A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a se...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Book chapter |
Language: | English |
Published: |
2020
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-13255 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-132552020-03-17T05:28:22Z A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems Al-Ghaili, A.M. Kasim, H. Othman, M. Hassan, Z. A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA’s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA. © Springer Nature Switzerland AG 2019. 2020-02-03T03:31:22Z 2020-02-03T03:31:22Z 2019 Book chapter 10.1007/978-3-030-04203-5_5 en |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
language |
English |
description |
A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA’s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA. © Springer Nature Switzerland AG 2019. |
format |
Book chapter |
author |
Al-Ghaili, A.M. Kasim, H. Othman, M. Hassan, Z. |
spellingShingle |
Al-Ghaili, A.M. Kasim, H. Othman, M. Hassan, Z. A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems |
author_facet |
Al-Ghaili, A.M. Kasim, H. Othman, M. Hassan, Z. |
author_sort |
Al-Ghaili, A.M. |
title |
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems |
title_short |
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems |
title_full |
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems |
title_fullStr |
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems |
title_full_unstemmed |
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems |
title_sort |
new encryption scheme method (esm) using capsulated-layers conception for verified qr-tag for iot-based smart access systems |
publishDate |
2020 |
_version_ |
1662758836739506176 |
score |
13.214268 |