Smart verification algorithm for IoT applications using QR tag

Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things

Saved in:
Bibliographic Details
Main Authors: Al-Ghaili A.M., Kasim H., Rahim F.A., Ibrahim Z.-A., Othman M., Hassan Z.
Other Authors: 26664381500
Format: Conference Paper
Published: Springer Verlag 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-25055
record_format dspace
spelling my.uniten.dspace-250552023-05-29T15:31:07Z Smart verification algorithm for IoT applications using QR tag Al-Ghaili A.M. Kasim H. Rahim F.A. Ibrahim Z.-A. Othman M. Hassan Z. 26664381500 57203863798 57350579500 57203863738 24824928800 13607947600 Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA�s robustness against unauthorized access�s attempts and brute force attack. � Springer Nature Singapore Pte Ltd. 2019. Final 2023-05-29T07:31:07Z 2023-05-29T07:31:07Z 2019 Conference Paper 10.1007/978-981-13-2622-6_11 2-s2.0-85053232810 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053232810&doi=10.1007%2f978-981-13-2622-6_11&partnerID=40&md5=0ad38463d99d69df4f3809933b253142 https://irepository.uniten.edu.my/handle/123456789/25055 481 107 116 Springer Verlag Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things
author2 26664381500
author_facet 26664381500
Al-Ghaili A.M.
Kasim H.
Rahim F.A.
Ibrahim Z.-A.
Othman M.
Hassan Z.
format Conference Paper
author Al-Ghaili A.M.
Kasim H.
Rahim F.A.
Ibrahim Z.-A.
Othman M.
Hassan Z.
spellingShingle Al-Ghaili A.M.
Kasim H.
Rahim F.A.
Ibrahim Z.-A.
Othman M.
Hassan Z.
Smart verification algorithm for IoT applications using QR tag
author_sort Al-Ghaili A.M.
title Smart verification algorithm for IoT applications using QR tag
title_short Smart verification algorithm for IoT applications using QR tag
title_full Smart verification algorithm for IoT applications using QR tag
title_fullStr Smart verification algorithm for IoT applications using QR tag
title_full_unstemmed Smart verification algorithm for IoT applications using QR tag
title_sort smart verification algorithm for iot applications using qr tag
publisher Springer Verlag
publishDate 2023
_version_ 1806425548026544128
score 13.214268