Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability

Authors

  • Irenna Wanisha Irenna W. Warner
  • Jaymaxcklien Bravyain James
  • Jeremy Silas Witeno
  • Luqmanul Hakim Mohammad Bakery
  • Melvianna Samuel
  • Muhammad Faisal

DOI:

https://doi.org/10.62951/ijcts.v1i3.24

Keywords:

Authentication, Blockchain, Privacy, Security, IIoT

Abstract

In the ever-changing digital world, strong security protocols are essential. As a vital line of defence against unwanted access, blockchain uses several verification techniques to boost security. This article investigates the use of blockchain technology to tackle privacy, security, and usability issues. By reducing the dangers associated with conventional centralised systems, blockchain's decentralised and immutable structure offers a secure platform for storing and verifying authentication credentials. This method increases user trust by using smart contracts to guarantee transparent and unchangeable authentication procedures. The suggested blockchain-based method strengthens security and enhances privacy by removing sources of failure and decreasing dependence on outside verification. Furthermore, user-centric design and expedited procedures improve the system's usability by making secure authentication more approachable and less obtrusive. This paper offers a thorough examination of the suggested system, stressing its benefits, possible drawbacks, and directions for future investigation. The results indicate that blockchain technology presents a viable solution to ensure that digital authentication frameworks combine privacy, security, and usability.

References

Aljuhani, A., et al. (2023). A deep learning integrated blockchain framework for securing industrial IoT. IEEE Internet of Things Journal, 1. https://doi.org/10.1109/jiot.2023.3316669

Aqeel, S., Khan, A. S., Ahmad, Z., & Abdullah, J. (2022). A comprehensive study on DNA based Security scheme Using Deep Learning in Healthcare. EDPACS, 66(3), 1-17.

Asim, J., Khan, A. S., Saqib, R. M., Abdullah, J., Ahmad, Z., Honey, S., Afzal, S., Alqahtani, M. S., & Abbas, M. (2022). Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review. Applied Sciences, 12(7), 3551.

Bala, R., & Manoharan, R. (2022). Blockchain based secure and effective authentication mechanism for 5G networks. IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom). https://doi.org/10.1109/icbds53701.2022.9936018

Balan, K., Abdulrazak, L. F., Khan, A. S., Julaihi, A. A., Tarmizi, S., Pillay, K. S., & Sallehudin, H. (2018). RSSI and public key infrastructure based secure communication in autonomous vehicular networks. International Journal of Advanced Computer Science and Applications, 9(12).

Fedorov, I. R., Getmaniuk, I. B., & Bezzateev, S. (2023). Blockchain-Based device authentication method in industrial internet of things. IEEE Xplore. https://doi.org/10.1109/icumt61075.2023.10333273

Ikharo, B. A., Obiagwu, A., Obasi, C., Hussein, S. U., & Akah, P. (2021). Security for Internet-of-Things enabled E-Health using blockchain and artificial intelligence: a novel integration framework. IEEE Xplore. https://doi.org/10.1109/icmeas52683.2021.9692368

Iqbal, A. M., Khan, A. S., Abdullah, J., Kulathuramaiyer, N., & Senin, A. A. (2022). Blended system thinking approach to strengthen the education and training in university-industry research collaboration. Technology Analysis & Strategic Management, 34(4), 447-460.

Iqbal, A. M., Kulathuramaiyer, N., Khan, A. S., Abdullah, J., & Khan, M. A. (2022). Intellectual capital: a system thinking analysis in revamping the exchanging information in university-industry research collaboration. Sustainability, 14(11), 6404.

Ismail, S., Dawoud, D. W., & Reza, H. (2022). Towards a lightweight identity management and secure authentication for IoT using blockchain. 2022 IEEE World AI IoT Congress (AIIoT). https://doi.org/10.1109/aiiot54504.2022.9817349

Jambli, M. N., Khan, A. S., Lenando, H., Abdullah, J., & Suhaili, S. M. (2017). A Dynamic Energy Savvy Routing Algorithm for Mobile Ad-Hoc and Sensor Networks. Advanced Science Letters, 23(6), 5542-5546.

Jan, S. U., Abbasi, I. A., Algarni, F., & Khan, A. S. (2022). A verifiably secure ECC based authentication scheme for securing IoD using FANET. IEEE Access, 10, 95321-95343.

Khan, A. S. (2014). Secure and efficient distributed relay-based rekeying algorithm for group communication in mobile multihop relay network. International Journal of Communication Networks and Information Security, 6(3), 189.

Khan, A. S., & Iqbal, A. M. (2018). Mobile Multihop Relay Wimax Networks: Security Perspectives. Universiti Malaysia Sarawak.

Khan, A. S., Fisal, N., Esa, M., Kamilah, S., Zubair, S., Maqbool, W., & Bakar, Z. A. (2014). Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks. Security for Multihop Wireless Networks, 43.

Khan, N., Abdullah, J., & Khan, A. S. (2015). Towards vulnerability prevention model for web browser using interceptor approach.

Lenando, H., Gharin, A. H., Jambli, M. N., Abdullah, J., & Khan, A. S. (2015). Neighbor selection protocol for heterogeneous information dissemination in Opportunistic Networks.

Lenando, H., Sian, G. S., Khan, A. S., & Fauzi, A. H. (2014). Identify the best location to place data based on social interaction in opportunistic network.

Liu, Y., et al. (2024). A Blockchain-Based Cross-Domain authentication management system for IoT devices. IEEE Transactions on Network Science and Engineering, 11(1), 115–127. https://doi.org/10.1109/tnse.2023.3292624

Patwe, S., & Mane, S. B. (2023). Blockchain enabled architecture for secure authentication in the metaverse environment. IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom). https://doi.org/10.1109/i2ct57861.2023.10126452

Rathee, G., Kerrache, C. A., & Limam, M. (2023). TrustBlkSyS: a trusted and blockchained cybersecure system for IIoT. IEEE Transactions on Industrial Informatics, 19(2), 1592–1599. https://doi.org/10.1109/tii.2022.3182984

Sukumaran, R. P., & Benedict, S. (2021). Survey on blockchain enabled authentication for Industrial Internet of Things. 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). https://doi.org/10.1109/i-smac52330.2021.9640973

Zhang, P., Wang, Y., Aujla, G. S., Jindal, A., & Al‐Otaibi, Y. D. (2022). A Blockchain-Based authentication scheme and secure architecture for IoT-Enabled maritime transportation systems. IEEE Transactions on Intelligent Transportation Systems, 1–10. https://doi.org/10.1109/tits.2022.3159485

Published

2024-07-18

How to Cite

Irenna Wanisha, James, J. B., Witeno, J. S., Mohammad Bakery, L. H., Samuel, M., & Muhammad Faisal. (2024). Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability. International Journal of Computer Technology and Science, 1(3), 41–55. https://doi.org/10.62951/ijcts.v1i3.24

Most read articles by the same author(s)

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.