Secure Login Using Multi-Tier Authentication Schemes in Fog Computing

  • Manzoor A
  • Wahid A
  • Ali Shah M
  • et al.
N/ACitations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, their vulnerabilities, security threats and their solution proposed over the period of 2012-2016. We compare the performance of existing multi-tier authentication schemes on three parameters, i.e., cost, usability and level of security. Multi-tier authentication schemes have been categorized into groups according to the factors involved in the authentication process. Lastly, we aim to provide an easy and concise view of the underlying authentication model adapted by each approach

Cite

CITATION STYLE

APA

Manzoor, A., Wahid, A., Ali Shah, M., Akhunzada, A., & Fayyaz Qureshi, F. (2017). Secure Login Using Multi-Tier Authentication Schemes in Fog Computing. EAI Endorsed Transactions on Internet of Things, 3(11), e5. https://doi.org/10.4108/eai.26-3-2018.154382

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free