A blockchain-based security system with light cryptography for user authentication security

Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology, healthcare, and other security concerns. Safety concerns currently limit the development of this advanced technology. On the other hand, traditional s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2023-11, Vol.83 (17), p.52451-52480
Hauptverfasser: Hagui, Imen, Msolli, Amina, ben Henda, Noura, Helali, Abdelhamid, Gassoumi, Abdelaziz, Nguyen, Thanh Phuong, Hassen, Fredj
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology, healthcare, and other security concerns. Safety concerns currently limit the development of this advanced technology. On the other hand, traditional security protocols and existing solutions cannot be used for IoT because most of them cannot guarantee good performance. Furthermore, they are often severely limited in terms of storage, computing power, and performance. The aim of the proposed research is to introduce a secure verification framework for user authentication, with a special focus on the communication between access points and node databases. The main goal is to increase the level of security within the proposed approach, ensuring the confidentiality, integrity, and availability of the image verification system during the authentication process. To achieve this goal, three phases were implemented. First, a new hybrid biometric pattern is proposed that merges image and password features to enhance the security of user authentication. Second, lightweight Encryption and Blockchain technologies are also utilized to ensure secure communication of patterns between the access point and the node database. Finally, in order to verify authenticity, a new proposed matching process involves comparing image and password features with the database records. The experimental analysis has been carried out in terms of accuracy, False Rejection Rate (FRR), False Acceptance Rate (FAR), and error rate. The proposed approach attained an accuracy of 98%, FAR of 0.1, FRR of 0.992, and an error rate of 0.017.
ISSN:1573-7721
1380-7501
1573-7721
DOI:10.1007/s11042-023-17643-5