A critical review of blockchain-based authentication techniques
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.4.17Keywords:
Blockchain technology, Authentication mechanisms, Digital security, Decentralized identity, Scalability, Privacy complianceDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Technology is very agile when it comes to securing data integrity, privacy and identity generally, and by extension, technology is very fit for use in the authentication of users and as a device. The focus of this paper lies in an attempt to find alternatives to the authentication in the blockchain, which is based on tokens, biometrics or knowledge. Further, the paper reviews the use of public, private and consortium blockchain in the field of healthcare, IoT, and cloud services. In this review, I will be looking at how strong blockchain-based authentication is compared with the old-school centralized authentication. It covers the advantages to security of decentralizing, but also practical limitations. Next, the challenges of scaling, spending energy, and compliance with legal regulations of blockchain in secure authentication are elaborated and the ways of improvement for blockchain in secure authentication are suggested. It provides a descriptive analysis of blockchain technologies that were recently published and a case study to compare and contrast different blockchain technologies and their usage in authenticating. This is not a systematic review as it does not discuss concepts from one perspective but rather discusses a handful of studies that contain peer-reviewed sources and evaluates the conceptual models and then accordingly assesses their performance in the real world. It offers the advantage of using different blockchain-based authentication instead of centralized systems. It eliminates single points of failure, has light tamper-proof reach back audit trials and controls personal data. The technology itself is still not close to solving those issues, which makes things too costly and too energy consuming, unable to scale and there is little point in the framework of legs. To broaden adoption for future systems, they must be more lightweight and more efficient in consensus protocols and further aligned with regulation.Abstract
How to Cite
Downloads
Similar Articles
- Kshema Manu, Malathi S, A Comprehensive Study on Addressing Trust Erosion in Multimedia in The Indian Context , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Sabeerath K, Manikandasaran S. Sundaram, ESPoW: Efficient and secured proof of ownership method to enable authentic deduplicated data access in public cloud storage , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Priya Nandhagopal, Jayasimman Lawrence, ETTG: Enhanced token and tag generation for authenticating users and deduplicating data stored in public cloud storage , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Archana Verma, Application of metaverse technologies and artificial intelligence in smart cities , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Priyanka Patel, Bhaskar Pandya, The idea of Indianness in Indian literature: An analysis of social and cultural themes in the short stories of Rabindranath Tagore, Mulk Raj Anand, and R.K. Narayan , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RFSVMDD: Ensemble of multi-dimension random forest and custom-made support vector machine for detecting RPL DDoS attacks in an IoT-based WSN environment , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- *HEERA LAXMI JADON, POONAM PRAKASH, SANJEEV PRATAP SINGH, ANTIBACTERIAL ACTIVITY OF NATURAL COMPOUNDS EXTRACTED WITH DIFFERENT SOLVENTS FROM CALOTROPIS PROCERA , The Scientific Temper: Vol. 2 No. 1&2 (2011): The Scientific Temper
- C. Mohan Raj, M. Sundaram , M. Anand, Automation of industrial machinerie , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Unified framework for sybil attack detection in mobile ad hoc networks using machine learning approach , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- V. Yamuna , P. Kandhavadivu, Recent developments in the synthesis of superabsorbent polymer from natural food sources: A review , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
<< < 4 5 6 7 8 9 10 11 12 13 > >>
You may also start an advanced similarity search for this article.

