Publication:
Smart verification algorithm for IoT applications using QR tag

dc.citedby5
dc.contributor.authorAl-Ghaili A.M.en_US
dc.contributor.authorKasim H.en_US
dc.contributor.authorRahim F.A.en_US
dc.contributor.authorIbrahim Z.-A.en_US
dc.contributor.authorOthman M.en_US
dc.contributor.authorHassan Z.en_US
dc.contributor.authorid26664381500en_US
dc.contributor.authorid57203863798en_US
dc.contributor.authorid57350579500en_US
dc.contributor.authorid57203863738en_US
dc.contributor.authorid24824928800en_US
dc.contributor.authorid13607947600en_US
dc.date.accessioned2023-05-29T07:31:07Z
dc.date.available2023-05-29T07:31:07Z
dc.date.issued2019
dc.descriptionElectrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of thingsen_US
dc.description.abstractA Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA�s robustness against unauthorized access�s attempts and brute force attack. � Springer Nature Singapore Pte Ltd. 2019.en_US
dc.description.natureFinalen_US
dc.identifier.doi10.1007/978-981-13-2622-6_11
dc.identifier.epage116
dc.identifier.scopus2-s2.0-85053232810
dc.identifier.spage107
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85053232810&doi=10.1007%2f978-981-13-2622-6_11&partnerID=40&md5=0ad38463d99d69df4f3809933b253142
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/25055
dc.identifier.volume481
dc.publisherSpringer Verlagen_US
dc.sourceScopus
dc.sourcetitleLecture Notes in Electrical Engineering
dc.titleSmart verification algorithm for IoT applications using QR tagen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
Files
Collections