Acknowledgement
The authors would like to thank the Deanship of Graduate Studies at Jouf University for funding and supporting this research through the initiative of DGS, Graduate Students Research Support (GSR) at Jouf University, Saudi Arabia.
References
- Stamp, M. (2011). Information security: principles and practice. John Wiley & Sons. ISBN: 978-1-118-02796-7, https://www.wiley.com/ens/Information+Security%3A+Principles+and+Practice%2C+2nd+Edition-p-9781118027967
- Fatma Hendaoui, Hamdi Eltaief, Habib Youssef, UAP: A unified authentication platform for IoT environment, Computer Networks, Volume 188, 2021, 107811, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2021.107811.
- Das, S. (2020). A risk-reduction-based incentivization model for human-centered multifactor authentication (Doctoral dissertation, Indiana University). https://www.proquest.com/openview/38faf90785cf47c997333c8a799e1e83/1?pq-origsite=gscholar&cbl=18750&diss=y
- Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Nicola Zannone, A survey on multi- factor authentication for online banking in the wild, Computers & Security, Volume 95, 2020, 101745, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.101745.
- Ometov A, Bezzateev S, Makitalo N, Andreev S, Mikkonen T, Koucheryavy Y. Multi-Factor Authentication: A Survey. Cryptography. 2018 Jan 5;2(1). https://doi.org/10.3390/cryptography2010001
- Patel C., Doshi N. (2019) Security Challenges in IoT Cyber World. In: Hassanien A., Elhoseny M., Ahmed S., Singh A. (eds) Security in Smart Cities: Models, Applications, and Challenges. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-01560-2_8
- Is your OTP safe? Here is how hackers are redirecting your SMS. https://www.businesstoday.in/latest/trends/is-your-otp-safe-here-is-how-hackers-are-redirecting- your-sms/story/433994.html. Date accessed: 06-13-2021
- Supeshala, Chamidu. (2017). Speaker Recognition using Voice Biometrics. https://www.researchgate.net/publication/344349873_Speaker_Recognition_using_Voice_BiometricsFigures
- Alston, A. (2021). A new era in cybersecurity through biometric technology (Order No. 28494739). Available from ProQuest Dissertations & Theses Global. (2537678931). Retrieved from https://www.proquest.com/dissertations-theses/new-era-cybersecurity-through-biometric/docview/2537678931/se-2?accountid=34495
- Mishra, Gouri & Mishra, Pradeep & Nand, Parma & Astya, Rani & ., Amrita. (2020). User Authentication: A Three Level Password Authentication Mechanism. Journal of Physics: Conference Series. 1712. 012005. 10.1088/1742-6596/1712/1/012005.
- B Poornima, Dr. Savadam Balaji. (2021). Cyber Security for Atm Terminals. Annals of the Romanian Society for Cell Biology, 8785-8789. Retrieved from https://www.annalsofrscb.ro/index.php/journal/article/view/3599
- Tabassum M., Sarower A.H., Esha A., Hassan M.M. (2020) An Enhancement of Kerberos Using Biometric Template and Steganography. In: Bhuiyan T., Rahman M.M., Ali M.A. (eds) Cyber Security and Computer Science. ICONCS 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 325. Springer, Cham. https://doi.org/10.1007/978-3-030-52856-0_9