QR Tag based Verification Method for Smart IoT Applications

A Quick Response (QR) tag based Verification Method (QRVM) used with Internet of Things (IoT) applications is proposed to verify and enable authorized requests by user to access a smart IoTbased application.QR-tag encrypted values are compared to original values. Three-layers have been proposed to...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Ghaili, Abbas M., Kasim, Hairoladenan, Othman, Marini, Hassan, Zainuddin
Format: Conference or Workshop Item
Language:English
Published: 2018
Subjects:
Online Access:http://repo.uum.edu.my/25219/1/KMICE%202018%20161%20167.pdf
http://repo.uum.edu.my/25219/
http://www.kmice.cms.net.my/ProcKMICe/KMICe2018/toc.html
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uum.repo.25219
record_format eprints
spelling my.uum.repo.252192018-11-25T02:34:27Z http://repo.uum.edu.my/25219/ QR Tag based Verification Method for Smart IoT Applications Al-Ghaili, Abbas M. Kasim, Hairoladenan Othman, Marini Hassan, Zainuddin QA75 Electronic computers. Computer science A Quick Response (QR) tag based Verification Method (QRVM) used with Internet of Things (IoT) applications is proposed to verify and enable authorized requests by user to access a smart IoTbased application.QR-tag encrypted values are compared to original values. Three-layers have been proposed to attain security objectives. The first layer relates to the IoT-based application’s integrity by performing a verification procedure to QR-tag’s contents. The second layer concerns the availability whereas user’s information are stored in offline database to disable any access caused by threats.The third one periodically generates an authenticated QR tag using 1-session private key to prevent both information leakage to attain it confidential.The QRVM aims to increase the IoTbased application privacy.The QRVM contribution is that it is useful to verify requests that need permissions to access such IoT automatic access systems and smart home applications. QRVM is evaluated in terms of security factors e.g., availability. Results confirmed it is faster than other competitive methods. In addition, results discussed QRVM’s robustness against unauthorized access’s attempts and brute force attack. 2018-07-25 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/25219/1/KMICE%202018%20161%20167.pdf Al-Ghaili, Abbas M. and Kasim, Hairoladenan and Othman, Marini and Hassan, Zainuddin (2018) QR Tag based Verification Method for Smart IoT Applications. In: Knowledge Management International Conference (KMICe) 2018, 25 –27 July 2018, Miri Sarawak, Malaysia. http://www.kmice.cms.net.my/ProcKMICe/KMICe2018/toc.html
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Al-Ghaili, Abbas M.
Kasim, Hairoladenan
Othman, Marini
Hassan, Zainuddin
QR Tag based Verification Method for Smart IoT Applications
description A Quick Response (QR) tag based Verification Method (QRVM) used with Internet of Things (IoT) applications is proposed to verify and enable authorized requests by user to access a smart IoTbased application.QR-tag encrypted values are compared to original values. Three-layers have been proposed to attain security objectives. The first layer relates to the IoT-based application’s integrity by performing a verification procedure to QR-tag’s contents. The second layer concerns the availability whereas user’s information are stored in offline database to disable any access caused by threats.The third one periodically generates an authenticated QR tag using 1-session private key to prevent both information leakage to attain it confidential.The QRVM aims to increase the IoTbased application privacy.The QRVM contribution is that it is useful to verify requests that need permissions to access such IoT automatic access systems and smart home applications. QRVM is evaluated in terms of security factors e.g., availability. Results confirmed it is faster than other competitive methods. In addition, results discussed QRVM’s robustness against unauthorized access’s attempts and brute force attack.
format Conference or Workshop Item
author Al-Ghaili, Abbas M.
Kasim, Hairoladenan
Othman, Marini
Hassan, Zainuddin
author_facet Al-Ghaili, Abbas M.
Kasim, Hairoladenan
Othman, Marini
Hassan, Zainuddin
author_sort Al-Ghaili, Abbas M.
title QR Tag based Verification Method for Smart IoT Applications
title_short QR Tag based Verification Method for Smart IoT Applications
title_full QR Tag based Verification Method for Smart IoT Applications
title_fullStr QR Tag based Verification Method for Smart IoT Applications
title_full_unstemmed QR Tag based Verification Method for Smart IoT Applications
title_sort qr tag based verification method for smart iot applications
publishDate 2018
url http://repo.uum.edu.my/25219/1/KMICE%202018%20161%20167.pdf
http://repo.uum.edu.my/25219/
http://www.kmice.cms.net.my/ProcKMICe/KMICe2018/toc.html
_version_ 1644284261689196544
score 13.18916