APPLICATION OF MULTI-FACTOR AUTHENTICATION TO ENSURE KEY INFRASTRUCTURE RESILIENCE IN DISTRIBUTED LEDGER TECHNOLOGY SYSTEMS TO SOME DESTRUCTIVE INFLUENCES
Abstract and keywords
Abstract (English):
The paper considers the solution of the problem of ensuring the resistance of key infrastructure in distributed registry systems to some destructive influences with the help of multi-factor authentication. Potentially possible destructive influences depending on defects in authentication systems, in particular on network nodes, are presented. Possible methods of providing resistance against such destructive influences are analyzed.

Keywords:
distributed ledger technology, key infrastructure, multi-factor authentication, resistance to destructive influences
References

1. Novikov A. L. Organizaciya mnogofaktornoy autentifikacii pol'zovateley v korporativnoy seti // Mezhdunarodnyy nauchnyy zhurnal “VESTNIK NAUKI” №6 (63). URL: https://cyberleninka.ru/article/n/organizatsiya-mnogofaktornoy-autentifikatsii-polzovateley-v-korporativnoy-seti/ (data obrascheniya: 09.09.2024)

2. Shishkin S. R., Ratushnyaya E. S., Basyrov I. I., Bogach E. V., Ustinova E. V. Ocenka problem i poisk putey resheniya pri ispol'zovanii tehnologii blokcheyn v avtorizacii pol'zovateley // Innovacii i investicii. 2023. №3. URL: https://cyberleninka.ru/article/n/otsenka-problem-i-poisk-putey-resheniya-pri-ispolzovanii-tehnologii-blokcheyn-v-avtorizatsii-polzovateley (data obrascheniya: 09.09.2024). EDN: https://elibrary.ru/WJSCQQ

3. Pankov K. N. Ispol'zovanie kriptograficheskih sredstv dlya skvoznyh cifrovyh tehnologiy na primere sistem raspredelennogo reestra // Tehnologii informacionnogo obschestva. Materialy XII Mezhdunarodnoy otraslevoy nauchno-tehnicheskoy konferencii. 2018. S. 365-366. EDN: https://elibrary.ru/UUHHSM

4. Fayzulin R.F., Demichev M.S., Markevich I.V., Ogol' A.R., Bondarev A.S. Dvuhfaktornaya autentifikaciya – sovremennye realii // Aktual'nye problemy aviacii i kosmonavtiki. 2022. URL: https://cyberleninka.ru/article/n/dvuhfaktornaya-autentifikatsiya-sovremennye-realii (data obrascheniya: 09.09.2024). EDN: https://elibrary.ru/MFXOMB

5. Golub V. A. Sistemy kontrolya dostupa: Uchebno-metodicheskoe posobie k kursu “Metody i sredstva zaschity informacii”. – Voronezh: Izd-vo VGU, 2004. – 15 s.

6. Plotkin A.S., Kesel' S.A., Repin M.M., Fedorov N.V. Analiz uyazvimostey sistem upravleniya klyuchami v raspredelennyh reestrah na primere blokcheyn IBM // Voprosy kiberbezopasnosti. - 2021. - №1(41). - S. 58-68.

7. Bonneau, J., Herley, C., Oorschot, P. C. van, & Stajano, F. (2012). The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. 2012 IEEE Symposium on Security and Privacy.

Login or Create
* Forgot password?