{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:23:58Z","timestamp":1776075838097,"version":"3.50.1"},"reference-count":68,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,11]]},"DOI":"10.1109\/isdfs58141.2023.10131870","type":"proceedings-article","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T17:30:36Z","timestamp":1685122236000},"page":"1-7","source":"Crossref","is-referenced-by-count":14,"title":["Survey on IoT Multi-Factor Authentication Protocols: A Systematic Literature Review"],"prefix":"10.1109","author":[{"given":"Zein Al-Abidin","family":"Mohammad Fneish","sequence":"first","affiliation":[{"name":"Arab Open University,Faculty of Computer Studies,Beirut,Lebanon"}]},{"given":"Mohammad","family":"El-Hajj","sequence":"additional","affiliation":[{"name":"University of Twente,Faculty of Electrical Engineering Mathematics and Computer Science,Enschede,Netherlands"}]},{"given":"Khouloud","family":"Samrouth","sequence":"additional","affiliation":[{"name":"Arab Open University,Faculty of Computer Studies,Beirut,Lebanon"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.07.085"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000790"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.26594\/register.v6i2.1932"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.37868\/sei.v3i1.124"},{"key":"ref59","article-title":"A lightweight three factor authentication framework for iot based critical applications","author":"saqib","year":"2021","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-1372-2_8"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00836-x"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/3805058"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06869-y"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058399"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2971254"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.20533\/ijisr.2042.4639.2015.0070"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102494"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9324035"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EAIT.2014.23"},{"key":"ref18","article-title":"Addressing false data injection attacks in iot systems with a domain specific language within an industrial context","author":"briland","year":"2021","journal-title":"Ph D dissertation University of Franche Comt&#x00E9;"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01225-1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2981049"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE47735.2019.9037779"},{"key":"ref45","first-page":"17","article-title":"Two factor authentication framework using otp-sms based on blockchain","volume":"7","author":"alharbi","year":"2019","journal-title":"Transactions on Machine Learning and Artificial Intelligence"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-03752-7"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2899580"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography3030024"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2019.8855828"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/s19163598"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2019.03760"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00484-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.05.170"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015905221"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/info12020087"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICOASE.2018.8548785"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.20935\/AL1003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s19051141"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2019.8847031"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2796539"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390280"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/s19173663"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2019.8891082"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-018-0062-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846299"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2018.8450397"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s18072394"},{"key":"ref2","article-title":"The networked physical world: proposals for the next generation of computing commerce, and automatic identification","author":"sarma","year":"1999","journal-title":"Auto-ID Center White Paper"},{"key":"ref1","first-page":"41","article-title":"Introduction to iot","volume":"5","author":"gokhale","year":"2018","journal-title":"International Advanced Research Journal in Science Engineering and Technology"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.06.020"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01513-w"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"3323e","DOI":"10.1002\/dac.3323","article-title":"Secure multi-factor remote user authentication scheme for internet of things environments","volume":"30","author":"dhillon","year":"2017","journal-title":"International Journal of Communication Systems"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4468301"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2017.8090407"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03834-9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1937"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773666"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2015.7413961"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02523-9"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02213-6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CESYS.2016.7890002"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9273662"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568941"},{"key":"ref65","article-title":"An authentication protocol for iot network based on cloud computing environment using two factor authentication","author":"roy","year":"0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.01.003"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2787800"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2882610"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.dcan.2020.06.003","article-title":"Lightweight authentication protocol for e-health clouds in iot-based applications through 5g technology","volume":"7","author":"ayub","year":"2021","journal-title":"Digital Communications and Networks"},{"key":"ref62","article-title":"A robust two-factor user authentication scheme-based ecc for smart home in iot","author":"zou","year":"2021","journal-title":"IEEE Systems Journal"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3049543"}],"event":{"name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","location":"Chattanooga, TN, USA","start":{"date-parts":[[2023,5,11]]},"end":{"date-parts":[[2023,5,12]]}},"container-title":["2023 11th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10131120\/10131673\/10131870.pdf?arnumber=10131870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T17:56:03Z","timestamp":1686592563000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10131870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,11]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/isdfs58141.2023.10131870","relation":{},"subject":[],"published":{"date-parts":[[2023,5,11]]}}}