The Application of Blockchain Technology in Network Security and Authentication: Issues and Strategies

被引:0
作者
Lu, Yanli [1 ]
机构
[1] Guangzhou Songtian Vocat Coll, Sch Informat Engn, Guangzhou 511370, Peoples R China
关键词
Blockchain; network security; identity verification; deep regression model;
D O I
10.14569/IJACSA.2024.01507107
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the advent of the digital age, the importance of network security and authentication is gradually highlighted. Blockchain technology, as a distributed, immutable record technology, brings great potential value to both areas. This study aims to delve into how blockchain technology can ensure network security and its application in authentication. Through extensive questionnaires and data collection, the study successfully built a deep regression model to reveal relevant causal relationships. The findings show that the adoption of blockchain technology can significantly improve the perceived effectiveness of cybersecurity, especially when organizations have a high opinion of it. This finding provides a valuable reference for organizations to make better use of this technology. However, there are still some limitations in the study, such as the scope of data collection and the complexity of the model. For these problems, this paper also puts forward corresponding solutions.
引用
收藏
页码:1103 / 1113
页数:11
相关论文
共 20 条
[1]   Matrix-Based Dynamic Authentication With Conditional Privacy-Preservation for Vehicular Network Security [J].
Aliev, Hayotjon ;
Kim, Hyung-Won .
IEEE ACCESS, 2020, 8 :200883-200896
[2]   A Scalable SDN Architecture for Underwater Networks Security Authentication [J].
Chen, Qiuli ;
He, Ming ;
Zheng, Xiang ;
Dai, Fei ;
Feng, Yuntian .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (08) :2044-2052
[3]   A Security Authentication Scheme of 5G Ultra-Dense Network Based on Block Chain [J].
Chen, Zhonglin ;
Chen, Shanzhi ;
Xu, Hui ;
Hu, Bo .
IEEE ACCESS, 2018, 6 :55372-55379
[4]   Physical Layer Authentication in Mission-Critical MTC Networks: A Security and Delay Performance Analysis [J].
Forssell, Henrik ;
Thobaben, Ragnar ;
Al-Zubaidy, Hussein ;
Gross, James .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2019, 37 (04) :795-808
[5]   SECURITY SOLUTIONS FOR THE CONTROLLER AREA NETWORK Bringing Authentication to In-Vehicle Networks [J].
Groza, Bogdan ;
Murvay, Pal-Stefan .
IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2018, 13 (01) :40-47
[6]   A two-factor security authentication scheme for wireless sensor networks in IoT environments [J].
Hu, Bin ;
Tang, Wen ;
Xie, Qi .
NEUROCOMPUTING, 2022, 500 :741-749
[7]   Security Flaws in Wireless Sensor Networks and Authentication Procedures for Internet of Things [J].
Irshad, Reyazur Rashid ;
Shaman, Faisal ;
Mehdi, Mohammed ;
Islam, Asharul ;
Rasool, Mohammad Ashiquee ;
Khan, Imran Mohd ;
Alattab, Ahmed Abdu ;
Alnfrawy, Ehab Tawfeek ;
Fatima, Kainat .
JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2023, 18 (02) :237-242
[8]  
Lakshmanan M, 2019, ROM J INF SCI TECH, V22, P228
[9]   Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks [J].
Li, Wenting ;
Li, Bin ;
Zhao, Yiming ;
Wang, Ping ;
Wei, Fushan .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
[10]   Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks [J].
Liu, Wenfen ;
Zhou, Gang ;
Wei, Jianghong ;
Hu, Xuexian ;
Kumari, Saru .
INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (02) :275-294