Advancements in Multi-Factor Authentication: A Quantum-Resilient and Federated Approach for Enhanced Security

Authors

  • Nur Syahrina Binti Juni Universiti Malaysia Sarawak
  • Grasila Huney Wan Universiti Malaysia Sarawak
  • Siti Aisyah Nabilah Binti Banchi Universiti Malaysia Sarawak
  • Estella Blessings Universiti Malaysia Sarawak
  • Venetha A/P Loganathan Universiti Malaysia Sarawak
  • Muhammad Faisal Director HRIMS, Ministry of Human Rights

DOI:

https://doi.org/10.62951/ijcts.v1i3.26

Keywords:

Quantum-Resilient Federated Multi-Factor Authentication, Industrial Internet of Things (IIoT) , Advances in Security Authentication

Abstract

The Internet of Things (IoT) phenomenon is centered around linking various devices and objects to the Internet, enabling them to communicate, collect, and exchange data [1]. The IoT needs strong, lightweight, and secure authorization schemes to regulate many devices with varying levels of ability. Quantum-resilient federated Multi-Factor Authentication (QRF-MFA) is a solution presented in this paper to address the above-discussed issues. Featuring quantum-resistant cryptographic protocols, high-speed and low-energy Physically Unclonable Functions (PUFs), decentralized identity management, and optimized communication protocols, QRF-MFA provides a complete solution for secure cross-domain device identification and authentication. This is done by leveraging blockchain technology for immutable and transparent management of identities yet limiting on-chain storage overhead. It also provides secure, lightweight communication well-suited for resource constrained IIoT devices, and it is designed for fog and edge computing environments as well. QRF-MFA eliminates the challenges of current methods by combining security, efficiency, and scalability and delivering a resilient and future-ready solution to secure IIoT authentication.  

References

Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Liu, X. (2022). A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract. In Proceedings - 2022 2nd International Conference of Smart Systems and Emerging Technologies, SMARTTECH 2022 (pp. 91–96). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SMARTTECH54121.2022.00032

Alanazi, M., & Aborokbah, M. (2022). Multifactor Authentication Approach on Internet of Things: Children’s Toys. In Proceedings of 2022 2nd International Conference on Computing and Information Technology, ICCIT 2022 (pp. 6–9). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICCIT52419.2022.9711596

Aljanah, S., Zhang, N., & Tay, S. W. (n.d.). A Multi-factor Homomorphic Encryption Based Method for Authenticated Access to IoT Devices.

Alnahari, W., & Quasim, M. T. (2021). Authentication of IoT Device and IoT Server Using Security Key. In 2021 International Congress of Advanced Technology and Engineering, ICOTEN 2021. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICOTEN52080.2021.9493492

Alshahrani, M. M. (2021). Secure Multifactor Remote Access User Authentication Framework for IoT Networks. Computers, Materials and Continua, 68(3), 3235–3254. https://doi.org/10.32604/cmc.2021.015310

Fauzi, A. H., & Khan, A. S. (2017). Threats Advancement in Primary User Emulation Attack and Spectrum Sensing Data Falsification (SSDF) Attack in Cognitive Radio Network (CRN) for 5G Wireless Network Environment. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-10), 179-183.

Institute of Electrical and Electronics Engineers. (2019). 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall): Proceedings: Honolulu, Hawaii, USA, 22-25 September 2019.

Khalid, H., Hashim, S. J., Ahmad, S. M. S., Hashim, F., & Chaudhary, M. A. (2021). Selamat: A New Secure and Lightweight Multi-factor Authentication Scheme for Cross-platform Industrial IoT Systems. Sensors, 21(4), 1–32. https://doi.org/10.3390/s21041428

Khan, A. S., Abdullah, J., Zen, K., & Tarmizi, S. (2017). Secure and Scalable Group Rekeying for Mobile Multihop Relay Network. Advanced Science Letters, 23(6), 5242-5245.

Khan, A. S., Halikul, I., & Abdullah, N. F. J. (2015). Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks. Jurnal Teknologi, 73(1), 75-81.

Khan, A. S., Javed, Y., Abdullah, J., Nazim, J. M., & Khan, N. (2017). Security Issues in 5G Device to Device Communication. IJCSNS, 17(5), 366.

Khan, A. S., Mehdi, M. H., Uddin, R., Abbasi, A. R., & Nisar, K. (2023). Ensemble Based Automotive Paint Surface Defect Detection Augmented by Order Statistics Filtering Using Machine Learning. Authorea Preprints.

Khan, A. S., Yahya, M. I. B., Zen, K. B., Abdullah, J. B., Rashid, R. B. A., Javed, Y., Khan, N. A., & Mostafa, A. M. (2023). Blockchain-Based Lightweight Multifactor Authentication for Cell-Free in Ultra-Dense 6G-Based (6-CMAS) Cellular Network. IEEE Access, 11, 20524-20541.

Khan, N., Abdullah, J., & Khan, A. S. (2017). Defending Malicious Script Attacks Using Machine Learning Classifiers. Wireless Communications and Mobile Computing, 2017.

Khan, S., Abdullah, J., Khan, N., Julahi, A. A., & Tarmizi, S. (2017). Quantum-Elliptic Curve Cryptography for Multihop Communication in 5G Networks. International Journal of Computer Science and Network Security (IJCSNS), 17(5), 357-365.

Odyuo, N., Lodh, S., & Walling, S. (2023). Multifactor Mutual Authentication of IoT Devices and Server. In Proceedings - 5th International Conference on Smart Systems and Inventive Technology, ICSSIT 2023 (pp. 391–396). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICSSIT55814.2023.10061113

Shoaib, M., Ullah, A., Abbasi, I. A., Algarni, F., & Khan, A. S. (2023). Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios. IEEE Access, 11, 123295-123313.

Suleski, T., Ahmed, M., Yang, W., & Wang, E. (2023). A Review of Multi-factor Authentication in the Internet of Healthcare Things. Digital Health, 9. SAGE Publications Inc. https://doi.org/10.1177/20552076231177144

Zen, K., Javed, M., Lenando, H. B., Zen, H., & Khan, A. S. (2015). Intelligent Coordinator Selection Mechanism (ICSM) for IEEE 802.15.4 Beacon-Enabled MAC Protocol in Mobile Wireless Sensor Networks. International Review on Computers and Software, 10(2), 164.

Zhang, Y., Li, B., Wu, J., Liu, B., Chen, R., & Chang, J. (2022). Efficient and Privacy-Preserving Blockchain-Based Multifactor Device Authentication Protocol for Cross-Domain IIoT. IEEE Internet of Things Journal, 9(22), 22501–22515. https://doi.org/10.1109/JIOT.2022.3176192

Zubair, S., Fisal, N., Abazeed, M. B., Salihu, B. A., & Khan, A. S. (2015). Lightweight Distributed Geographical: A Lightweight Distributed Protocol for Virtual Clustering in Geographical Forwarding Cognitive Radio Sensor Networks. International Journal of Communication Systems, 28(1), 1-18.

Published

2024-07-18

How to Cite

Nur Syahrina Binti Juni, Grasila Huney Wan, Siti Aisyah Nabilah Binti Banchi, Estella Blessings, Venetha A/P Loganathan, & Muhammad Faisal. (2024). Advancements in Multi-Factor Authentication: A Quantum-Resilient and Federated Approach for Enhanced Security . International Journal of Computer Technology and Science, 1(3), 71–86. https://doi.org/10.62951/ijcts.v1i3.26

Most read articles by the same author(s)

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.