{"title":"Multi factor user authentication mechanism using internet of things","authors":"M. Rao, S. Santhi, Md. Ali Hussain","doi":"10.1145/3339311.3339335","DOIUrl":null,"url":null,"abstract":"IoT (Internet of Things) has been one among the key areas of research; here huge number of things i.e. smart devices is connected over internet. Users are connected over internet with different devices using Internet of Things where the data is exchanged and processed with other devices as well as end users. client Verification is an important issue in internet-based applications. A standout amongst the most notable proof arrangements utilized right presently are the alphanumeric-based plans. To control the way users, examine graphic style pictures greater than reviewing alphanumeric secrets graphic critical solutions are offered. Clients who will choose weak passwords are exposed to lexicon attacks. For such attacks, graphical passwords provide much security. In this paper we recommend a two-stage confirmation approach mixing graphical passwords and Internet of Things.","PeriodicalId":206653,"journal":{"name":"Proceedings of the Third International Conference on Advanced Informatics for Computing Research - ICAICR '19","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Third International Conference on Advanced Informatics for Computing Research - ICAICR '19","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3339311.3339335","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
IoT (Internet of Things) has been one among the key areas of research; here huge number of things i.e. smart devices is connected over internet. Users are connected over internet with different devices using Internet of Things where the data is exchanged and processed with other devices as well as end users. client Verification is an important issue in internet-based applications. A standout amongst the most notable proof arrangements utilized right presently are the alphanumeric-based plans. To control the way users, examine graphic style pictures greater than reviewing alphanumeric secrets graphic critical solutions are offered. Clients who will choose weak passwords are exposed to lexicon attacks. For such attacks, graphical passwords provide much security. In this paper we recommend a two-stage confirmation approach mixing graphical passwords and Internet of Things.