TELKOMNIKA Telecommunication, Computing, Electronics and Control
QR code based authentication method for IoT applications using three security layers
Dublin Core
Title
TELKOMNIKA Telecommunication, Computing, Electronics and Control
QR code based authentication method for IoT applications using three security layers
QR code based authentication method for IoT applications using three security layers
Subject
Data authentication, Data security, Internet of Things, QR code
Description
A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users will scan QRC to access IoT applications. To authenticate contents of QRC, three procedures are applied. QRAM contributes to IoT automatic access systems or smart applications in terms of authentication and safety of access. QRAM is evaluated in term of security factors (e.g., authentication). Computation time of authentication procedures for several IoT applications has become a considerable issue. QRAM aims to reduce computation time
consumed to authenticate each QRC. Some authentication techniques still face difficulties when an IoT application requires fast response to users; therefore, QRAM aims to enhance so to meet real-time applications. Thus, QRAM is compared to several competitive methods used to verify QRC in term of computation time. Results confirmed that QRAM is faster than other competitive techniques. Besides, results have shown a high level of complexity in term of decryption time needed to deduce private contents of QRC. QRAM also is robust against unauthorized requests of access.
consumed to authenticate each QRC. Some authentication techniques still face difficulties when an IoT application requires fast response to users; therefore, QRAM aims to enhance so to meet real-time applications. Thus, QRAM is compared to several competitive methods used to verify QRC in term of computation time. Results confirmed that QRAM is faster than other competitive techniques. Besides, results have shown a high level of complexity in term of decryption time needed to deduce private contents of QRC. QRAM also is robust against unauthorized requests of access.
Creator
Abbas M. Al-Ghaili, Hairoladenan Kasim, Marini Othman, Wahidah Hashim
Source
DOI: 10.12928/TELKOMNIKA.v18i4.14748
Publisher
Universitas Ahmad Dahlan
Date
August 2020
Contributor
Sri Wahyuni
Rights
ISSN: 1693-6930
Relation
http://journal.uad.ac.id/index.php/TELKOMNIKA
Format
PDF
Language
English
Type
Text
Coverage
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Files
Collection
Citation
Abbas M. Al-Ghaili, Hairoladenan Kasim, Marini Othman, Wahidah Hashim, “TELKOMNIKA Telecommunication, Computing, Electronics and Control
QR code based authentication method for IoT applications using three security layers,” Repository Horizon University Indonesia, accessed March 14, 2025, https://repository.horizon.ac.id/items/show/3981.
QR code based authentication method for IoT applications using three security layers,” Repository Horizon University Indonesia, accessed March 14, 2025, https://repository.horizon.ac.id/items/show/3981.