AUTHENTICATION METHODS IN EMBEDDED SYSTEMS WITH LIMITED COMPUTING RESOURCES

Authors

DOI:

https://doi.org/10.31891/2219-9365-2025-81-4

Keywords:

authentication, embedded systems, limited resources, data security, passwords, OTP, tokens, MFA, lightweight cryptoalgorithms

Abstract

The article discusses various authentication methods used in embedded systems with limited computing resources. In today's world, the growing need for information technology security necessitates the implementation of effective data protection solutions. Embedded systems, as a rule, have limited capabilities in terms of memory, computing power and power consumption, which makes it difficult to implement complex authentication algorithms.

The article analyzes the main authentication approaches, including passwords, one-time codes (OTPs), tokens, and multi-factor authentication (MFA). Each of these methods has its advantages and disadvantages, which the authors consider in detail. Authentication using passwords, although an easy method to implement, is vulnerable to match-based attacks. This necessitates the implementation of more complex security policies.

At the same time, one-time codes generated for each authentication session provide an additional layer of protection, but their use may require additional resources for generation and verification. Tokens, both hardware and software, provide a higher level of security, but can be less convenient to use. Multi-factor authentication combines several methods, increasing security, but requires more resources and execution time, which can be critical for embedded systems.

The authors of the article conducted comprehensive testing of various authentication methods in order to evaluate their effectiveness according to three main parameters: speed, security and resource consumption. The results of the study show that authentication methods differ significantly in execution speed and energy consumption. For example, authentication with passwords proved to be the fastest but with the lowest level of security, while one-time codes and tokens offered a higher level of protection but required more time to process.

In conclusion, the article emphasizes the importance of choosing appropriate authentication methods that take into account the specifics of embedded systems. Recommendations from testing can be useful for developers and engineers working in the field, helping to balance security, speed, and resource efficiency. The study points to the need for further developments in the field of authentication to meet the needs of modern embedded systems and guarantee their reliability in the context of data security.

Published

2025-02-27

How to Cite

ROZLOMII І., FAURE Е., & NAUMENKO С. (2025). AUTHENTICATION METHODS IN EMBEDDED SYSTEMS WITH LIMITED COMPUTING RESOURCES. MEASURING AND COMPUTING DEVICES IN TECHNOLOGICAL PROCESSES, (1), 29–35. https://doi.org/10.31891/2219-9365-2025-81-4