TY - CONF AV - none KW - Denial-of-service attack; Internet of things; Side channel attack KW - Attack; Bit maps; Geographical locations; Second phase; Signature; Third phase; Three phase; Three phasis; Transmit data; Two phase KW - Authentication TI - A Convenient User Three Authentication Levels for Internet of Things (IoT) Devices SP - 288 ID - scholars18936 N2 - IoT has shown pervasiveness and prevalence everyday. The IoT nodes continuously generate and transmits data in the network, therefore authentication is needed in order to deliver actual data. A convenient and reliable way of authenticating these nodes is paramount. This work proposes a convenient way for the nodes to authenticate each other without the user being involved, and where the user gets involved, he performs his authentication conveniently. The authentication of the nodes goes through three phases. In the first phase of authentication nodes are authenticated by specially generating a signature which constitutes the specs of the node. The second phase authenticates by calculating the geographical location of the node and third phase prompts the user to enter his password from a bitmap. The password is difficult to crack as it comes in two bitmaps and randomly shuffles its characters each time it prompts. The first phase is sufficient to authenticate the nodes, but if it fails it can go the second phase. The user can get involved only if the two phases failed then he can provide his credential to authenticate the node. The system is resistant to side channel, rank, brute force, MITM, MAC spoofing, DoS, and DoS attacks. © 2023 IEEE. N1 - cited By 0; Conference of 11th IEEE Conference on Systems, Process and Control, ICSPC 2023 ; Conference Date: 16 December 2023; Conference Code:197292 Y1 - 2023/// EP - 293 UR - https://www.scopus.com/inward/record.uri?eid=2-s2.0-85186693659&doi=10.1109%2fICSPC59664.2023.10419961&partnerID=40&md5=40e69f506a15448c8328c01be2443007 A1 - Yalli, J.S. A1 - Hasan, M.H. A1 - Haron, N.S. ER -