Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology
DOI:
https://doi.org/10.62951/ijcts.v1i3.29Keywords:
Industrial Internet of Things (iioT), Blockchain, MFA, Security, ScalabilityAbstract
The rapid advancement of Industrial Internet of Things (IIoT) technology necessitates robust authentication solutions to ensure security, scalability, and efficiency. This project, titled "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain," examines various blockchain-based authentication methods for IIoT and identifies their strengths and weaknesses. Despite the enhanced security and decentralized nature of blockchain, issues such as scalability, high latency, and computational load persist. To address these challenges, we propose the integration of Multi-Factor Authentication (MFA) as a supplementary solution. MFA can distribute the authentication load, enhance flexibility and security, and reduce latency by utilizing quick-to-verify factors. Moreover, MFA ensures high availability and scalable storage and processing through cloud services, seamlessly integrating with existing systems to provide a superior user experience. This comprehensive approach not only mitigates the inherent limitations of blockchain technology in IIoT but also reinforces the overall security framework, ensuring resilient and efficient authentication mechanisms. The results demonstrate significant improvements in system performance and user satisfaction, establishing MFA as a viable enhancement to blockchain-based IIoT security solutions.References
Almadani, M. S., & Hussain, F. K. (2023). Implementing a Secure Blockchain-Based Wallet System with Multi-Factor Authentication. In 2023 IEEE International Conference on e-Business Engineering (ICEBE) (pp. 23-30). Sydney, Australia. https://doi.org/10.1109/ICEBE59045.2023.00010
ALSaleem, B. O., & Alshoshan, A. I. (2021). Multi-Factor Authentication to Systems Login. In 2021 National Computing Colleges Conference (NCCC) (pp. 1-4). Taif, Saudi Arabia. https://doi.org/10.1109/NCCC49330.2021.9428806
Bala, R., & Manoharan, R. (2022). Blockchain based Secure and Effective Authentication Mechanism for 5G Networks. In 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) (pp. 1-6). Pune, India. https://doi.org/10.1109/ICBDS53701.2022.9936018
Djonov, M., Galabov, M., & Georgieva-Trifonova, T. (2021). Solving IoT Security and Scalability Challenges with Blockchain. In 2021 5th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 52-56). Ankara, Turkey. https://doi.org/10.1109/ISMSIT52890.2021.9604700
Fauzi, A. H., & Khan, A. S. (2017). Threats Advancement in Primary User Emulation Attack and Spectrum Sensing Data Falsification (SSDF) Attack in Cognitive Radio Network (CRN) for 5G Wireless Network Environment. Journal of Telecommunication, Electronic and Computer Engineering (JTEC, 9(2-10), 179-183.
Fedorov, I. R., Getmaniuk, I. B., & Bezzateev, S. V. (2023). Blockchain-Based Device Authentication Method in Industrial Internet of Things. In 2023 15th International Congress on Ultra-Modern Telecommunications and Control Systems and Workshops (ICUMT) (pp. 243-249). https://doi.org/10.1109/ICUMT61075.2023.10333273
Gebremichael, T., et al. (2020). Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges. IEEE Access, 8, 152351-152366. https://doi.org/10.1109/ACCESS.2020.3016937
Gong-Guo, Z., & Wan, Z. (2021, April). Blockchain-based IoT security authentication system. In 2021 International Conference on Computer, Blockchain and Financial Development (CBFD). https://doi.org/10.1109/cbfd52659.2021.00090
Huang, Y., Jing, H., Li, C., & Hao, Y. (2021). Research on Intelligent Terminal Authentication Strategy Based on Blockchain. In 2021 2nd International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI) (pp. 23-26). Shenyang, China. https://doi.org/10.1109/ICHCI54629.2021.00012
Jian, W., Xu, J., Liang, W., & Li, K.-C. (2022). Dual Chain Authentication and Key Agreement Protocol Based on Blockchain Technology in Edge Computing. In 2022 IEEE 24th International Conference on High Performance Computing & Communications; 8th International Conference on Data Science & Systems; 20th International Conference on Smart City; 8th International Conference on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys) (pp. 396-401). Hainan, China. https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00082
Khan, A. A., Bourouis, S., Kamruzzaman, M. M., Hadjouni, M., Shaikh, Z. A., Laghari, A. A., Elmannai, H., & Dhahbi, S. (2023). Data Security in Healthcare Industrial Internet of Things With Blockchain. IEEE Sensors Journal, 23(20), 25144-25151. https://doi.org/10.1109/JSEN.2023.3273851
Khan, A. S., Abdullah, J., Zen, K., & Tarmizi, S. (2017). Secure and Scalable Group Rekeying for Mobile Multihop Relay Network. Advanced Science Letters, 23(6), 5242-5245.
Khan, A. S., Halikul, I., & Abdullah, N. F. J. (2015). Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks. Jurnal Teknologi, 73(1), 75-81.
Khan, A. S., Javed, Y., Abdullah, J., Nazim, J. M., & Khan, N. (2017). Security Issues in 5G Device to Device Communication. IJCSNS, 17(5), 366.
Khan, A. S., Mehdi, M. H., Uddin, R., Abbasi, A. R., & Nisar, K. (2023). Ensemble Based Automotive Paint Surface Defect Detection Augmented by Order Statistics Filtering Using Machine Learning. Authorea Preprints.
Khan, A. S., Yahya, M. I. B., Zen, K. B., Abdullah, J. B., Rashid, R. B. A., Javed, Y., Khan, N. A., & Mostafa, A. M. (2023). Blockchain-Based Lightweight Multifactor Authentication for Cell-Free in Ultra-Dense 6G-Based (6-CMAS) Cellular Network. IEEE Access, 11, 20524-20541.
Khan, N., Abdullah, J., & Khan, A. S. (2017). Defending Malicious Script Attacks Using Machine Learning Classifiers. Wireless Communications and Mobile Computing, 2017.
Khan, S., Abdullah, J., Khan, N., Julahi, A. A., & Tarmizi, S. (2017). Quantum-Elliptic Curve Cryptography for Multihop Communication in 5G Networks. International Journal of Computer Science and Network Security (IJCSNS, 17(5), 357-365.
Kumari, A., Tanwar, S., Tyagi, S., & Kumar, N. (2021). Blockchain-Based Massive Data Dissemination Handling in IIoT Environment. IEEE Network, 35(1), 318-325. https://doi.org/10.1109/MNET.011.2000355
Morais, D., Zúquete, A., & Mendes, A. (2023). Adaptive, Multi-Factor Authentication as a Service for Web Applications. In 2023 7th Cyber Security in Networking Conference (CSNet) (pp. 74-80). Montreal, QC, Canada. https://doi.org/10.1109/CSNet59123.2023.10339695
Rathee, G., Kerrache, C. A., & Lahby, M. (2023). TrustBlkSys: A Trusted and Blockchained Cybersecure System for IIoT. IEEE Transactions on Industrial Informatics, 19(2), 1592-1599. https://doi.org/10.1109/TII.2022.3182984
Shoaib, M., Ullah, A., Abbasi, I. A., Algarni, F., & Khan, A. S. (2023). Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios. IEEE Access, 11, 123295-123313.
Shukla, H., & Bhushan, B. (2023). Empowering Biometrics Authentication System Using Decentralized Blockchain Based Applications. In 2023 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) (pp. 1177-1182). Greater Noida, India. https://doi.org/10.1109/ICCCIS60361.2023.10425327
Vekariya, D., Rastogi, A., Priyadarshini, R., Patil, M., Kumar, M. S., & Pant, B. (2023). Mengers Authentication for efficient security system using Blockchain technology for Industrial IoT (IIOT) systems. In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 894-896). Greater Noida, India. https://doi.org/10.1109/ICACITE57410.2023.10182454
Zen, K., Javed, M., Lenando, H. B., Zen, H., & Khan, A. S. (2015). Intelligent Coordinator Selection Mechanism (ICSM) for IEEE 802.15.4 Beacon-Enabled MAC Protocol in Mobile Wireless Sensor Networks. International Review on Computers and Software, 10(2), 164.
Zubair, S., Fisal, N., Abazeed, M. B., Salihu, B. A., & Khan, A. S. (2015). Lightweight Distributed Geographical: A Lightweight Distributed Protocol for Virtual Clustering in Geographical Forwarding Cognitive Radio Sensor Networks. International Journal of Communication Systems, 28(1), 1-18.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computer Technology and Science

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.