
Selection of a rational authentication method for the remote systems of interaction with the vessels
Author(s) -
Vladimir V. Karetnikov,
Артем Буцанец,
Anastasiya V. Mitrofanova
Publication year - 2019
Publication title -
iop conference series. earth and environmental science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.179
H-Index - 26
eISSN - 1755-1307
pISSN - 1755-1315
DOI - 10.1088/1755-1315/378/1/012090
Subject(s) - password , computer science , authentication (law) , computer security , authentication protocol , password policy , cryptography , challenge–response authentication , encryption , remote control , one time password , operating system
Scientific and technical progress in the development and creation of software and hardware systems has a positive effect on improving the efficiency of water transport operation. The developed systems solve both general and particular tasks. Remote technical condition monitoring systems are used to solve particular problems, for example, to control fuel consumption. The vessels remote control systems are considered as larger ones. Obviously, only wireless means of communication between the remote user (operator) and the vessel are provided in them. The purpose of the paper is to determine a rational approach to ensure the information security for the remote systems of interaction with vessels. The main approaches to ensure the safe use of resources (Password authentication and authentication with one-time passwords, biometric authentication, authentication with a public key, authentication protocols and cryptographic methods) are considered and evaluated by the expert assessments method. Information security threats for the above-mentioned systems of remote interaction with the vessels are highlighted. It has been determined that for remote control systems it is highly expediently to use the cryptography methods with encryption, and for the remote technical condition monitoring such protection is not expedient, but the password authentication (including authentication with one-time password) is sufficient. Further directions of researches will be the elaboration of the specific solutions for selected means of security providing.