2020
DOI: 10.12928/telkomnika.v18i4.14748
|View full text |Cite
|
Sign up to set email alerts
|

QR code based authentication method for IoT applications using three security layers

Abstract: A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users will scan QRC to access IoT applications. To authenticate contents of QRC, three procedures are applied. QRAM contributes to IoT automatic access systems or smart applications in terms of authentication and safety o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 39 publications
0
6
0
Order By: Relevance
“…The latter was then employed in production‐to‐order scenarios of manufacturing enterprises. Al‐Ghaili [11] proposed a quick response code‐based authentication method (QRAM), which helps authenticate and secure IOT automatic access systems. Ren [12] conducted a study on the deployment of identity resolution systems in Industrial Internet of Things (IIOT), which provides a technical reference for the selection of identification and resolution systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The latter was then employed in production‐to‐order scenarios of manufacturing enterprises. Al‐Ghaili [11] proposed a quick response code‐based authentication method (QRAM), which helps authenticate and secure IOT automatic access systems. Ren [12] conducted a study on the deployment of identity resolution systems in Industrial Internet of Things (IIOT), which provides a technical reference for the selection of identification and resolution systems.…”
Section: Introductionmentioning
confidence: 99%
“…The latter was then employed in production-to-order scenarios of manufacturing enterprises. Al-Ghaili [11] proposed a quick response code-based authentication method (QRAM), which helps authenticate and secure IOT automatic access systems.…”
mentioning
confidence: 99%
“…These QR codes are generated by the authorities or by the vehicle owner and essentially contain the necessary information about the vehicle (5) . When an individual or authority wants to identify a vehicle, it simply needs to scan the code using the smartphone camera or the code reader (6) . The QRVRS framework generally includes a QR code model, a centralized database, and users.…”
Section: Introductionmentioning
confidence: 99%
“…A study (6) precisely outlined the significant use of QRVRS and its advantages in vehicle authorization systems (e-SVAM). Another study (9) discussed a similar system by emphasizing the critical contribution of security features for users of such systems.…”
Section: Introductionmentioning
confidence: 99%
“…where these drone capture the accident scene from all angles before physical presence of people within less time [8], [9]. Drone are also utilized for fire-fighting purposes, package delivery, medical kit delivery on difficult sites where the human presence need more time [10], [11]. Figure 1 shows the drone enabled IoT networks and data communication process.…”
mentioning
confidence: 99%