EAI Endorsed Transactions on Internet of Things (Mar 2017)
Secure Login Using Multi-Tier Authentication Schemes in Fog Computing
Abstract
Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, their vulnerabilities, security threats and their solution proposed over the period of 2012-2016. We compare the performance of existing multi-tier authentication schemes on three parameters, i.e., cost, usability and level of security. Multi-tier authentication schemes have been categorized into groups according to the factors involved in the authentication process. Lastly, we aim to provide an easy and concise view of the underlying authentication model adapted by each approach
Keywords