QR Tag based Verification Method for Smart IoT Applications

A Quick Response (QR) tag based Verification Method (QRVM) used with Internet of Things (IoT) applications is proposed to verify and enable authorized requests by user to access a smart IoTbased application.QR-tag encrypted values are compared to original values. Three-layers have been proposed to...

Full description

Bibliographic Details
Main Authors: Al-Ghaili, Abbas M., Kasim, Hairoladenan, Othman, Marini, Hassan, Zainuddin
Format: Conference or Workshop Item
Language:English
Published: 2018
Subjects:
Online Access:https://repo.uum.edu.my/id/eprint/25219/1/KMICE%202018%20161%20167.pdf
_version_ 1803628890512424960
author Al-Ghaili, Abbas M.
Kasim, Hairoladenan
Othman, Marini
Hassan, Zainuddin
author_facet Al-Ghaili, Abbas M.
Kasim, Hairoladenan
Othman, Marini
Hassan, Zainuddin
author_sort Al-Ghaili, Abbas M.
collection UUM
description A Quick Response (QR) tag based Verification Method (QRVM) used with Internet of Things (IoT) applications is proposed to verify and enable authorized requests by user to access a smart IoTbased application.QR-tag encrypted values are compared to original values. Three-layers have been proposed to attain security objectives. The first layer relates to the IoT-based application’s integrity by performing a verification procedure to QR-tag’s contents. The second layer concerns the availability whereas user’s information are stored in offline database to disable any access caused by threats.The third one periodically generates an authenticated QR tag using 1-session private key to prevent both information leakage to attain it confidential.The QRVM aims to increase the IoTbased application privacy.The QRVM contribution is that it is useful to verify requests that need permissions to access such IoT automatic access systems and smart home applications. QRVM is evaluated in terms of security factors e.g., availability. Results confirmed it is faster than other competitive methods. In addition, results discussed QRVM’s robustness against unauthorized access’s attempts and brute force attack.
first_indexed 2024-07-04T06:29:09Z
format Conference or Workshop Item
id uum-25219
institution Universiti Utara Malaysia
language English
last_indexed 2024-07-04T06:29:09Z
publishDate 2018
record_format dspace
spelling uum-252192018-11-25T02:34:27Z https://repo.uum.edu.my/id/eprint/25219/ QR Tag based Verification Method for Smart IoT Applications Al-Ghaili, Abbas M. Kasim, Hairoladenan Othman, Marini Hassan, Zainuddin QA75 Electronic computers. Computer science A Quick Response (QR) tag based Verification Method (QRVM) used with Internet of Things (IoT) applications is proposed to verify and enable authorized requests by user to access a smart IoTbased application.QR-tag encrypted values are compared to original values. Three-layers have been proposed to attain security objectives. The first layer relates to the IoT-based application’s integrity by performing a verification procedure to QR-tag’s contents. The second layer concerns the availability whereas user’s information are stored in offline database to disable any access caused by threats.The third one periodically generates an authenticated QR tag using 1-session private key to prevent both information leakage to attain it confidential.The QRVM aims to increase the IoTbased application privacy.The QRVM contribution is that it is useful to verify requests that need permissions to access such IoT automatic access systems and smart home applications. QRVM is evaluated in terms of security factors e.g., availability. Results confirmed it is faster than other competitive methods. In addition, results discussed QRVM’s robustness against unauthorized access’s attempts and brute force attack. 2018-07-25 Conference or Workshop Item PeerReviewed application/pdf en https://repo.uum.edu.my/id/eprint/25219/1/KMICE%202018%20161%20167.pdf Al-Ghaili, Abbas M. and Kasim, Hairoladenan and Othman, Marini and Hassan, Zainuddin (2018) QR Tag based Verification Method for Smart IoT Applications. In: Knowledge Management International Conference (KMICe) 2018, 25 –27 July 2018, Miri Sarawak, Malaysia. http://www.kmice.cms.net.my/ProcKMICe/KMICe2018/toc.html
spellingShingle QA75 Electronic computers. Computer science
Al-Ghaili, Abbas M.
Kasim, Hairoladenan
Othman, Marini
Hassan, Zainuddin
QR Tag based Verification Method for Smart IoT Applications
title QR Tag based Verification Method for Smart IoT Applications
title_full QR Tag based Verification Method for Smart IoT Applications
title_fullStr QR Tag based Verification Method for Smart IoT Applications
title_full_unstemmed QR Tag based Verification Method for Smart IoT Applications
title_short QR Tag based Verification Method for Smart IoT Applications
title_sort qr tag based verification method for smart iot applications
topic QA75 Electronic computers. Computer science
url https://repo.uum.edu.my/id/eprint/25219/1/KMICE%202018%20161%20167.pdf
work_keys_str_mv AT alghailiabbasm qrtagbasedverificationmethodforsmartiotapplications
AT kasimhairoladenan qrtagbasedverificationmethodforsmartiotapplications
AT othmanmarini qrtagbasedverificationmethodforsmartiotapplications
AT hassanzainuddin qrtagbasedverificationmethodforsmartiotapplications