Security factors based evaluation of verification algorithm for an IoT access system

Abbas M. Al-Ghaili, Hairoladenan Kasim, Marini Othman, Zainuddin Hassan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

This paper proposes a verification algorithm (VA) used as an access tool for Internet-of-Things (IoT) systems. From a security aspect’s point of view, the VA has been evaluated in terms of security factors. To perform this evaluation, a Multiple-Layer Security Architecture (MLSA) has been used in order to attain the three security objectives which are: confidentiality, integrity, and availability. The VA aims to enable an authorized access to smart IoT applications such as smart city applications. The VA has adopted the Quick Response (QR) tag to encrypt values being used as a smart-key. Performance of the proposed algorithm has considered the security factors in order to strengthen the security side of such an IoT system. To evaluate the VA accuracy, a total number of 70 QR tags have been generated. Results have shown a high percentage of accuracy in terms of security for verified QR tags used as smart keys for IoT systems.

Original languageEnglish
Title of host publicationRecent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018
EditorsFathey Mohammed, Faisal Saeed, Nadhmi Gazem, Abdelsalam Busalim
PublisherSpringer Verlag
Pages384-395
Number of pages12
ISBN (Print)9783319990064
DOIs
Publication statusPublished - 01 Jan 2019
Event3rd International Conference of Reliable Information and Communication Technology, IRICT 2018 - Kuala Lumpur, Malaysia
Duration: 23 Jun 201824 Jun 2018

Publication series

NameAdvances in Intelligent Systems and Computing
Volume843
ISSN (Print)2194-5357

Other

Other3rd International Conference of Reliable Information and Communication Technology, IRICT 2018
CountryMalaysia
CityKuala Lumpur
Period23/06/1824/06/18

Fingerprint

Internet of things
Availability
Smart city

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)

Cite this

Al-Ghaili, A. M., Kasim, H., Othman, M., & Hassan, Z. (2019). Security factors based evaluation of verification algorithm for an IoT access system. In F. Mohammed, F. Saeed, N. Gazem, & A. Busalim (Eds.), Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018 (pp. 384-395). (Advances in Intelligent Systems and Computing; Vol. 843). Springer Verlag. https://doi.org/10.1007/978-3-319-99007-1_37
Al-Ghaili, Abbas M. ; Kasim, Hairoladenan ; Othman, Marini ; Hassan, Zainuddin. / Security factors based evaluation of verification algorithm for an IoT access system. Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. editor / Fathey Mohammed ; Faisal Saeed ; Nadhmi Gazem ; Abdelsalam Busalim. Springer Verlag, 2019. pp. 384-395 (Advances in Intelligent Systems and Computing).
@inproceedings{7eafa46085e744339c326eaeda2b61fe,
title = "Security factors based evaluation of verification algorithm for an IoT access system",
abstract = "This paper proposes a verification algorithm (VA) used as an access tool for Internet-of-Things (IoT) systems. From a security aspect’s point of view, the VA has been evaluated in terms of security factors. To perform this evaluation, a Multiple-Layer Security Architecture (MLSA) has been used in order to attain the three security objectives which are: confidentiality, integrity, and availability. The VA aims to enable an authorized access to smart IoT applications such as smart city applications. The VA has adopted the Quick Response (QR) tag to encrypt values being used as a smart-key. Performance of the proposed algorithm has considered the security factors in order to strengthen the security side of such an IoT system. To evaluate the VA accuracy, a total number of 70 QR tags have been generated. Results have shown a high percentage of accuracy in terms of security for verified QR tags used as smart keys for IoT systems.",
author = "Al-Ghaili, {Abbas M.} and Hairoladenan Kasim and Marini Othman and Zainuddin Hassan",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-3-319-99007-1_37",
language = "English",
isbn = "9783319990064",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer Verlag",
pages = "384--395",
editor = "Fathey Mohammed and Faisal Saeed and Nadhmi Gazem and Abdelsalam Busalim",
booktitle = "Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018",
address = "Germany",

}

Al-Ghaili, AM, Kasim, H, Othman, M & Hassan, Z 2019, Security factors based evaluation of verification algorithm for an IoT access system. in F Mohammed, F Saeed, N Gazem & A Busalim (eds), Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. Advances in Intelligent Systems and Computing, vol. 843, Springer Verlag, pp. 384-395, 3rd International Conference of Reliable Information and Communication Technology, IRICT 2018, Kuala Lumpur, Malaysia, 23/06/18. https://doi.org/10.1007/978-3-319-99007-1_37

Security factors based evaluation of verification algorithm for an IoT access system. / Al-Ghaili, Abbas M.; Kasim, Hairoladenan; Othman, Marini; Hassan, Zainuddin.

Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. ed. / Fathey Mohammed; Faisal Saeed; Nadhmi Gazem; Abdelsalam Busalim. Springer Verlag, 2019. p. 384-395 (Advances in Intelligent Systems and Computing; Vol. 843).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Security factors based evaluation of verification algorithm for an IoT access system

AU - Al-Ghaili, Abbas M.

AU - Kasim, Hairoladenan

AU - Othman, Marini

AU - Hassan, Zainuddin

PY - 2019/1/1

Y1 - 2019/1/1

N2 - This paper proposes a verification algorithm (VA) used as an access tool for Internet-of-Things (IoT) systems. From a security aspect’s point of view, the VA has been evaluated in terms of security factors. To perform this evaluation, a Multiple-Layer Security Architecture (MLSA) has been used in order to attain the three security objectives which are: confidentiality, integrity, and availability. The VA aims to enable an authorized access to smart IoT applications such as smart city applications. The VA has adopted the Quick Response (QR) tag to encrypt values being used as a smart-key. Performance of the proposed algorithm has considered the security factors in order to strengthen the security side of such an IoT system. To evaluate the VA accuracy, a total number of 70 QR tags have been generated. Results have shown a high percentage of accuracy in terms of security for verified QR tags used as smart keys for IoT systems.

AB - This paper proposes a verification algorithm (VA) used as an access tool for Internet-of-Things (IoT) systems. From a security aspect’s point of view, the VA has been evaluated in terms of security factors. To perform this evaluation, a Multiple-Layer Security Architecture (MLSA) has been used in order to attain the three security objectives which are: confidentiality, integrity, and availability. The VA aims to enable an authorized access to smart IoT applications such as smart city applications. The VA has adopted the Quick Response (QR) tag to encrypt values being used as a smart-key. Performance of the proposed algorithm has considered the security factors in order to strengthen the security side of such an IoT system. To evaluate the VA accuracy, a total number of 70 QR tags have been generated. Results have shown a high percentage of accuracy in terms of security for verified QR tags used as smart keys for IoT systems.

UR - http://www.scopus.com/inward/record.url?scp=85053917379&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85053917379&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-99007-1_37

DO - 10.1007/978-3-319-99007-1_37

M3 - Conference contribution

AN - SCOPUS:85053917379

SN - 9783319990064

T3 - Advances in Intelligent Systems and Computing

SP - 384

EP - 395

BT - Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018

A2 - Mohammed, Fathey

A2 - Saeed, Faisal

A2 - Gazem, Nadhmi

A2 - Busalim, Abdelsalam

PB - Springer Verlag

ER -

Al-Ghaili AM, Kasim H, Othman M, Hassan Z. Security factors based evaluation of verification algorithm for an IoT access system. In Mohammed F, Saeed F, Gazem N, Busalim A, editors, Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. Springer Verlag. 2019. p. 384-395. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-3-319-99007-1_37