Revolutionizing IoT Security: Integrating Audio Data Transfer and Multi-Factor Authentication with Smartphones

被引:0
|
作者
Lawrence, Mark [1 ]
Wang, Yong [2 ]
机构
[1] New Mexico State Univ, Dept Engn Technol & Surveying Engn, Las Cruces, NM 88003 USA
[2] Dakota State Univ, Beacom Coll Comp & Cyber Sci, Madison, SD USA
关键词
Internet of Things; IoT; Audio Data Transfer; Multi-Factor Authentication; PROXIMITY-BASED AUTHENTICATION; INTERNET;
D O I
10.1109/eIT60633.2024.10609946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is important in the Internet of Things (IoT) due to the widespread adoption of IoT devices in home and enterprise networks. Multi-factor authentication (MFA) is an effective approach to prevent unauthorized use of devices. However, many IoT devices do not have input devices such as a keyboard, mouse, or touchscreen, which makes it challenging to enable multi-factor authentication. This paper proposes a novel approach utilizing Audio Data Transfer (ADT) to enable a second channel for MFA on IoT devices. The effectiveness of this dual-channel MFA system, tailored for IoT's unique constraints, is thoroughly analyzed through various tests, demonstrating its potential to enhance IoT security. The proposed approach requires a user to be proximate to the device, limiting the transmission distance between the user and the device. However, the proposed approach is accessible, cost-effective, and enhances security in IoT.
引用
收藏
页码:310 / 315
页数:6
相关论文
共 50 条
  • [21] Multi-Factor Authentication as a Service
    Shah, Yogendra
    Choyi, Vinod
    Schmidt, Andreas U.
    Subramanian, Lakshmi
    2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 144 - 150
  • [22] Multi-Factor Authentication: A Survey
    Ometov, Aleksandr
    Bezzateev, Sergey
    Makitalo, Niko
    Andreev, Sergey
    Mikkonen, Tommi
    Koucheryavy, Yevgeni
    CRYPTOGRAPHY, 2018, 2 (01) : 1 - 31
  • [23] Multi-Factor Authentication Modeling
    Dostalek, Libor
    2019 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT'2019), 2019, : 443 - 446
  • [24] Bypassing Multi-Factor Authentication
    Russell S.
    ITNOW, 2023, 65 (01) : 42 - 45
  • [25] Mobile Multi-Factor Authentication
    Bissada, Andrew
    Olmsted, Aspen
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 210 - 211
  • [26] Multi-Factor Authentication on Cloud
    Khan, Salman H.
    Akbar, M. Ali
    2015 INTERNATIONAL CONFERENCE ON DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2015, : 548 - 554
  • [27] Security analysis and enhancements of an improved multi-factor biometric authentication scheme
    Park, YoHan
    Park, KiSung
    Lee, KyungKeun
    Song, Hwangjun
    Park, YoungHo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (08):
  • [28] Security for Ambient Assisted Living Multi-factor Authentication in the Internet of Things
    Griffin, Phillip H.
    2015 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2015,
  • [29] Multi-Factor Security Enhanced Authentication Protocol for Wireless Sensor Networks
    Zhang L.
    Liang H.
    Deng D.
    Liu Y.
    Tang C.
    Chang Z.
    Gui S.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2023, 52 (05): : 699 - 708
  • [30] Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices
    Wang, Qingxuan
    Wang, Ding
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 597 - 612