Please enable JavaScript.
Coggle requires JavaScript to display documents.
Modern Authentication Techniques for Smart Cyber-Physical System - Coggle…
Modern Authentication Techniques for Smart Cyber-Physical System
Introduction
Authentication and Traditional Approaches
Passwords
Hardware Tokens
Biometrics
Threat Model (Insider threats, password sharing, etc.)
Terminology
Biometric Based Authentication
Performance Metrics
Classifiers
Categorization
iii. Soft Biometrics
ii. Behavioural Biometrics
i. Physiological Biometrics
Multi-Factor Authentication
Two-factor Authentication (2FA)
Multifactor Authentication (MFA)
Continuous Authentication
Computer Users
Mobile Device Users
IoT Device Users
Device Authentication
IEEE 800 1x
Device Pairing
Beyond Modern Authentication Techniques
a. Introduction
b. Privacy-aware Authentication Techniques
c. Usability Assessment Techniques
d. Applications
e. IoT-assisted Modern Authentication Techniques
f. Publicly Available Datasets
g. Summary and Conclusion
Introduction
History of Authentication
From Legacy to Modern Authentication
Identification, Authentication, and Authorization
Authentication Factors
Single-Factor Authentication
Two-Factor Authentication
Multi-Factor Authentication
Authentication Types
Device Authentication
User Authentication
Beyond Modern Authentication Techniques
Quantum Authentication
Post-Quantum Authentication
Modern Authentication Techniques
Possession Based Authentication
Tokens
Software Token
Hardware Tokens
ID Card
Implanted devices
Wrist Band
Biometric-Based Authentication
Fingerprint
Retinal
DNA Sequence
Signature
Face
Voice
Bio-Electric Signals
Knowledge-Based Authentication
Passwords
Partial Passwords
Passphrase
PIN
Challenge-Response
Security Question
Challenges for Modern Authentication
Security Challenges
Performance Challenges
Usability Challenges
Traditional Authentication
Traditional Possession-Based Authentication
Traditional Knowledge-Based Authentication
Authentication Systems
One-time-only Authentication Systems
On-demand Authentication Systems
Continuous Authentication Systems