Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
2
result(s) for
"Passwordless Authentication"
Sort by:
Innovative passwordless authentication approaches in IoT identity management
2025
A global ecosystem of networked sensors, actuators, and other devices intended for data exchange and interaction is known as the Internet of Things (IoT). Password-based authentication has been a major component of [oT solutions historically, despite its numerous flaws. This survey article provides a thorough analysis of the literature with an emphasis on the implementation of authentication without the use of passwords on the Internet of Things. Ensuring that authorized persons have the correct access to related IT incomes under the correct situations is the core necessity behind enterprise IoT security. Identity managing, the first line of protection in initiative security, is a key component of this project. Traditional passwordbased authentication systems are frequently regarded as \"high friction,\" causing users' problems and lengthy procedures in addition to being vulnerable to different security threats. IoT businesses are investigating password less authentication techniques more frequently in an effort to improve user productivity while preserving strong security assurance in response to these difficulties. A comprehensive analysis of password less authentication mechanisms designed for the Internet of Things is presented in this article.
Journal Article
Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics
2024
User-generated passwords often pose a security risk in authentication systems. However, providing a comparative substitute poses a challenge, given the common tradeoff between security and user experience. This paper integrates cryptographic methods (both asymmetric and symmetric), steganography, and a combination of physiological and behavioural biometrics to construct a prototype for a passwordless authentication system. We demonstrate the feasibility of scalable passwordless authentication while maintaining a balance between usability and security. We employ threat modeling techniques to pinpoint the security prerequisites for the system, along with choosing appropriate cryptographic protocols. In addition, a comparative analysis is conducted, examining the security impacts of the proposed system in contrast to that of traditional password-based systems. The results from the prototype indicate that authentication is possible within a timeframe similar to passwords (within 2 s), without imposing additional hardware costs on users to enhance security or compromising usability. Given the scalable nature of the system design and the elimination of shared secrets, the financial and efficiency burdens associated with password resets are alleviated. Furthermore, the risk of breaches is mitigated as there is no longer a need to store passwords and/or their hashes. Differing from prior research, our study presents a pragmatic design and prototype that deserves consideration as a viable alternative for both password-based and passwordless authentication systems.
Journal Article