Smart verification algorithm for IoT applications using QR tag

Abbas M. Al-Ghaili, Hairoladenan Kasim, Fiza Abdul Rahim, Zul Azri Ibrahim, Marini Othman, Zainuddin Hassan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA’s robustness against unauthorized access’s attempts and brute force attack.

Original languageEnglish
Title of host publicationComputational Science and Technology - 5th ICCST 2018
EditorsRayner Alfred, Ag Asri Ag Ibrahim, Yuto Lim, Patricia Anthony
PublisherSpringer Verlag
Pages107-116
Number of pages10
ISBN (Print)9789811326219
DOIs
Publication statusPublished - 01 Jan 2019
Event5th International Conference on Computational Science and Technology, ICCST 2018 - Kota Kinabalu, Malaysia
Duration: 29 Aug 201830 Aug 2018

Publication series

NameLecture Notes in Electrical Engineering
Volume481
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Other

Other5th International Conference on Computational Science and Technology, ICCST 2018
CountryMalaysia
CityKota Kinabalu
Period29/08/1830/08/18

Fingerprint

Internet of things

All Science Journal Classification (ASJC) codes

  • Industrial and Manufacturing Engineering

Cite this

Al-Ghaili, A. M., Kasim, H., Abdul Rahim, F., Ibrahim, Z. A., Othman, M., & Hassan, Z. (2019). Smart verification algorithm for IoT applications using QR tag. In R. Alfred, A. A. A. Ibrahim, Y. Lim, & P. Anthony (Eds.), Computational Science and Technology - 5th ICCST 2018 (pp. 107-116). (Lecture Notes in Electrical Engineering; Vol. 481). Springer Verlag. https://doi.org/10.1007/978-981-13-2622-6_11
Al-Ghaili, Abbas M. ; Kasim, Hairoladenan ; Abdul Rahim, Fiza ; Ibrahim, Zul Azri ; Othman, Marini ; Hassan, Zainuddin. / Smart verification algorithm for IoT applications using QR tag. Computational Science and Technology - 5th ICCST 2018. editor / Rayner Alfred ; Ag Asri Ag Ibrahim ; Yuto Lim ; Patricia Anthony. Springer Verlag, 2019. pp. 107-116 (Lecture Notes in Electrical Engineering).
@inproceedings{e20e3bdca71c4c1fa0b0ba980cbe85f8,
title = "Smart verification algorithm for IoT applications using QR tag",
abstract = "A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA’s robustness against unauthorized access’s attempts and brute force attack.",
author = "Al-Ghaili, {Abbas M.} and Hairoladenan Kasim and {Abdul Rahim}, Fiza and Ibrahim, {Zul Azri} and Marini Othman and Zainuddin Hassan",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-981-13-2622-6_11",
language = "English",
isbn = "9789811326219",
series = "Lecture Notes in Electrical Engineering",
publisher = "Springer Verlag",
pages = "107--116",
editor = "Rayner Alfred and Ibrahim, {Ag Asri Ag} and Yuto Lim and Patricia Anthony",
booktitle = "Computational Science and Technology - 5th ICCST 2018",
address = "Germany",

}

Al-Ghaili, AM, Kasim, H, Abdul Rahim, F, Ibrahim, ZA, Othman, M & Hassan, Z 2019, Smart verification algorithm for IoT applications using QR tag. in R Alfred, AAA Ibrahim, Y Lim & P Anthony (eds), Computational Science and Technology - 5th ICCST 2018. Lecture Notes in Electrical Engineering, vol. 481, Springer Verlag, pp. 107-116, 5th International Conference on Computational Science and Technology, ICCST 2018, Kota Kinabalu, Malaysia, 29/08/18. https://doi.org/10.1007/978-981-13-2622-6_11

Smart verification algorithm for IoT applications using QR tag. / Al-Ghaili, Abbas M.; Kasim, Hairoladenan; Abdul Rahim, Fiza; Ibrahim, Zul Azri; Othman, Marini; Hassan, Zainuddin.

Computational Science and Technology - 5th ICCST 2018. ed. / Rayner Alfred; Ag Asri Ag Ibrahim; Yuto Lim; Patricia Anthony. Springer Verlag, 2019. p. 107-116 (Lecture Notes in Electrical Engineering; Vol. 481).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Smart verification algorithm for IoT applications using QR tag

AU - Al-Ghaili, Abbas M.

AU - Kasim, Hairoladenan

AU - Abdul Rahim, Fiza

AU - Ibrahim, Zul Azri

AU - Othman, Marini

AU - Hassan, Zainuddin

PY - 2019/1/1

Y1 - 2019/1/1

N2 - A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA’s robustness against unauthorized access’s attempts and brute force attack.

AB - A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA’s robustness against unauthorized access’s attempts and brute force attack.

UR - http://www.scopus.com/inward/record.url?scp=85053232810&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85053232810&partnerID=8YFLogxK

U2 - 10.1007/978-981-13-2622-6_11

DO - 10.1007/978-981-13-2622-6_11

M3 - Conference contribution

AN - SCOPUS:85053232810

SN - 9789811326219

T3 - Lecture Notes in Electrical Engineering

SP - 107

EP - 116

BT - Computational Science and Technology - 5th ICCST 2018

A2 - Alfred, Rayner

A2 - Ibrahim, Ag Asri Ag

A2 - Lim, Yuto

A2 - Anthony, Patricia

PB - Springer Verlag

ER -

Al-Ghaili AM, Kasim H, Abdul Rahim F, Ibrahim ZA, Othman M, Hassan Z. Smart verification algorithm for IoT applications using QR tag. In Alfred R, Ibrahim AAA, Lim Y, Anthony P, editors, Computational Science and Technology - 5th ICCST 2018. Springer Verlag. 2019. p. 107-116. (Lecture Notes in Electrical Engineering). https://doi.org/10.1007/978-981-13-2622-6_11