TELKOMNIKA Telecommunication, Computing, Electronics and Control
QR code based authentication method for IoT applications using three security layers

Dublin Core

Title

TELKOMNIKA Telecommunication, Computing, Electronics and Control
QR code based authentication method for IoT applications using three security layers

Subject

Data authentication, Data security, Internet of Things, QR code

Description

A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users will scan QRC to access IoT applications. To authenticate contents of QRC, three procedures are applied. QRAM contributes to IoT automatic access systems or smart applications in terms of authentication and safety of access. QRAM is evaluated in term of security factors (e.g., authentication). Computation time of authentication procedures for several IoT applications has become a considerable issue. QRAM aims to reduce computation time
consumed to authenticate each QRC. Some authentication techniques still face difficulties when an IoT application requires fast response to users; therefore, QRAM aims to enhance so to meet real-time applications. Thus, QRAM is compared to several competitive methods used to verify QRC in term of computation time. Results confirmed that QRAM is faster than other competitive techniques. Besides, results have shown a high level of complexity in term of decryption time needed to deduce private contents of QRC. QRAM also is robust against unauthorized requests of access.

Creator

Abbas M. Al-Ghaili, Hairoladenan Kasim, Marini Othman, Wahidah Hashim

Source

DOI: 10.12928/TELKOMNIKA.v18i4.14748

Publisher

Universitas Ahmad Dahlan

Date

August 2020

Contributor

Sri Wahyuni

Rights

ISSN: 1693-6930

Relation

http://journal.uad.ac.id/index.php/TELKOMNIKA

Format

PDF

Language

English

Type

Text

Coverage

TELKOMNIKA Telecommunication, Computing, Electronics and Control

Files

Collection

Tags

,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

Citation

Abbas M. Al-Ghaili, Hairoladenan Kasim, Marini Othman, Wahidah Hashim, “TELKOMNIKA Telecommunication, Computing, Electronics and Control
QR code based authentication method for IoT applications using three security layers,” Repository Horizon University Indonesia, accessed March 14, 2025, https://repository.horizon.ac.id/items/show/3981.