Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications

Aleksandr Ometov, Vitaly Petrov, Sergey Bezzateev, Sergey Andreev, Yevgeni Koucheryavy, Mario Gerla

Research output: Contribution to journalArticleScientificpeer-review

20 Citations (Scopus)
14 Downloads (Pure)


The unprecedented proliferation of smart devices together with novel communication, computing, and control technologies have paved the way for A-IoT. This development involves new categories of capable devices, such as high-end wearables, smart vehicles, and consumer drones aiming to enable efficient and collaborative utilization within the smart city paradigm. While massive deployments of these objects may enrich people's lives, unauthorized access to said equipment is potentially dangerous. Hence, highly secure human authentication mechanisms have to be designed. At the same time, human beings desire comfortable interaction with the devices they own on a daily basis, thus demanding authentication procedures to be seamless and user-friendly, mindful of contemporary urban dynamics. In response to these unique challenges, this work advocates for the adoption of multi-factor authentication for A-IoT, such that multiple heterogeneous methods - both well established and emerging - are combined intelligently to grant or deny access reliably. We thus discuss the pros and cons of various solutions as well as introduce tools to combine the authentication factors, with an emphasis on challenging smart city environments. We finally outline the open questions to shape future research efforts in this emerging field.

Original languageEnglish
Pages (from-to)82-88
Number of pages7
JournalIEEE Network
Issue number2
Publication statusPublished - 1 Mar 2019
Publication typeA1 Journal article-refereed

Publication forum classification

  • Publication forum level 2

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications


Dive into the research topics of 'Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications'. Together they form a unique fingerprint.

Cite this