Affiliation:
1. School of Computing, Engineering and Physical Sciences, University of the West of Scotland, Lanarkshire G72 0LH, UK
Abstract
Passwords are the first line of defence against preventing unauthorised access to systems and potential leakage of sensitive data. However, the traditional reliance on username and password combinations is not enough protection and has prompted the implementation of technologies such as two-factor authentication (2FA). While 2FA enhances security by adding a layer of verification, these techniques are not impervious to threats. Even with the implementation of 2FA, the relentless efforts of cybercriminals present formidable obstacles in securing digital spaces. The objective of this work is to implement blockchain technology as a form of 2FA. The findings of this work suggest that blockchain-based 2FA methods could strengthen digital security compared to conventional 2FA methods.
Reference45 articles.
1. Department for Science, Innovation & Technology (2024, March 27). Cyber Security Breaches Survey 2023, Available online: https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2023/cyber-security-breaches-survey-2023.
2. On the origins and variations of blockchain technologies;Sherman;IEEE Secur. Priv.,2019
3. Ammous, S. (2024, July 11). Blockchain Technology: What Is It Good for?. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2832751.
4. Panda, S.K., and Satapathy, S.C. (2021, January 10–20). An investigation into smart contract deployment on Ethereum platform using Web3. js and solidity using blockchain. Proceedings of the Data Engineering and Intelligent Computing: Proceedings of ICICC 2020, Jessup, ML, USA.
5. Blockchain without waste: Proof-of-stake;Saleh;Rev. Financ. Stud.,2021