The Future of Digital Authentication: Blockchain-driven Decentralized Authentication in Web 3.0
DOI:
https://doi.org/10.13052/jwe1540-9589.2351Keywords:
Blockchain, Web 3.0, Web 3.0 authentication, Smart contractAbstract
This paper presents an innovative Web 3.0 authentication technique, designed for a user-centric internet environment. Addressing the rising demand for authentication techniques suitable for Web 3.0, it defines the essential features of such systems and introduces a new approach using smart contracts. This approach utilizes mother and child tokens in conjunction with the lock smart contract to ensure secure authentication. The approach is thoroughly tested against various security threats, including man-in-the-middle, replay, and brute-force attacks, and its practicality is evaluated on Ethereum-based networks.
Downloads
References
O. Lassila, and J. Hendler. Embracing Web 3.0. IEEE Internet Computing, 11(3):90–93, 2007.
J. Hendler. Web 3.0 Emerging. Computer, 42(1):111–113, 2009.
C. Chen, L. Zhang, Y. Li, T. Liao, S. Zhao, Z. Zheng, H. Huang, and J. Wu. When Digital Economy Meets Web3.0: Applications and Challenges. IEEE Open Journal of the Computer Society, 3:233–245, 2022.
S. Yangm, and M. Li. Web3.0 Data Infrastructure: Challenges and Opportunities. IEEE Network, 37(1):4–5, 2023.
A. Suryavanshi, A. G, M. Babu T. N, R. M, and A. Haq N. The integration of Blockchain and AI for Web 3.0: A security Perspective. 2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT), 2023.
C. Guan, D. Ding, and J. Guo. Web3.0: A Review And Research Agenda. 2022 RIVF International Conference on Computing and Communication Technologies (RIVF), 2022.
Z. Liu, Y. Xiang, j. Shi, P. Gao, H. Wang, X. Xiao, B. Wen, Q. Li, and Y. Hu. Make Web3.0 Connected. IEEE Transactions on Dependable and Secure Computing, 19(5):2965–2981, 2022.
P. S. S, and A. Kumar. Web3.0 E-Commerce Decentralized Application. SSRN. Available online: https:/ssrn.com/abstract=4268681.
S. Y. Lim, P. T.Fosting, A. Almasri, O. Musa, M. L. M. Kiah, T. F. Ang, and R. Ismail. Blockchain technology the identity management and authentication service disruptor: A survey. International Journal on Advanced Science Engineering and Information Technology, 8:1735–1745, 2018.
T. Y. C. Woo, and S. S. Lam. Authentication for distributed systems. Computer, 25(1):39–52, 1992.
Decentralized Identifiers (DIDs) v1.0. W3C. Available online: https:/www.w3.org/TR/did-core/.
O. Umoren, R. Singh, Z. Pervez, and K. Dahal. Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain. Sensors, 22(10):3956, 2022.
M. Asif, Z. Aziz, M. B. Ahmad, A. Khalid, H. A. Waris, and A. Gilani. Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities. Sensors, 22(7):2604, 2022.
Y. Wang, X. Jia, Y. Xia, M. K. Khan, and D. He. A blockchain-based conditional privacy-preserving authentication scheme for edge computing services. Journal of Information Security and Applications, 70:103334, 2022.
X. Xu, Y. Guo, and Y. Guo. Fog-enabled private blockchain-based identity authentication scheme for smart home. Computer Communications, 205:58–68, 2023.
A. Catalfamo, A. Ruggeri, A. Celesti, M. Fazio, and M. Villari. A Microservices and Blockchain Based One Time Password (MBB-OTP) Protocol for Security-Enhanced Authentication. 2021 IEEE Symposium on Computers and Communications (ISCC), 2021.
M. Zhang, L. Wang, and J. Yang. A Blockchain-Based Authentication Method with One-Time Password. 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), 2019.
S. W. Shah, and S. S. Kanhere. Recent Trends in User Authentication - A Survey. IEEE Access, 7:112505–112519, 2019.
W. Ma, J. Campbell, D. Tran, and D. Kleeman. Password Entropy and Password Quality. 2010 Fourth International Conference on Network and System Security. 2010.
H. Murray, and D. Malone. Evaluating password advice. 2017 28th Irish Signals and Systems Conference (ISSC), 2017.
M. Myers, R. Ankney, A. Malpani, S. Galperin and C. Adams. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. rfc2560. Available online: https:/www.rfc-editor.org/rfc/rfc2560.
C. Mitchell. PKI standards. Information Security Technical Report, 5(4):17–32, 2000.
Z. Rui, and Z. Yan. A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification. IEEE Access, 7:5994–6009, 2018.
D. Bhattacharyya, R. Ranjan, F. Alisherov A, and M. Choi. Biometric Authentication: A Review. International Journal of u-and-e-Service, Science and Technology, 2(3):13–28, 2009.
S. Cucko, and M. Turkanovic. Decentralized and Self-Sovereign Identity: Systematic Mapping Study. IEEE Access, 9:139009–139027, 2021.
C. Antal, T. Cioara, I. Anghel, M. Antal, and I. Salomie. Distributed Ledger Technology Review and Decentralized Applications Development Guidelines. Future Internet, 13(3):62, 2021.
W. Cai, Z. Wang, J. B. Ernst, Z. Hong, C. Feng, and V. C. M. Leung. Decentralized Applications: The Blockchain-Empowered Software System. IEEE Access, 6:53019–53033, 2018.
Ganache, One Click Blockchain. Truffle Suite. Available Online: https:/trufflesuite.com/ganache/.
Hyperledger Besu Ethereum client. Hyperledger Besu. Available Online: https:/besu.hyperledger.org/
Goerli Testnet. Available Online: https:/goerli.net/