Smart verification algorithm for IoT applications using QR tag
Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things
Saved in:
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Conference Paper |
Published: |
Springer Verlag
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-25055 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-250552023-05-29T15:31:07Z Smart verification algorithm for IoT applications using QR tag Al-Ghaili A.M. Kasim H. Rahim F.A. Ibrahim Z.-A. Othman M. Hassan Z. 26664381500 57203863798 57350579500 57203863738 24824928800 13607947600 Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA�s robustness against unauthorized access�s attempts and brute force attack. � Springer Nature Singapore Pte Ltd. 2019. Final 2023-05-29T07:31:07Z 2023-05-29T07:31:07Z 2019 Conference Paper 10.1007/978-981-13-2622-6_11 2-s2.0-85053232810 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053232810&doi=10.1007%2f978-981-13-2622-6_11&partnerID=40&md5=0ad38463d99d69df4f3809933b253142 https://irepository.uniten.edu.my/handle/123456789/25055 481 107 116 Springer Verlag Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things |
author2 |
26664381500 |
author_facet |
26664381500 Al-Ghaili A.M. Kasim H. Rahim F.A. Ibrahim Z.-A. Othman M. Hassan Z. |
format |
Conference Paper |
author |
Al-Ghaili A.M. Kasim H. Rahim F.A. Ibrahim Z.-A. Othman M. Hassan Z. |
spellingShingle |
Al-Ghaili A.M. Kasim H. Rahim F.A. Ibrahim Z.-A. Othman M. Hassan Z. Smart verification algorithm for IoT applications using QR tag |
author_sort |
Al-Ghaili A.M. |
title |
Smart verification algorithm for IoT applications using QR tag |
title_short |
Smart verification algorithm for IoT applications using QR tag |
title_full |
Smart verification algorithm for IoT applications using QR tag |
title_fullStr |
Smart verification algorithm for IoT applications using QR tag |
title_full_unstemmed |
Smart verification algorithm for IoT applications using QR tag |
title_sort |
smart verification algorithm for iot applications using qr tag |
publisher |
Springer Verlag |
publishDate |
2023 |
_version_ |
1806425548026544128 |
score |
13.214268 |