Please use this identifier to cite or link to this item:
http://dspace.uniten.edu.my/jspui/handle/123456789/13206
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Al-Ghaili, A.M. | en_US |
dc.contributor.author | Kasim, H. | en_US |
dc.contributor.author | Othman, M. | en_US |
dc.contributor.author | Hassan, Z. | en_US |
dc.date.accessioned | 2020-02-03T03:31:05Z | - |
dc.date.available | 2020-02-03T03:31:05Z | - |
dc.date.issued | 2019 | - |
dc.description.abstract | This paper proposes a verification algorithm (VA) used as an access tool for Internet-of-Things (IoT) systems. From a security aspect’s point of view, the VA has been evaluated in terms of security factors. To perform this evaluation, a Multiple-Layer Security Architecture (MLSA) has been used in order to attain the three security objectives which are: confidentiality, integrity, and availability. The VA aims to enable an authorized access to smart IoT applications such as smart city applications. The VA has adopted the Quick Response (QR) tag to encrypt values being used as a smart-key. Performance of the proposed algorithm has considered the security factors in order to strengthen the security side of such an IoT system. To evaluate the VA accuracy, a total number of 70 QR tags have been generated. Results have shown a high percentage of accuracy in terms of security for verified QR tags used as smart keys for IoT systems. © Springer Nature Switzerland AG 2019. | |
dc.language.iso | en | en_US |
dc.title | Security factors based evaluation of verification algorithm for an IoT access system | en_US |
dc.type | Conference Paper | en_US |
dc.identifier.doi | 10.1007/978-3-319-99007-1_37 | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
Appears in Collections: | UNITEN Scholarly Publication |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.