A critical review of blockchain-based authentication techniques

Published

25-04-2025

DOI:

https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.4.17

Keywords:

Blockchain technology, Authentication mechanisms, Digital security, Decentralized identity, Scalability, Privacy compliance

Dimensions Badge

Authors

  • Neeraj Deenbandhu Chhotu Ram University of Science and Technology, Murthal, Haryana, India.
  • Anita Singhrova Deenbandhu Chhotu Ram University of Science and Technology, Murthal, Haryana, India.

Abstract

Technology is very agile when it comes to securing data integrity, privacy and identity generally, and by extension, technology is very fit for use in the authentication of users and as a device. The focus of this paper lies in an attempt to find alternatives to the authentication in the blockchain, which is based on tokens, biometrics or knowledge. Further, the paper reviews the use of public, private and consortium blockchain in the field of healthcare, IoT, and cloud services. In this review, I will be looking at how strong blockchain-based authentication is compared with the old-school centralized authentication. It covers the advantages to security of decentralizing, but also practical limitations. Next, the challenges of scaling, spending energy, and compliance with legal regulations of blockchain in secure authentication are elaborated and the ways of improvement for blockchain in secure authentication are suggested. It provides a descriptive analysis of blockchain technologies that were recently published and a case study to compare and contrast different blockchain technologies and their usage in authenticating. This is not a systematic review as it does not discuss concepts from one perspective but rather discusses a handful of studies that contain peer-reviewed sources and evaluates the conceptual models and then accordingly assesses their performance in the real world. It offers the advantage of using different blockchain-based authentication instead of centralized systems. It eliminates single points of failure, has light tamper-proof reach back audit trials and controls personal data. The technology itself is still not close to solving those issues, which makes things too costly and too energy consuming, unable to scale and there is little point in the framework of legs. To broaden adoption for future systems, they must be more lightweight and more efficient in consensus protocols and further aligned with regulation.

How to Cite

Neeraj, & Anita Singhrova. (2025). A critical review of blockchain-based authentication techniques. The Scientific Temper, 16(04), 4136–4150. https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.4.17

Downloads

Download data is not yet available.

Similar Articles

<< < 7 8 9 10 11 12 13 14 15 16 > >> 

You may also start an advanced similarity search for this article.