Smart verification algorithm for IoT applications using QR tag

Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things

Saved in:
Bibliographic Details
Main Authors: Al-Ghaili A.M., Kasim H., Rahim F.A., Ibrahim Z.-A., Othman M., Hassan Z.
Other Authors: 26664381500
Format: Conference Paper
Published: Springer Verlag 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1833351220359593984
author Al-Ghaili A.M.
Kasim H.
Rahim F.A.
Ibrahim Z.-A.
Othman M.
Hassan Z.
author2 26664381500
author_facet 26664381500
Al-Ghaili A.M.
Kasim H.
Rahim F.A.
Ibrahim Z.-A.
Othman M.
Hassan Z.
author_sort Al-Ghaili A.M.
building UNITEN Library
collection Institutional Repository
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
continent Asia
country Malaysia
description Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things
format Conference Paper
id my.uniten.dspace-25055
institution Universiti Tenaga Nasional
publishDate 2023
publisher Springer Verlag
record_format dspace
spelling my.uniten.dspace-250552023-05-29T15:31:07Z Smart verification algorithm for IoT applications using QR tag Al-Ghaili A.M. Kasim H. Rahim F.A. Ibrahim Z.-A. Othman M. Hassan Z. 26664381500 57203863798 57350579500 57203863738 24824928800 13607947600 Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA�s robustness against unauthorized access�s attempts and brute force attack. � Springer Nature Singapore Pte Ltd. 2019. Final 2023-05-29T07:31:07Z 2023-05-29T07:31:07Z 2019 Conference Paper 10.1007/978-981-13-2622-6_11 2-s2.0-85053232810 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053232810&doi=10.1007%2f978-981-13-2622-6_11&partnerID=40&md5=0ad38463d99d69df4f3809933b253142 https://irepository.uniten.edu.my/handle/123456789/25055 481 107 116 Springer Verlag Scopus
spellingShingle Al-Ghaili A.M.
Kasim H.
Rahim F.A.
Ibrahim Z.-A.
Othman M.
Hassan Z.
Smart verification algorithm for IoT applications using QR tag
title Smart verification algorithm for IoT applications using QR tag
title_full Smart verification algorithm for IoT applications using QR tag
title_fullStr Smart verification algorithm for IoT applications using QR tag
title_full_unstemmed Smart verification algorithm for IoT applications using QR tag
title_short Smart verification algorithm for IoT applications using QR tag
title_sort smart verification algorithm for iot applications using qr tag
url_provider http://dspace.uniten.edu.my/