CFP last date
20 January 2026
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2026

Submit your paper
Know more
Random Articles
Reseach Article

Beyond Traditional Security Measures: A Blockchain-based Solution for Robust Data Transfer and User Verification in Networks

by Shikhi Jain, Reena Dadhich
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 76
Year of Publication: 2026
Authors: Shikhi Jain, Reena Dadhich
10.5120/ijca2026926315

Shikhi Jain, Reena Dadhich . Beyond Traditional Security Measures: A Blockchain-based Solution for Robust Data Transfer and User Verification in Networks. International Journal of Computer Applications. 187, 76 ( Jan 2026), 52-56. DOI=10.5120/ijca2026926315

@article{ 10.5120/ijca2026926315,
author = { Shikhi Jain, Reena Dadhich },
title = { Beyond Traditional Security Measures: A Blockchain-based Solution for Robust Data Transfer and User Verification in Networks },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2026 },
volume = { 187 },
number = { 76 },
month = { Jan },
year = { 2026 },
issn = { 0975-8887 },
pages = { 52-56 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number76/beyond-traditional-security-measures-a-blockchain-based-solution-for-robust-data-transfer-and-user-verification-in-networks/ },
doi = { 10.5120/ijca2026926315 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2026-01-20T22:56:38.150676+05:30
%A Shikhi Jain
%A Reena Dadhich
%T Beyond Traditional Security Measures: A Blockchain-based Solution for Robust Data Transfer and User Verification in Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 76
%P 52-56
%D 2026
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the ever-expanding relational environments of modern computing, guaranteeing the safe transfer of sensitive data is an increasing challenge, especially as networks become more decentralized and threatened by a wide range of cyber threats. Past security paradigms relied upon centralized control, password-based authentication, and symmetric encryption technologies that have proved useful in certain scenarios, but have also been repeatedly proven insufficient against advanced threats like identity spoofing, data interception, and protocol exploitation. This paper outlines a blockchain based, multifactor authentication protocol to help mitigate data tampering, prevent unauthorized access, and guarantee the authenticity of entities that are communicating. The recommended protocol employs a Monitoring Node (MN), which maintains an immutable blockchain ledger of authorized devices' MAC addresses and hashed biometric identifiers, such as fingerprints or facial images. A multi-layered security architecture using blockchain-based verification, an image-based OTP (one-time password) authentication, transaction IDs, and cryptographic hash functions are employed to help secure both the sender and receiver in communication. The suggested approach of using an image-grid based OTP is noteworthy to help defend against both another brute-force guessing or phishing by jettisoning the image patterns between each session. The simulation-based performance testing indicates that, against typical classic encryption-based solutions, the least expected performance for this protocol is improved authentication times, lower rate of integrity failures and no unauthorized access attempts in the simulated context. The solution shows good applicability to resource-constrained domains such as Wireless Sensor Networks (WSNs) and the Internet of Things (IoT), where lightweight, but reliable, security solutions are requirements.

References
  1. And, Ibrahim A. Abd El-Moghith, and Saad M. Darwish. “Towards Designing a Trusted Routing Scheme in Wireless Sensor Networks: A New Deep Blockchain Approach.” IEEE Access: Practical Innovations, Open Solutions, vol. 9, 2021, pp. 103822–103834, doi:10.1109/access.2021.3098933.
  2. Cui, Zhihua, et al. “A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN.” IEEE Transactions on Services Computing, vol. 13, no. 2, 2020, pp. 1–1, doi:10.1109/tsc.2020.2964537.
  3. Goyat, Rekha, et al. “Blockchain-Based Data Storage with Privacy and Authentication in Internet of Things.” IEEE Internet of Things Journal, vol. 9, no. 16, 2022, pp. 14203–14215, doi:10.1109/jiot.2020.3019074.
  4. Sable, N. P., & Rathod, V. U. (2023). Rethinking Blockchain and Machine Learning for Resource-Constrained WSN. In AI, IoT, Big Data and Cloud Computing for Industry 4.0 (pp. 303-318). Cham: Springer International Publishing.
  5. Ismail, S., Dawoud, D. W., & Reza, H. (2023). Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review. Future Internet, 15(6), 200.
  6. Li, Gang, et al. “Blockchain-Enhanced Spatiotemporal Data Aggregation for UAV-Assisted Wireless Sensor Networks.” IEEE Transactions on Industrial Informatics, vol. 18, no. 7, 2022, pp. 4520–4530, doi:10.1109/tii.2021.3120973.
  7. Peng, Cong, et al. “Multifunctional and Multidimensional Secure Data Aggregation Scheme in WSNs.” IEEE Internet of Things Journal, vol. 9, no. 4, 2022, pp. 2657–2668, doi:10.1109/jiot.2021.3077866.
  8. Ahmed, Adeel, et al. “An Energy-Efficient Data Aggregation Mechanism for IoT Secured by Blockchain.” IEEE Access: Practical Innovations, Open Solutions, vol. 10, 2022, pp. 11404–11419, doi:10.1109/access.2022.3146295.
  9. Ramasamy, Lakshmana Kumar, et al. “Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey.” IEEE Access: Practical Innovations, Open Solutions, vol. 9, 2021, pp. 128765–128785, doi:10.1109/access.2021.3111923.
  10. Butun, Ismail, et al. “Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures.” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, Firstquarter 2020, pp. 616–644, doi:10.1109/comst.2019.2953364.
  11. Ghadi, Y. Y., Mazhar, T., Al Shloul, T., Shahzad, T., Salaria, U. A., Ahmed, A., & Hamam, H. (2024). Machine learning solution for the security of wireless sensor network. IEEE Access.
  12. Dener, M., & Orman, A. (2023). Bbap-wsn: a new blockchain-based authentication protocol for wireless sensor networks. Applied Sciences, 13(3), 1526.
  13. Jabor, M. S., Azez, A. S., Campelo, J. C., &Bonastre Pina, A. (2023). New approach to improve power consumption associated with blockchain in WSNs. Plos one, 18(5), e0285924.
  14. Dener, M., & Orman, A. (2023). BBAP-WSN: A New Blockchain-Based Authentication Protocol for Wireless Sensor Networks. Applied Sciences, 13(3), 1526.
  15. Abdussami, M., Amin, R., Saravanan, P., & Vollala, S. (2023). BSAPM: BlockChain based secured authentication protocol for large scale WSN with FPGA implementation. Computer Communications.
  16. Revanesh, M., Acken, J. M., & Sridhar, V. (2023). DAG block: Trust aware load balanced routing and lightweight authentication encryption in WSN. Future Generation Computer Systems, 140, 402-421.
  17. Soosaimariyan, M. V. (2025). Blockchain-enhanced secure authentication for wireless sensor networks using consortium blockchain and fuzzy extractor. ICTACT Journal on Communication Technology, 16(1), 3419–3428. https://doi.org/10.21917/ijct.2025.0507
  18. Zhang, R., Yang, Y., & Brown, C. (2024). A blockchain-based secure authentication technique for edge networks. Journal of Network and Computer Applications, 211, 103453. https://doi.org/10.1016/j.jnca.2023.103453
  19. Liu, F., Zhang, X., & Wang, J. (2021). Combining blockchain and biometrics: A survey on technical advances and emerging applications. ACM Computing Surveys, 54(2), Article 35. https://doi.org/10.1145/3446705
  20. Kumar, P., & Singh, R. (2024). Preserving security in terms of authentication on blockchain-based wireless sensor networks. International Journal of Computer Networks and Applications, 11(1), 30-45. https://doi.org/10.5121/ijcna.2024.110103
  21. N. Patel & T. Shah. (2025). IoT authentication protocols: Classification, trends, and opportunities. Computer Standards & Interfaces, 89, 103632. https://doi.org/10.1016/j.csi.2025.103632
  22. Singh, A., & Jindal, N. (2024). Lightweight blockchain-based remote user authentication for fog computing in IoT. Computer Networks, 221, 109449. https://doi.org/10.1016/j.comnet.2024.109449
  23. Wang, X., Garg, S., Lin, H., Piran, M. J., Hu, J., & Hossain, M. S. (2021). Enabling secure authentication in industrial IoT with transfer learning empowered blockchain. IEEE Transactions on Industrial Informatics, 17(11), 7725–7733. https://doi.org/10.1109/TII.2021.3068198
Index Terms

Computer Science
Information Sciences

Keywords

Data transfer security Blockchain technology Authentication protocol Multi-step verification Brute-force mitigation Network resilience