Abstract
A Smart Verification Algorithm (SVA) used with Internet of Things (IoT) applications is proposed performing a verification procedure to enable authorized requests by user to access a smart system with help of Quick Response (QR) tag. It uses encrypted QR-tag values to compare them to original values. Three-layers have been proposed for this verification procedure to attain security objectives. The first layer implements a comparison to preserve the system integrated. In the second layer, original values are stored in offline database storage to disable any access caused by threats; to preserve it available. The third one frequently generates an authenticated QR tag using 1-session private key to prevent both information leakage and an unauthorized access if the key was deduced; to keep it confidential. The SVA aims to increase the system privacy. It is evaluated in terms of security factors. Results confirm that it is faster than other competitive techniques. Additionally, results have discussed SVA’s robustness against unauthorized access’s attempts and brute force attack.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Kirkham T, Armstrong D, Djemame K, Jiang M. Risk driven Smart Home resource management using cloud services. Future Generation Computer Systems. 2014 2014/09/01/;38:13-22.
Samuel SSI, editor A review of connectivity challenges in IoT-smart home. 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC); 2016 15-16 March 2016.
Nazemzadeh P, Fontanelli D, Macii D, Palopoli L. Indoor Localization of Mobile Robots Through QR Code Detection and Dead Reckoning Data Fusion. IEEE/ASME Transactions on Mechatronics. 2017;22(6):2588-99.
Liu Z, Choo KKR, Grossschadl J. Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography. IEEE Communications Magazine. 2018;56(2):158-62.
Rane S, Dubey A, Parida T, editors. Design of IoT based intelligent parking system using image processing algorithms. 2017 International Conference on Computing Methodologies and Communication (ICCMC); 2017 18-19 July 2017.
Huang H-F, Liu S-E, Chen H-F. Designing a new mutual authentication scheme based on nonce and smart cards. Journal of the Chinese Institute of Engineers. 2013 2013/01/01;36(1):98-102.
Xiao-Long W, Chun-Fu W, Guo-Dong L, Qing-Xie C, editors. A robot navigation method based on RFID and QR code in the warehouse. 2017 Chinese Automation Congress (CAC); 2017 20-22 Oct. 2017.
Ghaffari M, Ghadiri N, Manshaei MH, Lahijani MS. P4QS: A Peer-to-Peer Privacy Preserving Query Service for Location-Based Mobile Applications. IEEE Transactions on Vehicular Technology. 2017;66(10):9458-69.
Chen YH, Tsai MJ, Fu LC, Chen CH, Wu CL, Zeng YC, editors. Monitoring Elder’s Living Activity Using Ambient and Body Sensor Network in Smart Home. 2015 IEEE International Conference on Systems, Man, and Cybernetics; 2015 9-12 Oct. 2015.
Kanaris L, Kokkinis A, Fortino G, Liotta A, Stavrou S. Sample Size Determination Algorithm for fingerprint-based indoor localization systems. Computer Networks. 2016 2016/06/04/;101:169-77.
Lin SS, Hu MC, Lee CH, Lee TY. Efficient QR Code Beautification With High Quality Visual Content. IEEE Transactions on Multimedia. 2015;17(9):1515-24.
Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin JM, Guichard C. Two-Level QR Code for Private Message Sharing and Document Authentication. IEEE Transactions on Information Forensics and Security. 2016;11(3):571-83.
Lin PY. Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code. IEEE Transactions on Industrial Informatics. 2016;12(1):384-92.
Kim YG, Jun MS, editors. A design of user authentication system using QR code identifying method. 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT); 2011 Nov. 29 2011-Dec. 1 2011.
Acknowledgements
Work presented in this paper forms part of the research on Formulation of Evidence Source Extraction Framework for Big Data Digital Forensics Analysis in Advanced Metering Infrastructure, which was partially funded by Universiti Tenaga Nasional Start-Up Grant UNIIG 2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Al-Ghaili, A.M., Kasim, H., Rahim, F.A., Ibrahim, ZA., Othman, M., Hassan, Z. (2019). Smart Verification Algorithm for IoT Applications using QR Tag. In: Alfred, R., Lim, Y., Ibrahim, A., Anthony, P. (eds) Computational Science and Technology. Lecture Notes in Electrical Engineering, vol 481. Springer, Singapore. https://doi.org/10.1007/978-981-13-2622-6_11
Download citation
DOI: https://doi.org/10.1007/978-981-13-2622-6_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2621-9
Online ISBN: 978-981-13-2622-6
eBook Packages: EngineeringEngineering (R0)