A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems

A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a se...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.
Other Authors: 26664381500
Format: Book Chapter
Published: Springer Science and Business Media Deutschland GmbH 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-25042
record_format dspace
spelling my.uniten.dspace-250422023-05-29T15:30:54Z A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems Al-Ghaili A.M. Kasim H. Othman M. Hassan Z. 26664381500 57203863798 24824928800 13607947600 A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA�s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA. � Springer Nature Switzerland AG 2019. Final 2023-05-29T07:30:53Z 2023-05-29T07:30:53Z 2019 Book Chapter 10.1007/978-3-030-04203-5_5 2-s2.0-85060183621 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85060183621&doi=10.1007%2f978-3-030-04203-5_5&partnerID=40&md5=73dbe946477d2c85687fe300097f42e6 https://irepository.uniten.edu.my/handle/123456789/25042 154 77 103 Springer Science and Business Media Deutschland GmbH Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA�s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA. � Springer Nature Switzerland AG 2019.
author2 26664381500
author_facet 26664381500
Al-Ghaili A.M.
Kasim H.
Othman M.
Hassan Z.
format Book Chapter
author Al-Ghaili A.M.
Kasim H.
Othman M.
Hassan Z.
spellingShingle Al-Ghaili A.M.
Kasim H.
Othman M.
Hassan Z.
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
author_sort Al-Ghaili A.M.
title A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
title_short A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
title_full A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
title_fullStr A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
title_full_unstemmed A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
title_sort new encryption scheme method (esm) using capsulated-layers conception for verified qr-tag for iot-based smart access systems
publisher Springer Science and Business Media Deutschland GmbH
publishDate 2023
_version_ 1806423425778974720
score 13.222552