Research Article

Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication Strategy

Table 1

Comparison of different types of authentication schemes.

Authentication schemesIllustration

StaticA predefined set of schemes for any dynamic environment
Pseudo-staticA fixed solution is dynamically selected in different time scenarios
DynamicRandomSchemes are selected randomly during authentication without any predetermined order
AdaptiveSchemes are selected based on the current system, current environment state, and previous experience patterns