Blockchain Based Email Security to Mitigate Phishing Attack
DOI:
https://doi.org/10.69955/ajoeee.2024.v4i2.73Keywords:
Blockchain, Smart Contract, Email Security, Phishing Attack, Authentication, Decentralized SystemAbstract
Due to the rapid development of research in blockchain technology and cryptocurrencies, all sectors of an economy rely on their security essentials to mitigate various patterns of attack on the Internet. The smart contract is a transaction protocol that strengthens, verifies, and automatically enforces agreements after negotiation between multiple untrustworthy blockchain parties. Despite the positive aspects of smart contracts, issues of security risks, weaknesses, and legal challenges continue to undermine their implementation. This paper proposes an enhanced email verification system using blockchain-enabled smart contracts. In this framework, blockchain email enables swift verification of all emails being transmitted by introducing a challenging framework that prevents an internet attacker or cybercriminal from altering the authentication process. An acknowledgement email will be transmitted to the sender upon successful delivery, and the receiver can automatically receive the email with unique credentials. The findings reveal that the proposed system significantly mitigates phishing attacks by ensuring email authenticity and transaction integrity through blockchain hashing techniques, thereby enhancing email security in both online and offline environments.
Metrics
Downloads
References
[1] H. S. Al-Julandani and K. Al-Harthy, "Integrate Blockchain with Cloud Based Architecture to Prevent Phishing Attack," in 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 2022, pp. 1-6. https://doi.org/10.1109/ICRITO56286.2022.9964982
[2] B. Samuel and V. T. Somasundaran, "Prevention of Man-in-the-Middle Attacks using Blockchain VPN," unpublished.
[3] A. Alabdulatif, I. Khalil, and M. S. Rahman, "Security of Blockchain and AI-Empowered Smart Healthcare: Application-Based Analysis," Applied Sciences, vol. 12, no. 21, p. 11039, 2022. https://doi.org/10.3390/app122111039
[4] A. Chakraborty, A. Biswas, and A. K. Khan, "Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation," arXiv preprint arXiv:2209.13454, 2022. https://doi.org/10.1007/978-3-031-12419-8_1
[5] A. Pillai, A. V. Ramachandran, and V. Saraswat, "Design Considerations for Protection of Blockchain based Digital Identity Ecosystem," Journal of Information Assurance & Security, vol. 17, no. 3, pp. 171-180, 2022.
[6] G. R. Permana, T. E. Trowbridge, and B. Sherborne, "Ransomware Mitigation: An Analytical Investigation into the Effects and Trends of Ransomware Attacks on Global Business," unpublished, 2022. https://doi.org/10.31234/osf.io/ayc2d
[7] M. S. Kumar, S. Vimal, N. Z. Jhanjhi, S. S. Dhanabalan, and H. A. Alhumyani, "Blockchain based peer to peer communication in autonomous drone operation," Energy Reports, vol. 7, pp. 7925-7939, 2021. https://doi.org/10.1016/j.egyr.2021.08.073
[8] D. Piedrahita, J. Bermejo, and F. Machío, "A Secure Email Solution Based on Blockchain," in International Congress on Blockchain and Applications, Springer, Cham, 2021, pp. 355-358. https://doi.org/10.1007/978-3-030-86162-9_36
[9] M. M. Salama, "Using Blockchain Technology to Prevent Spoofing Attack in IoT Environment," International Journal of Computer Science and Network Security (IJCSNS), vol. 21, no. 3, pp. 51-58, 2021. https://doi.org/10.1201/9781003337393-8
[10] A. Pillai, A. V. Ramachandran, and V. Saraswat, "Design Considerations for Protection of Blockchain based Digital Identity Ecosystem," Journal of Information Assurance & Security, vol. 17, no. 3, pp. 171-180, 2022.
[11] A. Bhardwaj, F. Al-Turjman, V. Sapra, M. Kumar, and T. Stephan, "Privacy-aware detection framework to mitigate new-age phishing attacks," Computers & Electrical Engineering, vol. 96, p. 107546, 2021. https://doi.org/10.1016/j.compeleceng.2021.107546
[12] H. Abroshan, J. Devos, G. Poels, and E. Laermans, "Phishing happens beyond technology: the effects of human behaviors and demographics on each step of a phishing process," IEEE Access, vol. 9, pp. 44928-44949, 2021. https://doi.org/10.1109/ACCESS.2021.3066383
[13] N. Mashtalyar, U. N. Ntaganzwa, T. Santos, S. Hakak, and S. Ray, "Social engineering attacks: Recent advances and challenges," in International Conference on Human-Computer Interaction, Springer, Cham, 2021, pp. 417-431. https://doi.org/10.1007/978-3-030-77392-2_27
[14] H. Abroshan, J. Devos, G. Poels, and E. Laermans, "Phishing happens beyond technology: the effects of human behaviors and demographics on each step of a phishing process," IEEE Access, vol. 9, pp. 44928-44949, 2021. https://doi.org/10.1109/ACCESS.2021.3066383
Downloads
Published
Issue
Section
License
Copyright (c) 2024 AlamBiblilo Publishers
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The Asian Journal of Electrical and Electronic Engineering journal is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.