Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal

Background: Information and communication technology development provides services to various fields. In particular, the development of mobile technology has made ubiquitous services possible. However, as technology advances, security is being emphasized more and more. The existing method of user au...

Full description

Bibliographic Details
Main Authors: Semin Kim, Hyung-Jin Mun, Sunghyuck Hong
Format: Article
Language:English
Published: MDPI AG 2022-02-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/5/2301
_version_ 1797475751387201536
author Semin Kim
Hyung-Jin Mun
Sunghyuck Hong
author_facet Semin Kim
Hyung-Jin Mun
Sunghyuck Hong
author_sort Semin Kim
collection DOAJ
description Background: Information and communication technology development provides services to various fields. In particular, the development of mobile technology has made ubiquitous services possible. However, as technology advances, security is being emphasized more and more. The existing method of user authentication by entering an ID and password is likely to leak sensitive information if the server is attacked or keylogged. Therefore, multi-level authentication is needed to prevent server attacks or keylogging. Methods: Biometric authentication technology has been utilized by smartphones, but it is challenging to apply in the case of a lost device because the central server does not manage biometric data. Encrypting transactions through blockchain technology makes data management more secure because blockchain technology is distributed, and there is no primary target for hackers. Results: The method proposed in this study can become a basis for an authentication method that guarantees both security and integrity due to the synergetic use of biometric and blockchain technologies. Conclusions: The information stored in the service provider does not include sensitive information such as the user’s biometric data but is only a means of verifying the user’s information in the blockchain transaction with guaranteed anonymity. Therefore, users can receive services with confidence and safety.
first_indexed 2024-03-09T20:48:16Z
format Article
id doaj.art-0f1a02e61a234e709f991354bd0b0d47
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-09T20:48:16Z
publishDate 2022-02-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-0f1a02e61a234e709f991354bd0b0d472023-11-23T22:38:38ZengMDPI AGApplied Sciences2076-34172022-02-01125230110.3390/app12052301Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random TerminalSemin Kim0Hyung-Jin Mun1Sunghyuck Hong2Department of Computer Education, Jeonju National University of Education, 50 Seohakro, Wansan-gu, Jeonju-si 55101, KoreaDepartment of Information and Communication Engineering, Sungkyul University, 53 Sungkyul University-Ro, Manan-gu, Anyang-si 14097, KoreaDivision of Advanced IT Engineering, Baekseok University, 1-11 Baekseok Dahakro, Dongnam-gu, Cheonan 31056, KoreaBackground: Information and communication technology development provides services to various fields. In particular, the development of mobile technology has made ubiquitous services possible. However, as technology advances, security is being emphasized more and more. The existing method of user authentication by entering an ID and password is likely to leak sensitive information if the server is attacked or keylogged. Therefore, multi-level authentication is needed to prevent server attacks or keylogging. Methods: Biometric authentication technology has been utilized by smartphones, but it is challenging to apply in the case of a lost device because the central server does not manage biometric data. Encrypting transactions through blockchain technology makes data management more secure because blockchain technology is distributed, and there is no primary target for hackers. Results: The method proposed in this study can become a basis for an authentication method that guarantees both security and integrity due to the synergetic use of biometric and blockchain technologies. Conclusions: The information stored in the service provider does not include sensitive information such as the user’s biometric data but is only a means of verifying the user’s information in the blockchain transaction with guaranteed anonymity. Therefore, users can receive services with confidence and safety.https://www.mdpi.com/2076-3417/12/5/2301decentralized identitymulti-authenticationblockchainrandom select authentication
spellingShingle Semin Kim
Hyung-Jin Mun
Sunghyuck Hong
Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal
Applied Sciences
decentralized identity
multi-authentication
blockchain
random select authentication
title Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal
title_full Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal
title_fullStr Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal
title_full_unstemmed Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal
title_short Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal
title_sort multi factor authentication with randomly selected authentication methods with did on a random terminal
topic decentralized identity
multi-authentication
blockchain
random select authentication
url https://www.mdpi.com/2076-3417/12/5/2301
work_keys_str_mv AT seminkim multifactorauthenticationwithrandomlyselectedauthenticationmethodswithdidonarandomterminal
AT hyungjinmun multifactorauthenticationwithrandomlyselectedauthenticationmethodswithdidonarandomterminal
AT sunghyuckhong multifactorauthenticationwithrandomlyselectedauthenticationmethodswithdidonarandomterminal