{"id":"https://openalex.org/W2943527182","doi":"https://doi.org/10.23919/icact.2019.8701960","title":"Multi-Factor Authentication in Cyber Physical System: A State of Art Survey","display_name":"Multi-Factor Authentication in Cyber Physical System: A State of Art Survey","publication_year":2019,"publication_date":"2019-02-01","ids":{"openalex":"https://openalex.org/W2943527182","doi":"https://doi.org/10.23919/icact.2019.8701960","mag":"2943527182"},"language":"en","primary_location":{"id":"doi:10.23919/icact.2019.8701960","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2019.8701960","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043878504","display_name":"Sanjar Ibrokhimov","orcid":null},"institutions":[{"id":"https://openalex.org/I102786147","display_name":"Dongseo University","ror":"https://ror.org/00wygsf57","country_code":"KR","type":"education","lineage":["https://openalex.org/I102786147"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Sanjar Ibrokhimov","raw_affiliation_strings":["Division of Information and Communication Engineering, Dongseo University, Busan, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Division of Information and Communication Engineering, Dongseo University, Busan, Republic of Korea","institution_ids":["https://openalex.org/I102786147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073706357","display_name":"Kueh Lee Hui","orcid":"https://orcid.org/0009-0006-3587-130X"},"institutions":[{"id":"https://openalex.org/I51226738","display_name":"Dong-A University","ror":"https://ror.org/03qvtpc38","country_code":"KR","type":"education","lineage":["https://openalex.org/I51226738"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kueh Lee Hui","raw_affiliation_strings":["Dept. of Electrical Engineering, Dong-A University, South Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical Engineering, Dong-A University, South Korea","institution_ids":["https://openalex.org/I51226738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074894055","display_name":"Ahmed Abdulhakim Al-Absi","orcid":"https://orcid.org/0000-0001-6272-7756"},"institutions":[{"id":"https://openalex.org/I4210123477","display_name":"Kyungdong University","ror":"https://ror.org/02qedp211","country_code":"KR","type":"education","lineage":["https://openalex.org/I4210123477"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ahmed Abdulhakim Al-Absi","raw_affiliation_strings":["Department of Computer Engineering, Kyungdong University- Global Campus, Gangwondo, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Kyungdong University- Global Campus, Gangwondo, South Korea","institution_ids":["https://openalex.org/I4210123477"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043826308","display_name":"hoon jae lee","orcid":null},"institutions":[{"id":"https://openalex.org/I102786147","display_name":"Dongseo University","ror":"https://ror.org/00wygsf57","country_code":"KR","type":"education","lineage":["https://openalex.org/I102786147"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"hoon jae lee","raw_affiliation_strings":["Division of Information and Communication Engineering, Dongseo University, Busan, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Division of Information and Communication Engineering, Dongseo University, Busan, Republic of Korea","institution_ids":["https://openalex.org/I102786147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023601908","display_name":"Mangal Sain","orcid":"https://orcid.org/0000-0001-7298-7930"},"institutions":[{"id":"https://openalex.org/I102786147","display_name":"Dongseo University","ror":"https://ror.org/00wygsf57","country_code":"KR","type":"education","lineage":["https://openalex.org/I102786147"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Mangal Sain","raw_affiliation_strings":["Division of Information and Communication Engineering, Dongseo University, Busan, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Division of Information and Communication Engineering, Dongseo University, Busan, Republic of Korea","institution_ids":["https://openalex.org/I102786147"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5043878504"],"corresponding_institution_ids":["https://openalex.org/I102786147"],"apc_list":null,"apc_paid":null,"fwci":8.1396,"has_fulltext":false,"cited_by_count":62,"citation_normalized_percentile":{"value":0.9748981,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"279","last_page":"284"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.9551125764846802},{"id":"https://openalex.org/keywords/chip-authentication-program","display_name":"Chip Authentication Program","score":0.8101627230644226},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.8000460863113403},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7723180651664734},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.7634804844856262},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6435679793357849},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.6358601450920105},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6209821701049805},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.609574556350708},{"id":"https://openalex.org/keywords/generic-bootstrapping-architecture","display_name":"Generic Bootstrapping Architecture","score":0.5807328820228577},{"id":"https://openalex.org/keywords/email-authentication","display_name":"Email authentication","score":0.5717488527297974},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.5292009115219116},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4678284525871277},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4612966477870941},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.13975757360458374}],"concepts":[{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.9551125764846802},{"id":"https://openalex.org/C142124187","wikidata":"https://www.wikidata.org/wiki/Q5101471","display_name":"Chip Authentication Program","level":5,"score":0.8101627230644226},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.8000460863113403},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7723180651664734},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.7634804844856262},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6435679793357849},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.6358601450920105},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6209821701049805},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.609574556350708},{"id":"https://openalex.org/C174953433","wikidata":"https://www.wikidata.org/wiki/Q5532650","display_name":"Generic Bootstrapping Architecture","level":5,"score":0.5807328820228577},{"id":"https://openalex.org/C550791530","wikidata":"https://www.wikidata.org/wiki/Q5368811","display_name":"Email authentication","level":5,"score":0.5717488527297974},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.5292009115219116},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4678284525871277},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4612966477870941},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.13975757360458374}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact.2019.8701960","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2019.8701960","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5199999809265137,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1490839636","https://openalex.org/W1602485673","https://openalex.org/W1608084235","https://openalex.org/W1967308747","https://openalex.org/W2015133728","https://openalex.org/W2101250673","https://openalex.org/W2120645859","https://openalex.org/W2141420453","https://openalex.org/W2150197300","https://openalex.org/W2488125679","https://openalex.org/W2547223571","https://openalex.org/W2615210454","https://openalex.org/W4361191432","https://openalex.org/W6635966985","https://openalex.org/W6636334166","https://openalex.org/W6738143518","https://openalex.org/W6851943530"],"related_works":["https://openalex.org/W2393298610","https://openalex.org/W2314541983","https://openalex.org/W2390304521","https://openalex.org/W2093798919","https://openalex.org/W2941888532","https://openalex.org/W2610546334","https://openalex.org/W4253316174","https://openalex.org/W2558166637","https://openalex.org/W4385414233","https://openalex.org/W2017959161"],"abstract_inverted_index":{"Digital":[0],"Multifactor":[1,34],"authentication":[2,35,88,115,136],"is":[3,36],"one":[4],"of":[5,18,31,111,113],"the":[6,32,51,84,117],"best":[7],"ways":[8],"to":[9,58,89],"make":[10],"secure":[11],"authentication.":[12],"It":[13],"covers":[14],"many":[15],"different":[16],"areas":[17],"a":[19,60],"Cyber-connected":[20],"world,":[21],"including":[22,120],"online":[23],"payments,":[24],"communications,":[25],"access":[26],"right":[27],"management,":[28],"etc.":[29],"Most":[30],"time,":[33],"little":[37],"complex":[38],"as":[39],"it":[40],"require":[41],"extra":[42],"step":[43],"from":[44,86,94,131,151],"users.":[45],"With":[46],"two-factor":[47],"authentication,":[48],"along":[49],"with":[50],"user-ID":[52],"and":[53,98,123,129,146],"password,":[54],"user":[55,114],"also":[56],"needs":[57],"enter":[59],"special":[61,73],"code":[62,74],"which":[63,75],"they":[64,76],"normally":[65],"receive":[66],"by":[67],"short":[68],"message":[69],"service":[70],"or":[71],"some":[72],"got":[77],"in":[78,116],"advance.":[79],"This":[80],"paper":[81,106,141],"will":[82],"discuss":[83],"evolution":[85],"single":[87],"Multi-Factor":[90],"Authentication":[91,96,101],"(MFA)":[92],"starting":[93],"Single-Factor":[95],"(SFA)":[97],"through":[99],"Two-Factor":[100],"(2FA).":[102],"In":[103,138],"addition,":[104],"this":[105,140],"presents":[107],"five":[108],"high-level":[109],"categories":[110],"features":[112],"gadget-free":[118],"world":[119],"security,":[121],"privacy,":[122],"usability":[124],"aspects.":[125],"These":[126],"are":[127],"adapted":[128],"extended":[130],"earlier":[132],"research":[133,144],"on":[134],"web":[135],"methods.":[137],"conclusion,":[139],"gives":[142],"future":[143],"directions":[145],"open":[147],"problems":[148],"that":[149],"stem":[150],"our":[152],"observations.":[153]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
