Blockchain-Enhanced Multi-Factor Authentication for Securing IIoT
DOI:
https://doi.org/10.62951/ijeemcs.v1i3.16Abstract
This paper proposes Blockchain-Enhanced Multi-Factor Authentication (BEMFA) to address the limitations of existing authentication mechanisms in the Industrial Internet of Things (IIoT). BEMFA combines multi-factor authentication (MFA) with blockchain technology to ensure robust, scalable, and tamper-resistant security tailored to IIoT environments. This method dynamically manages roles and permissions, detects malicious devices, and ensures data integrity and authenticity. Our results demonstrate that BEMFA significantly enhances security, addressing critical access control challenges and mitigating risks posed by malicious devices while maintaining data integrity.
References
Abbasi, I. A., et al. (2024). A lightweight and robust authentication scheme for the healthcare system using public cloud server. PLOS ONE, 19(1), e0294429.
Ahmad, Z., et al. (2024). Anomaly detection in IIoT using machine learning: Current trends, challenges, and future directions. IEEE Access, 12, 45209-45227.
Ayub Khan, A., Laghari, A. A., Shaikh, Z. A., Dacko-Pikiewicz, Z., & Kot, S. (2022). Internet of things (IoT) security with blockchain technology: A state-of-the-art review. IEEE Access, 10, 122679-122695.
Brown, K. L., & Smith, A. J. (2024). Dynamic role-based access control for IIoT environments using blockchain technology. IEEE Internet of Things Journal, 11(4), 3131-3140.
Davis, L., & Thompson, J. (2024). Smart contracts for automated and secure access control in IIoT. Future Generation Computer Systems, 133, 220-232.
Deebak, B. D., Memon, F. H., Dev, K., Khowaja, S. A., Wang, W., & Qureshi, N. M. F. (2023). TAB-SAPP: A trust-aware blockchain-based seamless authentication for massive IoT-enabled industrial applications. IEEE Transactions on Industrial Informatics, 19, 243-250.
Gupta, R., et al. (2024). Scalability challenges and solutions in IIoT security mechanisms. Computers & Security, 116, 102627.
Harris, M., & Li, W. (2024). The importance of an immutable audit trail for accountability in IIoT. Journal of Information Security and Applications, 70, 103112.
Johnson, P. J., & Wang, L. (2024). Integration challenges of existing security solutions in IIoT. International Journal of Information Management, 66, 102485.
Kumar, A., & Patel, S. (2024). Latest advancements in IIoT security protocols and their effectiveness. ACM Computing Surveys, 57(3), 1-29.
Kumari, A., Tanwar, S., Tyagi, S., & Kumar, N. (2021). Blockchain-based massive data dissemination handling in IIoT environment. IEEE Network, 35, 318-325.
Lim, T. K., et al. (2024). End-to-end security mechanisms in IIoT: A comprehensive survey. Sensors, 24(5), 1657.
Morgan, J., & Scott, R. (2024). Public and private blockchain solutions for IIoT security. IEEE Communications Surveys & Tutorials, 23(4), 1923-1945.
Nisa, N., Khan, A. S., Ahmad, Z., & Abdullah, J. (2024). TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network. International Journal of Network Management, e2258.
Pal, S., & Jadidi, Z. (2021). Analysis of security issues and countermeasures for the Industrial Internet of Things. Analysis of Security Issues and Countermeasures for the Industrial Internet of Things.
Puthilibai, G., et al. (2022). Securing IIoT sensors communication using blockchain technology. 2022 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS).
Rathee, G., Ahmad, F., Jaglan, N., & Konstantinou, C. (2023). A secure and trusted mechanism for Industrial IoT network using blockchain. IEEE Transactions on Industrial Informatics, 19, 1894-1902.
Selvarajan, S., et al. (2023). An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. Journal of Cloud Computing, 12, 38.
Usman, M., Sarfraz, M. S., Aftab, M. U., Habib, U., & Javed, S. (2024). A blockchain based scalable domain access control framework for Industrial Internet of Things. IEEE Access, 12.
Zhang, X., et al. (2024). Frameworks for ensuring data integrity in IIoT systems. Journal of Network and Computer Applications, 205, 102885.
Zhou, L., Yeh, K.-H., Hancke, G., Liu, Z., & Su, C. (2018). Security and privacy for the Industrial Internet of Things: An overview of approaches to safeguarding endpoints. IEEE Signal Processing Magazine, 35(5), 76-87.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Electrical Engineering, Mathematics and Computer Science

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.