Skip to main content

Method Authentication of Objects Information Communication

  • Conference paper
  • First Online:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (NEW2AN 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13772))

Included in the following conference series:

  • 479 Accesses

Abstract

In this article, the issue of authentication of objects of information and communication systems based on mutual authentication, models of authentication of users of information and communication systems, the use a five-level authentication model in the control of access to computer systems, the use of blockchain technology in solving the problem of identification and authentication basics, working principle of Blockstack and uPort authentication protocols based on Blockchain technology, advantages and disadvantages of Blockstack, uPort authentication protocols are analyzed. In the given thesis questions of the authentication of objects of information-communication systems on the basis of mutual authenticate are considered. Also, the article considers the results obtained on the development of a model and algorithm for protecting an information system using two-factor authentication based on the generation of a one-time password. The proposed mathematical model of the information security system for user authentication based on the generation of a one-time password is described.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Edna Elizabeth, N., Nivetha, S.: Design of a two-factor authentication ticketing system for transit applications. In: IEEE Region 10 Conference (TENCON), pp. 2496–2502. Singapore (2016)

    Google Scholar 

  2. Babamir, F.S., Kirci, M.: Dynamic digest based authentication for client–server systems using biometric verification. Future Gener. Comput. Syst. 101, 112–126 (2019)

    Article  Google Scholar 

  3. Yu, Y., He, J., Zhu, N., Cai, F., Pathan, M.S.: A new method for identity authentication using mobile terminals. Procedia Comput. Sci. 131, 771–778 (2018)

    Article  Google Scholar 

  4. Иcxaкoв, A.Ю., Meщepякoв, P.B., Шeлyпaнoв, A.A., Иcxaкoв, C.Ю.: Coвpeмeнныe мeтoды и cпocoбы идeнтификaции. Teopия и пpaктикa. – Toмcк: TГУCУP 114 (2016)

    Google Scholar 

  5. Иcxaкoв, A.Ю: Cиcтeмa двyxфaктopнoй ayтeнтификaции нa ocнoвe QR кoдoв. Бeзoпacнocть инфopмaциoнныx тexнoлoгий 3, 97–101 (2014)

    Google Scholar 

  6. Evseev, S.P., Tomashevskyy, B.P.: Two-factor authentication methods threats analysis. Radio Electron. Comput. Sci. Control 1(32), 52–59 (2015)

    Google Scholar 

  7. Juraev, G., Rakhimberdiev, K.: Mathematical modeling of credit scoring system based on the Monge-Kantorovich problem. In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), pp. 1–7. IEEE (2022)

    Google Scholar 

  8. Umarovich, J.G., Bakhtiyorovich, R.K.: Modeling the decision-making process of lenders based on blockchain technology. In: 2021 International Conference on Information Science and Communications Technologies (ICISCT), pp. 1–5. IEEE (2021)

    Google Scholar 

  9. Juraev, G., Rakhimberdiev, K.: Prospects of application of blockchain technology in the banking. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1–5 (2022)

    Google Scholar 

  10. Karimov, M., Arzieva, J., Rakhimberdiev, K.: Development of approaches and schemes for proactive information protection in computer networks. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1–5 (2022)

    Google Scholar 

  11. Tashev, K., Arzieva, J., Arziev, A., Rakhimberdiev, K.: Method authentication of objects information communication systems. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1–5 (2022)

    Google Scholar 

  12. Arzieva, J., Arziev, A., Rakhimberdiev, K.: Application of random number generators in solving the problem of user authentication in blockchain systems. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1–5 (2022)

    Google Scholar 

  13. Sulak, F.: Cryptographic random testing of block ciphers and hash functions. Publication of the Middle East Technical University Ph.D. Examinations, pp. 7–39 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rakhimberdiev Kuvonchbek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kuvonchbek, R. (2023). Method Authentication of Objects Information Communication. In: Koucheryavy, Y., Aziz, A. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022. Lecture Notes in Computer Science, vol 13772. Springer, Cham. https://doi.org/10.1007/978-3-031-30258-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30258-9_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30257-2

  • Online ISBN: 978-3-031-30258-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics