An Introduction

This paper analyses the various authentication systems implemented for enhanced security and private re-position of an individual's log-in credentials. The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet of Things, provides great security to a user's credentials. MFA is followed by a brief description of the working mechanism of interaction of third party clients with private resources over the OAuth protocol framework and a study of the delegation based authentication system in IP-based IoT.

[1]  Sugata Sanyal,et al.  An LSB Data Hiding Technique Using Natural Number Decomposition , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[2]  Alexey Melnikov,et al.  Simple Authentication and Security Layer (SASL) , 2006, RFC.

[3]  Muhammad Khurram Khan,et al.  OTP-Based Two-Factor Authentication Using Mobile Phones , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[4]  Sugata Sanyal,et al.  A Novel Multipath Approach to Security in Mobile Ad Hoc Networks (MANETs) , 2011, ArXiv.

[5]  Jayesh Kataria A Scheme to Control Flooding of Fake Route Requests in Ad-hoc Networks , 2006 .

[6]  Sagar Acharya,et al.  Two Factor Authentication Using Smartphone Generated One Time Password , 2013 .

[7]  Neil Haller,et al.  The S/KEY One-Time Password System , 1995, RFC.

[8]  Michael B. Jones,et al.  The OAuth 2.0 Authorization Framework: Bearer Token Usage , 2012, RFC.

[9]  Gurpreet Singh Bhamra,et al.  Ant colony algorithms in MANETs: A review , 2012, J. Netw. Comput. Appl..

[10]  Sugata Sanyal,et al.  A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices , 2011, ArXiv.

[11]  Sugata Sanyal,et al.  The N/R one time password system , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[12]  D. Recordon,et al.  The OAuth 2.0 Authorization Protocol: Bearer Tokens draft-ietf-oauth-v2-bearer-10 , 2012 .

[13]  Hassan M. Elkamchouchi,et al.  Mobile one-time passwords: two-factor authentication using mobile phones , 2012, Secur. Commun. Networks.

[14]  Dharma P. Agrawal,et al.  Jigsaw-based secure data transfer over computer networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[15]  Angelos Stavrou,et al.  Universal Multi-Factor Authentication Using Graphical Passwords , 2008, 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems.

[16]  Sugata Sanyal,et al.  A Multifactor Secure Authentication System for Wireless Payment , 2010, Emergent Web Intelligence.

[17]  Klaus Wehrle,et al.  Delegation-based authentication and authorization for the IP-based Internet of Things , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[18]  Steven Furnell,et al.  Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..

[19]  Hugo Krawczyk,et al.  Public-key cryptography and password protocols , 1999 .

[20]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[21]  Eran Hammer-Lahav,et al.  The OAuth 1.0 Protocol , 2010, RFC.

[22]  Hokeun Kim,et al.  Authentication and Authorization for the Internet of Things , 2017, IT Professional.

[23]  Hannes Tschofenig,et al.  A Set of Simple Authentication and Security Layer (SASL) Mechanisms for OAuth , 2015, RFC.

[24]  Hugo Krawczyk,et al.  Public-key cryptography and password protocols , 1998, CCS '98.

[25]  Ivar Jørstad,et al.  Using the mobile phone as a security token for unified authentication , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).

[26]  Wassim El-Hajj,et al.  Two factor authentication using mobile phones , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[27]  Sugata Sanyal,et al.  Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services , 2013, ArXiv.

[28]  Dick Hardt,et al.  The OAuth 2.0 Authorization Framework , 2012, RFC.

[29]  Prabath Siriwardena,et al.  OAuth 2.0 , 2014 .