Abstract
This paper proposes a verification algorithm (VA) used as an access tool for Internet-of-Things (IoT) systems. From a security aspect’s point of view, the VA has been evaluated in terms of security factors. To perform this evaluation, a Multiple-Layer Security Architecture (MLSA) has been used in order to attain the three security objectives which are: confidentiality, integrity, and availability. The VA aims to enable an authorized access to smart IoT applications such as smart city applications. The VA has adopted the Quick Response (QR) tag to encrypt values being used as a smart-key. Performance of the proposed algorithm has considered the security factors in order to strengthen the security side of such an IoT system. To evaluate the VA accuracy, a total number of 70 QR tags have been generated. Results have shown a high percentage of accuracy in terms of security for verified QR tags used as smart keys for IoT systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Lin, S.S., et al.: Efficient QR code beautification with high quality visual content. IEEE Trans. Multimed. 17(9), 1515–1524 (2015)
Rane, S., Dubey, A., Parida, T.: Design of IoT based intelligent parking system using image processing algorithms. In: 2017 International Conference on Computing Methodologies and Communication (ICCMC) (2017)
Huang, H.-F., Liu, S.-E., Chen, H.-F.: Designing a new mutual authentication scheme based on nonce and smart cards. J. Chin. Inst. Eng. 36(1), 98–102 (2013)
Hung, C.H., et al.: A door lock system with augmented reality technology. In: 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE) (2017)
Tkachenko, I., et al.: Two-level QR code for private message sharing and document authentication. IEEE Trans. Inf. Forensics Secur. 11(3), 571–583 (2016)
Kanaris, L., et al.: Sample size determination algorithm for fingerprint-based indoor localization systems. Comput. Netw. 101, 169–177 (2016)
Ota, K., et al.: Smart infrastructure design for smart cities. IT Prof. 19(5), 42–49 (2017)
Kavitha, K.J., Shan, B.P.: Implementation of DWM for medical images using IWT and QR code as a watermark. In: 2017 Conference on Emerging Devices and Smart Systems (ICEDSS) (2017)
Kirkham, T., et al.: Risk driven smart home resource management using cloud services. Future Gener. Comput. Syst. 38, 13–22 (2014)
Kim, Y.G., Jun, M.S.: A design of user authentication system using QR code identifying method. In: 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT) (2011)
Warasart, M., Kuacharoen, P.: Paper-based document authentication using digital signature and QR code. In: 4th International Conference on Computer Engineering and Technology. International Proceedings of Computer Science and Information Technology (2012)
Acknowledgement
This research is funded by an internal grant (RJO10289176/B/1/2017/12) from Universiti Tenaga Nasional.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Al-Ghaili, A.M., Kasim, H., Othman, M., Hassan, Z. (2019). Security Factors Based Evaluation of Verification Algorithm for an IoT Access System. In: Saeed, F., Gazem, N., Mohammed, F., Busalim, A. (eds) Recent Trends in Data Science and Soft Computing. IRICT 2018. Advances in Intelligent Systems and Computing, vol 843. Springer, Cham. https://doi.org/10.1007/978-3-319-99007-1_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-99007-1_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99006-4
Online ISBN: 978-3-319-99007-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)