Quick Response Technique based Security Mechanism Design for Digital Hubs and LOT Systems
Abbas M. Al-Ghaili1, Marini Othman2, Hairoladenan Kasim3, Zainuddin Hassan4
1Abbas M. Al-Ghaili, Institute of Informatics and Computing Energy, IICE Universiti Tenaga Nasional UNITEN Kajang, Selangor, Malaysia.
2Marini Othman, Institute of Informatics and Computing Energy, IICE Universiti Tenaga Nasional UNITEN Kajang, Selangor, Malaysia.
3Hairoladenan Kasim, College of Computer Science and Information Technology, Universiti Tenaga Nasional UNITEN Kajang, Selangor, Malaysia.
4Zainuddin Hassan, College of Computer Science and Information Technology, Universiti Tenaga Nasional UNITEN Kajang, Selangor Malaysia.
Manuscript received on 25 May 2019 | Revised Manuscript received on 03 June 2019 | Manuscript Published on 22 June 2019 | PP: 384-388 | Volume-8 Issue-3S, February 2019 | Retrieval Number: C10800283S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In this paper, the Quick Response (QR) technique is used to generate an encrypted QR-Code. This paper designs a security mechanism to verify certain related information used to access an Internet of Things (IoT) based system. Only authorized requests are enabled to access the IoT system. To achieve this goal, the proposed security mechanism has used a three-Layer-Policy Verification Procedure (3LPVP). The proposed 3LPVP is applied on the QR-Code; this code is used as an IoT-key dedicated for a secure access. The proposed mechanism is important for a number of IoT-based systems that require information being shared and/ or transmitted between two parties or more, e.g., digital hubs, digital ecosystems, and other industry 4.0 related technologies. The 3LPVP needs to verify IoT-key’s contents during the first layer to authenticate issue of the IoT-key. In addition, the IoT-key is periodically generated using a 1-session cryptographic key to keep the IoTkey confidential. To verify the IoT-key’s integrity, related values are compared to original hash values using a secret question to which the user needs to answer. In the third layer, data is stored using an offline mode to disable any access caused by threats; to preserve the IoT-key available and responsive. The 3LPVP is evaluated in terms of security factors and then compared to a number of competitive techniques. Results have shown good performance of 3LPVP against brute force attack and encryption’s computation time.
Keywords: Internet of Things, Security Systems, QR-Code, Digital Hubs, Industry 4.0.
Scope of the Article: Digital Signal Processing Theory