International audienceThis paper introduces an original and strong authentication method using a two-factor scheme enhanced by network channels and devices diversity. The proposed solution combines an OTP-based approach using an IoT object as secondary device in addition to the mobile phone. Authentication factors are transmitted over different channels (LTE, LPWAN, ... ) via different devices thus greatly reducing the attack surface. To avoid depending on the protocol security specificities used to instantiate a channel, we use a security layer ensuring end-to-end encryption of the transferred sensitive contents. In addition, diversity can be leveraged by exploiting its inherent modularity to infer other approaches. We give an example of a...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceModern portable devices such as smartphones are enhanced by advanced functiona...
International audienceModern portable devices such as smartphones are enhanced by advanced functiona...
International audienceModern portable devices such as smartphones are enhanced by advanced functiona...
International audienceModern portable devices such as smartphones are enhanced by advanced functiona...
International audienceModern portable devices such as smartphones are enhanced by advanced functiona...
A secure network depends in part on user authentication and regrettably the authentication systems c...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceThis paper introduces an original and strong authentication method using a two...
International audienceModern portable devices such as smartphones are enhanced by advanced functiona...
International audienceModern portable devices such as smartphones are enhanced by advanced functiona...
International audienceModern portable devices such as smartphones are enhanced by advanced functiona...
International audienceModern portable devices such as smartphones are enhanced by advanced functiona...
International audienceModern portable devices such as smartphones are enhanced by advanced functiona...
A secure network depends in part on user authentication and regrettably the authentication systems c...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...