Skip to main content

Security Factors Based Evaluation of Verification Algorithm for an IoT Access System

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 843))

Abstract

This paper proposes a verification algorithm (VA) used as an access tool for Internet-of-Things (IoT) systems. From a security aspect’s point of view, the VA has been evaluated in terms of security factors. To perform this evaluation, a Multiple-Layer Security Architecture (MLSA) has been used in order to attain the three security objectives which are: confidentiality, integrity, and availability. The VA aims to enable an authorized access to smart IoT applications such as smart city applications. The VA has adopted the Quick Response (QR) tag to encrypt values being used as a smart-key. Performance of the proposed algorithm has considered the security factors in order to strengthen the security side of such an IoT system. To evaluate the VA accuracy, a total number of 70 QR tags have been generated. Results have shown a high percentage of accuracy in terms of security for verified QR tags used as smart keys for IoT systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lin, S.S., et al.: Efficient QR code beautification with high quality visual content. IEEE Trans. Multimed. 17(9), 1515–1524 (2015)

    Article  Google Scholar 

  2. Rane, S., Dubey, A., Parida, T.: Design of IoT based intelligent parking system using image processing algorithms. In: 2017 International Conference on Computing Methodologies and Communication (ICCMC) (2017)

    Google Scholar 

  3. Huang, H.-F., Liu, S.-E., Chen, H.-F.: Designing a new mutual authentication scheme based on nonce and smart cards. J. Chin. Inst. Eng. 36(1), 98–102 (2013)

    Article  Google Scholar 

  4. Hung, C.H., et al.: A door lock system with augmented reality technology. In: 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE) (2017)

    Google Scholar 

  5. Tkachenko, I., et al.: Two-level QR code for private message sharing and document authentication. IEEE Trans. Inf. Forensics Secur. 11(3), 571–583 (2016)

    Article  Google Scholar 

  6. Kanaris, L., et al.: Sample size determination algorithm for fingerprint-based indoor localization systems. Comput. Netw. 101, 169–177 (2016)

    Article  Google Scholar 

  7. Ota, K., et al.: Smart infrastructure design for smart cities. IT Prof. 19(5), 42–49 (2017)

    Article  Google Scholar 

  8. Kavitha, K.J., Shan, B.P.: Implementation of DWM for medical images using IWT and QR code as a watermark. In: 2017 Conference on Emerging Devices and Smart Systems (ICEDSS) (2017)

    Google Scholar 

  9. Kirkham, T., et al.: Risk driven smart home resource management using cloud services. Future Gener. Comput. Syst. 38, 13–22 (2014)

    Article  Google Scholar 

  10. Kim, Y.G., Jun, M.S.: A design of user authentication system using QR code identifying method. In: 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT) (2011)

    Google Scholar 

  11. Warasart, M., Kuacharoen, P.: Paper-based document authentication using digital signature and QR code. In: 4th International Conference on Computer Engineering and Technology. International Proceedings of Computer Science and Information Technology (2012)

    Google Scholar 

Download references

Acknowledgement

This research is funded by an internal grant (RJO10289176/B/1/2017/12) from Universiti Tenaga Nasional.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abbas M. Al-Ghaili .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Ghaili, A.M., Kasim, H., Othman, M., Hassan, Z. (2019). Security Factors Based Evaluation of Verification Algorithm for an IoT Access System. In: Saeed, F., Gazem, N., Mohammed, F., Busalim, A. (eds) Recent Trends in Data Science and Soft Computing. IRICT 2018. Advances in Intelligent Systems and Computing, vol 843. Springer, Cham. https://doi.org/10.1007/978-3-319-99007-1_37

Download citation

Publish with us

Policies and ethics