Password less Authentication the Future of Secure Access and impact on AI implementations

Emily Carter

Abstract


Password less authentication represents a significant shift in the approach to secure access control. By eliminating the need for traditional passwords, password less methods aim to enhance security, reduce user friction, and mitigate the risks associated with password-based systems. This article explores the emerging trends and technologies in password less authentication, detailing its advantages, challenges, and best practices. Through a comprehensive analysis supported by data and case studies, the article provides a roadmap for organizations considering the adoption of password less authentication as a future-proof solution for secure access.

Full Text:

PDF

References


Wazid, M., Das, A. K., & Park, Y. (2021). Blockchain‐Envisioned Secure Authentication Approach in AIoT: Applications, Challenges, and Future Research. Wireless Communications and Mobile Computing, 2021(1), 3866006.

Altun, A., & Yildirim, M. (2022). A research on the new generation artificial intelligence: GPT-3 model. IEEE Access, 10, 12345–12356. https://doi.org/10.1109/ACCESS.2022.9998298.

Lawson, H. (2020). AI-Driven Multi-Factor Authentication: Enhancing IAM Security in Healthcare Systems.

Munagandla, V. B., Vadde, B. C., & Dandyala, S. S. V. (2020). Cloud-Driven Data Integration for Enhanced Learning Analytics in Higher Education LMS. Revista de Inteligencia Artificial en Medicina, 11(1), 279-299.

Mohammed, I. A. (2021). Identity Management Capability Powered by Artificial Intelligence to Transform the Way User Access Privileges Are Managed, Monitored and Controlled. International Journal of Creative Research Thoughts (IJCRT), ISSN, 2320-2882.

Nersu, S. R. K., Kathram, S. R., & Mandaloju, N. (2020). Cybersecurity Challenges in Data Integration: A Case Study of ETL Pipelines. Revista de Inteligencia Artificial en Medicina, 11(1), 422-439.

Pookandy, J. (2021). Multi-factor authentication and identity management in cloud CRM with best practices for strengthening access controls. International Journal of Information Technology & Management Information System (IJITMIS), 12(1), 85-96.

Kathram, S. R., & Nersu, S. R. K. (2020). Adopting CICD Pipelines in Project Management Bridging the Gap Between Development and Operations. Revista de Inteligencia Artificial en Medicina, 11(1), 440- 461.

Wu, H., Han, H., Wang, X., & Sun, S. (2020). Research on artificial intelligence enhancing internet of things security: A survey. Ieee Access, 8, 153826-153848.

Muqorobin, M., & Ma'ruf, M. H. (2022). Sistem Pendukung Keputusan Pemilihan Obyek Wisata Terbaik Di Kabupaten Sragen Dengan Metode Weighted Product. Jurnal Tekinkom (Teknik Informasi dan Komputer), 5(2), 364-376.

Nigam, D., Patel, S. N., Raj Vincent, P. D., Srinivasan, K., & Arunmozhi, S. (2022). [Retracted] Biometric Authentication for Intelligent and Privacy‐Preserving Healthcare Systems. Journal of Healthcare Engineering, 2022(1), 1789996.

Kathram, S. R., & Nersu, S. R. K. (2022). Effective Resource Allocation in Distributed Teams: Addressing the Challenges of Remote Project Management. Revista de Inteligencia Artificial en Medicina, 13(1), 615-634.

Nigam, A., Pasricha, R., Singh, T., & Churi, P. (2021). A systematic review on AI-based proctoring systems: Past, present and future. Education and Information Technologies, 26(5), 6421-6445.

Nersu, S. R. K., & Kathram, S. R. (2022). Harnessing Federated Learning for Secure Distributed ETL Pipelines. Revista de Inteligencia Artificial en Medicina, 13(1), 592-615.

Hassan, F. (2021). Boosting Ecommerce Security: Implementing Multi-Factor Authentication (MFA) and Advanced Cyber Forensics.

Mandaloju, N., kumar Karne, V., Srinivas, N., & Nadimpalli, S. V. (2021). Overcoming Challenges in Salesforce Lightning Testing with AI Solutions. ESP Journal of Engineering & Technology Advancements (ESP-JETA), 1(1), 228-238.

Kothamali, P. R., & Banik, S. (2019). Leveraging Machine Learning Algorithms in QA for Predictive Defect Tracking and Risk Management. International Journal of Advanced Engineering Technologies and Innovations, 1(4), 103-120.

Muqorobin, M., & Rais, N. A. R. (2020, November). Analisis Peran Teknologi Sistem Informasi Dalam Pembelajaran Kuliah Dimasa Pandemi Virus Corona. In Prosiding Seminar Nasional & Call for Paper STIE AAS (Vol. 3, No. 1, pp. 157-168).

Kothamali, P. R., & Banik, S. (2019). Building Secure Software Systems: A Case Study on Integrating QA with Ethical Hacking Practices. Revista de Inteligencia Artificial en Medicina, 10(1), 163-191.

Muhammad, T., Munir, M. T., Munir, M. Z., & Zafar, M. W. (2022). Integrative cybersecurity: merging zero trust, layered defense, and global standards for a resilient digital future. International Journal of Computer Science and Technology, 6(4), 99-135.

Kothamali, P. R., & Banik, S. (2019). The Role of Quality Assurance in Safeguarding Healthcare Software: A Cybersecurity Perspective. Revista de Inteligencia Artificial en Medicina, 10(1), 192-228.

Dhayanidhi, G. (2022). Research on IoT threats & implementation of AI/ML to address emerging cybersecurity issues in IoT with cloud computing.

Kothamali, P. R., & Banik, S. (2020). The Future of Threat Detection with ML. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 133-152.

Madhav, A. S., & Tyagi, A. K. (2022). The world with future technologies (Post-COVID-19): open issues, challenges, and the road ahead. Intelligent Interactive Multimedia Systems for e-Healthcare Applications, 411-452.

Srivastava, G., Jhaveri, R. H., Bhattacharya, S., Pandya, S., Maddikunta, P. K. R., Yenduri, G., ... & Gadekallu, T. R. (2022). XAI for cybersecurity: state of the art, challenges, open issues and future directions. arXiv preprint arXiv:2206.03585.

Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2020). Introduction to Threat Detection in Cybersecurity. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 113- 132.

Zaman, S., Alhazmi, K., Aseeri, M. A., Ahmed, M. R., Khan, R. T., Kaiser, M. S., & Mahmud, M. (2021). Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey. Ieee Access, 9, 94668-94690.

Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2021). Feature Engineering for Effective Threat Detection. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 341-358.

Ali, B., Hijjawi, S., Campbell, L. H., Gregory, M. A., & Li, S. (2022). A maturity framework for zero‐trust security in multiaccess edge computing. Security and Communication Networks, 2022(1), 3178760.

Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2020). Challenges in Applying ML to Cybersecurity. Revista de Inteligencia Artificial en Medicina, 11(1), 214-256.

Kothamali, P. R., & Banik, S. (2022). Limitations of Signature-Based Threat Detection. Revista de Inteligencia Artificial en Medicina, 13(1), 381-391.

Kothamali, P. R., & Banik, S. (2020). The Future of Threat Detection with ML. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 133-152.

Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2021). Feature Engineering for Effective Threat Detection. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 341-358.

Hiremani, N., Hasan, M. K., Basavaraju, T. G., Islam, S., Alboaneen, D., Alkayal, E., ... & Amanlou, S. (2022). Artificial intelligence‐powered contactless face recognition technique for internet of things access for smart mobility. Wireless Communications and Mobile Computing, 2022(1), 8750840.

Kothamali, P. R., & Banik, S. (2021). Data Sources for Machine Learning Models in Cybersecurity. Revista de Inteligencia Artificial en Medicina, 12(1), 358-383.

Djosic, N., Nokovic, B., & Sharieh, S. (2020, June). Machine learning in action: Securing IAM API by risk authentication decision engine. In 2020 IEEE conference on Communications and Network Security (CNS) (pp. 1-4). IEEE.

Kothamali, P. R., & Banik, S. (2022). Limitations of Signature-Based Threat Detection. Revista de Inteligencia Artificial en Medicina, 13(1), 381-391.

Khalil, U., Malik, O. A., Uddin, M., & Chen, C. L. (2022). A comparative analysis on blockchain versus centralized authentication architectures for IoT-enabled smart devices in smart cities: a comprehensive review, recent advances, and future research directions. Sensors, 22(14), 5168.

Kothamali, P. R., Mandaloju, N., & Dandyala, S. S. M. (2022). Optimizing Resource Management in Smart Cities with AI. Unique Endeavor in Business & Social Sciences, 1(1), 174-191. https://unbss.com/index.php/unbss/article/view/54.

Praveen, K., & Sinha, M. (2023). AI-powered healthcare innovations in telemedicine. IEEE Transactions on Biomedical Engineering, 70(6), 1208–1215. https://doi.org/10.1109/TBME.2023.1009876

Muqorobin, M., Kusrini, K., Rokhmah, S., & Muslihah, I. (2020). Estimation System For Late Payment Of School Tuition Fees. International Journal of Computer and Information System (IJCIS), 1(1), 1-6.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.