Browse by author
Lookup NU author(s): Dr Zhenyu Wen
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
© 2014 IEEE.SDN has provided significant convenience for network providers and operators in cloud computing. Such a great advantage is extending to the Internet of Things network. However, it also increases the risk if the security of an SDN network is compromised. For example, if the network operator's permission is illegally obtained by a hacker, he/she can control the entry of the SDN network. Therefore, an effective authentication scheme is needed to fit various application scenarios with high-security requirements. In this article, we design, implement, and evaluate a new authentication scheme called the hidden pattern (THP), which combines graphics password and digital challenge value to prevent multiple types of authentication attacks at the same time. We examined THP in the perspectives of both security and usability, with a total number of 694 participants in 63 days. Our evaluation shows that THP can provide better performance than the existing schemes in terms of security and usability.
Author(s): Fang L, Li Y, Yun X, Wen Z, Ji S, Meng W, Cao Z, Tanveer M
Publication type: Article
Publication status: Published
Journal: IEEE Internet of Things Journal
Year: 2020
Volume: 7
Issue: 7
Pages: 5745-5759
Print publication date: 01/07/2020
Online publication date: 27/09/2019
Acceptance date: 15/09/2019
ISSN (print): 2576-3180
ISSN (electronic): 2327-4662
Publisher: Institute of Electrical and Electronics Engineers Inc.
URL: https://doi.org/10.1109/JIOT.2019.2944301
DOI: 10.1109/JIOT.2019.2944301
Altmetrics provided by Altmetric