{"id":"https://openalex.org/W4410823646","doi":"https://doi.org/10.3390/cryptography9020035","title":"Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications","display_name":"Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications","publication_year":2025,"publication_date":"2025-05-28","ids":{"openalex":"https://openalex.org/W4410823646","doi":"https://doi.org/10.3390/cryptography9020035"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography9020035","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9020035","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/cryptography9020035","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018701574","display_name":"Salem AlJanah","orcid":"https://orcid.org/0000-0003-0480-4543"},"institutions":[{"id":"https://openalex.org/I240666556","display_name":"Imam Mohammad ibn Saud Islamic University","ror":"https://ror.org/05gxjyb39","country_code":"SA","type":"education","lineage":["https://openalex.org/I240666556"]},{"id":"https://openalex.org/I28407311","display_name":"University of Manchester","ror":"https://ror.org/027m9bs27","country_code":"GB","type":"education","lineage":["https://openalex.org/I28407311"]}],"countries":["GB","SA"],"is_corresponding":true,"raw_author_name":"Salem AlJanah","raw_affiliation_strings":["College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia","Department of Computer Science, The University of Manchester, Manchester M13 9PL, UK"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia","institution_ids":["https://openalex.org/I240666556"]},{"raw_affiliation_string":"Department of Computer Science, The University of Manchester, Manchester M13 9PL, UK","institution_ids":["https://openalex.org/I28407311"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048365502","display_name":"Ning Zhang","orcid":"https://orcid.org/0000-0001-9519-9128"},"institutions":[{"id":"https://openalex.org/I28407311","display_name":"University of Manchester","ror":"https://ror.org/027m9bs27","country_code":"GB","type":"education","lineage":["https://openalex.org/I28407311"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ning Zhang","raw_affiliation_strings":["Department of Computer Science, The University of Manchester, Manchester M13 9PL, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Manchester, Manchester M13 9PL, UK","institution_ids":["https://openalex.org/I28407311"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025999210","display_name":"Siok Wah Tay","orcid":"https://orcid.org/0000-0002-0005-889X"},"institutions":[{"id":"https://openalex.org/I173029219","display_name":"Multimedia University","ror":"https://ror.org/04zrbnc33","country_code":"MY","type":"education","lineage":["https://openalex.org/I173029219"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Siok Wah Tay","raw_affiliation_strings":["Faculty of Information Science and Technology (FIST), Multimedia University, Melaka 75450, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Science and Technology (FIST), Multimedia University, Melaka 75450, Malaysia","institution_ids":["https://openalex.org/I173029219"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018701574"],"corresponding_institution_ids":["https://openalex.org/I240666556","https://openalex.org/I28407311"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":1.4888,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83281786,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"9","issue":"2","first_page":"35","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/factor","display_name":"Factor (programming language)","score":0.6097413301467896},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6037025451660156},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5852627158164978},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.580741286277771},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5602853298187256},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.5027551651000977},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47607535123825073},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43054479360580444},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.2609827518463135}],"concepts":[{"id":"https://openalex.org/C2781039887","wikidata":"https://www.wikidata.org/wiki/Q1391724","display_name":"Factor (programming language)","level":2,"score":0.6097413301467896},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6037025451660156},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5852627158164978},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.580741286277771},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5602853298187256},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.5027551651000977},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47607535123825073},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43054479360580444},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.2609827518463135},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/cryptography9020035","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9020035","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:openaire/201e4d67-a051-4e3e-abfb-79c4383ff04d","is_oa":true,"landing_page_url":"https://research.manchester.ac.uk/en/publications/201e4d67-a051-4e3e-abfb-79c4383ff04d","pdf_url":null,"source":{"id":"https://openalex.org/S4306400662","display_name":"Research Explorer (The University of Manchester)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28407311","host_organization_name":"University of Manchester","host_organization_lineage":["https://openalex.org/I28407311"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"AlJanah, S, Zhang, N & Tay, S W 2025, 'Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications', Cryptography, vol. 9, no. 2, 35. https://doi.org/10.3390/cryptography9020035","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:shdl.mmu.edu.my:14204","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196753","display_name":"Siti Hasmah Digital Library-MMU Institutiona Repository (Multimedia University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I173029219","host_organization_name":"Multimedia University","host_organization_lineage":["https://openalex.org/I173029219"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"},{"id":"pmh:oai:doaj.org/article:27174a3e0e1645598847a653da0c08d6","is_oa":true,"landing_page_url":"https://doaj.org/article/27174a3e0e1645598847a653da0c08d6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 9, Iss 2, p 35 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography9020035","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9020035","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":81,"referenced_works":["https://openalex.org/W1986684482","https://openalex.org/W2085002292","https://openalex.org/W2141420453","https://openalex.org/W2273663819","https://openalex.org/W2289455499","https://openalex.org/W2292123528","https://openalex.org/W2412908136","https://openalex.org/W2516089876","https://openalex.org/W2560195950","https://openalex.org/W2587473413","https://openalex.org/W2606882085","https://openalex.org/W2608333876","https://openalex.org/W2609047018","https://openalex.org/W2617427664","https://openalex.org/W2717686215","https://openalex.org/W2733306512","https://openalex.org/W2753121224","https://openalex.org/W2772156789","https://openalex.org/W2775405389","https://openalex.org/W2781808171","https://openalex.org/W2795482797","https://openalex.org/W2797440422","https://openalex.org/W2810799152","https://openalex.org/W2888413717","https://openalex.org/W2890187623","https://openalex.org/W2891683142","https://openalex.org/W2904793806","https://openalex.org/W2909223906","https://openalex.org/W2919099218","https://openalex.org/W2943373652","https://openalex.org/W2952624816","https://openalex.org/W2966593378","https://openalex.org/W2976577124","https://openalex.org/W2980991739","https://openalex.org/W2982381313","https://openalex.org/W2996306964","https://openalex.org/W2999414741","https://openalex.org/W3002823324","https://openalex.org/W3005560537","https://openalex.org/W3028449155","https://openalex.org/W3036907975","https://openalex.org/W3042565401","https://openalex.org/W3089303131","https://openalex.org/W3091821067","https://openalex.org/W3094254490","https://openalex.org/W3094745711","https://openalex.org/W3095513123","https://openalex.org/W3096156160","https://openalex.org/W3127595396","https://openalex.org/W3139190907","https://openalex.org/W3160875403","https://openalex.org/W3169126164","https://openalex.org/W3185430008","https://openalex.org/W3190874804","https://openalex.org/W3200276483","https://openalex.org/W3200337798","https://openalex.org/W3200511651","https://openalex.org/W3202923701","https://openalex.org/W4210387249","https://openalex.org/W4210503308","https://openalex.org/W4212855388","https://openalex.org/W4214844755","https://openalex.org/W4226190813","https://openalex.org/W4230238643","https://openalex.org/W4280532439","https://openalex.org/W4280585317","https://openalex.org/W4293731219","https://openalex.org/W4311277365","https://openalex.org/W4315865020","https://openalex.org/W4386778812","https://openalex.org/W4386831150","https://openalex.org/W4391305807","https://openalex.org/W4402127185","https://openalex.org/W4412162377","https://openalex.org/W6736582577","https://openalex.org/W6737230258","https://openalex.org/W6790510963","https://openalex.org/W6794907518","https://openalex.org/W6809663260","https://openalex.org/W6822826988","https://openalex.org/W6856934198"],"related_works":["https://openalex.org/W2363363251","https://openalex.org/W4309172146","https://openalex.org/W4238865314","https://openalex.org/W4291701200","https://openalex.org/W2784315464","https://openalex.org/W4391429007","https://openalex.org/W192327621","https://openalex.org/W3000652178","https://openalex.org/W153191986","https://openalex.org/W4324137616"],"abstract_inverted_index":{"As":[0,89],"more":[1,10,75],"Internet":[2],"of":[3,91,98,128,174,184,198,217],"Things":[4],"(IoT)":[5],"devices":[6,129],"are":[7,15,56,70,142,164,177],"being":[8,17],"used,":[9],"sensitive":[11],"data":[12],"and":[13,39,103,132,163,171,180,189,205,211],"services":[14],"also":[16,178],"hosted":[18],"by,":[19],"or":[20],"accessed":[21],"via,":[22],"IoT":[23,37,67,150,185],"devices.":[24,151],"This":[25],"leads":[26],"to":[27,45,79,82,106,117,144],"a":[28,31,40],"need":[29],"for":[30,35,59,86],"stronger":[32,41],"authentication":[33,42,50,54,85,109,119,127,140,148,187],"solution":[34,43],"the":[36,66,96,99,125,156,159,175,195,199,203],"context,":[38,68],"tends":[44],"be":[46],"based":[47],"on":[48,95],"several":[49],"factors.":[51],"Existing":[52],"multi-factor":[53,84,108,126,146],"solutions":[55,188],"mostly":[57],"used":[58],"user-to-system":[60],"identity":[61],"verification":[62],"scenarios,":[63],"whereas,":[64],"in":[65,110,130,213],"there":[69],"device-to-device":[71,87,131],"communication":[72,170,204],"scenarios.":[73],"Therefore,":[74],"work":[76,94],"is":[77],"necessary":[78],"investigate":[80],"how":[81],"facilitate":[83,107,145],"interactions.":[88,134],"part":[90],"our":[92],"ongoing":[93],"design":[97],"M2I":[100],"(Multi-factor":[101],"Multilevel":[102],"Interaction-based)":[104],"framework":[105,120],"IoT,":[111],"this":[112,136],"paper":[113],"reports":[114],"an":[115,118],"extension":[116],"published":[121],"previously":[122],"that":[123,155,194],"supports":[124],"device-to-multidevice":[133],"In":[135],"extended":[137],"framework,":[138],"four":[139],"protocols":[141,157,176,201],"added":[143],"group":[147,186],"between":[149],"Analysis":[152],"results":[153,192],"show":[154,193],"satisfy":[158],"specified":[160],"security":[161],"requirements":[162],"resilient":[165],"against":[166],"authentication-related":[167],"attacks.":[168],"The":[169,191],"computation":[172],"overheads":[173],"analyzed":[179],"compared":[181],"with":[182,215],"those":[183,216],"Kerberos.":[190,218],"symmetric-key-based":[196],"version":[197],"proposed":[200],"cut":[202],"computational":[206],"costs,":[207],"respectively,":[208],"by":[209],"70\u223c74%":[210],"89\u223c92%":[212],"comparison":[214]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
