A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems

A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a se...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Ghaili, A.M., Kasim, H., Othman, M., Hassan, Z.
Format: Book chapter
Language:English
Published: 2020
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-13255
record_format dspace
spelling my.uniten.dspace-132552020-03-17T05:28:22Z A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems Al-Ghaili, A.M. Kasim, H. Othman, M. Hassan, Z. A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA’s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA. © Springer Nature Switzerland AG 2019. 2020-02-03T03:31:22Z 2020-02-03T03:31:22Z 2019 Book chapter 10.1007/978-3-030-04203-5_5 en
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
language English
description A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA’s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA. © Springer Nature Switzerland AG 2019.
format Book chapter
author Al-Ghaili, A.M.
Kasim, H.
Othman, M.
Hassan, Z.
spellingShingle Al-Ghaili, A.M.
Kasim, H.
Othman, M.
Hassan, Z.
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
author_facet Al-Ghaili, A.M.
Kasim, H.
Othman, M.
Hassan, Z.
author_sort Al-Ghaili, A.M.
title A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
title_short A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
title_full A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
title_fullStr A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
title_full_unstemmed A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
title_sort new encryption scheme method (esm) using capsulated-layers conception for verified qr-tag for iot-based smart access systems
publishDate 2020
_version_ 1662758836739506176
score 13.222552