Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

Recent trends in user authentication–a survey

SW Shah, SS Kanhere - IEEE access, 2019 - ieeexplore.ieee.org
Recent advancements in technology have led to profusion of personal computing devices,
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …

Performance Analysis of Authentication System: A Systematic Literature Review

D Singla, N Verma - Recent Advances in Computer Science and …, 2024 - benthamdirect.com
Background: Data authentication is vital nowadays, as the development of the internet and
its applications allow users to have all-time data availability, attracting attention towards …

ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification

N Ghose, K Gupta, L Lazos, M Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Two-factor authentication provides an additional layer of protection to commonly-occurring
password breaches. However, existing TFA methods, often involve special hardware …

Secure mobile two-factor authentication leveraging active sound sensing

Y Ren, C Chen, H Liu, J Yu, Z Zheng… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The two-factor authentication (2FA) has drawn increasingly attention as the mobile devices
become more prevalent. For example, the user's possession of the enrolled phone could be …

User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices

JJ Jeong, SWA Shah, A Nanda, R Doss… - … on Human-Machine …, 2024 - ieeexplore.ieee.org
Physical authentication devices (PADs) offer a higher level of security than other
authentication technologies commonly used in multifactor authentication (MFA) schemes …

Wi-sign: Device-free second factor user authentication

SW Shah, SS Kanhere - Proceedings of the 15th EAI International …, 2018 - dl.acm.org
Most two-factor authentication (2FA) implementations rely on the user possessing and
interacting with a secondary device (eg mobile phone) which has contributed to the lack of …

FPCA: Parasitic Coding Authentication for UAVs by FM Signals

S Zhu, X Zheng, L Liu, H Ma - IEEE/ACM Transactions on …, 2024 - ieeexplore.ieee.org
De-authentication attack is one of the major threats to Unmanned Aerial Vehicle (UAV)
communication, in which the attacker continuously sends de-authentication frames to …

Wi-access: Second factor user authentication leveraging WiFi signals

SW Shah, SS Kanhere - 2018 IEEE International Conference …, 2018 - ieeexplore.ieee.org
Two factor authentication offers significant benefits but has had limited uptake as users find
the extra step required at each authentication attempt (eg, to enter a verification code) to be …

Abnormal behavior detection mechanism using deep learning for zero-trust security infrastructure

HW Kim, EH Song - International Journal of Information Technology, 2024 - Springer
As ICT technology has developed, work has become possible in a variety of locations and
working from home has become more active. Intranet-type information network access was …