Abstract
Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology, healthcare, and other security concerns. Safety concerns currently limit the development of this advanced technology. On the other hand, traditional security protocols and existing solutions cannot be used for IoT because most of them cannot guarantee good performance. Furthermore, they are often severely limited in terms of storage, computing power, and performance. The aim of the proposed research is to introduce a secure verification framework for user authentication, with a special focus on the communication between access points and node databases. The main goal is to increase the level of security within the proposed approach, ensuring the confidentiality, integrity, and availability of the image verification system during the authentication process. To achieve this goal, three phases were implemented. First, a new hybrid biometric pattern is proposed that merges image and password features to enhance the security of user authentication. Second, lightweight Encryption and Blockchain technologies are also utilized to ensure secure communication of patterns between the access point and the node database. Finally, in order to verify authenticity, a new proposed matching process involves comparing image and password features with the database records. The experimental analysis has been carried out in terms of accuracy, False Rejection Rate (FRR), False Acceptance Rate (FAR), and error rate. The proposed approach attained an accuracy of 98%, FAR of 0.1, FRR of 0.992, and an error rate of 0.017.
Similar content being viewed by others
Data availability
The data that has been used is confidential.
References
Atlam HF, Walters RJ, Wills GB (2018) Internet of things: state-of-the-art, challenges, applications, and open issues. Int J Intell Comput Res 9(3):928–938. https://doi.org/10.20533/ijicr.2042.4655.2018.0112
Atlam HF, Wills GB (2020) IoT Security, privacy, Safety and Ethics. In: Internet of Things. https://doi.org/10.1007/978-3-030-18732-3_8
Zheng X, Martin P, Brohman K, Xu LD (2014) Cloudqual: a quality model for cloud services. IEEE Trans Ind Inform 10(2):1527–1536. https://doi.org/10.1109/TII.2014.2306329
Wan J, Li J, Imran M, Li D (2019) A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Trans Ind Inform 15(6):3652–3660. https://doi.org/10.1109/TII.2019.2894573
Uddin MA, Stranieri A, Gondal I, Balasubramanian V (2019) An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring. Proc IEEE Int Conf Ind Technol 2019(Febru):1135–1142. https://doi.org/10.1109/ICIT.2019.8754936
Mohsin AH et al (2019) Based blockchain-PSO-AES techniques in finger vein biometrics: a novel verification secure framework for patient authentication. Comput Stand Interfaces 66:103343. https://doi.org/10.1016/j.csi.2019.04.002
Kumar MM, Prasad MVNK, Raju USN (2020) Blockchain-based multi-instance Iris authentication using additive ElGamal homomorphic encryption. IET Biom 9(4):165–177. https://doi.org/10.1049/iet-bmt.2019.0169
Hassan MU, Rehmani MH, Chen J (2019) Privacy preservation in blockchain based IoT systems: integration issues, prospects, challenges, and future research directions. Futur Gener Comput Syst 97:512–529. https://doi.org/10.1016/j.future.2019.02.060
Shen M et al (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Commun 38(5):942–954. https://doi.org/10.1109/JSAC.2020.2980916
Khari M, Garg AK, Gandomi AH, Gupta R, Patan R, Balusamy B (2020) Securing data in internet of things (IoT) using cryptography and steganography techniques. IEEE Trans Syst Man Cybern Syst 50(1):73–80. https://doi.org/10.1109/TSMC.2019.2903785
Ge C, Liu Z, Fang L (2020) A blockchain based decentralized data security mechanism for the internet of things. J Parallel Distrib Comput 141:1–9. https://doi.org/10.1016/j.jpdc.2020.03.005
Sarier ND (2021) Efficient biometric-based identity management on the blockchain for smart industrial applications. Pervasive Mob Comput 71:101322. https://doi.org/10.1016/j.pmcj.2020.101322
Lee YK, Jeong J (2021) Securing biometric authentication system using blockchain. ICT Express 7(3):322–326. https://doi.org/10.1016/j.icte.2021.08.003
Mishra P, Modanwal V, Kaur H, Varshney G (2021) Pseudo-biometric identity framework: achieving self-sovereignity for biometrics on blockchain. Conf Proc- IEEE Int Conf Syst Man Cybern 945–951. https://doi.org/10.1109/SMC52423.2021.9659136
Ma J, Qi B, Lv K (2021) BSA: Enabling Biometric-Based Storage and Authorization on Blockchain. Proc– 2021 IEEE 20th Int Conf Trust Secur Priv Comput Commun Trust pp. 1077–1084. https://doi.org/10.1109/TrustCom53373.2021.00147
Singh P, Masud M, Hossain MS, Kaur A (2021) Cross-domain secure data sharing using blockchain for industrial IoT. J Parallel Distrib Comput 156:176–184. https://doi.org/10.1016/j.jpdc.2021.05.007
Panda SK, Mohammad GB, Nandan Mohanty S, Sahoo S (2021) Smart contract-based land registry system to reduce frauds and time delay. Secur Priv 4(5). https://doi.org/10.1002/spy2.172
Liu B, Yu K, Feng C, Choo KKR (2021) Cross-domain authentication for 5G-enabled UAVs: A blockchain approach. DroneCom 2021 - Proc. 4th ACM MobiCom Work. Drone Assist. Wirel. Commun. 5G Beyond 9(8):25–30. https://doi.org/10.1145/3477090.3481053
Wang L, Tian Y, Zhang D (2022) Toward cross-domain dynamic accumulator authentication based on blockchain in internet of things. IEEE Trans Ind Inform 18(4):2858–2867. https://doi.org/10.1109/TII.2021.3116049
Gaba P, Raw RS, Mohammed MA, Nedoma J, Martinek R (2022) Impact of block data components on the performance of blockchain-based VANET implemented on hyperledger fabric. IEEE Access 10(July):71003–71018. https://doi.org/10.1109/ACCESS.2022.3188296
Panwar A, Bhatnagar V, Khari M, Salehi AW, Gupta G (2022) A blockchain framework to secure personal health record (PHR) in IBM cloud-based data lake. Comput Intell Neurosci 2022:1. https://doi.org/10.1155/2022/3045107
Poongodi M et al (2022) 5G based blockchain network for authentic and ethical keyword search engine. IET Commun 16(5):442–448. https://doi.org/10.1049/cmu2.12251
Lakhan A, Mohammed MA, Kadry S, AlQahtani SA, Maashi MS, Abdulkareem KH (2022) Federated learning-aware multi-objective modeling and blockchain-enable system for IIoT applications. Comput Electr Eng 100(April 2021):107839. https://doi.org/10.1016/j.compeleceng.2022.107839
Anitha R, Tapas Bapu BR (2022) Blockchain-based light-weight authentication approach for a multiple wireless sensor network. IETE J Res. https://doi.org/10.1080/03772063.2022.2154710
Nanda SK, Panda SK, Dash M (2023) Medical supply chain integrated with blockchain and IoT to track the logistics of medical products. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-14846-8
Lakhan A et al (2023) Federated-learning based privacy preservation and Fraud-enabled blockchain IoMT system for healthcare. IEEE J Biomed Heal Inform 27(2):664–672. https://doi.org/10.1109/JBHI.2022.3165945
Barman S (2023) A light weight authentication protocol for a blockchain-based off-chain medical data access in multi-server environment, preprint. https://doi.org/10.21203/rs.3.rs-2727465/v1
Anitha Rajakumari P, Parwekar P (2023) Secure public administration using wireless blockchain technology with efficient routing policy. Int J Commun Syst 36(6):1–18. https://doi.org/10.1002/dac.5441
Saif S, Das P, Biswas S, Khari M, Shanmuganathan V (2022) Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare. Microprocess Microsyst 104622. https://doi.org/10.1016/j.micpro.2022.104622
Penard W, van Werkhoven T (2008) On the secure hash algorithm family. Cryptogr. Context, pp 1–18, [Online]. Available: https://blog.infocruncher.com/resources/ethereum-whitepaper-annotated/On%20the%20Secure%20Hash%20Algorithm%20family%20(2008).pdf
Rajan SP (2015) Review and investigations on future research directions of mobile based telecare system for cardiac surveillance. J Appl Res Technol 13(4):454–460. https://doi.org/10.1016/j.jart.2015.09.002
Singh G, Supriya S (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67:33–38. https://doi.org/10.5120/11507-7224
Patil P, Narayankar P, Narayan DG, Meena SM (2016) A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES RSA and Blowfish. Procedia Comput Sci 78(December 2015):617–624. https://doi.org/10.1016/j.procs.2016.02.108
Zaidan AA, Majeed A, Zaidan BB (2009) High securing cover-file of hidden data using statistical technique and AES, encryption, algorithm. World Acad Sci Eng Technol 54:463–474
Msolli A, Helali A, Maaref H (2018) New security approach in real-time wireless multimedia sensor networks. Comput Electr Eng 72:910–925. https://doi.org/10.1016/j.compeleceng.2018.01.016
Dayal M, Chawla A, Khari M (2021) Coalescence of Neural Networks and Blockchain. In: Handbook of Green Computing and Blockchain Technologies, pp. 31–44. https://doi.org/10.1201/9781003107507
Sáenz-royo C, Fleta-asín J (2023) Evaluating blockchain as a participatory organisational system: looking for transaction efficiency. 0:1–31. https://doi.org/10.1111/itor.13329
Fernández-Caramés TM, Fraga-Lamas P (2018) A review on the use of blockchain for the internet of things. IEEE Access 6:32979–33001. https://doi.org/10.1109/ACCESS.2018.2842685
Yale Face Database. https://www.kaggle.com/datasets/olgabelitskaya/yale-face-database
Wadi SM, Zainal N (2014) High definition image encryption algorithm based on AES modification. Wirel Pers Commun 79(2):811–829. https://doi.org/10.1007/s11277-014-1888-7
Acknowledgements
The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Research Groups Program under grant number (RGP.1/24/44).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hagui, I., Msolli, A., ben Henda, N. et al. A blockchain-based security system with light cryptography for user authentication security. Multimed Tools Appl 83, 52451–52480 (2024). https://doi.org/10.1007/s11042-023-17643-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-17643-5