2023
DOI: 10.3390/s23052757
|View full text |Cite
|
Sign up to set email alerts
|

BAuth-ZKP—A Blockchain-Based Multi-Factor Authentication Mechanism for Securing Smart Cities

Abstract: The overwhelming popularity of technology-based solutions and innovations to address day-to-day processes has significantly contributed to the emergence of smart cities. where millions of interconnected devices and sensors generate and share huge volumes of data. The easy and high availability of rich personal and public data generated in these digitalized and automated ecosystems renders smart cities vulnerable to intrinsic and extrinsic security breaches. Today, with fast-developing technologies, the classic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 86 publications
0
13
0
Order By: Relevance
“…One potential area of future research is the development of more sophisticated authentication and authorization mechanisms to protect against unauthorized access to chatbot data. For instance, multi-factor authentication methods, which use blockchain, image recognition, a secure one-time PIN, and biometric authentication [38][39][40], may be used to improve the security of chatbots. Additionally, secure encryption [41] and end-to-end encryption can be used to ensure that messages and data are protected from interception or tampering [42].…”
Section: Privacy and Securitymentioning
confidence: 99%
“…One potential area of future research is the development of more sophisticated authentication and authorization mechanisms to protect against unauthorized access to chatbot data. For instance, multi-factor authentication methods, which use blockchain, image recognition, a secure one-time PIN, and biometric authentication [38][39][40], may be used to improve the security of chatbots. Additionally, secure encryption [41] and end-to-end encryption can be used to ensure that messages and data are protected from interception or tampering [42].…”
Section: Privacy and Securitymentioning
confidence: 99%
“…A comprehensive evaluation of the body of research on cloud computing security literature reveals some research gaps that point to areas that could be explored further. Identity and Access Management (IAM) difficulties are well covered in the literature; however, there is a noticeable knowledge gap regarding the efficaciousness and practical use of advanced IAM solutions, like multi-factor authentication [177] and adaptive authentication, in various cloud contexts. In addition, more research on the harmonisation of global regulatory frameworks and strategies for seamless compliance across jurisdictions would be beneficial for the Legal and Compliance Challenges thematic category, which while skilfully addressing the complexities of data residency and international data transfer regulations, could benefit from it [178], [179].…”
Section: Research Gaps and Future Directionsmentioning
confidence: 99%
“…By using Quadratic Arithmetic Programs in zk-SNARKs, people can convert information into polynomial forms, allowing for proof of correct program execution. Recursive zk-SNARKs enable proof verification of other proofs, reducing data and computational demands for improved scalability, eliminating the characteristic of Blockchains' decentralized characteristic [10].…”
Section: Leveraging Zkp Mechanisms In Blockchainmentioning
confidence: 99%