Abstract
In this article, the issue of authentication of objects of information and communication systems based on mutual authentication, models of authentication of users of information and communication systems, the use a five-level authentication model in the control of access to computer systems, the use of blockchain technology in solving the problem of identification and authentication basics, working principle of Blockstack and uPort authentication protocols based on Blockchain technology, advantages and disadvantages of Blockstack, uPort authentication protocols are analyzed. In the given thesis questions of the authentication of objects of information-communication systems on the basis of mutual authenticate are considered. Also, the article considers the results obtained on the development of a model and algorithm for protecting an information system using two-factor authentication based on the generation of a one-time password. The proposed mathematical model of the information security system for user authentication based on the generation of a one-time password is described.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Edna Elizabeth, N., Nivetha, S.: Design of a two-factor authentication ticketing system for transit applications. In: IEEE Region 10 Conference (TENCON), pp. 2496–2502. Singapore (2016)
Babamir, F.S., Kirci, M.: Dynamic digest based authentication for client–server systems using biometric verification. Future Gener. Comput. Syst. 101, 112–126 (2019)
Yu, Y., He, J., Zhu, N., Cai, F., Pathan, M.S.: A new method for identity authentication using mobile terminals. Procedia Comput. Sci. 131, 771–778 (2018)
Иcxaкoв, A.Ю., Meщepякoв, P.B., Шeлyпaнoв, A.A., Иcxaкoв, C.Ю.: Coвpeмeнныe мeтoды и cпocoбы идeнтификaции. Teopия и пpaктикa. – Toмcк: TГУCУP 114 (2016)
Иcxaкoв, A.Ю: Cиcтeмa двyxфaктopнoй ayтeнтификaции нa ocнoвe QR кoдoв. Бeзoпacнocть инфopмaциoнныx тexнoлoгий 3, 97–101 (2014)
Evseev, S.P., Tomashevskyy, B.P.: Two-factor authentication methods threats analysis. Radio Electron. Comput. Sci. Control 1(32), 52–59 (2015)
Juraev, G., Rakhimberdiev, K.: Mathematical modeling of credit scoring system based on the Monge-Kantorovich problem. In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), pp. 1–7. IEEE (2022)
Umarovich, J.G., Bakhtiyorovich, R.K.: Modeling the decision-making process of lenders based on blockchain technology. In: 2021 International Conference on Information Science and Communications Technologies (ICISCT), pp. 1–5. IEEE (2021)
Juraev, G., Rakhimberdiev, K.: Prospects of application of blockchain technology in the banking. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1–5 (2022)
Karimov, M., Arzieva, J., Rakhimberdiev, K.: Development of approaches and schemes for proactive information protection in computer networks. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1–5 (2022)
Tashev, K., Arzieva, J., Arziev, A., Rakhimberdiev, K.: Method authentication of objects information communication systems. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1–5 (2022)
Arzieva, J., Arziev, A., Rakhimberdiev, K.: Application of random number generators in solving the problem of user authentication in blockchain systems. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1–5 (2022)
Sulak, F.: Cryptographic random testing of block ciphers and hash functions. Publication of the Middle East Technical University Ph.D. Examinations, pp. 7–39 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kuvonchbek, R. (2023). Method Authentication of Objects Information Communication. In: Koucheryavy, Y., Aziz, A. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022. Lecture Notes in Computer Science, vol 13772. Springer, Cham. https://doi.org/10.1007/978-3-031-30258-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-031-30258-9_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-30257-2
Online ISBN: 978-3-031-30258-9
eBook Packages: Computer ScienceComputer Science (R0)