Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability
(Irenna Wanisha, Jaymaxcklien Bravyain James, Jeremy Silas Witeno, Luqmanul Hakim Mohammad Bakery, Melvianna Samuel, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.24
- Volume: 1,
Issue: 3,
Sitasi : 0 18-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.27-Jul-2025
Abstrak:
In the ever-changing digital world, strong security protocols are essential. As a vital line of defence against unwanted access, blockchain uses several verification techniques to boost security. This article investigates the use of blockchain technology to tackle privacy, security, and usability issues. By reducing the dangers associated with conventional centralised systems, blockchain's decentralised and immutable structure offers a secure platform for storing and verifying authentication credentials. This method increases user trust by using smart contracts to guarantee transparent and unchangeable authentication procedures. The suggested blockchain-based method strengthens security and enhances privacy by removing sources of failure and decreasing dependence on outside verification. Furthermore, user-centric design and expedited procedures improve the system's usability by making secure authentication more approachable and less obtrusive. This paper offers a thorough examination of the suggested system, stressing its benefits, possible drawbacks, and directions for future investigation. The results indicate that blockchain technology presents a viable solution to ensure that digital authentication frameworks combine privacy, security, and usability.
|
0 |
2024 |
Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology
(Rebecca Ling Ze Siew, Brendan Chan Kah Le, Lee Kai Yue, Nuri Nazirah Binti Ismail, Xavier Liong Zhi Hao, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.29
- Volume: 1,
Issue: 3,
Sitasi : 0 18-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.27-Jul-2025
Abstrak:
The rapid advancement of Industrial Internet of Things (IIoT) technology necessitates robust authentication solutions to ensure security, scalability, and efficiency. This project, titled "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain," examines various blockchain-based authentication methods for IIoT and identifies their strengths and weaknesses. Despite the enhanced security and decentralized nature of blockchain, issues such as scalability, high latency, and computational load persist. To address these challenges, we propose the integration of Multi-Factor Authentication (MFA) as a supplementary solution. MFA can distribute the authentication load, enhance flexibility and security, and reduce latency by utilizing quick-to-verify factors. Moreover, MFA ensures high availability and scalable storage and processing through cloud services, seamlessly integrating with existing systems to provide a superior user experience. This comprehensive approach not only mitigates the inherent limitations of blockchain technology in IIoT but also reinforces the overall security framework, ensuring resilient and efficient authentication mechanisms. The results demonstrate significant improvements in system performance and user satisfaction, establishing MFA as a viable enhancement to blockchain-based IIoT security solutions.
|
0 |
2024 |
Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme
(Azreen Shafieqah Asri, Faizatul Fitri Boestamam, Harith Zakwan Bin Zakaria, Mohammad Amir Alam Rahim Omar, Mohammad Hamka Izzuddin Bin Mohamad Yahya, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.19
- Volume: 1,
Issue: 3,
Sitasi : 0 17-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.27-Jul-2025
Abstrak:
With the rapid expansion of the Industrial Internet of Things (IIoT), integrating devices, machines, and systems to optimize operations and enable data-driven decision-making, ensuring robust security measures is essential. While blockchain has shown the potential to upgrade traditional authentication methods in IIoT environments, vulnerabilities persist. This paper introduces two innovative methods to enhance blockchain-based authentication in IIoT: first, integrating AI-driven anomaly and threat detection into the blockchain authentication scheme; second, implementing Ethereum smart contracts for enhanced authentication with a two-factor authentication (2FA) system and GFE algorithms. By combining AI for anomaly detection with decentralized smart contracts and blockchain-based 2FA, and leveraging GFE algorithms to enhance blockchain capabilities, the proposed scheme aims to significantly fortify security measures. This integration offers a resilient defense against evolving threats, ensuring transparency, adaptability, and heightened security in IIoT applications.
|
0 |
2024 |
Enhancing Aspects of IIoT Networks with Federated Learning Blockchain Integrated Authentication Solution
(Fang Ting Ling, Ng Hui Wen, Tsi Shi Ping, Vivian Bong Chiaw Cin, Yew Wei Yi, Muhammad Faisal)
DOI : 10.62951/ijeemcs.v1i3.17
- Volume: 1,
Issue: 3,
Sitasi : 0 15-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.06-Aug-2025
Abstrak:
The Industrial Internet of Things (IIoT) faces various challenges in ensuring secure communication, authentication, and data integrity due to its distributed nature and evolving threat landscape. To address these issues, this paper proposes the integration of blockchain authentication as a robust solution to enhance security and reliability in IIoT networks. By leveraging Federated Learning with blockchain technology, the proposed solution aims to improve authentication mechanisms by training models across multiple edge devices, increasing fault tolerance, and adaptability while reducing the risk of single points of failure. The use of blockchain technology ensures a tamper-proof and transparent ledger for securely storing authentication data and model updates, enhancing security and integrity in IIoT networks. The results and analysis demonstrate that the integration of Federated Learning and blockchain technology effectively addresses interoperability issues, performance optimization concerns, and security vulnerabilities within IIoT networks, offering a more efficient, secure, and scalable authentication alternative.
|
0 |
2024 |
Blockchain-Enhanced Multi-Factor Authentication for Securing IIoT
(Allyson Eddy, Bram Zoe anak Guillan, Einstein Kent Elias, Eldren Aniell, Shircrayson bin Simon, Muhammad Faisal)
DOI : 10.62951/ijeemcs.v1i3.16
- Volume: 1,
Issue: 3,
Sitasi : 0 15-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.27-Jul-2025
Abstrak:
This paper proposes Blockchain-Enhanced Multi-Factor Authentication (BEMFA) to address the limitations of existing authentication mechanisms in the Industrial Internet of Things (IIoT). BEMFA combines multi-factor authentication (MFA) with blockchain technology to ensure robust, scalable, and tamper-resistant security tailored to IIoT environments. This method dynamically manages roles and permissions, detects malicious devices, and ensures data integrity and authenticity. Our results demonstrate that BEMFA significantly enhances security, addressing critical access control challenges and mitigating risks posed by malicious devices while maintaining data integrity.
|
0 |
2024 |
Enhancing Security in Industrial IoT Through Blockchain-based Authentication Mechanisms
(Jun Kong Phiang, Vivian Yong Siew Yee, Hafizuddin Bin Hilmi, Dedree Leonna Lai, Ng Ee Zoe, Muhammad Faisal)
DOI : 10.62951/ijeemcs.v1i3.20
- Volume: 1,
Issue: 3,
Sitasi : 0 15-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.27-Jul-2025
Abstrak:
The Industrial Internet of Things (IIoT) has revolutionized industrial processes, offering automation and data-driven decision-making. However, this interconnectedness brings new security challenges, especially in crucial infrastructure sectors. Traditional security measures are inadequate, leading to the exploration of innovative solutions. Blockchain technology has emerged as a promising solution due to its decentralized and immutable nature. This paper proposes a Hybrid Blockchain-Based Authentication Mechanism for IIoT, combining Delegated Proof of Stake (DPoS) and Elliptic Curve Cryptography (ECC). The hybrid architecture utilizes public and private blockchains to ensure scalability, efficiency, and security. Lightweight consensus algorithms, DPoS, are incorporated to optimize performance, while ECC provides efficient cryptographic techniques suitable for IIoT environments. An interoperable framework facilitates seamless integration with existing infrastructure, ensuring regulatory compliance and compatibility. Decentralized identity management further enhances security and privacy. Results and analysis demonstrate the effectiveness of the proposed solution, positioning hybrid blockchain architecture as the most suitable approach for enhancing security in IIoT environments.
|
0 |
2024 |
Philosophy of Religion and An-Nafs
(Muhamad Amran, Faisal)
DOI : 10.70821/zj.v1i1.2
- Volume: 1,
Issue: 1,
Sitasi : 11 30-Jun-2024
| Abstrak
| PDF File
| Resource
| Last.14-Jul-2025
Abstrak:
Mengkaji an nafs adalah sebuah kajian yg pasti tetap menarik. Menafsirkan bagian tentang penting, berguna dan juga fungsinya. Pengertianan nafs banyak yang menuangkan pendapat dan variatif sesuai dengan perspektif masing-masing yg beragam serta latar belakang mereka yang lebih fokus atas hal itu. Semantara itu dari sisi lain pemahaman tentang an nafs dimaksud cukup esensial sejalan dengan keberadaannya didalam diri setiap manusia. Tulisan ini berusaha mengkuliti pemikiran Al-Kindi, salah seorang tokoh terpepuler dan terkemuka dalam filsafat Islam. Buah pemikiran beliau tentang an nafs akan dikaji dari perspektif filsafat agama. Melalui penelusuran bentuk penelitian kepustakaan dengan pendekatan kualitatif ditemukan bahwa Al-Kindi adalah salah satu filsuf Islam berkebangsaan Arab pertama yang berhasil mengabungkan atau mepersatukan antara filsafat dan agama. Baginya filsafat adalah usaha manusia secara sistematis agar mengetahui kebenaran, sedangkan agama adalah sumber dari kebenaran itu sendiri. Maka dari itu wahyu tidak bertentangan dengan filsafat Letaknya jiwa bagi tubuh adalah sebagai pemberi hidup, sedangkan tubuh adalah hanya sebagai tumpangan. Jiwa dan tubuh adalah dua komponen yang saling melengkapi. Jiwa adalah kesempurnaan pertama bagi jism organik, yang dengannya jisim memiliki kehidupan secara potensial. Jiwa mengambil peran kehidupan bagi tubuh, kalau tidak ada jiwa maka tubuh tidak dapat merasakan apa-apa, dan bahkan tubuh akan lenyap dengan sendirinya.
|
11 |
2024 |
Criminal Responsibility Towards Public Transportation Company If Traffic Accidents Based On Law Number 22 Of 2009 Concerning Traffic And Road Transport
(David David, Faisal Santiago)
DOI : 10.62951/icistech.v1i1.32
- Volume: 1,
Issue: 1,
Sitasi : 0 30-Jun-2024
| Abstrak
| PDF File
| Resource
| Last.13-Aug-2025
Abstrak:
The number of accidents caused by public transportation and no concrete responsibility for the entrepreneur / owner of public transportation, the absence of strict sanctions against the owner or entrepreneur of public transportation in the event of a traffic accident, and there is no legal protection for passengers or family of passengers who are victims of accidents traffic on public transport. In the event that a traffic crime is committed by a Public Transportation Company, in addition to the punishment imposed on the management as referred to in paragraph (1), a maximum fine of 3 (three) times the fines specified in each article in this Chapter shall also be imposed. In addition to fines, public transportation companies can be subject to additional penalties in the form of temporary suspension or revocation of the transportation operation permit for the vehicles used. However, the police cannot immediately revoke the license to operate public transport whose fleets have experienced traffic accidents.Problem Statements: how sanctions against public transportation companies in the event of a traffic accident based on Law Number 22 of 2009 concerning Road Traffic and Transportation? Methodology: In this journal, the author uses a type of empirical research, namely research conducted through field studies that examines (especially) primary data which is also complemented by materials in the form of legislation and research results, assessment results and other references. Significance and contribution of the study: sanctions against public transportation companies in the event of a traffic accident based on Law Number 22 of 2009 concerning Road Traffic and Transportation
|
0 |
2024 |
Pengelompokan Data Wilayah Rawan Bencana Alam di Pulau Jawa
(Maulana Ichsan, Erlangga Alfath Wijaya, Mohammad Raffi Mahendra, Faisal Amar Alfarouk)
DOI : 10.61132/neptunus.v2i3.181
- Volume: 2,
Issue: 3,
Sitasi : 0 25-Jun-2024
| Abstrak
| PDF File
| Resource
| Last.06-Aug-2025
Abstrak:
Java Island is the most disaster-prone region in Indonesia because Java Island is located in a convex zone (meeting each other) between two tectonic plates, namely the Eurasian Plate in the north, and the Indo-Australian Plate which causes the formation of volcanoes and earthquakes. Java Island which is near the convergence zone of these plates causes Java to become a disaster-prone zone, with many volcanoes that often erupt and experience many earthquakes. Volcanoes are formed due to the movement of hot magma from the meeting of plates to the earth's surface. While earthquakes occur due to the instantaneous movement of earth plates.
|
0 |
2024 |
Teknologi Sebagai Kegiatan Manusia Dalam Era Modern Kehidupan Masyarakat
(Faisal Tamimi, Siti Munawaroh)
DOI : 10.61132/saturnus.v2i3.157
- Volume: 2,
Issue: 3,
Sitasi : 0 21-Jun-2024
| Abstrak
| PDF File
| Resource
| Last.07-Aug-2025
Abstrak:
This research examines Technology as a Human Activity in the Modern Era of Community Life, technology is something that we cannot avoid in the current era of modernization, all human activities using technology have progressed very rapidly. By using this sophisticated technology, humans in the modern era can make it easier to do work. At first technology developed gradually along with the progress of culture and civilization. Because technology is a rapidly advancing cultural development, humans develop technology more quickly. Because technology provides structure for human activity, it can be said that technology does not simply assist human activity, but also reshapes it, creating new activities that define the self, community, and good. Moral-ethical decisions, social relationships, space, time, perception, and self-concept. Transformation through technological advances For example, when complex new instruments or techniques are used in medical practice, it not only changes what doctors do but also how people think about health, disease, and medical care. Social and moral life is influenced by the technological devices we appraise. They enhance human worldviews, social practices, organizations, values, and lifestyles. Nowadays, it is difficult to be truly active in making technological decisions while technological devices are most often imposed on us, forcing many things on us. Apart from having a positive impact, the development of this technology also has a negative impact which can hinder direct interaction between people, where people already have a lot of indirect interaction, everyone is already dependent on technology, especially smartphones and social media, all activities already involves social media, be it news, business, learning and others.
|
0 |
2024 |