, whether due to multiple password database leaks or increasingly sophisticated phishing attacks, dramatically increase the risk of authentication credential vulnerability [ 2 ]. Worse, poor user password hygiene, such as using passwords that are easily discovered such as birth dates, names, relatives' names, and phone pins, or repeating them across several accounts, exacerbates these flaws [ 3 ]. Figure 2 depicts the healthcare IT topology for medical devices.…”
Section: Introductionmentioning
confidence: 99%
“…We also assessed the results and noted that mIoT devices do not possess the requisite data protocols and standards [ 131 ]. Therefore, many issues must be addressed to ensure IoT privacy and security [ 144 , 145 ], which is one of the major challenges of the IoT era. Moreover, the continuous monitoring of critical indicators requires reduced energy consumption and a longer battery life [ 146 ] to prevent a break of communication.…”
Section: Discussionmentioning
confidence: 99%
“…Below, we briefly introduce the technical features of these methods and analyze their application limitations in the confidentiality management of archives on the cloud. (1) Identity authentication is the process of user identity confirmation, to prevent illegal users from accessing system resources illegally [11,26]. Specifically, it can be divided into two categories, i.e., single-factor authentication [27][28][29] (such as username and password authentication, smart card authentication, dynamic password authentication and biometric authentication) and two-factor authentication [30,31] (which combines two kinds of single-factor authentication to further strengthen the security of identity authentication).…”
Section: Related Work and Limitationsmentioning
confidence: 99%