Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability
DOI:
https://doi.org/10.62951/ijcts.v1i3.24Keywords:
Authentication, Blockchain, Privacy, Security, IIoTAbstract
In the ever-changing digital world, strong security protocols are essential. As a vital line of defence against unwanted access, blockchain uses several verification techniques to boost security. This article investigates the use of blockchain technology to tackle privacy, security, and usability issues. By reducing the dangers associated with conventional centralised systems, blockchain's decentralised and immutable structure offers a secure platform for storing and verifying authentication credentials. This method increases user trust by using smart contracts to guarantee transparent and unchangeable authentication procedures. The suggested blockchain-based method strengthens security and enhances privacy by removing sources of failure and decreasing dependence on outside verification. Furthermore, user-centric design and expedited procedures improve the system's usability by making secure authentication more approachable and less obtrusive. This paper offers a thorough examination of the suggested system, stressing its benefits, possible drawbacks, and directions for future investigation. The results indicate that blockchain technology presents a viable solution to ensure that digital authentication frameworks combine privacy, security, and usability.
References
Aljuhani, A., et al. (2023). A deep learning integrated blockchain framework for securing industrial IoT. IEEE Internet of Things Journal, 1. https://doi.org/10.1109/jiot.2023.3316669
Aqeel, S., Khan, A. S., Ahmad, Z., & Abdullah, J. (2022). A comprehensive study on DNA based Security scheme Using Deep Learning in Healthcare. EDPACS, 66(3), 1-17.
Asim, J., Khan, A. S., Saqib, R. M., Abdullah, J., Ahmad, Z., Honey, S., Afzal, S., Alqahtani, M. S., & Abbas, M. (2022). Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review. Applied Sciences, 12(7), 3551.
Bala, R., & Manoharan, R. (2022). Blockchain based secure and effective authentication mechanism for 5G networks. IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom). https://doi.org/10.1109/icbds53701.2022.9936018
Balan, K., Abdulrazak, L. F., Khan, A. S., Julaihi, A. A., Tarmizi, S., Pillay, K. S., & Sallehudin, H. (2018). RSSI and public key infrastructure based secure communication in autonomous vehicular networks. International Journal of Advanced Computer Science and Applications, 9(12).
Fedorov, I. R., Getmaniuk, I. B., & Bezzateev, S. (2023). Blockchain-Based device authentication method in industrial internet of things. IEEE Xplore. https://doi.org/10.1109/icumt61075.2023.10333273
Ikharo, B. A., Obiagwu, A., Obasi, C., Hussein, S. U., & Akah, P. (2021). Security for Internet-of-Things enabled E-Health using blockchain and artificial intelligence: a novel integration framework. IEEE Xplore. https://doi.org/10.1109/icmeas52683.2021.9692368
Iqbal, A. M., Khan, A. S., Abdullah, J., Kulathuramaiyer, N., & Senin, A. A. (2022). Blended system thinking approach to strengthen the education and training in university-industry research collaboration. Technology Analysis & Strategic Management, 34(4), 447-460.
Iqbal, A. M., Kulathuramaiyer, N., Khan, A. S., Abdullah, J., & Khan, M. A. (2022). Intellectual capital: a system thinking analysis in revamping the exchanging information in university-industry research collaboration. Sustainability, 14(11), 6404.
Ismail, S., Dawoud, D. W., & Reza, H. (2022). Towards a lightweight identity management and secure authentication for IoT using blockchain. 2022 IEEE World AI IoT Congress (AIIoT). https://doi.org/10.1109/aiiot54504.2022.9817349
Jambli, M. N., Khan, A. S., Lenando, H., Abdullah, J., & Suhaili, S. M. (2017). A Dynamic Energy Savvy Routing Algorithm for Mobile Ad-Hoc and Sensor Networks. Advanced Science Letters, 23(6), 5542-5546.
Jan, S. U., Abbasi, I. A., Algarni, F., & Khan, A. S. (2022). A verifiably secure ECC based authentication scheme for securing IoD using FANET. IEEE Access, 10, 95321-95343.
Khan, A. S. (2014). Secure and efficient distributed relay-based rekeying algorithm for group communication in mobile multihop relay network. International Journal of Communication Networks and Information Security, 6(3), 189.
Khan, A. S., & Iqbal, A. M. (2018). Mobile Multihop Relay Wimax Networks: Security Perspectives. Universiti Malaysia Sarawak.
Khan, A. S., Fisal, N., Esa, M., Kamilah, S., Zubair, S., Maqbool, W., & Bakar, Z. A. (2014). Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks. Security for Multihop Wireless Networks, 43.
Khan, N., Abdullah, J., & Khan, A. S. (2015). Towards vulnerability prevention model for web browser using interceptor approach.
Lenando, H., Gharin, A. H., Jambli, M. N., Abdullah, J., & Khan, A. S. (2015). Neighbor selection protocol for heterogeneous information dissemination in Opportunistic Networks.
Lenando, H., Sian, G. S., Khan, A. S., & Fauzi, A. H. (2014). Identify the best location to place data based on social interaction in opportunistic network.
Liu, Y., et al. (2024). A Blockchain-Based Cross-Domain authentication management system for IoT devices. IEEE Transactions on Network Science and Engineering, 11(1), 115–127. https://doi.org/10.1109/tnse.2023.3292624
Patwe, S., & Mane, S. B. (2023). Blockchain enabled architecture for secure authentication in the metaverse environment. IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom). https://doi.org/10.1109/i2ct57861.2023.10126452
Rathee, G., Kerrache, C. A., & Limam, M. (2023). TrustBlkSyS: a trusted and blockchained cybersecure system for IIoT. IEEE Transactions on Industrial Informatics, 19(2), 1592–1599. https://doi.org/10.1109/tii.2022.3182984
Sukumaran, R. P., & Benedict, S. (2021). Survey on blockchain enabled authentication for Industrial Internet of Things. 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). https://doi.org/10.1109/i-smac52330.2021.9640973
Zhang, P., Wang, Y., Aujla, G. S., Jindal, A., & Al‐Otaibi, Y. D. (2022). A Blockchain-Based authentication scheme and secure architecture for IoT-Enabled maritime transportation systems. IEEE Transactions on Intelligent Transportation Systems, 1–10. https://doi.org/10.1109/tits.2022.3159485
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computer Technology and Science

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.