QR Tag based Verification Method for Smart IoT Applications
A Quick Response (QR) tag based Verification Method (QRVM) used with Internet of Things (IoT) applications is proposed to verify and enable authorized requests by user to access a smart IoTbased application.QR-tag encrypted values are compared to original values. Three-layers have been proposed to...
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/25219/1/KMICE%202018%20161%20167.pdf |
_version_ | 1825805246036705280 |
---|---|
author | Al-Ghaili, Abbas M. Kasim, Hairoladenan Othman, Marini Hassan, Zainuddin |
author_facet | Al-Ghaili, Abbas M. Kasim, Hairoladenan Othman, Marini Hassan, Zainuddin |
author_sort | Al-Ghaili, Abbas M. |
collection | UUM |
description | A Quick Response (QR) tag based Verification Method (QRVM) used with Internet of Things (IoT) applications is proposed to verify and enable authorized requests by user to access a smart IoTbased application.QR-tag encrypted values are compared to original values. Three-layers have
been proposed to attain security objectives. The
first layer relates to the IoT-based application’s
integrity by performing a verification procedure to QR-tag’s contents. The second layer concerns the availability whereas user’s information are stored in offline database to disable any access caused by threats.The third one periodically generates an authenticated QR tag using 1-session private key to prevent both information leakage to attain it confidential.The QRVM aims to increase the IoTbased application privacy.The QRVM contribution is that it is useful to verify requests that need permissions to access such IoT automatic access systems and smart home applications. QRVM is evaluated in terms of security factors e.g., availability. Results confirmed it is faster than other competitive methods. In addition, results discussed QRVM’s robustness against unauthorized access’s attempts and brute force attack. |
first_indexed | 2024-07-04T06:29:09Z |
format | Conference or Workshop Item |
id | uum-25219 |
institution | Universiti Utara Malaysia |
language | English |
last_indexed | 2024-07-04T06:29:09Z |
publishDate | 2018 |
record_format | eprints |
spelling | uum-252192018-11-25T02:34:27Z https://repo.uum.edu.my/id/eprint/25219/ QR Tag based Verification Method for Smart IoT Applications Al-Ghaili, Abbas M. Kasim, Hairoladenan Othman, Marini Hassan, Zainuddin QA75 Electronic computers. Computer science A Quick Response (QR) tag based Verification Method (QRVM) used with Internet of Things (IoT) applications is proposed to verify and enable authorized requests by user to access a smart IoTbased application.QR-tag encrypted values are compared to original values. Three-layers have been proposed to attain security objectives. The first layer relates to the IoT-based application’s integrity by performing a verification procedure to QR-tag’s contents. The second layer concerns the availability whereas user’s information are stored in offline database to disable any access caused by threats.The third one periodically generates an authenticated QR tag using 1-session private key to prevent both information leakage to attain it confidential.The QRVM aims to increase the IoTbased application privacy.The QRVM contribution is that it is useful to verify requests that need permissions to access such IoT automatic access systems and smart home applications. QRVM is evaluated in terms of security factors e.g., availability. Results confirmed it is faster than other competitive methods. In addition, results discussed QRVM’s robustness against unauthorized access’s attempts and brute force attack. 2018-07-25 Conference or Workshop Item PeerReviewed application/pdf en https://repo.uum.edu.my/id/eprint/25219/1/KMICE%202018%20161%20167.pdf Al-Ghaili, Abbas M. and Kasim, Hairoladenan and Othman, Marini and Hassan, Zainuddin (2018) QR Tag based Verification Method for Smart IoT Applications. In: Knowledge Management International Conference (KMICe) 2018, 25 –27 July 2018, Miri Sarawak, Malaysia. http://www.kmice.cms.net.my/ProcKMICe/KMICe2018/toc.html |
spellingShingle | QA75 Electronic computers. Computer science Al-Ghaili, Abbas M. Kasim, Hairoladenan Othman, Marini Hassan, Zainuddin QR Tag based Verification Method for Smart IoT Applications |
title | QR Tag based Verification Method for Smart IoT Applications |
title_full | QR Tag based Verification Method for Smart IoT Applications |
title_fullStr | QR Tag based Verification Method for Smart IoT Applications |
title_full_unstemmed | QR Tag based Verification Method for Smart IoT Applications |
title_short | QR Tag based Verification Method for Smart IoT Applications |
title_sort | qr tag based verification method for smart iot applications |
topic | QA75 Electronic computers. Computer science |
url | https://repo.uum.edu.my/id/eprint/25219/1/KMICE%202018%20161%20167.pdf |
work_keys_str_mv | AT alghailiabbasm qrtagbasedverificationmethodforsmartiotapplications AT kasimhairoladenan qrtagbasedverificationmethodforsmartiotapplications AT othmanmarini qrtagbasedverificationmethodforsmartiotapplications AT hassanzainuddin qrtagbasedverificationmethodforsmartiotapplications |