4.6 Article

Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions

Journal

COMPUTER STANDARDS & INTERFACES
Volume 64, Issue -, Pages 41-60

Publisher

ELSEVIER
DOI: 10.1016/j.csi.2018.12.002

Keywords

Blockchain technology; Authentication; Distributed ledger technology; Security; Decentralised app

Ask authors/readers for more resources

As the first and last line of defence in many cases, authentication is a crucial part of a system. With authentication, any unauthorised access to the system can be prevented. This work maps the research landscape through two means. The first is a comprehensive taxonomy of blockchain technology in authentication over networking. The second is identification of different types of authentication systems under various platforms that use blockchain technology. This work also provides useful and classified information which can enhance the understanding of how various authentication systems can be combined with blockchain technology. In addition, problems associated with this blockchain technology and proposed solutions are surveyed to fulfil the requirements of the network applications. Moreover, this work highlights the importance, capabilities, motivations and challenges of blockchain technology with distinct applications in various fields. Finally, recommendations and future research directions are discussed.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available