SlideShare a Scribd company logo
1 of 15
2
The growth of IoT in modern days helps the devices to work productively and
efficiently. However the device needs human intervention for timely assistance.
Hence there is an urge for augmented platform along with AI mechanism that
works with supervised approach to communicate among devices for timely
decision making and support. The novelty in the approach details the data
generated from IoT devices and analysis the data to work more promptly when
integrated with other devices. The challenges faced in such approaches are the
security breaches like eavesdropping, jamming, denial of service (DOS) attacks,
and spoofing attacks can be identified and control using proposed enhanced
security with comprehensive future directions by creating IoB (Internet of Things
Behavior) to fight against attacks. The augumented approach gives a simulation
approach to track the breaches that occurs while communicating with the
devices.
Currently, Internet of Things (IoT) solutions are becoming increasingly common
in several areas (e.g., industry, agriculture, human location, and home
automation) . A key factor for their ease in adoption is the reasonable low cost of
this type of equipment, which by not having relevant output peripherals such as
an LCD displays can keep the costs low. Considering that occasionally it is
necessary to visualize the IoT device output or access real-time configurations,
and that a simple LCD display device might cost much more than the IoT device
itself, it becomes necessary to research solutions to visualize the IoT device data
without the use of specific or additional equipment, only that already available
to the administrator, namely a smartphone.
3
This section presents some works related to the theme of augmented reality
(AR)
associated with the Internet of Things. Some articles explained how augmented
reality works and others have shown some solutions already implemented in
the world of IoT. Augmented reality combines information and virtual elements
with real world imagery acquired through a camera. AR is becoming
increasingly popular in common application for general public entertainment
(e.g., gaming, video, and photo filters in social media mobile applications). In
specific fields, there are other works, focused on marker detection, information
security, platforms for interaction with devices, and IoT.
4
5
Conceptual Architecture
In this section, the conceptual architecture
of the Secure Augmented Reality for
Internet of Things (SAR.IoT) solution,
oriented to the industry and research areas,
is pressented. The main objective is to allow
an augmented reality interaction between
the user and the IoT devices, all through a
web solution, and that guarantees the
security of the information. The different
modules are specified in detail below,
namely the Client, Server and the IoT
device.
SAR.IoT conceptual architecture.
6
Client
The interconnection between the Client,
Server, and IoT device. Note that although
there is a direct interaction between the
Client and IoT device, this only occurs for
the AR marker reading associated with the
device, all the communications were
performed using the server.
Client role
7
Server
part of the proposed architecture for the
server, where it is possible to see the two
modules within it, the information module,
and the integration module, each
performing their respective tasks,
interacting with each other and with the
other modules via northbound and
southbound, respectively.
Server role
8
IoT Device
In order to be able to interact with an IoT
device, it is necessary to be able to
communicate with it, either to obtain
information about the equipment itself or
to perform actions. For this to be possible, it
is necessary to provide this IoT device with
a software-based agent that returns the
needed information and performs the
desired actions. The zoom at this point in
the general architecture, where it is possible
to visualize the connection between the
server’s integration module and the IoT
devices of the interaction module.
IoT device role
9
Communication
part of the proposed architecture is
presented, focused on the different
communication protocols incorporated in
it.
Communication architecture
10
Prototype Implementation
This section presents the prototype
developed to test and validate the proposed
architecture, describing the analyzed
frameworks, the used equipment, and the
operation of the entire solution. For this
project, a solution was developed, mostly
focused on web technologies, called the
Secured Augmented Reality for IoT, shortly
named SAR.IoT.
Smartphone Android Xiaomi A2 Lite
11
Operation
To present augmented information in a
device, it is necessary to analyze and
process the image captured by the device
itself, usually using a proper software
library. In this case, we used the ARToolKit
library, the Javascript version,
JSARToolKit5, to work in a web
environment, allowing the system to be
used by any device with an updated
browser (e.g., smartphones, tablets,
computers, etc.).
Process view of the client’s operation
12
Visualization Modes
In the visualization module, two
visualization modes were implemented: a
normal mode and a debug mode. The
normal mode presents the IoT device’s
augmented information, while the debug
mode adds graphical pins to signal the
presence of augmented information that is
not available or configured in the system.
To switch between modes, the user can
click the button on the upper right screen
corner.
Normal mode (left) and debug mode (right)
13
Interaction with
Augmented Reality
When an AR marker augmented
reality information in clicked/pressed
on the smartphone’s screen, an
embedded web page with content
regarding the IoT device is produced.
The contents are updated in real time
and can allow interaction with the IoT
device.
Processed AR marker (left) and the correspondent
interaction dashboard (right)
14
An Augmented Monitoring
Tool
The great advantage of an augmented
reality system incorporated in a
smartphone, is its ability to easily allow
the detection of equipment that is
malfunctioning by simply pointing the
smartphone’s camera to the IoT devices
and checking if any of them have
warnings.
AR markers (a) being detected (b) and showing an
anomaly in a device (c)
15
Tests and Optimizations
In this section, all the tests and
optimizations performed are exposed.
Various types of AR markers were
tested and different degrees of
confidence in the recognition system
were analyzed. The performance of the
solution was also analyzed, with
multiple AR markers being shown in the
screen at the same time. The security
layer of the AR markers was also tested,
namely, if the system could block access
to the information of the markers to
unauthorized users.
PATTERN markers

More Related Content

Similar to SAR.pptx

Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...Pavan Kumar
 
Ch 4.pptx
Ch 4.pptxCh 4.pptx
Ch 4.pptxKume3
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDr. Raghavendra GS
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxjmindy
 
Controlling Electrical Appliances Using IOT and AR
Controlling Electrical Appliances Using IOT and ARControlling Electrical Appliances Using IOT and AR
Controlling Electrical Appliances Using IOT and ARIRJET Journal
 
IOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsIOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsKuldeep Singh
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxugushe
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)Biniam Behailu
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsNagarro
 
How To Develop IoT Mobile Applications
How To Develop IoT Mobile ApplicationsHow To Develop IoT Mobile Applications
How To Develop IoT Mobile ApplicationsAshish Kumar
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET Journal
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 

Similar to SAR.pptx (20)

iot.docx
iot.docxiot.docx
iot.docx
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...
 
Ch 4.pptx
Ch 4.pptxCh 4.pptx
Ch 4.pptx
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
Unleashing the Potential of IoT and Android
Unleashing the Potential of IoT and AndroidUnleashing the Potential of IoT and Android
Unleashing the Potential of IoT and Android
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docx
 
Controlling Electrical Appliances Using IOT and AR
Controlling Electrical Appliances Using IOT and ARControlling Electrical Appliances Using IOT and AR
Controlling Electrical Appliances Using IOT and AR
 
IOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsIOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of Things
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of Things
 
How To Develop IoT Mobile Applications
How To Develop IoT Mobile ApplicationsHow To Develop IoT Mobile Applications
How To Develop IoT Mobile Applications
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
internet of things
internet of thingsinternet of things
internet of things
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 

Recently uploaded

NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceSapana Sha
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAbdelrhman abooda
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 

Recently uploaded (20)

NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 

SAR.pptx

  • 1.
  • 2. 2 The growth of IoT in modern days helps the devices to work productively and efficiently. However the device needs human intervention for timely assistance. Hence there is an urge for augmented platform along with AI mechanism that works with supervised approach to communicate among devices for timely decision making and support. The novelty in the approach details the data generated from IoT devices and analysis the data to work more promptly when integrated with other devices. The challenges faced in such approaches are the security breaches like eavesdropping, jamming, denial of service (DOS) attacks, and spoofing attacks can be identified and control using proposed enhanced security with comprehensive future directions by creating IoB (Internet of Things Behavior) to fight against attacks. The augumented approach gives a simulation approach to track the breaches that occurs while communicating with the devices.
  • 3. Currently, Internet of Things (IoT) solutions are becoming increasingly common in several areas (e.g., industry, agriculture, human location, and home automation) . A key factor for their ease in adoption is the reasonable low cost of this type of equipment, which by not having relevant output peripherals such as an LCD displays can keep the costs low. Considering that occasionally it is necessary to visualize the IoT device output or access real-time configurations, and that a simple LCD display device might cost much more than the IoT device itself, it becomes necessary to research solutions to visualize the IoT device data without the use of specific or additional equipment, only that already available to the administrator, namely a smartphone. 3
  • 4. This section presents some works related to the theme of augmented reality (AR) associated with the Internet of Things. Some articles explained how augmented reality works and others have shown some solutions already implemented in the world of IoT. Augmented reality combines information and virtual elements with real world imagery acquired through a camera. AR is becoming increasingly popular in common application for general public entertainment (e.g., gaming, video, and photo filters in social media mobile applications). In specific fields, there are other works, focused on marker detection, information security, platforms for interaction with devices, and IoT. 4
  • 5. 5 Conceptual Architecture In this section, the conceptual architecture of the Secure Augmented Reality for Internet of Things (SAR.IoT) solution, oriented to the industry and research areas, is pressented. The main objective is to allow an augmented reality interaction between the user and the IoT devices, all through a web solution, and that guarantees the security of the information. The different modules are specified in detail below, namely the Client, Server and the IoT device. SAR.IoT conceptual architecture.
  • 6. 6 Client The interconnection between the Client, Server, and IoT device. Note that although there is a direct interaction between the Client and IoT device, this only occurs for the AR marker reading associated with the device, all the communications were performed using the server. Client role
  • 7. 7 Server part of the proposed architecture for the server, where it is possible to see the two modules within it, the information module, and the integration module, each performing their respective tasks, interacting with each other and with the other modules via northbound and southbound, respectively. Server role
  • 8. 8 IoT Device In order to be able to interact with an IoT device, it is necessary to be able to communicate with it, either to obtain information about the equipment itself or to perform actions. For this to be possible, it is necessary to provide this IoT device with a software-based agent that returns the needed information and performs the desired actions. The zoom at this point in the general architecture, where it is possible to visualize the connection between the server’s integration module and the IoT devices of the interaction module. IoT device role
  • 9. 9 Communication part of the proposed architecture is presented, focused on the different communication protocols incorporated in it. Communication architecture
  • 10. 10 Prototype Implementation This section presents the prototype developed to test and validate the proposed architecture, describing the analyzed frameworks, the used equipment, and the operation of the entire solution. For this project, a solution was developed, mostly focused on web technologies, called the Secured Augmented Reality for IoT, shortly named SAR.IoT. Smartphone Android Xiaomi A2 Lite
  • 11. 11 Operation To present augmented information in a device, it is necessary to analyze and process the image captured by the device itself, usually using a proper software library. In this case, we used the ARToolKit library, the Javascript version, JSARToolKit5, to work in a web environment, allowing the system to be used by any device with an updated browser (e.g., smartphones, tablets, computers, etc.). Process view of the client’s operation
  • 12. 12 Visualization Modes In the visualization module, two visualization modes were implemented: a normal mode and a debug mode. The normal mode presents the IoT device’s augmented information, while the debug mode adds graphical pins to signal the presence of augmented information that is not available or configured in the system. To switch between modes, the user can click the button on the upper right screen corner. Normal mode (left) and debug mode (right)
  • 13. 13 Interaction with Augmented Reality When an AR marker augmented reality information in clicked/pressed on the smartphone’s screen, an embedded web page with content regarding the IoT device is produced. The contents are updated in real time and can allow interaction with the IoT device. Processed AR marker (left) and the correspondent interaction dashboard (right)
  • 14. 14 An Augmented Monitoring Tool The great advantage of an augmented reality system incorporated in a smartphone, is its ability to easily allow the detection of equipment that is malfunctioning by simply pointing the smartphone’s camera to the IoT devices and checking if any of them have warnings. AR markers (a) being detected (b) and showing an anomaly in a device (c)
  • 15. 15 Tests and Optimizations In this section, all the tests and optimizations performed are exposed. Various types of AR markers were tested and different degrees of confidence in the recognition system were analyzed. The performance of the solution was also analyzed, with multiple AR markers being shown in the screen at the same time. The security layer of the AR markers was also tested, namely, if the system could block access to the information of the markers to unauthorized users. PATTERN markers