Research Article
Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication Strategy
Table 1
Comparison of different types of authentication schemes.
| Authentication schemes | Illustration |
| Static | A predefined set of schemes for any dynamic environment | Pseudo-static | A fixed solution is dynamically selected in different time scenarios | Dynamic | Random | Schemes are selected randomly during authentication without any predetermined order | Adaptive | Schemes are selected based on the current system, current environment state, and previous experience patterns |
|
|