Mutual authentication

Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at the same time in an authentication protocol. It is a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS). Mutual authentication is a desired characteristic in verification schemes that transmit sensitive data, in order to ensure data security. Mutual authentication can be accomplished with two types of credentials: usernames and passwords, and public key certificates.

Comment
enMutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at the same time in an authentication protocol. It is a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS). Mutual authentication is a desired characteristic in verification schemes that transmit sensitive data, in order to ensure data security. Mutual authentication can be accomplished with two types of credentials: usernames and passwords, and public key certificates.
Has abstract
enMutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at the same time in an authentication protocol. It is a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS). Mutual authentication is a desired characteristic in verification schemes that transmit sensitive data, in order to ensure data security. Mutual authentication can be accomplished with two types of credentials: usernames and passwords, and public key certificates. Mutual authentication is often employed in the Internet of Things (IoT). Writing effective security schemes in IoT systems can become challenging, especially when schemes are desired to be lightweight and have low computational costs. Mutual authentication is a crucial security step that can defend against many adversarial attacks, which otherwise can have large consequences if IoT systems (such as e-Healthcare servers) are hacked. In scheme analyses done of past works, a lack of mutual authentication had been considered a weakness in data transmission schemes.
Is primary topic of
Mutual authentication
Label
enMutual authentication
Link from a Wikipage to an external page
docs.oracle.com/cd/E19798-01/821-1841/bncbt/index.html
Link from a Wikipage to another Wikipage
5G
Alice and Bob
Authenticating
Authentication protocol
Biometrics
Bit
Blockchain
Body area network
Burrows–Abadi–Needham logic
Business-to-business
Category:Authentication methods
Category:Computer access control
Cloud computing
Dapr
Data security
Device-to-device
Fog computing
Hacker
Information system
Internet Key Exchange
Internet of things
Man-in-the-middle attack
Memory footprint
Microservices
Mobile edge computing
Multi-factor authentication
One-time password
Password
Public key certificate
Radio frequency
Radio-frequency identification
Replay attack
Runtime system
Secure Shell
Smart card
Smartwatch
Spoofing attack
Telecare
Transport Layer Security
Unmanned aerial vehicle
Vehicular automation
X.509 certificate
Zero trust networks
SameAs
4rgKr
m.08p1x1
Mutual authentication
Q6944186
Subject
Category:Authentication methods
Category:Computer access control
WasDerivedFrom
Mutual authentication?oldid=1113164922&ns=0
WikiPageLength
24271
Wikipage page ID
3064285
Wikipage revision ID
1113164922
WikiPageUsesTemplate
Template:Cn
Template:Reflist
Template:Short description