Conference Paper

Decentralized Dynamic Identity Authentication System Based on Blockchain

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Today, many services are provided through web applications. Most of the information transmitted and stored through web applications that provide these many services contains personal, commercial and even confidential information of the state and will be targeted by hackers in the future as in the past [3]. For this reason, authentication, which refers to the verification of the User's identity on the Internet, plays an important role in protecting information security [4]. ...
... The security of the SMS verification method via mobile phone is also relatively high, but SMS may not be received when the network signal is not good, which may cause users to wait. In addition, the cost of SMS verification method is relatively high [3]. Thanks to the developments in recent years, many applications can be accessed via third party authentication platforms like Google and Facebook, as depicted in Figure 1. ...
Article
Full-text available
In the age of information and technology, web applications have become an important part of daily life. The communication of these web applications, where important personal and corporate information is managed, with the outside world is provided by authentication methods. Today, most applications use the traditional username-password method for authentication. This method, which is vulnerable to brute force attacks, causes serious security vulnerabilities. In this method, since most users use the same login credentials in different applications, an attack can affect many applications. Some applications also prefer to rely on third-party systems such as Google and Facebook for authentication. Due to their nature, these systems have risks such as data security and single point failure. For more security in the authentication area, studies have been carried out on the Two-Factor Authentication (2FA) method This method has serious disadvantages such as GSM network problems, SMS cost or centralization. To overcome these problems, blockchain is a suitable solution thanks to its distributed, transparent, secure and immutable structure. In an important and sensitive issue such as identity control, it is thought that it may be risky to present blockchain technology, which is still under development, as the only method. Considering the current situation, in this study, a proposal has been made to offer a secure blockchain-based solution as an alternative to the authentication methods that currently work for web applications. The new technologies and tools used in the proposed solution are explained with visuals.
... A new twist on authentication is proposed in [38] by combining RFID and decentralized authentication to solve embedded system authentication issues. Decentralized Dynamic Identity Authentication utilizing a block chain is proposed in [39]. The authors tackle the common issue of replay attacks, reuses of passwords, and password aging by introducing dynamic passwords. ...
Article
Full-text available
IoT edge computing is a network design model that captures and processes data at the network edge. The results are forwarded to a cloud service or, if additional processing is needed, a middle tier. By processing data at the edge and middle tier, edge networks achieve better load-balancing and improve performance; however, traditional edge network deployments represent a rigid participation model. Edge networks require physical access to an IoT device and often lock the device to a single edge network. These constraints make it difficult to construct the ideal network, as they reject IoT devices deployed at the network edge but not owned by the network administrator. Our goal is to remove these limitations by creating a network protocol that supports broader participation of IoT devices, cryptographically secures network data, and improves network performance by increasing captured data at the network edge. The protocol is named Snap to symbolize the ease of self assembly. Our experimental research focuses on temperature stability and the cycle efficiency of an HVAC system by utilizing a Snap network to combine two existing edge networks and increase the number of temperature measurement points. The additional measurement points improved the efficiency of the HVAC cycle strategy by increasing the square footage of measured building space. The additional temperature capture points supported an adjustment to the HVAC cycle strategy which resulted in reducing the disparity between the requested temperature and the resulting temperatures. Snap networks support a broader range of IoT sensors leading to increased measurement density, sample rate frequency, and coverage of the network edge.
... As a prevailing identity authentication technology, dynamic password identity authentication finds widespread use in blockchain-based identity authentication. Zhu et al. [4] designed a blockchain-based dynamic password identity authentication system. This system utilizes information stored in the blockchain, such as public keys and the current block height (nonce) array, to generate unique combinations of public keys and nonce arrays for each authentication attempt. ...
Article
Full-text available
Blockchain, as one of the emerging technologies in recent years, is essentially a decentralized distributed ledger. By leveraging blockchain, it provides a new approach to identity authentication. This paper provides an overview of the applications of identity authentication based on blockchain. Firstly, the background knowledge of blockchain is introduced. Then, the technical aspects of identity authentication based on blockchain are discussed and classified from the perspectives of identity authentication techniques and cryptographic algorithms. Subsequently, the applications of identity authentication based on blockchain technology are introduced and classified in various fields. Finally, a summary of the entire paper is presented.
Preprint
The intersection of blockchain (distributed ledger) and identity management lacks a comprehensive framework for classifying distributed-ledger-based identity solutions. This paper introduces a methodologically developed taxonomy derived from the analysis of 390 scientific papers and expert discussions. The resulting framework consists of 22 dimensions with 113 characteristics, organized into three groups: trust anchor implementations, identity architectures (identifiers and credentials), and ledger specifications. This taxonomy facilitates the systematic analysis, comparison, and design of distributed-ledger-based identity solutions, as demonstrated through its application to two distinct architectures. As the first methodology-driven taxonomy in this field, this work advances standardization and enhances understanding of distributed-ledger-based identity architectures. It provides researchers and practitioners with a structured framework for evaluating design decisions and implementation approaches.
Conference Paper
Full-text available
Bitcoin has emerged as a popular crypto currency. It was introduced in 2008 by Satoshi Nakamoto (A pseudonym). The reasons for its popularity include its decentralized nature, double spending prevention, smart strategy to counter inflation and providing a certain degree of anonymity. In February 2014, Bitcoin community was shocked to know that a Japan based company named Mt. Gox who, were dealing 70 percent of Bitcoin transactions that time, announced that they were hit by a bug in the Bitcoin protocol named as Transaction Malleability. The company lost hundreds of millions of dollars worth bitcoin. Soon after this, another company SilkRoad 2 also claimed to have affected by same issue. To date there is little research literature available on this recent issue and it is hard to grasp this problem. The purpose of writing this paper is twofold. We discuss Transaction Malleability in detail with respect to the structure of Bitcoin transactions in order to make reader properly understands what Transaction Malleability is and how it works. We also propose a mechanism to counter this issue.
Book
This collection of different views on how digitalization is influencing various industrial sectors addresses essential topics like big data and analytics, fintech and insuretech, cloud and mobility technologies, disruption and entrepreneurship. The technological advances of the 21st century have been massively impacted by the digital upheaval: there is no future without digitalization. The sale of products and services has left the classical point of sale and now takes place on a variety of channels. Whether in the automotive industry, travel and traffic, in cities, or the financial industry – newly designed ecosystems are being created everywhere; data is being generated and analyzed in real time; and companies are competing for mobile access channels to customers in order to gain knowledge about their individual contexts and preferences. In turn, customers can now publicly share their opinions, experiences and knowledge as User Generated Content, allowing them to impact the market and empowering them to build or destroy trust.
Conference Paper
Blockchain is the basic technology of bitcoin. With the value appreciation and stable operation of bitcoin, blockchain is attracting more and more attention in many areas. Blockchain has the characteristics of decentralization, stability, security, and non-modifiability. It has the potential to change the network architecture. The consensus algorithm plays a crucial role in maintaining the safety and efficiency of blockchain. Using a right algorithm may bring a significant increase to the performance of blockchain application. In this paper, we reviewed the basic principles and characteristics of the consensus algorithms and analyzed the performance and application scenarios of different consensus mechanisms. We also gave a technical guidance of selecting a suitable consensus algorithm and summarized the limitations and future development of blockchain technology.
Design of dynamic password authentication system based on blockchain technology
  • L Zhang
Identity management and authentication model based on smart contract
  • W Pan
  • X F Huang
Research on Blockchain Two-Party Elliptic Curve Digital Signature Algorithm Based on Hash Proof System
  • liu
Research on the Challenges and Countermeasures of Blockchain Technology
  • X Qiu
Research on Bitcoin Mining Attacks
  • han
A time stamp-based radio frequency replay attack defense scheme
  • Y Q Chen
Information Security
  • J F Ma
  • Y L Shen
Research on Bitcoin Mining Attacks
  • J Han
  • J Zou
  • H Jiang
Research on Blockchain Two-Party Elliptic Curve Digital Signature Algorithm Based on Hash Proof System
  • F Liu
  • J Yang
  • J Y Qi
A review of consensus algorithms for blockchain technology
  • X G Wang