QR code based authentication method for IoT applications using three security layers
A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Published: |
Universitas Ahmad Dahlan
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-25704 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-257042023-05-29T16:13:02Z QR code based authentication method for IoT applications using three security layers Al-Ghaili A.M. Kasim H. Othman M. Hashim W. 26664381500 57203863798 24824928800 11440260100 A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users will scan QRC to access IoT applications. To authenticate contents of QRC, three procedures are applied. QRAM contributes to IoT automatic access systems or smart applications in terms of authentication and safety of access. QRAM is evaluated in term of security factors (e.g., authentication). Computation time of authentication procedures for several IoT applications has become a considerable issue. QRAM aims to reduce computation time consumed to authenticate each QRC. Some authentication techniques still face difficulties when an IoT application requires fast response to users; therefore, QRAM aims to enhance so to meet real-time applications. Thus, QRAM is compared to several competitive methods used to verify QRC in term of computation time. Results confirmed that QRAM is faster than other competitive techniques. Besides, results have shown a high level of complexity in term of decryption time needed to deduce private contents of QRC. QRAM also is robust against unauthorized requests of access. � 2020 Universitas Ahmad Dahlan. Final 2023-05-29T08:13:01Z 2023-05-29T08:13:01Z 2020 Article 10.12928/TELKOMNIKA.V18I4.14748 2-s2.0-85087607871 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85087607871&doi=10.12928%2fTELKOMNIKA.V18I4.14748&partnerID=40&md5=74749147b1f3f7788b0575f67d31e428 https://irepository.uniten.edu.my/handle/123456789/25704 18 4 2004 2011 All Open Access, Hybrid Gold, Green Universitas Ahmad Dahlan Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users will scan QRC to access IoT applications. To authenticate contents of QRC, three procedures are applied. QRAM contributes to IoT automatic access systems or smart applications in terms of authentication and safety of access. QRAM is evaluated in term of security factors (e.g., authentication). Computation time of authentication procedures for several IoT applications has become a considerable issue. QRAM aims to reduce computation time consumed to authenticate each QRC. Some authentication techniques still face difficulties when an IoT application requires fast response to users; therefore, QRAM aims to enhance so to meet real-time applications. Thus, QRAM is compared to several competitive methods used to verify QRC in term of computation time. Results confirmed that QRAM is faster than other competitive techniques. Besides, results have shown a high level of complexity in term of decryption time needed to deduce private contents of QRC. QRAM also is robust against unauthorized requests of access. � 2020 Universitas Ahmad Dahlan. |
author2 |
26664381500 |
author_facet |
26664381500 Al-Ghaili A.M. Kasim H. Othman M. Hashim W. |
format |
Article |
author |
Al-Ghaili A.M. Kasim H. Othman M. Hashim W. |
spellingShingle |
Al-Ghaili A.M. Kasim H. Othman M. Hashim W. QR code based authentication method for IoT applications using three security layers |
author_sort |
Al-Ghaili A.M. |
title |
QR code based authentication method for IoT applications using three security layers |
title_short |
QR code based authentication method for IoT applications using three security layers |
title_full |
QR code based authentication method for IoT applications using three security layers |
title_fullStr |
QR code based authentication method for IoT applications using three security layers |
title_full_unstemmed |
QR code based authentication method for IoT applications using three security layers |
title_sort |
qr code based authentication method for iot applications using three security layers |
publisher |
Universitas Ahmad Dahlan |
publishDate |
2023 |
_version_ |
1806428008078114816 |
score |
13.214268 |