{"title":"基于多服务器的无线应用中的多因素认证方案综述","authors":"Yashwant Nogia, Samayveer Singh, V. Tyagi","doi":"10.1109/ICSCCC58608.2023.10177011","DOIUrl":null,"url":null,"abstract":"Multifactor Authentication (MFA) schemes for securing communication in wireless applications have gained popularity in Research academia and enterprises. MFA schemes are able to provide adequate security for Multiserver-based wireless applications and they are less vulnerable to attacks like privileged-insider attacks, replay attacks, and some similar attacks. This paper reviews several MFA schemes for wireless applications based on multiple servers. The authentication schemes employ numerous factors, including the things that the user knows (password), things that the user has (smartphone), and things that the user is (fingerprint or biometric data). The aimof comparing the authentication schemes is to analyze how MFA across multiple servers provide secure communication accross multiple servers. we also compares the performance of reviewed MFA scheme based on total execution time of registration phase, login & authentication phase and password changing phase and computational cost. finally the paper is summarized with future work.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Multifactor Authentication Schemes for Multiserver Based Wireless Application: A Review\",\"authors\":\"Yashwant Nogia, Samayveer Singh, V. Tyagi\",\"doi\":\"10.1109/ICSCCC58608.2023.10177011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Multifactor Authentication (MFA) schemes for securing communication in wireless applications have gained popularity in Research academia and enterprises. MFA schemes are able to provide adequate security for Multiserver-based wireless applications and they are less vulnerable to attacks like privileged-insider attacks, replay attacks, and some similar attacks. This paper reviews several MFA schemes for wireless applications based on multiple servers. The authentication schemes employ numerous factors, including the things that the user knows (password), things that the user has (smartphone), and things that the user is (fingerprint or biometric data). The aimof comparing the authentication schemes is to analyze how MFA across multiple servers provide secure communication accross multiple servers. we also compares the performance of reviewed MFA scheme based on total execution time of registration phase, login & authentication phase and password changing phase and computational cost. finally the paper is summarized with future work.\",\"PeriodicalId\":359466,\"journal\":{\"name\":\"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCCC58608.2023.10177011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCCC58608.2023.10177011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multifactor Authentication Schemes for Multiserver Based Wireless Application: A Review
Multifactor Authentication (MFA) schemes for securing communication in wireless applications have gained popularity in Research academia and enterprises. MFA schemes are able to provide adequate security for Multiserver-based wireless applications and they are less vulnerable to attacks like privileged-insider attacks, replay attacks, and some similar attacks. This paper reviews several MFA schemes for wireless applications based on multiple servers. The authentication schemes employ numerous factors, including the things that the user knows (password), things that the user has (smartphone), and things that the user is (fingerprint or biometric data). The aimof comparing the authentication schemes is to analyze how MFA across multiple servers provide secure communication accross multiple servers. we also compares the performance of reviewed MFA scheme based on total execution time of registration phase, login & authentication phase and password changing phase and computational cost. finally the paper is summarized with future work.