Please use this identifier to cite or link to this item:
http://dspace.uniten.edu.my/jspui/handle/123456789/13240
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Al-Ghaili, A.M. | en_US |
dc.contributor.author | Kasim, H. | en_US |
dc.contributor.author | Rahim, F.A. | en_US |
dc.contributor.author | Ibrahim, Z.-A. | en_US |
dc.contributor.author | Othman, M. | en_US |
dc.contributor.author | Hassan, Z. | en_US |
dc.date.accessioned | 2020-02-03T03:31:17Z | - |
dc.date.available | 2020-02-03T03:31:17Z | - |
dc.date.issued | 2019 | - |
dc.description.abstract | A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA’s robustness against unauthorized access’s attempts and brute force attack. © Springer Nature Singapore Pte Ltd. 2019. | |
dc.language.iso | en | en_US |
dc.title | Smart verification algorithm for IoT applications using QR tag | en_US |
dc.type | Conference Paper | en_US |
dc.identifier.doi | 10.1007/978-981-13-2622-6_11 | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
Appears in Collections: | UNITEN Scholarly Publication |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.