A New Encryption Scheme Method (ESM) Using Capsulated-Layers Conception for Verified QR-Tag for IoT-Based Smart Access Systems
- 652 Downloads
A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. A three Layer Encryption Algorithm (3LEA) is designed to generate a cryptographic Quick Response (QR) tag. In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. In order to make a decision either to approve or disapprove a request to access an IoT-based system, a three-Layer Protection Algorithm (3LPA) is proposed. 3LPVA applies math operations to authenticate confidentiality, integrity, and availability of QR-tag (i.e., smart key). Thus, once the smart key is verified, an access to the IoT-based system is allowed. The 3LEA, 3PVA, and 3LPA are designed in such a way and capsulated using a new Encryption Scheme Method (ESM). The ESM contributes much to IoT technology era in terms of systems security; it is used as a smart key designer and verifier for IoT access systems. The ESM is evaluated in terms of security factors, decryption time, robustness, unpredictability, and 3LEA’s technical evaluation. Results show good performance of robustness and an unpredictability behavior of 3LEA.
KeywordsIoT Computer security Encryption scheme QR tag
This research study is funded by UNIIG (J510050781/2017-B2).
- 2.Rane, S., Dubey, A., Parida, T.: Design of IoT based intelligent parking system using image processing algorithms. In: 2017 International Conference on Computing Methodologies and Communication (ICCMC), pp. 1049–1053 (2017)Google Scholar
- 3.Alshattnawi, S.: Effective use of QR codes in religious tourism. In: International Conference on Advanced Computer Science Applications and Technologies, pp. 497–501 (2012)Google Scholar
- 5.Hung, C.H., Fanjiang, Y.Y., Chung, K.C., Kao, C.Y.: A door lock system with augmented reality technology. In: IEEE 6th Global Conference on Consumer Electronics (GCCE), pp. 1–2 (2017)Google Scholar
- 7.Rodrigues, B., Chaudhari, A., More, S.: Two factor verification using QR-code: a unique authentication system for Android smartphone users. In: 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 457–462 (2016)Google Scholar
- 9.Samuel, S.S.I.: A review of connectivity challenges in IoT-smart home. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), pp. 1–4 (2016)Google Scholar
- 11.Chen, Y.H., Tsai, M.J., Fu, L.C., Chen, C.H., Wu, C.L., Zeng, Y.C.: Monitoring elder’s living activity using ambient and body sensor network in smart home. In: 2015 IEEE International Conference on Systems, Man, and Cybernetics, pp. 2962–2967 (2015)Google Scholar
- 12.Kavitha, K.J., Shan, B.P.: Implementation of DWM for medical images using IWT and QR code as a watermark. In: 2017 Conference on Emerging Devices and Smart Systems (ICEDSS), pp. 252–255 (2017)Google Scholar
- 13.Lin, P.Y.: Distributed secret sharing approach with cheater prevention based on QR code. IEEE Trans. Ind. Inf. 12, 384–392 (2016)Google Scholar
- 15.Xiao-Long, W., Chun-Fu, W., Guo-Dong, L., Qing-Xie, C.: A robot navigation method based on RFID and QR code in the warehouse. In: 2017 Chinese Automation Congress (CAC), pp. 7837–7840 (2017)Google Scholar
- 18.Kim, Y.G., Jun, M.S.: A design of user authentication system using QR code identifying method. In: 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 31–35 (2011)Google Scholar