Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
77
result(s) for
"Multi-factor authentication"
Sort by:
A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications
by
Elikana Sam, Anael
,
Ali, Guma
,
Dida, Mussa Ally
in
Algorithms
,
Authentication
,
Bank technology
2021
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) that uses a standard public key cryptography technique (RSA), and Fernet encryption to secure a QR code and the records in the databases. The evolutionary prototyping model was adopted when developing the native mobile money application prototypes to prove that the algorithm is feasible and provides a higher degree of security. The developed applications were tested, and a detailed security analysis was conducted. The results show that the proposed algorithm is secure, efficient, and highly effective against the various threat models. It also offers secure and efficient authentication and ensures data confidentiality, integrity, non-repudiation, user anonymity, and privacy. The performance analysis indicates that it achieves better overall performance compared with the existing mobile money systems.
Journal Article
Strengthening Multi‐Factor Authentication Through Physically Unclonable Functions in PVDF‐HFP‐Phase‐Dependent a‐IGZO Thin‐Film Transistors
2024
For enhanced security in hardware‐based security devices, it is essential to extract various independent characteristics from a single device to generate multiple keys based on specific values. Additionally, the secure destruction of authentication information is crucial for the integrity of the data. Doped amorphous indium gallium zinc oxide (a‐IGZO) thin‐film transistors (TFTs) using poly(vinylidene fluoride‐co‐hexafluoropropylene) (PVDF‐HFP) induce a dipole doping effect through a phase‐transition process, creating physically unclonable function (PUF) devices for secure user information protection. The PUF security key, generated at VGS = 20 V in a 20 × 10 grid, demonstrates uniformity of 42% and inter‐Hamming distance (inter‐HD) of 49.79% in the β‐phase of PVDF‐HFP. However, in the γ‐phase, the uniformity drops to 22.5%, and inter‐HD decreases to 35.74%, indicating potential security key destruction during the phase transition. To enhance security, a multi‐factor authentication (MFA) system is integrated, utilizing five security keys extracted from various TFT parameters. The security keys from turn‐on voltage (VON), VGS = 20 V, VGS = 30 V, mobility, and threshold voltage (Vth) exhibit near‐ideal uniformities and inter‐HDs, with the highest values of 58% and 51.68%, respectively. The dual security system, combining phase transition and MFA, establishes a robust protection mechanism for privacy‐sensitive user information. To enhance hardware‐based security, extracting multiple keys from a single device based on specific values and ensuring the secure destruction of authentication information is presented. Doped IGZO‐based transistors, induced with a dipole doping effect using PVDF‐HFP, create PUF devices. The integration of a multi‐factor authentication system, utilizing security keys from various device parameters, establishes a robust protection mechanism.
Journal Article
A Comprehensive Authentication Taxonomy and Lightweight Considerations in the Internet-of-Medical-Things (IoMT)
by
Radzi, Raja Zahilah binti Raja Mohd
,
Julaihi, Azlina binti Ahmadi
,
Ngadi, Md Asri
in
Authentication
,
Constraints
,
Cryptography
2024
The potential of Internet-of-Things (IoT) in healthcare is evident in its ability to connect medical equipment, sensors, and healthcare personnel to provide high-quality medical expertise in remote locations. The constraints faced by these devices such as limited storage, power, and energy resources necessitate the need for a lightweight authentication mechanism that is both efficient and secure. This study contributes by exploring challenges and lightweight authentication advancement, focusing on their efficiency on the Internet-of-Medical-Things (IoMT). A review of recent literature reveals ongoing issues such as the high complexity of cryptographic operations, scalability challenges, and security vulnerabilities in the proposed authentication systems. These findings lead to the need for multi-factor authentication with a simplified cryptographic process and more efficient aggregated management practices tailored to the constraints of IoMT environments. This study also introduces an extended taxonomy, namely, Lightweight Aggregated Authentication Solutions (LAAS), a lightweight efficiency approach that includes a streamlined authentication process and aggregated authentication, providing an understanding of lightweight authentication approaches. By identifying critical research gaps and future research directions, this study aims to provide a secure authentication protocol for IoMT and similar resource-constraint domains.
Journal Article
A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles
by
Awaysheh, Feras M.
,
Ikuesan, Richard A.
,
Alawadi, Sadi A.
in
Access control
,
Access control mechanism
,
Authentication
2021
Continuous and emerging advances in Information and Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines and Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due to the implicit functionalities that are focused on realizing the Internet of Vehicle (IoV) vision. However, IoV is susceptible to attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may succeed due to inadequate or ineffective authentication techniques. Hence, there is a timely need for hardening the authentication process through cutting-edge access control mechanisms. This paper proposes a Blockchain-based Multi-Factor authentication model that uses an embedded Digital Signature (MFBC_eDS) for vehicular clouds and Cloud-enabled IoV. Our proposed MFBC_eDS model consists of a scheme that integrates the Security Assertion Mark-up Language (SAML) to the Single Sign-On (SSO) capabilities for a connected edge to cloud ecosystem. MFBC_eDS draws an essential comparison with the baseline authentication scheme suggested by Karla and Sood. Based on the foundations of Karla and Sood’s scheme, an embedded Probabilistic Polynomial-Time Algorithm (ePPTA) and an additional Hash function for the Pi generated during Karla and Sood’s authentication were proposed and discussed. The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on the Dolev–Yao adversarial model while satisfying aspects of the Confidentiality, Integrity, and Availability (CIA) triad.
Journal Article
A review of multi-factor authentication in the Internet of Healthcare Things
by
Ahmed, Mohiuddin
,
Wang, Eugene
,
Yang, Wencheng
in
Authentication protocols
,
COVID-19
,
Cybersecurity
2023
Objective
This review paper aims to evaluate existing solutions in healthcare authentication and provides an insight into the technologies incorporated in Internet of Healthcare Things (IoHT) and multi-factor authentication (MFA) applications for next-generation authentication practices. Our review has two objectives: (a) Review MFA based on the challenges, impact and solutions discussed in the literature; and (b) define the security requirements of the IoHT as an approach to adapting MFA solutions in a healthcare context.
Methods
To review the existing literature, we indexed articles from the IEEE Xplore, ACM Digital Library, ScienceDirect, and SpringerLink databases. The search was refined to combinations of ‘authentication’, ‘multi-factor authentication’, ‘Internet of Things authentication’, and ‘medical authentication’ to ensure that the retrieved journal articles and conference papers were relevant to healthcare and Internet of Things-oriented authentication research.
Results
The concepts of MFA can be applied to healthcare where security can often be overlooked. The security requirements identified result in stronger methodologies of authentication such as hardware solutions in combination with biometric data to enhance MFA approaches. We identify the key vulnerabilities of weaker approaches to security such as password use against various cyber threats. Cyber threats and MFA solutions are categorised in this paper to facilitate readers’ understanding of them in healthcare domains.
Conclusions
We contribute to an understanding of up-to-date MFA approaches and how they can be improved for use in the IoHT. This is achieved by discussing the challenges, benefits, and limitations of current methodologies and recommendations to improve access to eHealth resources through additional layers of security.
Journal Article
SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems
by
Hashim, Fazirulhisyam
,
Chaudhary, Muhammad Akmal
,
Khalid, Haqi
in
cross-platform
,
fog computing
,
fog node
2021
The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. Fog users at the network’s edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. This communication complexity brings enormous security challenges and potential vulnerability to malicious threats. The attacker may replace the edge device with a fake one and authenticate it as a legitimate device. Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. We proved our scheme using Burrows Abdi Needham’s logic (BAN logic) to prove secure mutual authentication. The results show that the SELAMAT scheme provides better security, functionality, communication, and computation cost than the existing schemes.
Journal Article
A Blockchain-Based Authentication Mechanism for Enhanced Security
by
McCabe, Charlotte
,
Mohideen, Althaff Irfan Cader
,
Singh, Raman
in
authentication
,
Blockchain
,
blockchain technology
2024
Passwords are the first line of defence against preventing unauthorised access to systems and potential leakage of sensitive data. However, the traditional reliance on username and password combinations is not enough protection and has prompted the implementation of technologies such as two-factor authentication (2FA). While 2FA enhances security by adding a layer of verification, these techniques are not impervious to threats. Even with the implementation of 2FA, the relentless efforts of cybercriminals present formidable obstacles in securing digital spaces. The objective of this work is to implement blockchain technology as a form of 2FA. The findings of this work suggest that blockchain-based 2FA methods could strengthen digital security compared to conventional 2FA methods.
Journal Article
Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
by
Ezz, Mohamed
,
Alruily, Meshrif
,
Said, Wael
in
Access control
,
authentication factors
,
Bibliometrics
2023
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud security from unauthorized access and data breaches. Multi-factor authentication verifies that authentic cloud users are only authorized to access cloud apps, data, services, and resources, making it more secure for enterprises and less inconvenient for users. The number of authentication factors varies based on the security framework’s architecture and the required security level. Therefore, implementing a secured multi-factor authentication framework in a cloud platform is a challenging process. In this paper, we developed an adaptive multi-factor multi-layer authentication framework that embeds an access control and intrusion detection mechanisms with an automated selection of authentication methods. The core objective is to enhance a secured cloud platform with low false positive alarms that makes it more difficult for intruders to access the cloud system. To enhance the authentication mechanism and reduce false alarms, multiple authentication factors that include the length, validity, and value of the user factor is implemented with a user’s geolocation and user’s browser confirmation method that increase the identity verification of cloud users. An additional AES-based encryption component is applied to data, which are protected from being disclosed. The AES encryption mechanism is implemented to conceal the login information on the directory provider of the cloud. The proposed framework demonstrated excellent performance in identifying potentially malicious users and intruders, thereby effectively preventing any intentional attacks on the cloud services and data.
Journal Article
A Proposed Mobile Voting Framework Utilizing Blockchain Technology and Multi-Factor Authentication
by
Barka, T. F.
,
Abayomi-Zannu, T. P.
,
Odun-Ayo, I. A.
in
Authentication
,
Blockchain
,
Cryptography
2019
Voting is fundamental to any consensus-based society and is one of the most critical functions of democracy. Mobile voting (m-voting) was utilized as a means for voters to easily and conveniently cast their votes using their mobile devices which have been the most adopted means of communication but has a major problem which is safely securing the casted votes and avoiding any form of tampering. In this paper, we propose an m-voting framework that utilizes blockchain technology to securely store the casted votes and multi-factor authentication to authenticate the voters before they cast their votes while also providing an easily accessible, secure and transparent m-voting system.
Journal Article
Unlocking Security for Comprehensive Electroencephalogram-Based User Authentication Systems
by
Cantoral-Ceballos, Jose Antonio
,
Khalil, Adnan Elahi Khan
,
Antelis, Javier M.
in
Accuracy
,
Algorithms
,
Artificial intelligence
2024
With recent significant advancements in artificial intelligence, the necessity for more reliable recognition systems has rapidly increased to safeguard individual assets. The use of brain signals for authentication has gained substantial interest within the scientific community over the past decade. Most previous efforts have focused on identifying distinctive information within electroencephalogram (EEG) recordings. In this study, an EEG-based user authentication scheme is presented, employing a multi-layer perceptron feedforward neural network (MLP FFNN). The scheme utilizes P300 potentials derived from EEG signals, focusing on the user’s intent to select specific characters. This approach involves two phases: user identification and user authentication. Both phases utilize EEG recordings of brain signals, data preprocessing, a database to store and manage these recordings for efficient retrieval and organization, and feature extraction using mutual information (MI) from selected EEG data segments, specifically targeting power spectral density (PSD) across five frequency bands. The user identification phase employs multi-class classifiers to predict the identity of a user from a set of enrolled users. The user authentication phase associates the predicted user identities with user labels using probability assessments, verifying the claimed identity as either genuine or an impostor. This scheme combines EEG data segments with user mapping, confidence calculations, and claimed user verification for robust authentication. It also accommodates new users by transforming EEG data into feature vectors without the need for retraining. The model extracts selected features to identify users and to classify the input based on these features to authenticate the user. The experiments show that the proposed scheme can achieve 97% accuracy in EEG-based user identification and authentication.
Journal Article