eprintid: 18936 rev_number: 2 eprint_status: archive userid: 1 dir: disk0/00/01/89/36 datestamp: 2024-06-04 14:11:23 lastmod: 2024-06-04 14:11:23 status_changed: 2024-06-04 14:04:27 type: conference_item metadata_visibility: show creators_name: Yalli, J.S. creators_name: Hasan, M.H. creators_name: Haron, N.S. title: A Convenient User Three Authentication Levels for Internet of Things (IoT) Devices ispublished: pub keywords: Denial-of-service attack; Internet of things; Side channel attack, Attack; Bit maps; Geographical locations; Second phase; Signature; Third phase; Three phase; Three phasis; Transmit data; Two phase, Authentication note: cited By 0; Conference of 11th IEEE Conference on Systems, Process and Control, ICSPC 2023 ; Conference Date: 16 December 2023; Conference Code:197292 abstract: IoT has shown pervasiveness and prevalence everyday. The IoT nodes continuously generate and transmits data in the network, therefore authentication is needed in order to deliver actual data. A convenient and reliable way of authenticating these nodes is paramount. This work proposes a convenient way for the nodes to authenticate each other without the user being involved, and where the user gets involved, he performs his authentication conveniently. The authentication of the nodes goes through three phases. In the first phase of authentication nodes are authenticated by specially generating a signature which constitutes the specs of the node. The second phase authenticates by calculating the geographical location of the node and third phase prompts the user to enter his password from a bitmap. The password is difficult to crack as it comes in two bitmaps and randomly shuffles its characters each time it prompts. The first phase is sufficient to authenticate the nodes, but if it fails it can go the second phase. The user can get involved only if the two phases failed then he can provide his credential to authenticate the node. The system is resistant to side channel, rank, brute force, MITM, MAC spoofing, DoS, and DoS attacks. © 2023 IEEE. date: 2023 official_url: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85186693659&doi=10.1109%2fICSPC59664.2023.10419961&partnerID=40&md5=40e69f506a15448c8328c01be2443007 id_number: 10.1109/ICSPC59664.2023.10419961 full_text_status: none publication: 2023 IEEE 11th Conference on Systems, Process and Control, ICSPC 2023 - Proceedings pagerange: 288-293 refereed: TRUE citation: Yalli, J.S. and Hasan, M.H. and Haron, N.S. (2023) A Convenient User Three Authentication Levels for Internet of Things (IoT) Devices. In: UNSPECIFIED.