Mutual authentication
Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at the same time in an authentication protocol. It is a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS). Mutual authentication is a desired characteristic in verification schemes that transmit sensitive data, in order to ensure data security. Mutual authentication can be accomplished with two types of credentials: usernames and passwords, and public key certificates.
- Comment
- enMutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at the same time in an authentication protocol. It is a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS). Mutual authentication is a desired characteristic in verification schemes that transmit sensitive data, in order to ensure data security. Mutual authentication can be accomplished with two types of credentials: usernames and passwords, and public key certificates.
- Has abstract
- enMutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at the same time in an authentication protocol. It is a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS). Mutual authentication is a desired characteristic in verification schemes that transmit sensitive data, in order to ensure data security. Mutual authentication can be accomplished with two types of credentials: usernames and passwords, and public key certificates. Mutual authentication is often employed in the Internet of Things (IoT). Writing effective security schemes in IoT systems can become challenging, especially when schemes are desired to be lightweight and have low computational costs. Mutual authentication is a crucial security step that can defend against many adversarial attacks, which otherwise can have large consequences if IoT systems (such as e-Healthcare servers) are hacked. In scheme analyses done of past works, a lack of mutual authentication had been considered a weakness in data transmission schemes.
- Is primary topic of
- Mutual authentication
- Label
- enMutual authentication
- Link from a Wikipage to an external page
- docs.oracle.com/cd/E19798-01/821-1841/bncbt/index.html
- Link from a Wikipage to another Wikipage
- 5G
- Alice and Bob
- Authenticating
- Authentication protocol
- Biometrics
- Bit
- Blockchain
- Body area network
- Burrows–Abadi–Needham logic
- Business-to-business
- Category:Authentication methods
- Category:Computer access control
- Cloud computing
- Dapr
- Data security
- Device-to-device
- Fog computing
- Hacker
- Information system
- Internet Key Exchange
- Internet of things
- Man-in-the-middle attack
- Memory footprint
- Microservices
- Mobile edge computing
- Multi-factor authentication
- One-time password
- Password
- Public key certificate
- Radio frequency
- Radio-frequency identification
- Replay attack
- Runtime system
- Secure Shell
- Smart card
- Smartwatch
- Spoofing attack
- Telecare
- Transport Layer Security
- Unmanned aerial vehicle
- Vehicular automation
- X.509 certificate
- Zero trust networks
- SameAs
- 4rgKr
- m.08p1x1
- Mutual authentication
- Q6944186
- Subject
- Category:Authentication methods
- Category:Computer access control
- WasDerivedFrom
- Mutual authentication?oldid=1113164922&ns=0
- WikiPageLength
- 24271
- Wikipage page ID
- 3064285
- Wikipage revision ID
- 1113164922
- WikiPageUsesTemplate
- Template:Cn
- Template:Reflist
- Template:Short description