Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability
(Irenna Wanisha, Jaymaxcklien Bravyain James, Jeremy Silas Witeno, Luqmanul Hakim Mohammad Bakery, Melvianna Samuel, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.24
- Volume: 1,
Issue: 3,
Sitasi : 0 18-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.27-Jul-2025
Abstrak:
In the ever-changing digital world, strong security protocols are essential. As a vital line of defence against unwanted access, blockchain uses several verification techniques to boost security. This article investigates the use of blockchain technology to tackle privacy, security, and usability issues. By reducing the dangers associated with conventional centralised systems, blockchain's decentralised and immutable structure offers a secure platform for storing and verifying authentication credentials. This method increases user trust by using smart contracts to guarantee transparent and unchangeable authentication procedures. The suggested blockchain-based method strengthens security and enhances privacy by removing sources of failure and decreasing dependence on outside verification. Furthermore, user-centric design and expedited procedures improve the system's usability by making secure authentication more approachable and less obtrusive. This paper offers a thorough examination of the suggested system, stressing its benefits, possible drawbacks, and directions for future investigation. The results indicate that blockchain technology presents a viable solution to ensure that digital authentication frameworks combine privacy, security, and usability.
|
0 |
2024 |
Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology
(Rebecca Ling Ze Siew, Brendan Chan Kah Le, Lee Kai Yue, Nuri Nazirah Binti Ismail, Xavier Liong Zhi Hao, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.29
- Volume: 1,
Issue: 3,
Sitasi : 0 18-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.27-Jul-2025
Abstrak:
The rapid advancement of Industrial Internet of Things (IIoT) technology necessitates robust authentication solutions to ensure security, scalability, and efficiency. This project, titled "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain," examines various blockchain-based authentication methods for IIoT and identifies their strengths and weaknesses. Despite the enhanced security and decentralized nature of blockchain, issues such as scalability, high latency, and computational load persist. To address these challenges, we propose the integration of Multi-Factor Authentication (MFA) as a supplementary solution. MFA can distribute the authentication load, enhance flexibility and security, and reduce latency by utilizing quick-to-verify factors. Moreover, MFA ensures high availability and scalable storage and processing through cloud services, seamlessly integrating with existing systems to provide a superior user experience. This comprehensive approach not only mitigates the inherent limitations of blockchain technology in IIoT but also reinforces the overall security framework, ensuring resilient and efficient authentication mechanisms. The results demonstrate significant improvements in system performance and user satisfaction, establishing MFA as a viable enhancement to blockchain-based IIoT security solutions.
|
0 |
2024 |
Advancements in Multi-Factor Authentication: A Quantum-Resilient and Federated Approach for Enhanced Security
(Nur Syahrina Binti Juni, Grasila Huney Wan, Siti Aisyah Nabilah Binti Banchi, Estella Blessings, Venetha A/P Loganathan, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.26
- Volume: 1,
Issue: 3,
Sitasi : 0 18-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.06-Aug-2025
Abstrak:
The Internet of Things (IoT) phenomenon is centered around linking various devices and objects to the Internet, enabling them to communicate, collect, and exchange data [1]. The IoT needs strong, lightweight, and secure authorization schemes to regulate many devices with varying levels of ability. Quantum-resilient federated Multi-Factor Authentication (QRF-MFA) is a solution presented in this paper to address the above-discussed issues. Featuring quantum-resistant cryptographic protocols, high-speed and low-energy Physically Unclonable Functions (PUFs), decentralized identity management, and optimized communication protocols, QRF-MFA provides a complete solution for secure cross-domain device identification and authentication. This is done by leveraging blockchain technology for immutable and transparent management of identities yet limiting on-chain storage overhead. It also provides secure, lightweight communication well-suited for resource constrained IIoT devices, and it is designed for fog and edge computing environments as well. QRF-MFA eliminates the challenges of current methods by combining security, efficiency, and scalability and delivering a resilient and future-ready solution to secure IIoT authentication.
|
0 |
2024 |
Enhancing Authentication Security: Analyzing Time-Based One-Time Password Systems
(Asyura Binti Sofian, Ayu Fitri Alafiah Binti Peradus, Fidel Yong, Irvine Shearer, Nurrul Nazwa Binti Ismail, Yugendran A/L Mahendran, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.25
- Volume: 1,
Issue: 3,
Sitasi : 0 18-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.06-Aug-2025
Abstrak:
This paper explores the Time-Based One-Time Password (TOTP) authentication mechanism enhanced with lightweight cryptographic algorithms, presenting it as an advanced solution to the limitations of traditional OTP systems. There are a lot of applications and systems where this mechanism is applied. For example, bank applications, e-commerce websites, access control system, healthcare system, etc. TOTP generates dynamic, time-sensitive passwords using the current time and a secret key processed through a cryptographic hash function, significantly improving security by reducing vulnerabilities to code reused and interception. The adoption of lightweight algorithms ensures that TOTP can be efficiently implemented on resource-constrained devices, such as those on the Internet of Things (IoT) ecosystem. Despite its benefits, TOTP faces challenges including synchronization issues between client devices and servers, and a trade-off between computational efficiency and security strength. This paper discusses the implications of these challenges and evaluates how TOTP, with appropriate design considerations, can provide a robust, secure, and efficient authentication method suitable for various applications, from digital banking to IoT environments.
|
0 |
2024 |
Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme
(Azreen Shafieqah Asri, Faizatul Fitri Boestamam, Harith Zakwan Bin Zakaria, Mohammad Amir Alam Rahim Omar, Mohammad Hamka Izzuddin Bin Mohamad Yahya, Muhammad Faisal)
DOI : 10.62951/ijcts.v1i3.19
- Volume: 1,
Issue: 3,
Sitasi : 0 17-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.27-Jul-2025
Abstrak:
With the rapid expansion of the Industrial Internet of Things (IIoT), integrating devices, machines, and systems to optimize operations and enable data-driven decision-making, ensuring robust security measures is essential. While blockchain has shown the potential to upgrade traditional authentication methods in IIoT environments, vulnerabilities persist. This paper introduces two innovative methods to enhance blockchain-based authentication in IIoT: first, integrating AI-driven anomaly and threat detection into the blockchain authentication scheme; second, implementing Ethereum smart contracts for enhanced authentication with a two-factor authentication (2FA) system and GFE algorithms. By combining AI for anomaly detection with decentralized smart contracts and blockchain-based 2FA, and leveraging GFE algorithms to enhance blockchain capabilities, the proposed scheme aims to significantly fortify security measures. This integration offers a resilient defense against evolving threats, ensuring transparency, adaptability, and heightened security in IIoT applications.
|
0 |
2024 |
Blockchain-Enhanced Multi-Factor Authentication for Securing IIoT
(Allyson Eddy, Bram Zoe anak Guillan, Einstein Kent Elias, Eldren Aniell, Shircrayson bin Simon, Muhammad Faisal)
DOI : 10.62951/ijeemcs.v1i3.16
- Volume: 1,
Issue: 3,
Sitasi : 0 15-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.27-Jul-2025
Abstrak:
This paper proposes Blockchain-Enhanced Multi-Factor Authentication (BEMFA) to address the limitations of existing authentication mechanisms in the Industrial Internet of Things (IIoT). BEMFA combines multi-factor authentication (MFA) with blockchain technology to ensure robust, scalable, and tamper-resistant security tailored to IIoT environments. This method dynamically manages roles and permissions, detects malicious devices, and ensures data integrity and authenticity. Our results demonstrate that BEMFA significantly enhances security, addressing critical access control challenges and mitigating risks posed by malicious devices while maintaining data integrity.
|
0 |
2024 |
Enhancing Security in Industrial IoT Through Blockchain-based Authentication Mechanisms
(Jun Kong Phiang, Vivian Yong Siew Yee, Hafizuddin Bin Hilmi, Dedree Leonna Lai, Ng Ee Zoe, Muhammad Faisal)
DOI : 10.62951/ijeemcs.v1i3.20
- Volume: 1,
Issue: 3,
Sitasi : 0 15-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.27-Jul-2025
Abstrak:
The Industrial Internet of Things (IIoT) has revolutionized industrial processes, offering automation and data-driven decision-making. However, this interconnectedness brings new security challenges, especially in crucial infrastructure sectors. Traditional security measures are inadequate, leading to the exploration of innovative solutions. Blockchain technology has emerged as a promising solution due to its decentralized and immutable nature. This paper proposes a Hybrid Blockchain-Based Authentication Mechanism for IIoT, combining Delegated Proof of Stake (DPoS) and Elliptic Curve Cryptography (ECC). The hybrid architecture utilizes public and private blockchains to ensure scalability, efficiency, and security. Lightweight consensus algorithms, DPoS, are incorporated to optimize performance, while ECC provides efficient cryptographic techniques suitable for IIoT environments. An interoperable framework facilitates seamless integration with existing infrastructure, ensuring regulatory compliance and compatibility. Decentralized identity management further enhances security and privacy. Results and analysis demonstrate the effectiveness of the proposed solution, positioning hybrid blockchain architecture as the most suitable approach for enhancing security in IIoT environments.
|
0 |
2024 |
Enhancing Aspects of IIoT Networks with Federated Learning Blockchain Integrated Authentication Solution
(Fang Ting Ling, Ng Hui Wen, Tsi Shi Ping, Vivian Bong Chiaw Cin, Yew Wei Yi, Muhammad Faisal)
DOI : 10.62951/ijeemcs.v1i3.17
- Volume: 1,
Issue: 3,
Sitasi : 0 15-Jul-2024
| Abstrak
| PDF File
| Resource
| Last.06-Aug-2025
Abstrak:
The Industrial Internet of Things (IIoT) faces various challenges in ensuring secure communication, authentication, and data integrity due to its distributed nature and evolving threat landscape. To address these issues, this paper proposes the integration of blockchain authentication as a robust solution to enhance security and reliability in IIoT networks. By leveraging Federated Learning with blockchain technology, the proposed solution aims to improve authentication mechanisms by training models across multiple edge devices, increasing fault tolerance, and adaptability while reducing the risk of single points of failure. The use of blockchain technology ensures a tamper-proof and transparent ledger for securely storing authentication data and model updates, enhancing security and integrity in IIoT networks. The results and analysis demonstrate that the integration of Federated Learning and blockchain technology effectively addresses interoperability issues, performance optimization concerns, and security vulnerabilities within IIoT networks, offering a more efficient, secure, and scalable authentication alternative.
|
0 |
2024 |
Philosophy of Religion and An-Nafs
(Muhamad Amran, Faisal)
DOI : 10.70821/zj.v1i1.2
- Volume: 1,
Issue: 1,
Sitasi : 11 30-Jun-2024
| Abstrak
| PDF File
| Resource
| Last.14-Jul-2025
Abstrak:
Mengkaji an nafs adalah sebuah kajian yg pasti tetap menarik. Menafsirkan bagian tentang penting, berguna dan juga fungsinya. Pengertianan nafs banyak yang menuangkan pendapat dan variatif sesuai dengan perspektif masing-masing yg beragam serta latar belakang mereka yang lebih fokus atas hal itu. Semantara itu dari sisi lain pemahaman tentang an nafs dimaksud cukup esensial sejalan dengan keberadaannya didalam diri setiap manusia. Tulisan ini berusaha mengkuliti pemikiran Al-Kindi, salah seorang tokoh terpepuler dan terkemuka dalam filsafat Islam. Buah pemikiran beliau tentang an nafs akan dikaji dari perspektif filsafat agama. Melalui penelusuran bentuk penelitian kepustakaan dengan pendekatan kualitatif ditemukan bahwa Al-Kindi adalah salah satu filsuf Islam berkebangsaan Arab pertama yang berhasil mengabungkan atau mepersatukan antara filsafat dan agama. Baginya filsafat adalah usaha manusia secara sistematis agar mengetahui kebenaran, sedangkan agama adalah sumber dari kebenaran itu sendiri. Maka dari itu wahyu tidak bertentangan dengan filsafat Letaknya jiwa bagi tubuh adalah sebagai pemberi hidup, sedangkan tubuh adalah hanya sebagai tumpangan. Jiwa dan tubuh adalah dua komponen yang saling melengkapi. Jiwa adalah kesempurnaan pertama bagi jism organik, yang dengannya jisim memiliki kehidupan secara potensial. Jiwa mengambil peran kehidupan bagi tubuh, kalau tidak ada jiwa maka tubuh tidak dapat merasakan apa-apa, dan bahkan tubuh akan lenyap dengan sendirinya.
|
11 |
2024 |
Criminal Responsibility Towards Public Transportation Company If Traffic Accidents Based On Law Number 22 Of 2009 Concerning Traffic And Road Transport
(David David, Faisal Santiago)
DOI : 10.62951/icistech.v1i1.32
- Volume: 1,
Issue: 1,
Sitasi : 0 30-Jun-2024
| Abstrak
| PDF File
| Resource
| Last.13-Aug-2025
Abstrak:
The number of accidents caused by public transportation and no concrete responsibility for the entrepreneur / owner of public transportation, the absence of strict sanctions against the owner or entrepreneur of public transportation in the event of a traffic accident, and there is no legal protection for passengers or family of passengers who are victims of accidents traffic on public transport. In the event that a traffic crime is committed by a Public Transportation Company, in addition to the punishment imposed on the management as referred to in paragraph (1), a maximum fine of 3 (three) times the fines specified in each article in this Chapter shall also be imposed. In addition to fines, public transportation companies can be subject to additional penalties in the form of temporary suspension or revocation of the transportation operation permit for the vehicles used. However, the police cannot immediately revoke the license to operate public transport whose fleets have experienced traffic accidents.Problem Statements: how sanctions against public transportation companies in the event of a traffic accident based on Law Number 22 of 2009 concerning Road Traffic and Transportation? Methodology: In this journal, the author uses a type of empirical research, namely research conducted through field studies that examines (especially) primary data which is also complemented by materials in the form of legislation and research results, assessment results and other references. Significance and contribution of the study: sanctions against public transportation companies in the event of a traffic accident based on Law Number 22 of 2009 concerning Road Traffic and Transportation
|
0 |
2024 |