DEVELOPMENT OF AN AUTHENTICATION MODEL BASED ON THE SECOND FACTOR IN AN AUTOMATED CONTROL SYSTEM
Abstract
The article describes methods of two-factor authentication and considers an example of its possible use in an automated control system. The example considers a sequential algorithm for generating a one-time password based on the received hash value based on the result of the selected mathematical function. To implement this algorithm, a two-factor authentication model has been developed.
About the Authors
О. UssatovaKazakhstan
S. Nyssanbayeva
Kazakhstan
W. Wojcik
Poland
Waldemar Woicik
References
1. Davydov A. E. (2015) “Protection and security of departmental integrated information and communication systems”, R. V Maximov, O. K. Savitsky - OJSC Voentelecom, 519 p.
2. Yuriev D. R., Rogova O. S. (2017) Comparative analysis oftwo-factor authentication [“Technical sciences - from theory to practice”], Novosibirsk: SibAK, pp. 46-51.
3. Nysanbaeva S. E., Usatova O. A. (2018) “Two-factor authentication in the automated control system” [“Computer Science and Applied Mathematics”] - Almaty, volume № 2, pp. 239-242.
4. National Institute of Standards and Technology (NIST) https://www.nist.gov/ (Date of the application 02. 07. 2018y.).
5. FIPS 140-2 standard and self-encryption technology / https://www.seagate.com/files/www.content/solutions-content/security-and-encryption/id/docs/faq-fips-sed-lr-mb-605-2-1302-ru.pdf.
6. Convenient and secure access to applications https://identityblitz.ru/products/blitzidentity-provider/?ref=main.
7. Two-factor authentication: What you need to know (FAQ) https://www.cnet.com/news/two-factor-authentication-what-you-need-to-know-faq.
8. D. Wang, P. Wang, and J. Liu (2014), “Improved privacy-preserving authentication scheme for roaming service in mobile networks,” in Proc. WCNC, April, pp. 3178-3183.
Review
For citations:
Ussatova О., Nyssanbayeva S., Wojcik W. DEVELOPMENT OF AN AUTHENTICATION MODEL BASED ON THE SECOND FACTOR IN AN AUTOMATED CONTROL SYSTEM. Herald of the Kazakh-British technical university. 2019;16(1):115-118.