A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems

Abbas M. Al-Ghaili, Hairoladenan Kasim, Marini Othman, Zainuddin Hassan

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA’s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA.

Original languageEnglish
Title of host publicationIntelligent Systems Reference Library
PublisherSpringer Science and Business Media Deutschland GmbH
Pages77-103
Number of pages27
DOIs
Publication statusPublished - 01 Jan 2019

Publication series

NameIntelligent Systems Reference Library
Volume154
ISSN (Print)1868-4394
ISSN (Electronic)1868-4408

Fingerprint

Cryptography
Internet
time factor
Security systems
integrity
Internet of things
Quick response
Conception
Tag
Encryption
Availability
evaluation
performance
Values
Robustness

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Information Systems and Management
  • Library and Information Sciences

Cite this

Al-Ghaili, A. M., Kasim, H., Othman, M., & Hassan, Z. (2019). A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems. In Intelligent Systems Reference Library (pp. 77-103). (Intelligent Systems Reference Library; Vol. 154). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-04203-5_5
Al-Ghaili, Abbas M. ; Kasim, Hairoladenan ; Othman, Marini ; Hassan, Zainuddin. / A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems. Intelligent Systems Reference Library. Springer Science and Business Media Deutschland GmbH, 2019. pp. 77-103 (Intelligent Systems Reference Library).
@inbook{575a0a9bc8574114a202b8495e9fbade,
title = "A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems",
abstract = "A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA’s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA.",
author = "Al-Ghaili, {Abbas M.} and Hairoladenan Kasim and Marini Othman and Zainuddin Hassan",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-3-030-04203-5_5",
language = "English",
series = "Intelligent Systems Reference Library",
publisher = "Springer Science and Business Media Deutschland GmbH",
pages = "77--103",
booktitle = "Intelligent Systems Reference Library",
address = "Germany",

}

Al-Ghaili, AM, Kasim, H, Othman, M & Hassan, Z 2019, A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems. in Intelligent Systems Reference Library. Intelligent Systems Reference Library, vol. 154, Springer Science and Business Media Deutschland GmbH, pp. 77-103. https://doi.org/10.1007/978-3-030-04203-5_5

A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems. / Al-Ghaili, Abbas M.; Kasim, Hairoladenan; Othman, Marini; Hassan, Zainuddin.

Intelligent Systems Reference Library. Springer Science and Business Media Deutschland GmbH, 2019. p. 77-103 (Intelligent Systems Reference Library; Vol. 154).

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems

AU - Al-Ghaili, Abbas M.

AU - Kasim, Hairoladenan

AU - Othman, Marini

AU - Hassan, Zainuddin

PY - 2019/1/1

Y1 - 2019/1/1

N2 - A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA’s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA.

AB - A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA’s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA.

UR - http://www.scopus.com/inward/record.url?scp=85060183621&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85060183621&partnerID=8YFLogxK

U2 - 10.1007/978-3-030-04203-5_5

DO - 10.1007/978-3-030-04203-5_5

M3 - Chapter

T3 - Intelligent Systems Reference Library

SP - 77

EP - 103

BT - Intelligent Systems Reference Library

PB - Springer Science and Business Media Deutschland GmbH

ER -

Al-Ghaili AM, Kasim H, Othman M, Hassan Z. A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems. In Intelligent Systems Reference Library. Springer Science and Business Media Deutschland GmbH. 2019. p. 77-103. (Intelligent Systems Reference Library). https://doi.org/10.1007/978-3-030-04203-5_5