Preview

Herald of the Kazakh-British technical university

Advanced search

DEVELOPMENT OF AN AUTHENTICATION MODEL BASED ON THE SECOND FACTOR IN AN AUTOMATED CONTROL SYSTEM

Abstract

The article describes methods of two-factor authentication and considers an example of  its possible use in an automated control system. The example considers a sequential algorithm for generating a one-time password based on the received hash value based on the result of the selected mathematical function. To implement this algorithm, a two-factor authentication model has been developed.

About the Authors

О. Ussatova
Казахский Национальный университет им. аль-Фараби; Институт информационных и вычислительных технологий
Kazakhstan


S. Nyssanbayeva
Институт информационных и вычислительных технологий
Kazakhstan


W. Wojcik
Люблинский технический университет
Poland

Waldemar Woicik



References

1. Davydov A. E. (2015) “Protection and security of departmental integrated information and communication systems”, R. V Maximov, O. K. Savitsky - OJSC Voentelecom, 519 p.

2. Yuriev D. R., Rogova O. S. (2017) Comparative analysis oftwo-factor authentication [“Technical sciences - from theory to practice”], Novosibirsk: SibAK, pp. 46-51.

3. Nysanbaeva S. E., Usatova O. A. (2018) “Two-factor authentication in the automated control system” [“Computer Science and Applied Mathematics”] - Almaty, volume № 2, pp. 239-242.

4. National Institute of Standards and Technology (NIST) https://www.nist.gov/ (Date of the application 02. 07. 2018y.).

5. FIPS 140-2 standard and self-encryption technology / https://www.seagate.com/files/www.content/solutions-content/security-and-encryption/id/docs/faq-fips-sed-lr-mb-605-2-1302-ru.pdf.

6. Convenient and secure access to applications https://identityblitz.ru/products/blitzidentity-provider/?ref=main.

7. Two-factor authentication: What you need to know (FAQ) https://www.cnet.com/news/two-factor-authentication-what-you-need-to-know-faq.

8. D. Wang, P. Wang, and J. Liu (2014), “Improved privacy-preserving authentication scheme for roaming service in mobile networks,” in Proc. WCNC, April, pp. 3178-3183.


Review

For citations:


Ussatova О., Nyssanbayeva S., Wojcik W. DEVELOPMENT OF AN AUTHENTICATION MODEL BASED ON THE SECOND FACTOR IN AN AUTOMATED CONTROL SYSTEM. Herald of the Kazakh-British technical university. 2019;16(1):115-118.

Views: 302


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6688 (Print)
ISSN 2959-8109 (Online)