A multifactor authentication system using secret splitting in the perspective of Cloud of Things
Title | A multifactor authentication system using secret splitting in the perspective of Cloud of Things |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Shah, R. H., Salapurkar, D. P. |
Conference Name | 2017 International Conference on Emerging Trends Innovation in ICT (ICEI) |
Publisher | IEEE |
ISBN Number | 978-1-5090-3404-8 |
Keywords | authentication, cloud computing, Cloud of Things, CoT, cryptography, Diffie-Hellman key exchange algorithm, encryption algorithms, Human Behavior, human factor, human factors, Internet of Things, IoT, message authentication, Metrics, multifactor authentication, multifactor authentication system, pubcrawl, resilience, Resiliency, secret splitting, security analysis, Servers, smart cards, virtualized control |
Abstract | Internet of Things (IoT) is an emerging trend that is changing the way devices connect and communicate. Integration of cloud computing with IoT i.e. Cloud of Things (CoT) provide scalability, virtualized control and access to the services provided by IoT. Security issues are a major obstacle in widespread deployment and application of CoT. Among these issues, authentication and identification of user is crucial. In this study paper, survey of various authentication schemes is carried out. The aim of this paper is to study a multifactor authentication system which uses secret splitting in detail. The system uses exclusive-or operations, encryption algorithms and Diffie-Hellman key exchange algorithm to share key over the network. Security analysis shows the resistance of the system against different types of attacks. |
URL | https://ieeexplore.ieee.org/document/7977000 |
DOI | 10.1109/ETIICT.2017.7977000 |
Citation Key | shah_multifactor_2017 |
- message authentication
- virtualized control
- smart cards
- Servers
- Security analysis
- secret splitting
- Resiliency
- resilience
- pubcrawl
- multifactor authentication system
- multifactor authentication
- Metrics
- authentication
- IoT
- Internet of Things
- Human Factors
- human factor
- Human behavior
- encryption algorithms
- Diffie-Hellman key exchange algorithm
- Cryptography
- CoT
- Cloud of Things
- Cloud Computing