Security factors based evaluation of verification algorithm for an IoT access system

This paper proposes a verification algorithm (VA) used as an access tool for Internet-of-Things (IoT) systems. From a security aspect’s point of view, the VA has been evaluated in terms of security factors. To perform this evaluation, a Multiple-Layer Security Architecture (MLSA) has been used in or...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Ghaili, A.M., Kasim, H., Othman, M., Hassan, Z.
Format: Conference Paper
Language:English
Published: 2020
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Tenaga Nasional
Language: English
id my.uniten.dspace-13206
record_format dspace
spelling my.uniten.dspace-132062020-03-17T05:19:10Z Security factors based evaluation of verification algorithm for an IoT access system Al-Ghaili, A.M. Kasim, H. Othman, M. Hassan, Z. This paper proposes a verification algorithm (VA) used as an access tool for Internet-of-Things (IoT) systems. From a security aspect’s point of view, the VA has been evaluated in terms of security factors. To perform this evaluation, a Multiple-Layer Security Architecture (MLSA) has been used in order to attain the three security objectives which are: confidentiality, integrity, and availability. The VA aims to enable an authorized access to smart IoT applications such as smart city applications. The VA has adopted the Quick Response (QR) tag to encrypt values being used as a smart-key. Performance of the proposed algorithm has considered the security factors in order to strengthen the security side of such an IoT system. To evaluate the VA accuracy, a total number of 70 QR tags have been generated. Results have shown a high percentage of accuracy in terms of security for verified QR tags used as smart keys for IoT systems. © Springer Nature Switzerland AG 2019. 2020-02-03T03:31:05Z 2020-02-03T03:31:05Z 2019 Conference Paper 10.1007/978-3-319-99007-1_37 en
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
language English
description This paper proposes a verification algorithm (VA) used as an access tool for Internet-of-Things (IoT) systems. From a security aspect’s point of view, the VA has been evaluated in terms of security factors. To perform this evaluation, a Multiple-Layer Security Architecture (MLSA) has been used in order to attain the three security objectives which are: confidentiality, integrity, and availability. The VA aims to enable an authorized access to smart IoT applications such as smart city applications. The VA has adopted the Quick Response (QR) tag to encrypt values being used as a smart-key. Performance of the proposed algorithm has considered the security factors in order to strengthen the security side of such an IoT system. To evaluate the VA accuracy, a total number of 70 QR tags have been generated. Results have shown a high percentage of accuracy in terms of security for verified QR tags used as smart keys for IoT systems. © Springer Nature Switzerland AG 2019.
format Conference Paper
author Al-Ghaili, A.M.
Kasim, H.
Othman, M.
Hassan, Z.
spellingShingle Al-Ghaili, A.M.
Kasim, H.
Othman, M.
Hassan, Z.
Security factors based evaluation of verification algorithm for an IoT access system
author_facet Al-Ghaili, A.M.
Kasim, H.
Othman, M.
Hassan, Z.
author_sort Al-Ghaili, A.M.
title Security factors based evaluation of verification algorithm for an IoT access system
title_short Security factors based evaluation of verification algorithm for an IoT access system
title_full Security factors based evaluation of verification algorithm for an IoT access system
title_fullStr Security factors based evaluation of verification algorithm for an IoT access system
title_full_unstemmed Security factors based evaluation of verification algorithm for an IoT access system
title_sort security factors based evaluation of verification algorithm for an iot access system
publishDate 2020
_version_ 1662758829949976576