Modern Authentication Techniques for Smart Cyber-Physical System
Introduction
Biometric Based Authentication
Multi-Factor Authentication
Continuous Authentication
Device Authentication
Beyond Modern Authentication Techniques
Authentication and Traditional Approaches
Passwords
Hardware Tokens
Biometrics
Threat Model (Insider threats, password sharing, etc.)
Terminology
Performance Metrics
Classifiers
Categorization
click to edit
iii. Soft Biometrics
ii. Behavioural Biometrics
i. Physiological Biometrics
Two-factor Authentication (2FA)
Multifactor Authentication (MFA)
Computer Users
Mobile Device Users
IoT Device Users
IEEE 800 1x
Device Pairing
click to edit
a. Introduction
b. Privacy-aware Authentication Techniques
c. Usability Assessment Techniques
d. Applications
e. IoT-assisted Modern Authentication Techniques
f. Publicly Available Datasets
g. Summary and Conclusion
Introduction
Authentication Factors
Authentication Types
Device Authentication
User Authentication
Beyond Modern Authentication Techniques
Quantum Authentication
Post-Quantum Authentication
History of Authentication
From Legacy to Modern Authentication
Identification, Authentication, and Authorization
Single-Factor Authentication
Two-Factor Authentication
Multi-Factor Authentication
Modern Authentication Techniques
Possession Based Authentication
Biometric-Based Authentication
Knowledge-Based Authentication
Passwords
Partial Passwords
Passphrase
PIN
Challenge-Response
Security Question
Tokens
ID Card
Implanted devices
Software Token
Hardware Tokens
Wrist Band
Fingerprint
Retinal
DNA Sequence
Signature
Face
Voice
Bio-Electric Signals
Challenges for Modern Authentication
Security Challenges
Performance Challenges
Usability Challenges
Traditional Authentication
Authentication Systems
One-time-only Authentication Systems
On-demand Authentication Systems
Continuous Authentication Systems
Traditional Possession-Based Authentication
Traditional Knowledge-Based Authentication