UTFacultiesEEMCSDisciplines & departmentsSCSEducationAssignmentsOpen AssignmentsOpen Master AssignmentsMay 29, 2023: Three-Factor Authentication for Enhanced Security in IoT Applications

May 29, 2023: Three-Factor Authentication for Enhanced Security in IoT Applications

MAster assignment

Three-Factor Authentication for Enhanced Security in IoT Applications

TYPE : MASTER CS

Period: Start date: as soon as possible

Student: Unassigned

If you are interested please contact:

Abstract:

Authentication is a critical aspect of securing IoT applications, and traditional two-factor authentication (2FA) may not provide sufficient security. This thesis aims to investigate the application of three-factor authentication (3FA) in IoT environments to enhance security. The proposal involves designing a 3FA framework, incorporating three distinct authentication factors, evaluating its security properties, and assessing the performance implications of implementing 3FA in IoT applications.

Literature Review:

  1. Conduct an extensive review of existing literature on authentication mechanisms in IoT applications, focusing on two-factor authentication (2FA) and three-factor authentication (3FA) techniques.
  2. Explore different authentication factors, such as knowledge-based (e.g., passwords), possession-based (e.g., tokens), and inherence-based (e.g., biometrics), suitable for IoT authentication.
  3. Identify the security properties, advantages, and challenges associated with three-factor authentication in IoT environments.

Design of Three-Factor Authentication Framework:

  1. Design a comprehensive three-factor authentication framework suitable for IoT applications.
  2. Select three distinct authentication factors to be incorporated, such as passwords, biometrics, tokens, or location-based factors.
  3. Define the authentication workflow, including the order and sequence of authenticating the factors.

Implementation and Integration:

  1. Implement the designed three-factor authentication framework in a representative IoT application or testbed.
  2. Integrate the framework with existing IoT protocols and communication mechanisms.
  3. Ensure compatibility and interoperability with different IoT devices and platforms.

Security Analysis:

  1. Evaluate the security properties of the implemented three-factor authentication framework.
  2. Assess the robustness of the framework against various security threats, such as replay attacks, impersonation attacks, or stolen credential attacks.
  3. Analyze the effectiveness of three-factor authentication in mitigating security risks and enhancing the overall security posture of IoT applications.

Performance Evaluation:

  1. Measure the performance implications of implementing three-factor authentication in IoT applications.
  2. Assess the computational overhead, latency, and resource consumption introduced by the three-factor authentication framework.
  3. Analyze the trade-offs between security and performance to ensure a balance between enhanced security and acceptable performance levels.

 Usability and User Experience Evaluation:

  1. Conduct user studies and surveys to assess the usability and user experience of the three-factor authentication framework in IoT applications.
  2. Gather feedback on user satisfaction, convenience, and perceived security.
  3. Identify potential usability challenges and propose improvements to enhance the user experience.

Comparative Analysis:

  1. Compare the security effectiveness and performance characteristics of the three-factor authentication framework with traditional two-factor authentication techniques.
  2. Analyze the strengths, limitations, and potential use cases of three-factor authentication in IoT applications.
  3. Discuss the implications of three-factor authentication for enhancing security in IoT environments.

Discussion and Future Directions:

  1. Analyze the findings from the security analysis, performance evaluation, and usability assessment.
  2. Discuss the implications of three-factor authentication for securing IoT applications and data.
  3. Identify areas for further research and improvement, such as adaptive authentication mechanisms or novel authentication factors.

Expected Outcome:

The expected outcome of this research is a comprehensive understanding of three-factor authentication (3FA) for enhancing security in IoT applications. The thesis will provide insights into the security properties, performance implications, and usability aspects of implementing 3FA in IoT environments. The findings will contribute to the development of practical and effective authentication mechanisms for securing IoT applications.

References:

  1. Zhou, Z., & Chen, Y. (2019). Three-Factor Authentication for the Internet of Things. IEEE Internet of Things Journal, 6(1), 170-180. DOI: 10.1109/JIOT.2018.2840359
  2. Raza, S., et al. (2019). Authentication Techniques for the Internet of Things: Taxonomy, Survey, and Challenges. IEEE Communications Surveys & Tutorials, 21(3), 2624-2651. DOI: 10.1109/COMST.2019.2908758
  3. Le, D. V., et al. (2020). User-Centric Three-Factor Authentication for IoT Systems. IEEE Access, 8, 98897-98912. DOI: 10.1109/ACCESS.2020.2993187