A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a se...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Book Chapter |
Published: |
Springer Science and Business Media Deutschland GmbH
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-25042 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-250422023-05-29T15:30:54Z A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems Al-Ghaili A.M. Kasim H. Othman M. Hassan Z. 26664381500 57203863798 24824928800 13607947600 A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA�s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA. � Springer Nature Switzerland AG 2019. Final 2023-05-29T07:30:53Z 2023-05-29T07:30:53Z 2019 Book Chapter 10.1007/978-3-030-04203-5_5 2-s2.0-85060183621 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85060183621&doi=10.1007%2f978-3-030-04203-5_5&partnerID=40&md5=73dbe946477d2c85687fe300097f42e6 https://irepository.uniten.edu.my/handle/123456789/25042 154 77 103 Springer Science and Business Media Deutschland GmbH Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA�s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA. � Springer Nature Switzerland AG 2019. |
author2 |
26664381500 |
author_facet |
26664381500 Al-Ghaili A.M. Kasim H. Othman M. Hassan Z. |
format |
Book Chapter |
author |
Al-Ghaili A.M. Kasim H. Othman M. Hassan Z. |
spellingShingle |
Al-Ghaili A.M. Kasim H. Othman M. Hassan Z. A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems |
author_sort |
Al-Ghaili A.M. |
title |
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems |
title_short |
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems |
title_full |
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems |
title_fullStr |
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems |
title_full_unstemmed |
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems |
title_sort |
new encryption scheme method (esm) using capsulated-layers conception for verified qr-tag for iot-based smart access systems |
publisher |
Springer Science and Business Media Deutschland GmbH |
publishDate |
2023 |
_version_ |
1806423425778974720 |
score |
13.222552 |