Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2018.8.3.085

Biometric Information and OTP based on Authentication Mechanism using Blockchain  

Mun, Hyung-Jin (Department of Information & Communication Engineering, Sungkyul University)
Publication Information
Journal of Convergence for Information Technology / v.8, no.3, 2018 , pp. 85-90 More about this Journal
Abstract
Blockchain technology provides distributed trust structure; with this, we can implement a system that cannot be forged and make Smart Contract possible. With blockchain technology emerging as next generation security technology, there have been studies on authentication and security services that ensure integrity. Although Internet-based services have been going with user authentication with password, the information can be stolen through a client and a network and the server is exposed to hacking. For the reason, we suggest blockchain technology and OTP based authentication mechanism to ensure integrity. In particular, the Two-Factor Authentication is able to ensure secure authentication by combining OTP authentication and biometric authentication without using password. As the suggested authentication applies multiple hash functions and generates transactions to be placed in blocks in order for biometric information not to be identified, it is protected from server attacks by being separate from the server.
Keywords
Blockchain; User Authentication; Biometric; OTP; Two-Factor Authentication;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 H. J. Mun & S. Oh. (2016). Injecting subject policy into access control for strengthening the protection of personal information. Wireless Personal Communications, 89(3), 715-728. DOI : 10.1007/s11277-015-3094-7   DOI
2 H. J. Mun, S. H. Hong & J. P. Shin. (2017). A novel secure and efficient hash function with extra padding against rainbow table attacks. Cluster Computing, 1-13. DOI : 10.1007/s10586-017-0886-4   DOI
3 S. H. Hong & S. H. Park. (2017). The Research on Blockchain-based Secure IoT Authentication. Journal of the Korea Convergence Society, 8(11), 57-62. DOI : 10.15207/JKCS.2017.8.11.057   DOI
4 H. J. Mun & K. Y. Jin, (2017) Empowering Information Subject to Control Information Use to Protect Personal Information, Indian Journal of Forensic Medicine & Toxicology. 11(2), 530-534. DOI : 10.5958/0973-9130.2017.00181.5   DOI
5 W. Stallings (1988). Cryptography and Network Security. UK : Pearson Education
6 C. T. Li, C. Y. Weng & C. Fan. (2012). Two-Factor User Authentication in Multi-Server Networks. International Journal of Security and Its Applications, 6(2), 261-268.
7 Namu. (2018). OTP. Namu. https://namu.wiki/w/OTP
8 Y. S. Jeong, S. H. Han & S. S. Shin. (2012). A Study on Mobile OTP Generation Model. Journal of Digital Convergence, 10(2), 183-191.   DOI
9 W. J. Jang & H. W. Lee. (2010). Biometric One-Time Password Generation Mechanism and its Application on SIP Authentication. Journal of the Korea Convergence Society, 1(1), 93-100.
10 K. H. Lee. (2013). A Study of Authentication Scheme using Biometric-Based Effectiveness Analysis in Mobile Devices. Journal of Digital Convergence, 11(11), 795-801. DOI : 10.14400/jdpm.2013.11.11.795   DOI
11 S. H. Yun. (2017). The Biometric Authentication Scheme Capable of Multilevel Security Control. Journal of the Korea Convergence Society, 8(2), 9-14. DOI : 10.15207/JKCS.2017.8.2.009   DOI
12 J. H. Yang. (2018). A Study on the Effect of Block Chain Application and Legal Issue in Logistics Industry. Journal of Convergence for Information Technology, 8(1), 187-199. DOI : 10.22156/CS4SMB.2018.8.1.187   DOI
13 D. Y. Lee, J. W. Park, J. H. Lee, S. R. Lee & S. Y. Park. (2017). Blockchain Core Technology and Domestic and Foreign Trends. Communications of the Korean Institute of Information Scientists and Engineers, 35(6), 22-28.