Revolutionizing IoT Security: Integrating Audio Data Transfer and Multi-Factor Authentication with Smartphones

被引:0
|
作者
Lawrence, Mark [1 ]
Wang, Yong [2 ]
机构
[1] New Mexico State Univ, Dept Engn Technol & Surveying Engn, Las Cruces, NM 88003 USA
[2] Dakota State Univ, Beacom Coll Comp & Cyber Sci, Madison, SD USA
关键词
Internet of Things; IoT; Audio Data Transfer; Multi-Factor Authentication; PROXIMITY-BASED AUTHENTICATION; INTERNET;
D O I
10.1109/eIT60633.2024.10609946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is important in the Internet of Things (IoT) due to the widespread adoption of IoT devices in home and enterprise networks. Multi-factor authentication (MFA) is an effective approach to prevent unauthorized use of devices. However, many IoT devices do not have input devices such as a keyboard, mouse, or touchscreen, which makes it challenging to enable multi-factor authentication. This paper proposes a novel approach utilizing Audio Data Transfer (ADT) to enable a second channel for MFA on IoT devices. The effectiveness of this dual-channel MFA system, tailored for IoT's unique constraints, is thoroughly analyzed through various tests, demonstrating its potential to enhance IoT security. The proposed approach requires a user to be proximate to the device, limiting the transmission distance between the user and the device. However, the proposed approach is accessible, cost-effective, and enhances security in IoT.
引用
收藏
页码:310 / 315
页数:6
相关论文
共 50 条
  • [31] Beyond passwords: A multi-factor authentication approach for robust digital security
    Simha, R. Keerthan
    Raghavan, H. K.
    Prabhu, Akshatha
    Joshi, Pallavi
    INTERNET TECHNOLOGY LETTERS, 2025, 8 (02)
  • [32] Implementing multi-factor authentication (MFA) for robust network access security
    De, Indrajit
    Agarwal, Ambuj Kumar
    Bhushan, Bharat
    Kalnawat, Aarti
    Mathurkar, Piyush
    Garg, Amit
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 821 - 832
  • [33] ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment
    Dargaoui, Souhayla
    Azrour, Mourade
    El Allaoui, Ahmad
    Guezzaz, Azidine
    Alabdulatif, Abdulatif
    Ahmad, Sultan
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2025, 21 (01) : 56 - 75
  • [34] Multi-factor user authentication scheme for IoT-based healthcare services
    Dhillon P.K.
    Kalra S.
    Dhillon, Parwinder Kaur (parwindhillon@gmail.com), 2018, Springer Science and Business Media Deutschland GmbH (04) : 141 - 160
  • [35] A secure data backup scheme using multi-factor authentication
    Liu, Yining
    Zhong, Qi
    Chang, Liang
    Xia, Zhe
    He, Debiao
    Cheng, Chi
    IET INFORMATION SECURITY, 2017, 11 (05) : 250 - 255
  • [36] Understanding security failures of multi-factor authentication schemes for multi-server environments
    Wang, Ding
    Zhang, Xizhe
    Zhang, Zijian
    Wang, Ping
    COMPUTERS & SECURITY, 2020, 88
  • [37] Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
    Mostafa, Ayman Mohamed
    Ezz, Mohamed
    Elbashir, Murtada K.
    Alruily, Meshrif
    Hamouda, Eslam
    Alsarhani, Mohamed
    Said, Wael
    APPLIED SCIENCES-BASEL, 2023, 13 (19):
  • [38] Multi-factor authentication at jagged peak
    Gill G.
    Jones J.
    2016, Informing Science Institute (05) : 1 - 16
  • [39] Dynamic Multi-factor Authentication for Smartphone
    Yohan, Alexander
    Lo, Nai-Wei
    Lie, Henry Roes
    2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 2448 - 2453
  • [40] Ubiquitous Desktops with Multi-factor Authentication
    Doyle, Paul
    Deegan, Mark
    O'Driscoll, Ciaran
    Gleeson, Michael
    Gillespie, Brian
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 201 - 206