Journal
COMPUTER STANDARDS & INTERFACES
Volume 64, Issue -, Pages 41-60Publisher
ELSEVIER
DOI: 10.1016/j.csi.2018.12.002
Keywords
Blockchain technology; Authentication; Distributed ledger technology; Security; Decentralised app
Ask authors/readers for more resources
As the first and last line of defence in many cases, authentication is a crucial part of a system. With authentication, any unauthorised access to the system can be prevented. This work maps the research landscape through two means. The first is a comprehensive taxonomy of blockchain technology in authentication over networking. The second is identification of different types of authentication systems under various platforms that use blockchain technology. This work also provides useful and classified information which can enhance the understanding of how various authentication systems can be combined with blockchain technology. In addition, problems associated with this blockchain technology and proposed solutions are surveyed to fulfil the requirements of the network applications. Moreover, this work highlights the importance, capabilities, motivations and challenges of blockchain technology with distinct applications in various fields. Finally, recommendations and future research directions are discussed.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available