Skip to main content

Smart Verification Algorithm for IoT Applications using QR Tag

  • Conference paper
  • First Online:
Computational Science and Technology

Abstract

A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA’s robustness against unauthorized access’s attempts and brute force attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kirkham T, Armstrong D, Djemame K, Jiang M. Risk driven Smart Home resource management using cloud services. Future Generation Computer Systems. 2014 2014/09/01/;38:13-22.

    Google Scholar 

  2. Samuel SSI, editor A review of connectivity challenges in IoT-smart home. 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC); 2016 15-16 March 2016.

    Google Scholar 

  3. Nazemzadeh P, Fontanelli D, Macii D, Palopoli L. Indoor Localization of Mobile Robots Through QR Code Detection and Dead Reckoning Data Fusion. IEEE/ASME Transactions on Mechatronics. 2017;22(6):2588-99.

    Google Scholar 

  4. Liu Z, Choo KKR, Grossschadl J. Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography. IEEE Communications Magazine. 2018;56(2):158-62.

    Google Scholar 

  5. Rane S, Dubey A, Parida T, editors. Design of IoT based intelligent parking system using image processing algorithms. 2017 International Conference on Computing Methodologies and Communication (ICCMC); 2017 18-19 July 2017.

    Google Scholar 

  6. Huang H-F, Liu S-E, Chen H-F. Designing a new mutual authentication scheme based on nonce and smart cards. Journal of the Chinese Institute of Engineers. 2013 2013/01/01;36(1):98-102.

    Google Scholar 

  7. Xiao-Long W, Chun-Fu W, Guo-Dong L, Qing-Xie C, editors. A robot navigation method based on RFID and QR code in the warehouse. 2017 Chinese Automation Congress (CAC); 2017 20-22 Oct. 2017.

    Google Scholar 

  8. Ghaffari M, Ghadiri N, Manshaei MH, Lahijani MS. P4QS: A Peer-to-Peer Privacy Preserving Query Service for Location-Based Mobile Applications. IEEE Transactions on Vehicular Technology. 2017;66(10):9458-69.

    Google Scholar 

  9. Chen YH, Tsai MJ, Fu LC, Chen CH, Wu CL, Zeng YC, editors. Monitoring Elder’s Living Activity Using Ambient and Body Sensor Network in Smart Home. 2015 IEEE International Conference on Systems, Man, and Cybernetics; 2015 9-12 Oct. 2015.

    Google Scholar 

  10. Kanaris L, Kokkinis A, Fortino G, Liotta A, Stavrou S. Sample Size Determination Algorithm for fingerprint-based indoor localization systems. Computer Networks. 2016 2016/06/04/;101:169-77.

    Google Scholar 

  11. Lin SS, Hu MC, Lee CH, Lee TY. Efficient QR Code Beautification With High Quality Visual Content. IEEE Transactions on Multimedia. 2015;17(9):1515-24.

    Google Scholar 

  12. Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin JM, Guichard C. Two-Level QR Code for Private Message Sharing and Document Authentication. IEEE Transactions on Information Forensics and Security. 2016;11(3):571-83.

    Google Scholar 

  13. Lin PY. Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code. IEEE Transactions on Industrial Informatics. 2016;12(1):384-92.

    Google Scholar 

  14. Kim YG, Jun MS, editors. A design of user authentication system using QR code identifying method. 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT); 2011 Nov. 29 2011-Dec. 1 2011.

    Google Scholar 

Download references

Acknowledgements

Work presented in this paper forms part of the research on Formulation of Evidence Source Extraction Framework for Big Data Digital Forensics Analysis in Advanced Metering Infrastructure, which was partially funded by Universiti Tenaga Nasional Start-Up Grant UNIIG 2016.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abbas M. Al-Ghaili .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Ghaili, A.M., Kasim, H., Rahim, F.A., Ibrahim, ZA., Othman, M., Hassan, Z. (2019). Smart Verification Algorithm for IoT Applications using QR Tag. In: Alfred, R., Lim, Y., Ibrahim, A., Anthony, P. (eds) Computational Science and Technology. Lecture Notes in Electrical Engineering, vol 481. Springer, Singapore. https://doi.org/10.1007/978-981-13-2622-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2622-6_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2621-9

  • Online ISBN: 978-981-13-2622-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics