Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal
Background: Information and communication technology development provides services to various fields. In particular, the development of mobile technology has made ubiquitous services possible. However, as technology advances, security is being emphasized more and more. The existing method of user au...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-02-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/12/5/2301 |
_version_ | 1797475751387201536 |
---|---|
author | Semin Kim Hyung-Jin Mun Sunghyuck Hong |
author_facet | Semin Kim Hyung-Jin Mun Sunghyuck Hong |
author_sort | Semin Kim |
collection | DOAJ |
description | Background: Information and communication technology development provides services to various fields. In particular, the development of mobile technology has made ubiquitous services possible. However, as technology advances, security is being emphasized more and more. The existing method of user authentication by entering an ID and password is likely to leak sensitive information if the server is attacked or keylogged. Therefore, multi-level authentication is needed to prevent server attacks or keylogging. Methods: Biometric authentication technology has been utilized by smartphones, but it is challenging to apply in the case of a lost device because the central server does not manage biometric data. Encrypting transactions through blockchain technology makes data management more secure because blockchain technology is distributed, and there is no primary target for hackers. Results: The method proposed in this study can become a basis for an authentication method that guarantees both security and integrity due to the synergetic use of biometric and blockchain technologies. Conclusions: The information stored in the service provider does not include sensitive information such as the user’s biometric data but is only a means of verifying the user’s information in the blockchain transaction with guaranteed anonymity. Therefore, users can receive services with confidence and safety. |
first_indexed | 2024-03-09T20:48:16Z |
format | Article |
id | doaj.art-0f1a02e61a234e709f991354bd0b0d47 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-09T20:48:16Z |
publishDate | 2022-02-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-0f1a02e61a234e709f991354bd0b0d472023-11-23T22:38:38ZengMDPI AGApplied Sciences2076-34172022-02-01125230110.3390/app12052301Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random TerminalSemin Kim0Hyung-Jin Mun1Sunghyuck Hong2Department of Computer Education, Jeonju National University of Education, 50 Seohakro, Wansan-gu, Jeonju-si 55101, KoreaDepartment of Information and Communication Engineering, Sungkyul University, 53 Sungkyul University-Ro, Manan-gu, Anyang-si 14097, KoreaDivision of Advanced IT Engineering, Baekseok University, 1-11 Baekseok Dahakro, Dongnam-gu, Cheonan 31056, KoreaBackground: Information and communication technology development provides services to various fields. In particular, the development of mobile technology has made ubiquitous services possible. However, as technology advances, security is being emphasized more and more. The existing method of user authentication by entering an ID and password is likely to leak sensitive information if the server is attacked or keylogged. Therefore, multi-level authentication is needed to prevent server attacks or keylogging. Methods: Biometric authentication technology has been utilized by smartphones, but it is challenging to apply in the case of a lost device because the central server does not manage biometric data. Encrypting transactions through blockchain technology makes data management more secure because blockchain technology is distributed, and there is no primary target for hackers. Results: The method proposed in this study can become a basis for an authentication method that guarantees both security and integrity due to the synergetic use of biometric and blockchain technologies. Conclusions: The information stored in the service provider does not include sensitive information such as the user’s biometric data but is only a means of verifying the user’s information in the blockchain transaction with guaranteed anonymity. Therefore, users can receive services with confidence and safety.https://www.mdpi.com/2076-3417/12/5/2301decentralized identitymulti-authenticationblockchainrandom select authentication |
spellingShingle | Semin Kim Hyung-Jin Mun Sunghyuck Hong Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal Applied Sciences decentralized identity multi-authentication blockchain random select authentication |
title | Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal |
title_full | Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal |
title_fullStr | Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal |
title_full_unstemmed | Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal |
title_short | Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal |
title_sort | multi factor authentication with randomly selected authentication methods with did on a random terminal |
topic | decentralized identity multi-authentication blockchain random select authentication |
url | https://www.mdpi.com/2076-3417/12/5/2301 |
work_keys_str_mv | AT seminkim multifactorauthenticationwithrandomlyselectedauthenticationmethodswithdidonarandomterminal AT hyungjinmun multifactorauthenticationwithrandomlyselectedauthenticationmethodswithdidonarandomterminal AT sunghyuckhong multifactorauthenticationwithrandomlyselectedauthenticationmethodswithdidonarandomterminal |