University of Twente Student Theses

Login

A comparative analysis of the multi-factor authentication protocols presented in the literature

Bals, J. (2022) A comparative analysis of the multi-factor authentication protocols presented in the literature.

[img] PDF
437kB
Abstract:The Internet of Things continues to develop and impact or world and even our daily lives. it is vastly changing our world, whether this at university, at home, at supermarket or even in street. IoT is getting intention in ideas like smart homes and smart cities, raising a number of security concerns. Every node in IoT platforms should be identified by the whole components of the system and by other nodes also. So every node should be authenticated before being able to communicate. In this paper , we will investigate authentication schemes used in IoT and particularly multi-factor ones. As a result bench mark of all multi-factor schemes presented in the literature will be analysed regarding their strength, weaknesses and the factors used in each one.
Item Type:Essay (Bachelor)
Faculty:EEMCS: Electrical Engineering, Mathematics and Computer Science
Subject:54 computer science
Programme:Computer Science BSc (56964)
Link to this item:https://purl.utwente.nl/essays/91797
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page