| International Journal of Computer Applications |
| Foundation of Computer Science (FCS), NY, USA |
| Volume 187 - Number 76 |
| Year of Publication: 2026 |
| Authors: Shikhi Jain, Reena Dadhich |
10.5120/ijca2026926315
|
Shikhi Jain, Reena Dadhich . Beyond Traditional Security Measures: A Blockchain-based Solution for Robust Data Transfer and User Verification in Networks. International Journal of Computer Applications. 187, 76 ( Jan 2026), 52-56. DOI=10.5120/ijca2026926315
In the ever-expanding relational environments of modern computing, guaranteeing the safe transfer of sensitive data is an increasing challenge, especially as networks become more decentralized and threatened by a wide range of cyber threats. Past security paradigms relied upon centralized control, password-based authentication, and symmetric encryption technologies that have proved useful in certain scenarios, but have also been repeatedly proven insufficient against advanced threats like identity spoofing, data interception, and protocol exploitation. This paper outlines a blockchain based, multifactor authentication protocol to help mitigate data tampering, prevent unauthorized access, and guarantee the authenticity of entities that are communicating. The recommended protocol employs a Monitoring Node (MN), which maintains an immutable blockchain ledger of authorized devices' MAC addresses and hashed biometric identifiers, such as fingerprints or facial images. A multi-layered security architecture using blockchain-based verification, an image-based OTP (one-time password) authentication, transaction IDs, and cryptographic hash functions are employed to help secure both the sender and receiver in communication. The suggested approach of using an image-grid based OTP is noteworthy to help defend against both another brute-force guessing or phishing by jettisoning the image patterns between each session. The simulation-based performance testing indicates that, against typical classic encryption-based solutions, the least expected performance for this protocol is improved authentication times, lower rate of integrity failures and no unauthorized access attempts in the simulated context. The solution shows good applicability to resource-constrained domains such as Wireless Sensor Networks (WSNs) and the Internet of Things (IoT), where lightweight, but reliable, security solutions are requirements.