Skip to main content
Log in

A blockchain-based security system with light cryptography for user authentication security

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology, healthcare, and other security concerns. Safety concerns currently limit the development of this advanced technology. On the other hand, traditional security protocols and existing solutions cannot be used for IoT because most of them cannot guarantee good performance. Furthermore, they are often severely limited in terms of storage, computing power, and performance. The aim of the proposed research is to introduce a secure verification framework for user authentication, with a special focus on the communication between access points and node databases. The main goal is to increase the level of security within the proposed approach, ensuring the confidentiality, integrity, and availability of the image verification system during the authentication process. To achieve this goal, three phases were implemented. First, a new hybrid biometric pattern is proposed that merges image and password features to enhance the security of user authentication. Second, lightweight Encryption and Blockchain technologies are also utilized to ensure secure communication of patterns between the access point and the node database. Finally, in order to verify authenticity, a new proposed matching process involves comparing image and password features with the database records. The experimental analysis has been carried out in terms of accuracy, False Rejection Rate (FRR), False Acceptance Rate (FAR), and error rate. The proposed approach attained an accuracy of 98%, FAR of 0.1, FRR of 0.992, and an error rate of 0.017.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 2
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availability

The data that has been used is confidential.

References

  1. Atlam HF, Walters RJ, Wills GB (2018) Internet of things: state-of-the-art, challenges, applications, and open issues. Int J Intell Comput Res 9(3):928–938. https://doi.org/10.20533/ijicr.2042.4655.2018.0112

    Article  Google Scholar 

  2. Atlam HF, Wills GB (2020) IoT Security, privacy, Safety and Ethics. In: Internet of Things. https://doi.org/10.1007/978-3-030-18732-3_8

  3. Zheng X, Martin P, Brohman K, Xu LD (2014) Cloudqual: a quality model for cloud services. IEEE Trans Ind Inform 10(2):1527–1536. https://doi.org/10.1109/TII.2014.2306329

    Article  Google Scholar 

  4. Wan J, Li J, Imran M, Li D (2019) A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Trans Ind Inform 15(6):3652–3660. https://doi.org/10.1109/TII.2019.2894573

    Article  Google Scholar 

  5. Uddin MA, Stranieri A, Gondal I, Balasubramanian V (2019) An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring. Proc IEEE Int Conf Ind Technol 2019(Febru):1135–1142. https://doi.org/10.1109/ICIT.2019.8754936

    Article  Google Scholar 

  6. Mohsin AH et al (2019) Based blockchain-PSO-AES techniques in finger vein biometrics: a novel verification secure framework for patient authentication. Comput Stand Interfaces 66:103343. https://doi.org/10.1016/j.csi.2019.04.002

    Article  Google Scholar 

  7. Kumar MM, Prasad MVNK, Raju USN (2020) Blockchain-based multi-instance Iris authentication using additive ElGamal homomorphic encryption. IET Biom 9(4):165–177. https://doi.org/10.1049/iet-bmt.2019.0169

    Article  Google Scholar 

  8. Hassan MU, Rehmani MH, Chen J (2019) Privacy preservation in blockchain based IoT systems: integration issues, prospects, challenges, and future research directions. Futur Gener Comput Syst 97:512–529. https://doi.org/10.1016/j.future.2019.02.060

    Article  Google Scholar 

  9. Shen M et al (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Commun 38(5):942–954. https://doi.org/10.1109/JSAC.2020.2980916

    Article  Google Scholar 

  10. Khari M, Garg AK, Gandomi AH, Gupta R, Patan R, Balusamy B (2020) Securing data in internet of things (IoT) using cryptography and steganography techniques. IEEE Trans Syst Man Cybern Syst 50(1):73–80. https://doi.org/10.1109/TSMC.2019.2903785

    Article  Google Scholar 

  11. Ge C, Liu Z, Fang L (2020) A blockchain based decentralized data security mechanism for the internet of things. J Parallel Distrib Comput 141:1–9. https://doi.org/10.1016/j.jpdc.2020.03.005

    Article  Google Scholar 

  12. Sarier ND (2021) Efficient biometric-based identity management on the blockchain for smart industrial applications. Pervasive Mob Comput 71:101322. https://doi.org/10.1016/j.pmcj.2020.101322

    Article  Google Scholar 

  13. Lee YK, Jeong J (2021) Securing biometric authentication system using blockchain. ICT Express 7(3):322–326. https://doi.org/10.1016/j.icte.2021.08.003

    Article  Google Scholar 

  14. Mishra P, Modanwal V, Kaur H, Varshney G (2021) Pseudo-biometric identity framework: achieving self-sovereignity for biometrics on blockchain. Conf Proc- IEEE Int Conf Syst Man Cybern 945–951. https://doi.org/10.1109/SMC52423.2021.9659136

  15. Ma J, Qi B, Lv K (2021) BSA: Enabling Biometric-Based Storage and Authorization on Blockchain. Proc– 2021 IEEE 20th Int Conf Trust Secur Priv Comput Commun Trust pp. 1077–1084. https://doi.org/10.1109/TrustCom53373.2021.00147

  16. Singh P, Masud M, Hossain MS, Kaur A (2021) Cross-domain secure data sharing using blockchain for industrial IoT. J Parallel Distrib Comput 156:176–184. https://doi.org/10.1016/j.jpdc.2021.05.007

    Article  Google Scholar 

  17. Panda SK, Mohammad GB, Nandan Mohanty S, Sahoo S (2021) Smart contract-based land registry system to reduce frauds and time delay. Secur Priv 4(5). https://doi.org/10.1002/spy2.172

  18. Liu B, Yu K, Feng C, Choo KKR (2021) Cross-domain authentication for 5G-enabled UAVs: A blockchain approach. DroneCom 2021 - Proc. 4th ACM MobiCom Work. Drone Assist. Wirel. Commun. 5G Beyond 9(8):25–30. https://doi.org/10.1145/3477090.3481053

  19. Wang L, Tian Y, Zhang D (2022) Toward cross-domain dynamic accumulator authentication based on blockchain in internet of things. IEEE Trans Ind Inform 18(4):2858–2867. https://doi.org/10.1109/TII.2021.3116049

    Article  Google Scholar 

  20. Gaba P, Raw RS, Mohammed MA, Nedoma J, Martinek R (2022) Impact of block data components on the performance of blockchain-based VANET implemented on hyperledger fabric. IEEE Access 10(July):71003–71018. https://doi.org/10.1109/ACCESS.2022.3188296

    Article  Google Scholar 

  21. Panwar A, Bhatnagar V, Khari M, Salehi AW, Gupta G (2022) A blockchain framework to secure personal health record (PHR) in IBM cloud-based data lake. Comput Intell Neurosci 2022:1. https://doi.org/10.1155/2022/3045107

    Article  Google Scholar 

  22. Poongodi M et al (2022) 5G based blockchain network for authentic and ethical keyword search engine. IET Commun 16(5):442–448. https://doi.org/10.1049/cmu2.12251

    Article  Google Scholar 

  23. Lakhan A, Mohammed MA, Kadry S, AlQahtani SA, Maashi MS, Abdulkareem KH (2022) Federated learning-aware multi-objective modeling and blockchain-enable system for IIoT applications. Comput Electr Eng 100(April 2021):107839. https://doi.org/10.1016/j.compeleceng.2022.107839

    Article  Google Scholar 

  24. Anitha R, Tapas Bapu BR (2022) Blockchain-based light-weight authentication approach for a multiple wireless sensor network. IETE J Res. https://doi.org/10.1080/03772063.2022.2154710

    Article  Google Scholar 

  25. Nanda SK, Panda SK, Dash M (2023) Medical supply chain integrated with blockchain and IoT to track the logistics of medical products. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-14846-8

    Article  Google Scholar 

  26. Lakhan A et al (2023) Federated-learning based privacy preservation and Fraud-enabled blockchain IoMT system for healthcare. IEEE J Biomed Heal Inform 27(2):664–672. https://doi.org/10.1109/JBHI.2022.3165945

    Article  Google Scholar 

  27. Barman S (2023) A light weight authentication protocol for a blockchain-based off-chain medical data access in multi-server environment, preprint. https://doi.org/10.21203/rs.3.rs-2727465/v1

  28. Anitha Rajakumari P, Parwekar P (2023) Secure public administration using wireless blockchain technology with efficient routing policy. Int J Commun Syst 36(6):1–18. https://doi.org/10.1002/dac.5441

    Article  Google Scholar 

  29. Saif S, Das P, Biswas S, Khari M, Shanmuganathan V (2022) Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare. Microprocess Microsyst 104622. https://doi.org/10.1016/j.micpro.2022.104622

  30. Penard W, van Werkhoven T (2008) On the secure hash algorithm family. Cryptogr. Context, pp 1–18, [Online]. Available: https://blog.infocruncher.com/resources/ethereum-whitepaper-annotated/On%20the%20Secure%20Hash%20Algorithm%20family%20(2008).pdf

  31. Rajan SP (2015) Review and investigations on future research directions of mobile based telecare system for cardiac surveillance. J Appl Res Technol 13(4):454–460. https://doi.org/10.1016/j.jart.2015.09.002

    Article  Google Scholar 

  32. Singh G, Supriya S (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67:33–38. https://doi.org/10.5120/11507-7224

    Article  Google Scholar 

  33. Patil P, Narayankar P, Narayan DG, Meena SM (2016) A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES RSA and Blowfish. Procedia Comput Sci 78(December 2015):617–624. https://doi.org/10.1016/j.procs.2016.02.108

    Article  Google Scholar 

  34. Zaidan AA, Majeed A, Zaidan BB (2009) High securing cover-file of hidden data using statistical technique and AES, encryption, algorithm. World Acad Sci Eng Technol 54:463–474

    Google Scholar 

  35. Msolli A, Helali A, Maaref H (2018) New security approach in real-time wireless multimedia sensor networks. Comput Electr Eng 72:910–925. https://doi.org/10.1016/j.compeleceng.2018.01.016

    Article  Google Scholar 

  36. Dayal M, Chawla A, Khari M (2021) Coalescence of Neural Networks and Blockchain. In: Handbook of Green Computing and Blockchain Technologies, pp. 31–44. https://doi.org/10.1201/9781003107507

  37. Sáenz-royo C, Fleta-asín J (2023) Evaluating blockchain as a participatory organisational system: looking for transaction efficiency. 0:1–31. https://doi.org/10.1111/itor.13329

  38. Fernández-Caramés TM, Fraga-Lamas P (2018) A review on the use of blockchain for the internet of things. IEEE Access 6:32979–33001. https://doi.org/10.1109/ACCESS.2018.2842685

    Article  Google Scholar 

  39. Yale Face Database. https://www.kaggle.com/datasets/olgabelitskaya/yale-face-database

  40. Wadi SM, Zainal N (2014) High definition image encryption algorithm based on AES modification. Wirel Pers Commun 79(2):811–829. https://doi.org/10.1007/s11277-014-1888-7

    Article  Google Scholar 

Download references

Acknowledgements

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Research Groups Program under grant number (RGP.1/24/44).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdelhamid Helali.

Ethics declarations

Conflict of interest

The authors declare that they have no known personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hagui, I., Msolli, A., ben Henda, N. et al. A blockchain-based security system with light cryptography for user authentication security. Multimed Tools Appl 83, 52451–52480 (2024). https://doi.org/10.1007/s11042-023-17643-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17643-5

Keywords

Navigation