Publicación:
Security Issues in Internet Architecture and Protocols Based on Behavioural Biometric Block Chain-Enhanced Authentication Layer

dc.contributor.authorQuisocala Herrera, Jhimmy Alberth
dc.contributor.authorTasayco-Jala, Abel Alejandro
dc.contributor.authorMenacho Vargas, Isabel
dc.contributor.authorBarrientos Farias, Wilfredo
dc.contributor.authorCollantes Inga, Zoila Mercedes
dc.contributor.authorHerrera Palacios, Eber L.
dc.contributor.authorFlores Limo, Fernando Antonio
dc.date.accessioned2025-08-15T15:27:18Z
dc.date.issued2023
dc.description.abstractInternet security is of paramount importance due to the pervasive nature of the network in modern society. As the globe grows increasingly interconnected, issues like data breaches, unauthorized access, and service disruptions become more common. Safeguarding private data, ensuring uninterrupted communication, and protecting vital services are all essential to establishing confidence and stability in the online world. Internet security is a complex problem to solve due to the interconnected nature of the Internet's Architecture and Protocols (IAP). Due to the wide variety of devices and platforms that can access the Internet, cybercriminals can breach a complex ecosystem. Constant monitoring and flexibility are required due to the rapid development of new attack methods and vulnerabilities. The difficulty lies in balancing implementing new security measures and minimizing disruptions to the user experience, which calls for adaptive and novel approaches. In this paper, the Behavioural Biometric Block Chain-Enhanced Authentication layer (BBB-EAL) framework recommends a static authentication mechanism for end-users and edge servers. This authentication creates a secure and encrypted link between parties. Access tokens are produced via a smart contract, removing the requirement for a trusted third party. This work emphasizes the importance of architecture design and sequence diagrams in representing participant interactions and information sharing. Additionally, it examines the construction of the Machine Learning (ML) model used to recognize KMT dynamics. Simulations indicate that the recommended design improves user authentication in an IAP-enabled environment. The findings demonstrate the ability to evaluate confidence in real time, achieve minimal authentication time, and utilize resources efficiently. © 2023, Innovative Information Science and Technology Research Group. All rights reserved.
dc.identifier.doi10.58346/JISIS.2023.I3.008
dc.identifier.scopus2-s2.0-85170255366
dc.identifier.urihttps://cris.une.edu.pe/handle/001/531
dc.identifier.uuid4eeaa365-3b98-45e0-98e0-125ad715d310
dc.language.isoen
dc.publisherInnovative Information Science and Technology Research Group
dc.relation.citationissue3
dc.relation.citationvolume13
dc.relation.ispartofJournal of Internet Services and Information Security
dc.rightshttp://purl.org/coar/access_right/c_abf2
dc.subjectAuthentication
dc.subjectBehavioural
dc.subjectBiometric
dc.subjectBlock Chain
dc.subjectInternet
dc.subjectKMT Dynamics
dc.subjectMachine Learning
dc.subjectProtocol
dc.subjectSecurity
dc.titleSecurity Issues in Internet Architecture and Protocols Based on Behavioural Biometric Block Chain-Enhanced Authentication Layer
dc.typehttp://purl.org/coar/resource_type/c_2df8fbb1
dspace.entity.typePublication
oaire.citation.endPage142
oaire.citation.startPage122
person.affiliation.nameFacultad de Ciencias Sociales y Humanidades
person.identifier.orcid0000-0002-5494-9794
relation.isAuthorOfPublicationbf2d914e-b3a1-43d2-9556-05e287248306
relation.isAuthorOfPublication.latestForDiscoverybf2d914e-b3a1-43d2-9556-05e287248306

Archivos

Colecciones