QR code based authentication method for IoT applications using three security layers

A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Ghaili A.M., Kasim H., Othman M., Hashim W.
Other Authors: 26664381500
Format: Article
Published: Universitas Ahmad Dahlan 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-25704
record_format dspace
spelling my.uniten.dspace-257042023-05-29T16:13:02Z QR code based authentication method for IoT applications using three security layers Al-Ghaili A.M. Kasim H. Othman M. Hashim W. 26664381500 57203863798 24824928800 11440260100 A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users will scan QRC to access IoT applications. To authenticate contents of QRC, three procedures are applied. QRAM contributes to IoT automatic access systems or smart applications in terms of authentication and safety of access. QRAM is evaluated in term of security factors (e.g., authentication). Computation time of authentication procedures for several IoT applications has become a considerable issue. QRAM aims to reduce computation time consumed to authenticate each QRC. Some authentication techniques still face difficulties when an IoT application requires fast response to users; therefore, QRAM aims to enhance so to meet real-time applications. Thus, QRAM is compared to several competitive methods used to verify QRC in term of computation time. Results confirmed that QRAM is faster than other competitive techniques. Besides, results have shown a high level of complexity in term of decryption time needed to deduce private contents of QRC. QRAM also is robust against unauthorized requests of access. � 2020 Universitas Ahmad Dahlan. Final 2023-05-29T08:13:01Z 2023-05-29T08:13:01Z 2020 Article 10.12928/TELKOMNIKA.V18I4.14748 2-s2.0-85087607871 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85087607871&doi=10.12928%2fTELKOMNIKA.V18I4.14748&partnerID=40&md5=74749147b1f3f7788b0575f67d31e428 https://irepository.uniten.edu.my/handle/123456789/25704 18 4 2004 2011 All Open Access, Hybrid Gold, Green Universitas Ahmad Dahlan Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users will scan QRC to access IoT applications. To authenticate contents of QRC, three procedures are applied. QRAM contributes to IoT automatic access systems or smart applications in terms of authentication and safety of access. QRAM is evaluated in term of security factors (e.g., authentication). Computation time of authentication procedures for several IoT applications has become a considerable issue. QRAM aims to reduce computation time consumed to authenticate each QRC. Some authentication techniques still face difficulties when an IoT application requires fast response to users; therefore, QRAM aims to enhance so to meet real-time applications. Thus, QRAM is compared to several competitive methods used to verify QRC in term of computation time. Results confirmed that QRAM is faster than other competitive techniques. Besides, results have shown a high level of complexity in term of decryption time needed to deduce private contents of QRC. QRAM also is robust against unauthorized requests of access. � 2020 Universitas Ahmad Dahlan.
author2 26664381500
author_facet 26664381500
Al-Ghaili A.M.
Kasim H.
Othman M.
Hashim W.
format Article
author Al-Ghaili A.M.
Kasim H.
Othman M.
Hashim W.
spellingShingle Al-Ghaili A.M.
Kasim H.
Othman M.
Hashim W.
QR code based authentication method for IoT applications using three security layers
author_sort Al-Ghaili A.M.
title QR code based authentication method for IoT applications using three security layers
title_short QR code based authentication method for IoT applications using three security layers
title_full QR code based authentication method for IoT applications using three security layers
title_fullStr QR code based authentication method for IoT applications using three security layers
title_full_unstemmed QR code based authentication method for IoT applications using three security layers
title_sort qr code based authentication method for iot applications using three security layers
publisher Universitas Ahmad Dahlan
publishDate 2023
_version_ 1806428008078114816
score 13.214268