Research Article
Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication Strategy
Table 1
Comparison of different types of authentication schemes.
| | Authentication schemes | Illustration |
| | Static | A predefined set of schemes for any dynamic environment | | Pseudo-static | A fixed solution is dynamically selected in different time scenarios | | Dynamic | Random | Schemes are selected randomly during authentication without any predetermined order | | Adaptive | Schemes are selected based on the current system, current environment state, and previous experience patterns |
|
|