The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
Developed security and privacy algorithms for cyber physical system IJECEIAES
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid. Therefore, the data security and integrity are necessary to ensure the highest level of protection and performance for such systems. In this paper, two sides security system for cyber-physical level is proposed to obtain security, privacy, and integrity. The first side is applied the secure sockets layer (SSL)/transport layer security (TLS) encryption protocol with the internet of things (IoT) based message queuing telemetry transport (MQTT) protocol to secure the connection and encrypt the data exchange between the system's parties. The second side proposes an algorithm to detect and prevent a denial of service (DoS) attack (hypertext transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber-attacks, which infect the Web servers. They also prove the implementation of security, privacy and integrity aspects on the CPS.
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...ijtsrd
Millions of people worldwide have Internet access today. Intrusion detection technology is a modern wave of information technology monitoring devices to deter malicious activities. Malware development malicious software is a vital problem when it comes to designing intrusion detection systems IDS . The key challenge is to recognize unknown and hidden malware, because malware writers use various evasion techniques to mask information to avoid IDS detection. Malicious attacks have become more sophisticated and Furthermore, threats to security have increased, including a zero day attack on internet users. Through the use of IT in our daily lives, computer security has become critical. Cyber threats are becoming more complex and pose growing challenges when it comes to successful intrusion detection. Failure to prevent invading information, such as data privacy, integrity and availability can undermine the credibility of security services. Specific intrusion detection approaches were proposed in the literature to combat computer security threats. This paper consists of a literature survey of the IDS that uses program algorithms to use specific data collection and forensic techniques in real time. Data mining techniques for cyber research are introduced in support of intrusion detection. Mohammed I. Alghamdi "An Assessment of Intrusion Detection System (IDS) and Data-Set Overview: A Comprehensive Review of Recent Works" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, URL: https://www.ijtsrd.com/papers/ijtsrd35730.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35730/an-assessment-of-intrusion-detection-system-ids-and-dataset-overview-a-comprehensive-review-of-recent-works/mohammed-i-alghamdi
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
Abstract
Nowadays the security methods from password protected access up to firewalls which are used to secure the data as well as the networks from attackers. Several times these types of security methods are not enough to protect data. We can consider the use of Intrusion Detection Systems (IDS) is the one way to secure the data on critical systems. Most of the research work is going on the effectiveness and exactness of the intrusion detection, but these attempts are for the detection of the intrusions at the operating system and network level only. It is unable to detect the unexpected behavior of systems due to malicious transactions in databases. The method used for spotting any interferes on the information in the form of database known as database intrusion detection. It relies on enlisting the execution of a transaction. After that, if the recognized pattern is aside from those regular patterns actual is considered as an intrusion. But the identified problem with this process is that the accuracy algorithm which is used may not identify entire patterns. This type of challenges can affect in two ways. 1) Missing of the database with regular patterns. 2) The detection process neglects some new patterns. Therefore we proposed sequential data mining method by using new Modified Apriori Algorithm. The algorithm upturns the accurateness and rate of pattern detection by the process. The Apriori algorithm with modifications is used in the proposed model.
Keywords — Anomaly Detection, Modified Apriori Algorithm, Misuse detection, Sequential Pattern Mining
The Next Generation Cognitive Security Operations Center: Network Flow Forens...Konstantinos Demertzis
A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effective SOC is related to the ability to examine and analyze the vast number of data flows and to correlate several other types of events from a cybersecurity perception. The supervision and categorization of network flow is an essential process not only for the scheduling, management, and regulation of the network’s services, but also for attacks identification and for the consequent forensics’ investigations. A serious potential disadvantage of the traditional software solutions used today for computer network monitoring, and specifically for the instances of effective categorization of the encrypted or obfuscated network flow, which enforces the rebuilding of messages packets in sophisticated underlying protocols, is the requirements of computational resources. In addition, an additional significant inability of these software packages is they create high false positive rates because they are deprived of accurate predicting mechanisms.
For all the reasons above, in most cases, the traditional software fails completely to recognize unidentified vulnerabilities and zero-day exploitations. This paper proposes a novel intelligence driven Network Flow Forensics Framework (NF3) which uses low utilization of computing power and resources, for the Next Generation Cognitive Computing SOC (NGC2SOC) that rely solely on advanced fully automated intelligence methods. It is an effective and accurate Ensemble Machine Learning forensics tool to Network Traffic Analysis, Demystification of Malware Traffic and Encrypted Traffic Identification.
Developed security and privacy algorithms for cyber physical system IJECEIAES
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid. Therefore, the data security and integrity are necessary to ensure the highest level of protection and performance for such systems. In this paper, two sides security system for cyber-physical level is proposed to obtain security, privacy, and integrity. The first side is applied the secure sockets layer (SSL)/transport layer security (TLS) encryption protocol with the internet of things (IoT) based message queuing telemetry transport (MQTT) protocol to secure the connection and encrypt the data exchange between the system's parties. The second side proposes an algorithm to detect and prevent a denial of service (DoS) attack (hypertext transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber-attacks, which infect the Web servers. They also prove the implementation of security, privacy and integrity aspects on the CPS.
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...ijtsrd
Millions of people worldwide have Internet access today. Intrusion detection technology is a modern wave of information technology monitoring devices to deter malicious activities. Malware development malicious software is a vital problem when it comes to designing intrusion detection systems IDS . The key challenge is to recognize unknown and hidden malware, because malware writers use various evasion techniques to mask information to avoid IDS detection. Malicious attacks have become more sophisticated and Furthermore, threats to security have increased, including a zero day attack on internet users. Through the use of IT in our daily lives, computer security has become critical. Cyber threats are becoming more complex and pose growing challenges when it comes to successful intrusion detection. Failure to prevent invading information, such as data privacy, integrity and availability can undermine the credibility of security services. Specific intrusion detection approaches were proposed in the literature to combat computer security threats. This paper consists of a literature survey of the IDS that uses program algorithms to use specific data collection and forensic techniques in real time. Data mining techniques for cyber research are introduced in support of intrusion detection. Mohammed I. Alghamdi "An Assessment of Intrusion Detection System (IDS) and Data-Set Overview: A Comprehensive Review of Recent Works" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, URL: https://www.ijtsrd.com/papers/ijtsrd35730.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35730/an-assessment-of-intrusion-detection-system-ids-and-dataset-overview-a-comprehensive-review-of-recent-works/mohammed-i-alghamdi
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
Abstract
Nowadays the security methods from password protected access up to firewalls which are used to secure the data as well as the networks from attackers. Several times these types of security methods are not enough to protect data. We can consider the use of Intrusion Detection Systems (IDS) is the one way to secure the data on critical systems. Most of the research work is going on the effectiveness and exactness of the intrusion detection, but these attempts are for the detection of the intrusions at the operating system and network level only. It is unable to detect the unexpected behavior of systems due to malicious transactions in databases. The method used for spotting any interferes on the information in the form of database known as database intrusion detection. It relies on enlisting the execution of a transaction. After that, if the recognized pattern is aside from those regular patterns actual is considered as an intrusion. But the identified problem with this process is that the accuracy algorithm which is used may not identify entire patterns. This type of challenges can affect in two ways. 1) Missing of the database with regular patterns. 2) The detection process neglects some new patterns. Therefore we proposed sequential data mining method by using new Modified Apriori Algorithm. The algorithm upturns the accurateness and rate of pattern detection by the process. The Apriori algorithm with modifications is used in the proposed model.
Keywords — Anomaly Detection, Modified Apriori Algorithm, Misuse detection, Sequential Pattern Mining
The Next Generation Cognitive Security Operations Center: Network Flow Forens...Konstantinos Demertzis
A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effective SOC is related to the ability to examine and analyze the vast number of data flows and to correlate several other types of events from a cybersecurity perception. The supervision and categorization of network flow is an essential process not only for the scheduling, management, and regulation of the network’s services, but also for attacks identification and for the consequent forensics’ investigations. A serious potential disadvantage of the traditional software solutions used today for computer network monitoring, and specifically for the instances of effective categorization of the encrypted or obfuscated network flow, which enforces the rebuilding of messages packets in sophisticated underlying protocols, is the requirements of computational resources. In addition, an additional significant inability of these software packages is they create high false positive rates because they are deprived of accurate predicting mechanisms.
For all the reasons above, in most cases, the traditional software fails completely to recognize unidentified vulnerabilities and zero-day exploitations. This paper proposes a novel intelligence driven Network Flow Forensics Framework (NF3) which uses low utilization of computing power and resources, for the Next Generation Cognitive Computing SOC (NGC2SOC) that rely solely on advanced fully automated intelligence methods. It is an effective and accurate Ensemble Machine Learning forensics tool to Network Traffic Analysis, Demystification of Malware Traffic and Encrypted Traffic Identification.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
Analytical survey of active intrusion detection techniques in mobile ad hoc n...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Collaborative Intrusion Detection System for Cloud Computingijsrd.com
Cloud computing is a computing paradigm that shifts drastically from traditional computing architecture. Although this new computing paradigm brings many advantages like utility computing model but the design in not flawless and hence suffers from not only many known computer vulnerabilities but also introduces unique information confidentiality, integrity and availability risks as well due its inherent design paradigm. To provide secure and reliable services in cloud computing environment is an important issue. To counter a variety of attacks, especially large-scale coordinated attacks, a framework of Collaborative Intrusion Detection System (IDS) is proposed. The proposed system could reduce the impact of these kinds of attacks through providing timely notifications about new intrusions to Cloud users' systems. To provide such ability, IDSs in the cloud computing regions both correlate alerts from multiple elementary detectors and exchange knowledge of interconnected Clouds with each other.
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSIJCNCJournal
Internet of things (IoT) is the integration of computer-based systems and the physical world in which things
interact with each other. Due to heterogeneity and resource-constrained feature of IoT devices, there are
many privacy and security challenges resulting in many threat vulnerabilities in IoT environments. After
reviewing and analyzing the recent IoT security, privacy, and authentication protocols, we will withdraw
research gaps focused on the elimination of human factors in IoT authentication. In order to fill these
research gaps, this paper proposes a privacy-preserving machine authenticated key agreement based on
IoT, denoted as IoTMAKA. IoTMAKA uses dynamic identity and machine fingerprint to provide security and
privacy. Security analysis shows that IoTMAKA provides anonymity and untraceability, provides freshness,
and is secure against passive and active attacks. IoTMAKA reduces communication overheads by 20% and
computational overheads by 25% on average as compared to the previous related works.
Hacking and cracking passwords on Wi-Fi in campus location is criminal acts that might approach because it could be considered stealing. Many Wi-Fi SSID are protected. It means that the owner of the Wi-Fi does not allow connections used freely by strangers. The are Many ways to crack it. A penetration test is one of the popular techniques to break the password. This tool directs the user to try to connect to the similar SSID name. However, they do not realize the name they join in is a fake SSID. This moment is used by the attackers to obtain the password. Soon after they try to connect several times, the attacker has been already recorded the SSID password.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
On The Substitution of Energy Sources: The Effect of Flex Fuel Vehicles in th...IJERA Editor
The substitution process resultant of the competition between two energy sources for the same market based on
dynamic forecasting model derived from biomathematics, previously applied by authors in the Brazilian
gasoline/hydrated ethanol consumption market is analyzed. The hydrated ethanol restriction supply due to
decreasing production as a consequence of international price of sugar increasing was the prevailing motive of
the forecast breaking. Again the stop and go process adopted by sugarcane private sector was the main reason of
hydrated ethanol decreasing production
Mechanical and Chemical Properties of Bamboo/Glass Fibers Reinforced Polyeste...IJERA Editor
The chemical resistance of Bamboo/Glass reinforced Polyester hybrid composites to acetic acid, Nitric acid,
Hydrochloric acid, Sodium hydroxide, Sodium carbonate, Benzene, Toluene, Carbon tetrachloride and Water
was studied. The tensile and impact properties of these composites were also studied. The effect of alkali
treatment of bamboo fibers on these properties was studied. It was observed that the tensile and impact
properties of the hybrid composites increase with glass fiber content. The author investigated the interfacial
bonding between Glsss/Bamboo fiber composites by SEM. These properties found to be higher when alkali
treated bamboo fibers were used in hybrid composites. The hybrid fiber composites showed better resistance to
the chemicals mentioned above. The elimination of amorphous hemi-cellulose with alkali treatment leading to
higher crystallinity of the bamboo fibers with alkali treatment may be responsible for these observations.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
Analytical survey of active intrusion detection techniques in mobile ad hoc n...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Collaborative Intrusion Detection System for Cloud Computingijsrd.com
Cloud computing is a computing paradigm that shifts drastically from traditional computing architecture. Although this new computing paradigm brings many advantages like utility computing model but the design in not flawless and hence suffers from not only many known computer vulnerabilities but also introduces unique information confidentiality, integrity and availability risks as well due its inherent design paradigm. To provide secure and reliable services in cloud computing environment is an important issue. To counter a variety of attacks, especially large-scale coordinated attacks, a framework of Collaborative Intrusion Detection System (IDS) is proposed. The proposed system could reduce the impact of these kinds of attacks through providing timely notifications about new intrusions to Cloud users' systems. To provide such ability, IDSs in the cloud computing regions both correlate alerts from multiple elementary detectors and exchange knowledge of interconnected Clouds with each other.
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSIJCNCJournal
Internet of things (IoT) is the integration of computer-based systems and the physical world in which things
interact with each other. Due to heterogeneity and resource-constrained feature of IoT devices, there are
many privacy and security challenges resulting in many threat vulnerabilities in IoT environments. After
reviewing and analyzing the recent IoT security, privacy, and authentication protocols, we will withdraw
research gaps focused on the elimination of human factors in IoT authentication. In order to fill these
research gaps, this paper proposes a privacy-preserving machine authenticated key agreement based on
IoT, denoted as IoTMAKA. IoTMAKA uses dynamic identity and machine fingerprint to provide security and
privacy. Security analysis shows that IoTMAKA provides anonymity and untraceability, provides freshness,
and is secure against passive and active attacks. IoTMAKA reduces communication overheads by 20% and
computational overheads by 25% on average as compared to the previous related works.
Hacking and cracking passwords on Wi-Fi in campus location is criminal acts that might approach because it could be considered stealing. Many Wi-Fi SSID are protected. It means that the owner of the Wi-Fi does not allow connections used freely by strangers. The are Many ways to crack it. A penetration test is one of the popular techniques to break the password. This tool directs the user to try to connect to the similar SSID name. However, they do not realize the name they join in is a fake SSID. This moment is used by the attackers to obtain the password. Soon after they try to connect several times, the attacker has been already recorded the SSID password.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
On The Substitution of Energy Sources: The Effect of Flex Fuel Vehicles in th...IJERA Editor
The substitution process resultant of the competition between two energy sources for the same market based on
dynamic forecasting model derived from biomathematics, previously applied by authors in the Brazilian
gasoline/hydrated ethanol consumption market is analyzed. The hydrated ethanol restriction supply due to
decreasing production as a consequence of international price of sugar increasing was the prevailing motive of
the forecast breaking. Again the stop and go process adopted by sugarcane private sector was the main reason of
hydrated ethanol decreasing production
Mechanical and Chemical Properties of Bamboo/Glass Fibers Reinforced Polyeste...IJERA Editor
The chemical resistance of Bamboo/Glass reinforced Polyester hybrid composites to acetic acid, Nitric acid,
Hydrochloric acid, Sodium hydroxide, Sodium carbonate, Benzene, Toluene, Carbon tetrachloride and Water
was studied. The tensile and impact properties of these composites were also studied. The effect of alkali
treatment of bamboo fibers on these properties was studied. It was observed that the tensile and impact
properties of the hybrid composites increase with glass fiber content. The author investigated the interfacial
bonding between Glsss/Bamboo fiber composites by SEM. These properties found to be higher when alkali
treated bamboo fibers were used in hybrid composites. The hybrid fiber composites showed better resistance to
the chemicals mentioned above. The elimination of amorphous hemi-cellulose with alkali treatment leading to
higher crystallinity of the bamboo fibers with alkali treatment may be responsible for these observations.
Liquid Level Estimation in Dynamic Condition using Kalman FilterIJERA Editor
The aim of this paper is to estimate true liquid level of tank from noisy measurements due to dynamic conditions
using kalman filter algorithm. We proposed kalman filter based approach to reduce noise in liquid level
measurement system due to effect like sloshing. The function of kalman filter is to reduce error in liquid level
measurement that produced from sensor resulting from effect like sloshing in dynamic environment. A prototype
model was constructed and placed in dynamic condition, level data was acquired using ultrasonic sensor to
verify the effectiveness of kalman filter. The tabulated data are shown for comparison of accuracy and error
analysis between both measurements with Kalman filter and statistical averaging filter. After several test with
different liquid levels and analysis of the recorded data, the technique shows the usefulness in liquid level
measurement application in dynamic condition.
Energy Storage: CFD Modeling of Phase Change Materials For Thermal Energy Sto...IJERA Editor
To optimize the utilization of thermal conversion systems it is needed to integrate them with thermal energy
storage. Between many types of base materials, the phase change materials (PCMs) are the most adequate
mediums to store and release the thermal energy. PCMs have high latent heat of fusion and, in general, low
thermal conductivity, therefore, nanomaterials are used as additives to enhance the properties of base materials
as PCMs.
Paper presents an exhaustive classification of PCMs and nanomaterials used in thermal energy storage
technologies in addition an assessment about their modeling through computational fluid dynamics (CFD).
Goal was to emphasize CFD use as an effective tool to increase engineering development of thermal energy
storage technologies
Big data Mining Using Very-Large-Scale Data Processing PlatformsIJERA Editor
Big Data consists of large-volume, complex, growing data sets with multiple, heterogenous sources. With the
tremendous development of networking, data storage, and the data collection capacity, Big Data are now rapidly
expanding in all science and engineering domains, including physical, biological and biomedical sciences. The
MapReduce programming mode which has parallel processing ability to analyze the large-scale network.
MapReduce is a programming model that allows easy development of scalable parallel applications to process
big data on large clusters of commodity machines. Google’s MapReduce or its open-source equivalent Hadoop
is a powerful tool for building such applications.
Gas-Particulate Models of Flow through Porous StructuresIJERA Editor
A recently developed general model of gas-particulate flow is sub-classified in this work. The model takes into
account both the Darcy resistance and the Forchheimer effects, and is valid for variable particle number density
and flow through variable porosity media. The form of governing equations is discussed when the particle
relaxation time is small.
Petrological and Geochemical Studies on Granitoids in BibinagarBhongir Area, ...IJERA Editor
The Granitoids of the Bibinagar- Bhongir area in the Nalgonda district are purely high potassic calc alkaline and
meta aluminous and A-type belongs to Peninsular Gneissic Complex of the Eastern Dharwar Craton. The
petrographic study of granitoids indicates that of pure magmatic origin in the form of different magmatic
textures viz. perthitic, porphyritic and poiklitic textures. Geochemically the granitoids are rich in K2O & Na2O
suggesting source from calc-alkaline magma. The Granitoids are falling mostly in the volcanic arc field on Yb
vs Ta discrimination plot. The REE pattern shows strong Eu negative anomaly, suggesting early separation of
plagioclase and the enhanced level of LILE relative to HFSE in Bibinagar-Bhongir granitoids points to the
subduction zone enrichment and/or crustal contamination of the source region.
Hybrid system with multi-connected boost converterIJERA Editor
Environmentally friendly solutions are becoming more prominent than ever as a result of concern regarding the
state of our deteriorating planet. This paper presents a new system configuration of the front-end rectifier stage
for a hybrid wind/photovoltaic energy system. This configuration allows the two sources to supply the load
separately or simultaneously depending on the availability of the energy sources. The inherent nature of this
Cuk-SEPIC fused converter, additional input filters are not necessary to filter out high frequency harmonics.
Harmonic content is detrimental for the generator lifespan, heating issues, and efficiency. The fused multiinput
rectifier stage also allows Maximum Power Point Tracking (MPPT) to be used to extract maximum power from
the wind and sun when it is available. An adaptive MPPT algorithm will be used for the wind system and a
standard perturb and observe method will be used for the PV system. Operational analysis of the proposed
system will be discussed in this paper. Simulation results are given to highlight the merits of the proposed
circuit
An Analysis of the Existing Frameworks in Cloud Computing Adoption and Introd...IJERA Editor
The coming up of cloud computing in recent years has evolved an interest from different organisations,
institutions and users to take advantage of web applications. This is a result of the new economic model for the
Information Technology (IT) department that cloud computing promises. The model promises a shift from an
organisation required to invest heavily for limited IT resources that are internally managed, to a model where
the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud
computing also promises scalability of resources and on-demand availability of resources. Although, the
adoption of cloud computing promises various benefits to an organisation, a successful adoption of cloud
computing in an organisation requires an understanding of different dynamics and expertise in diverse domains.
Currently, there are inadequate guidelines for adopting cloud computing and building trust. This paper aims to
evaluating a shortlist of eleven frameworks for Cloud Computing and concludes that none of them addresses all
Cloud adoption challenges fully so that a new framework is required. Later we explain our proposal for the
framework discusses and topics related to the proposed framework.
Conceptual Model of Information Technology and Its Impact on Financial Univer...IJERA Editor
Information technology is heart of information system; however, it‟s proved information system with data,
information and knowledge from the component of information technology (hardware, software, database and
network communication) because they play a critical role in any organization and affects managers and their
organizations in financial University performance. Information Technology can be defined as the used of
electronic means which involve access storage, processing of electronic technology to handling of information.
The study aimed to made Conceptual model and investigate the uses Information Technology for employee at
Private University in the north of Jordan from their perspective of Users‟ satisfactions and impact of
Information Technology on University performance of employee. The study method was a descriptive survey
which uses questionnaire to collect data, questionnaire was justified and developed by the researcher to measure
the university performance based on previous studies its applied to (90) employee from University in the north
of Jordan. The study was using SPSS to analyses data. The results indicate that uses Information Technology for
employee at University in the north of Jordan there were a statistically significant relationship between the
Information Technology and University performance of employee at University in the north of Jordan; however
the sample reported a significant in the hypotheses and accepted. The study have Conclusion should gives more
attention to focus on and beneficial of using Information technology applications.
Identification of Sex of the Speaker With Reference To Bodo Vowels: A Compara...IJERA Editor
This work presents an application of Fundamental Frequency (Pitch), Linear Predictive Cepstral Coefficient
(LPCC) and Mel Frequency Cepstral Coefficient (MFCC) in identification of sex of the speaker in speech
recognition research. The aim of this article is to compare the performance of these three methods for
identification of sex of the speakers. A successful speech recognition system can help in non critical operations
such as presenting the driving route to the driver, dialing a phone number, light switch turn on/off, the coffee
machine on/off etc. apart from speaker verification-caste wise, community wise and locality wise including
identification of sex. Here an attempt has been made to identify the sex of Bodo speakers through vowel
utterance by following Pitch value, LPCC and MFCC techniques. It is found here that the feature vector
organization of LPCC coefficients provides a more promising way of speech-speaker recognition in case of
Bodo Language than that of Pitch and MFCC.
Design and Implementation of Digital Chebyshev Type II Filter using XSG for N...IJERA Editor
ASIC Chips and Digital Signal Processors are generally used for implementing digital filters. Now days the
advanced technologies lead to use of field programmable Gate Array (FPGA) for the implementation of Digital
Filters.The present paper deals with Design and Implementation of Digital IIR Chebyshev type II filter using
Xilinx System Generator. The Quantization and Overflow are main crucial parameters while designing the filter
on FPGA and that need to be consider for getting the stability of the filter. As compare to the conventional DSP
the speed of the system is increased by implementation on FPGA. Digital Chebyshev type II filter is initially
designed analytically for the desired Specifications and simulated using Simulink in Matlab environment. This
paper also proposes the method to implement Digital IIR Chebyshev type II Filter by using XSG platform. The
filter has shown good performance for noise removal in ECG
Fibrous Scaffold Produced By Rotary Jet Spinning TechniqueIJERA Editor
Poly(L-lactic acid) (PLLA)/ poly(ɛ-caprolactone) (PCL) mesh was produced by Rotary Jet Spinning (RJS)
process. RJS is a simple method which fabricates three-dimensional fibers by exploiting a high-speed rotating
nozzle o form a polymer jet which undergoes stretching before solidification without the need of high voltage.
Blend meshes were characterized by scanning electron microscopy (SEM), thermo gravimetric analysis (TGA),
differential scanning calorimeter (DSC) and infrared spectroscopy Fourier transform (FTIR). SEM imagens
provides information about the morphological structure, which confirmed the production of fibers using RJS.
Data obtained by thermal analyzes indicated the immiscible property of PLLA/PCL blend and also the total
solvent evaporation. As a preliminary in vitro assay it was investigated using Vero cells, was not found any sign
suggesting cell toxicity, indicating biocompatibility. Thus, this report suggests the use of PCL/PLLA mesh as
fiber scaffold substrate for tissue engineering
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Envir...IJERA Editor
Sharing of Information in a cloud environment is inevitable in onward of cloud computing environment.
Security in accessing cloud information has to consider many issues such as authentication, cost, time in
uploading and many other criteria. Authentication of data is must for utilizing the others data and uploading our
own data has become tedious. Getting Certificate and for every access is long process and cost increases. Ring
signature gives an assurance to the user to build an unidentified and accurate information sharing system. It
allows a data individualistic to innominate authenticate his data which can be put into the cloud for storage or
analysis purpose. In Identity-Based (ID Based ) Ring Signature Members of this cluster can easily share data
avoiding the pricey certificate verification as done in the usual procedure. Forward Security re authentication
overhead is avoided in Ring Signature by using RSA Algorithm we further provide increased level of security in
reduced time, efficient and simple manner.
On-state Torque Optimization for Synthesized MR FluidIJERA Editor
Magneto-Rheological (MR) fluids are the suspension of magnetizable particles in a carrier fluids and their
rheological properties viscosity etc. can be changed by varying the magnetic field applied to it. Due to such
variable characteristics, these MR fluids find wide application in various automotive industries devices e.g. MR
brakes and MR clutches etc. In MR brakes, the MR fluids generate a resisting torque (between housing and
rotor) within milliseconds on the application of magnetic field. In the present work, the optimal values of MR
fluid constituents is obtain which give the high values of on-state torque. For this, 18 samples of MR fluids are
prepared and their compositions are selected using L-18 orthogonal array. Further, an experimental approach is
used to determine and validate the torque generated by the MR fluid samples. For this purpose, experimental
setup is designed and fabricated in-house. ANOVA is used to statistically analyze the significant factors which
affect the on-state torque which in-turn gives the optimal composition of MR fluid. For this optimal composition,
on-state torque of the MR fluid sample came out to be 0.887587 N-m.
A Study on Guided and Unguided Transmission Medias and a Proposed Idea to Ext...IJERA Editor
Networking in computers enables sharing of information by interconnecting the computing devices. The sharing
of information is possible through transmission media. The transmission media is classified as wired or wireless.
Wired media have limitation in geography. But wireless is not bounded by geography. In the wireless world the
first wireless technology was infrared and it was a very slow technology. So, inventions were continued to find a
better wireless technology, finally we got Bluetooth, Wi-Fi ,WI-MAX and Gi-Fi. In this paper we discussed
about different Wired and Wireless Technologies and given a proposed idea to extend the limit of Gi-Fi beyond
10 meters.
An Overview of Landslide Forecasting Using Wireless Sensor Network and Geogra...IJERA Editor
Landslides are natural disasters cause losses in many human lives and damage properties every year around the
globe. Using of physical and electronic monitoring makes possible in prediction and prevention losses from
landslide. Today, the wireless sensor network technology has been developed rapidly for landslide predictions.
The primary object of this present paper is to overview the landslide prediction method using wireless sensor
networks (WSN) and geographical information systems (GIS). The paper focuses on various landslide
conditioning factors, WSN design requirement, and small scale down slope model similar to study area (hazard
location). Landslide prediction database to support warning system are also discussed.
Effect of MR Fluid Damping during Milling of CFRP LaminatesIJERA Editor
Machining of fiber reinforced composites is an essential activity taken up in order to integrate them with other
components. Carbon fiber reinforced polymer (CFRP) composites are difficult to machine owing to the nonhomogeneity
of their constituent materials and abrasive nature. As these materials involve more than one phase,
the variation of cutting forces is rather large, which leads to tool chatter and poor surface finish. Therefore the
proper selection of the tool, process parameters and the ability to control the machining forces would result in
better tolerances and improved surface finish. In this study, multiple slots are machined in CFRP laminates
under different machining conditions of spindle speed, feed and depth of cut. A comparative study is made by
conducting the same set of experiments under the influence of the magneto- rheological (MR) damping in order
to assess the tool deflection. It is observed that the MR fluid damping reduces the tool deflection and thus
improves the quality of machined surfaces.
The Internet of Things (IoT) is thriving network of smart objects where one physical object can exchange information with another physical object. In today’s Internet of Things (IoT) the interest is the concealment and security of data in a network. The obtrusion into Internet of Things (IoT) exposes the extent with which the internet of things is vulnerable to attacks and how such attack can be detected to prevent extreme damage. It emphasises on threats, vulnerability, attacks and possible methods of detecting intruders to stop the system from further destruction, this paper proposes a way out of the impending security situation of Internet of things using IPV6 Low -power wireless personal Area Network.
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...cyberprosocial
The Internet of Things, or IoT, has become a disruptive force in the era of connected devices, changing the way we interact with our surroundings. In the center of this networked web is an essential element called IoT gateways. The purpose of this paper is to offer a thorough overview of IoT gateways, their importance in enabling smooth device connectivity, and the critical necessity to safeguard these gateways against growing cyber threats.
A signature-based data security and authentication framework for internet of...IJECEIAES
Internet of things (IoT) is the next big revolution in modernized network technologies connecting a massive number of heterogeneous smart appliances and physical objects. Owing to these technologies' novelty, various issues are characterized by security concerns are the most prioritized issue. A review of existing security approaches highlights that they are very particular about the solution towards a specific attack and cannot resist any unknown attacker. Therefore, this manuscript presents a novel computational model that introduces a unique authentication process using a simplified encryption strategy. The simulated study outcome shows that the proposed system offers efficient security and efficient data transmission performance in the presence of an unknown adversary. Hence, the study outcome exhibits better effects than frequently used security solutions when implemented in a vulnerable IoT environment.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/40008/internet-of-things-iot-anytimeanywhereanything-connectivity/nidhi-chadha
Cybersecurity stands as the bedrock of our digital world, safeguarding systems, networks, and data from a rising tide of cyber threats. In the era of the Internet of Things (IoT), wherean ever-expanding array of devices and objects are seamlessly interconnected, the importance of cybersecurity has escalated to unprecedented levels.
In the past decade, internet of things IoT has been a focus of research. It makes more intelligent to core element of modern world such as hospitals, cities, organizations, and buildings. Usually, IoT has four major components including sensing, information processing, applications and services, heterogeneous access and additional components e.g. Security and privacy. In this paper, we are presenting security perspective from the perspective of layers that comprises IoT. In this we focus on the overview of IoT security perspective. Sunilkumar Malge | Pallavi Singh ""Internet of Things (IoT): Security Perspective"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24010.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/24010/internet-of-things-iot-security-perspective/sunilkumar-malge
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Similar to Security Issues and Challenges in Internet of Things – A Review (20)
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Final project report on grocery store management system..pdf
Security Issues and Challenges in Internet of Things – A Review
1. Lilima Jain.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 2) April 2016, pp.46-53
www.ijera.com 46|P a g e
Security Issues and Challenges in Internet of Things – A Review
Lilima Jain, Kishore Kumar. U, Vishanth Fastino. A, Prof. R. Manjula
SCOPE, VIT UNIVERSITY Vellore-632014, Tamil Nadu
ABSTRACT
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
Keywords: Internet of Things, Security, Communication, Issues and Challenges in Maintenance Phase.
I. INTRODUCTION
The Internet of Things (IoT) is a
combination of internet and the web in the physical
world paradigm. It has a widespread development
in distributed devices with embedded identification
and sensing technologies. These devices have the
unique addressing systems through which they can
be identified in a complicated network
environment. Internet of Things provides the means
to communicate and interact with the devices and
the physical entities. That it can cooperate with
their neighbouring devices to reach the common
goal. Nowadays people are using Internet of Things
for sending and receiving emails, accessing internet
and other distributed devices. Internet of Things is
a backbone for internet connectivity of physical
objects which have computation and
communication capabilities around the sensing
devices.
This invention helps to make the
embedded devices smart and letting them to
interconnect with the other devices in the physical
world that it can work faster and easier. This will
make the new change in the field of Information
and Technologies. Its well known demand in this
era made it to connect with the various
technologies with the base as internet. And for
making this communication and coordination
secure. It provides a new way to service and
communication.
Within certain perspective “Internet of
Things” is briefly use to refer:
1. The distributed global networks connect all the
devices through the internet connectivity so
that they can sense and respond according to
the communication and information.
2. Some technologies are necessary to sense the IoT
like embedded devices, RFID, sensors, actuator
networks, peer to peer communication devices.
3. Together working of all applications and services
for investing on the techniques to start the new
business and marketing opportunities.
In this review paper, The aim is to give a
proper view of the security issues in the Internet of
Things and also provide a review on the Internet of
Things applications and research challenges. The
protection and security concerns encompassing IoT
frequently shows themselves as a treat to end-client
appropriation and adversely sways trust among
end-clients in these arrangements. In this paper, it
presents a reference programming design for
building cloud enabled IoT applications in backing
of community oriented pervasive frameworks went
for accomplishing dependability among end-clients
in IoT situations. We introduce a contextual
investigation that influences this reference design
to secure touchy client information in an IoT
application execution and assess the reaction of an
end-client study finished through a study. Past the
protection and security concerns enclosing IoT
frameworks, it is turning out to be more
unavoidable for pervasive synergistic gadgets to
influence web administrations for information
sharing and correspondence to backend stockpiling
frameworks.
With the coming of distributed computing,
it is not phenomenal for the versatile
administrations that these pervasive gadgets convey
with, to be facilitated in the cloud. Therefore, with
the inescapable area particular protection and
security attentiveness toward distributed
computing, IoT, pervasive frameworks and web
RESEARCH ARTICLE OPEN ACCESS
2. Lilima Jain.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 2) April 2016, pp.46-53
www.ijera.com 47|P a g e
administrations, it is vital to set up a reference
engineering that gives a comprehensive answer for
executing cloud-empowered applications and
administration associations in IoT situations in a
design that enhances the general objective of
accomplishing end-user trust and, thusly, enhance
client reception of IoT applications (Apps).
II. RELATED WORK
Internet of Things is related with the
embedded devices and the sensors. we studied
about how to make the IoT secure. Here there are
some issues which we need to secure and how to
test that it is insecure and the prevention
mechanism.
The following needs to be test for the Internet of
Things:
1. Insecure web interface
2. Insufficient Authorization or login
3. Insecurity in Network Services
4. Lack of Transport Encryption
5. Privacy Concerns
6. Insecurity in cloud interface
7. Insecure remote interface
8. Insufficient security configurability
9. Insecure software/Firmware
10. Poor Physical Security
1. Insecure web interface
Insecurity in web interfaces might bring
about the loss of information or information
corruption, lack of responsibility denial of access
and it might prompt complete gadget takeover. An
unstable interface in web can be available [2]when
issues, for example, account enumeration, lack of
record lockout or because of the vicinity of feeble
credentials. Issues with the web interface are
anything but difficult to find when analyze the
interface physically with the testing devices
Checking for an insecure web interface includes:
Determining if the default user name and
password can be changed during initial product
setup[9].
Determining if a specific user account is
locked out after 3 failed login attempts
Identifying an authentic account in case of
account recovery and password recovery.
Reviewing the interface for certain issues such
as cross site scripting, request forgery and sql
injection.
2. Insufficient Authorization or Login:
Authentication is required for secure
login. Insufficient authorizationauthentication is
prevalent as it assumed that the users will be
provided with the interfaces only on the secure
networks and not to external users on other
networks insufficient authorizationauthentication
results in data loss.
Lack of secret key unpredictability
Poorly ensured certifications
Lack of two element verification
Privilege Escalation
Lack of Role Based Access control
3. Insecurity in Network Services
Unstable System Administrations might
be vulnerable to cushion flood assaults or assaults
that make a disavowal of administration condition
leaving the gadget difficult to reach to the client.
Foreswearing of administration assaults against
different clients might likewise be encouraged
when shaky system administrations are available.
Insecure system administrations can frequently be
recognized via mechanized apparatuses, for
example, port scanners and fuzzers.
Checking for insecure network services
includes:
Reviewing so as to figure out whether unstable
system administrations exist your gadget for
open ports utilizing a port scanner.
As open ports are recognized, each can be tried
utilizing any number of computerized
apparatuses that search for DOS
vulnerabilities, vulnerabilities identified with
UDP administrations and vulnerabilities
identified with cushion flood and fluffing
assaults.
Investigating system ports to guarantee they
are completely fundamental and if there are
any ports being presented to the web utilizing
UPnP.
4. Lack of Transport Encryption:
Absence of transport encryption permits
information to be seen as it goes over nearby
systems or the web, Absence of transport
encryption is pervasive on neighbourhood systems
as it is anything but difficult to expect that nearby
system movement won't be broadly noticeable,
however on account of a neighbourhood remote
system, mis-configuration of that remote system
can make activity unmistakable to anybody inside
of scope of that remote system. Numerous issues
with transport encryption are viewing so as to
anything but difficult to find basically arrange
movement and hunting down decipherable
information.[9] Mechanized devices can likewise
search for appropriate execution of regular
transport encryption, for example, SSL and TLS.
3. Lilima Jain.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 2) April 2016, pp.46-53
www.ijera.com 48|P a g e
Checking for lack of transport encryption
includes:
Checking on system movement of the gadget,
its versatile application and any cloud
associations with figure out whether any data
is gone in clear content.
Inspecting the utilization of SSL or TLS to
guarantee it is a la mode and appropriately
executed.
Assessing the utilization of any encryption
conventions to guarantee they are suggested
and acknowledged.
5. Privacy Concerns:
Concerns produced by the gathering of
individual information not withstanding absence of
appropriate insurance of that information is
common. Security concerns are anything but
difficult to find by basically assessing the
information that is being gathered as the client sets
up and enacts the gadget. Robotized apparatuses
can likewise search for particular examples of
information that might demonstrate accumulation
of individual information or other delicate
information.
Checking for Privacy Concerns includes:
Recognizing all information sorts that are
being gathered by the gadget , its versatile
application and any cloud interfaces.
The gadget and it's different segments ought to
just gather what is important to perform its
capacity.
By and by identifiable data can be uncovered
when not appropriately encoded while very
still on capacity mediums and amid travel over
systems.
Assessing who has admittance to individual
data that is gathered.
6. Insecurity in Cloud Interface:
An unreliable cloud interface is available
when simple to figure qualifications are utilized or
account count is conceivable.[8] Unreliable cloud
interfaces are anything but difficult to find by
basically evaluating the association with the cloud
interface and using so as to distinguish if SSL is
being used or the watchword reset instrument to
recognize substantial records which can prompt
record identification.
Checking for insecurity in cloud interface
includes:
Figuring out whether the default username and
watchword can be changed amid beginning
item setup.
Figuring out whether a particular client record
is bolted out after 3 – 5 fizzled login
endeavours.
Figuring out whether substantial records can
be distinguished utilizing watchword
recuperation systems or new client pages.
Auditing the interface for issues, for example,
cross - site scripting , cross – site demand
fabrication and sql infusion.
Evaluating all cloud interfaces for any security
breaches (API interfaces and cloud – based
web interfaces).
7. Insecure Remote Interface:
An unreliable portable interface is
available when simple to figure qualifications are
utilized or account identification is conceivable.
Unreliable versatile interfaces are anything but
difficult to find by just inspecting the association
with the remote systems and using so as to
distinguish if SSL is being used or the secret word
reset instrument to recognize substantial records
which can prompt record count.
Checking for insecure Remote interface
includes:
Figuring out whether the default username and
secret key can be changed amid starting item
setup.
Figuring out whether a particular client records
is bolted out after 3 – 5 fizzled login
endeavours.
Figuring out whether substantial records can
be recognized utilizing secret word
recuperation systems or new client pages.
Looking into whether qualifications are
presented while associated with remote
systems.
Looking into whether two component
verification alternatives are accessible.
8. Insufficient Security Configurability:
Lacking security configurability is
available when clients of the gadget have restricted
or no capacity to modify its security controls.
Deficient security configurability is obvious when
the web interface of the gadget has no choices for
making granular client authorizations or for
instance, constraining the utilization of solid
passwords. Manual audit of the web interface and
its accessible alternatives will uncover these lacks.
Checking for insufficient security
configurability includes:
Looking into the managerial interface of the
gadget for choices to fortify security, for
example, constraining the making of solid
passwords.
4. Lilima Jain.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 2) April 2016, pp.46-53
www.ijera.com 49|P a g e
Evaluating the regulatory interface for the
capacity to isolated administrator clients from
typical clients.
Evaluating the regulatory interface for
encryption alternatives.
Evaluating the regulatory interface for
alternatives to empower secure logging of
different security occasions.
Evaluating the regulatory interface for
alternatives to empower alarms and notices to
the end client for security occasions.
9. Insecure Software/ Firmware:
The absence of capacity for a gadget to be
overhauled presents a security shortcoming all
alone. Gadgets ought to be able to be redesigned
when vulnerabilities are found and
programming/firmware upgrades can be frail when
the overhauled documents themselves and the
system association they are conveyed on are not
secured. Programming/firmware can likewise be
shaky on the off chance that they contain
hardcoded touchy information, for example,
accreditations. Security issues with
programming/firmware are moderately simple to
find by just reviewing the system activity amid the
overhaul to check for encryption or utilizing a hex
editorial manager to examine the upgrade record
itself for fascinating data.
Checking for insecure software/firmware
updates includes:
Looking into the upgrade record itself for
introduction of delicate data in intelligible
configuration by somebody utilizing a hex
alter apparatus.
Looking into the creation record overhaul for
legitimate encryption utilizing acknowledged
calculations.
Looking into the creation record overhauling to
guarantee it is legitimately marked.
Looking into the specialized technique used to
transmit the upgrade.
Checking on the gadget for legitimate approval
of marked upgrade documents.
10. Poor Physical Security:
Physical security shortcoming are
available when an assailant can dismantle a gadget
to effectively get to the capacity medium and any
information put away on that medium.
Shortcomings are additionally present when USB
ports or other outer ports can be utilized to get to
the gadget utilizing highlights proposed for
arrangement or upkeep.
Checking for poor security includes:
Inspecting how effortlessly a gadget can be
dismantled and information stockpiling
mediums got to or evacuated.
Auditing the utilization of outer ports, for
example, USB to figure out whether
information can be gotten to on the gadget
without dismantling the gadget.
Looking into the quantity of physical outside
ports to figure out whether all are required for
appropriate gadget capacity.
Looking into the managerial interface to figure
out whether outside ports, for example, USB
can be deactivated.
Looking into the managerial interface to figure
out whether regulatory capacities can be
restricted to neighbourhood get to as it were.
III. MOTIVATION
The reference architecture displayed in
this paper gives a structure to guaranteeing that
protection and security become the dominant focal
point all through the application improvement
lifecycle in the quest for augmenting the guarantee
of IoT, Ubiquitous processing and Distributed
computing originals. In inferring our reference
design, we layout the significant segments of
cutting edge IoT frameworks that can profit by
safeguarding security and information protection
by considering a portion of the key parts of IoT
frameworks in the accompanying relevant
situations:
Scenario 1:
A home mechanization checking
administration that is fit for watching the use of
power in a given family unit and flawlessly
manages the home's utilization of power by taking
in the inclinations of the family unit in correlation
with ideal force utilization best practices of other
neighbouring family units of comparative size .
Scenario 2:
An Online Social Networking (OSN)
administration that is coordinated with a pervasive
eyewear gadget, similar to Google Glass, for
catching pictures and recording recordings of
fascinating minutes. The administration is thought
to be valuable for putting away the recorded
photographs and recordings in cloud capacity while
empowering the end-client to share the put away
media with different companions in the OSN too as
free.
Scenario 3:
A motion picture suggestion
administration that influences past media content
review designs and the inclinations of persuasive
5. Lilima Jain.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 2) April 2016, pp.46-53
www.ijera.com 50|P a g e
individuals in a specific family client's circle of
OSN companions to suggest future motion pictures
that will be of hobby to the client. This situation is
utilized for our situation study execution.
In accordance with the situation introduced over, a
percentage of the major parts that have their own
particular aspects for protection and security
concerns include:
End-User Preferences for Security, Privacy and
Trust Cloud Computing: as a cloud-facilitated
web alternately versatile administration and
cloud-based information stockpiling
Ubiquitous Computing: spoke to by the Kinect
Sensor, Tablet gadget and a Smart TV
Service Oriented Architecture (SOA): as the
Facebook Graph API (web administration)
utilized for surmising the inclinations of
compelling companions in a given family
part's OSN circle and in addition the YouTube
API (web administration) for spilling a film.
Network correspondence crosswise over
remote systems for transmitting and accepting
information.
Reference Architecture:
A portion of the key concerns inborn in
every layer of the IoT reference design.
A. Security and Privacy in the Ubiquitous Sensors
and Gadgets in the Smart Environment:
In considering the security and protection worries
of IoT applications, it is critical to focus on a
percentage of the security also, protection
challenges relating to pervasive gadgets and
sensors that are regularly working universally to
gather and trade information in nature. From a
security and security point of view, a portion of the
key prerequisites that can be tended to at this layer
of the IoT application incorporate. User
recognizable proof and approval to control get to
and implement consents and approval levels for
different segments of the framework.[4]
• Tamper resistance of the physical and sensible
gadget. Since IoT gadgets are regularly unattended,
physical assault vulnerabilities are basic.
• Content security - through computerized rights
administration (DRM) of substance utilized as a
part of the framework.
• Data security to ensure touchy client information.
• Data interchanges and capacity security through
defensive measures for both information in-travel
and information at rest.
• Secure system interchanges to guarantee that
system interchanges between pervasive gadgets and
outer administrations are just approved through
secure association channels (for instance, the
remote correspondence in the shrewd home
environment of our contextual investigation must
be transmitted through the client's assigned "home"
remote switch, as a matter of course.
• Privacy in pervasive registering comes to play on
the grounds that the route in which the gadget or
sensor gathers information about the end-clients
may strife with the client's security inclinations for
a specific situation. These security obstructions and
inclinations must be protected keeping in mind the
end goal to ingrain end-client trust in the
framework.
Fig, IoT Reference Architecture
B. Security and Privacy in the Cloud Computing
Layer: Distributed processing can be portrayed as
"a model for engaging general, supportive, on-
interest framework access to a typical pool of
configurable figuring resources (e.g., frameworks,
servers, stockpiling, applications, and institutions)
that can be easily recognized and made for the
public with very less effort from the management
or the organization ".
We consider the related layers in an IoT
arrangement that makes utilization of an open
cloud arrangement:
• Services Layer - which incorporates:
o Security Applications.
o Data administration frameworks.
o Operating Systems.
• Server Virtualization layer
• Physical Hardware layer - which incorporates:
o Physical equipment
o Network correspondence framework.
C. Security and Privacy in the IoT Application and
Service Layer:
Security issues in integrating mobile
agents and devices with services can be categorized
as: Confidentiality, Authentication, Authorization,
Integrity, Non repudiation, Privacy and
Availability.
The IoT application client interface itself
may have its own particular protection and security
concerns[1]. Maybe what’s more, the outsider outer
administrations utilized in the arrangement ought to
6. Lilima Jain.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 2) April 2016, pp.46-53
www.ijera.com 51|P a g e
be represented to guarantee that they ensure the
end-client's protection and security inclinations.
IV. ISSUES AND CHALLENGES OF
INTERNET AND THINGS
Issues of IOT:
To the different functionalities and
originated from different technology and
application fields are belonging to the same
communication environment. IoT devices have
various variety in it ranges from:
Wireless: IoT devices are the mode for Wireless
communication modules (e.g, Bluetooth, WiFi,
ZigBee etc.) and it can also communicate with its
neighbouring devices. These wireless networks
have the sensors attached with it through which it
can connect with the network nodes through the air
channel.
Heterogeneous: The IoT have the high level of
heterogeneity than the Internet. As these both
objects belongs small RFID tags to the large
connected servers.Thus, comparing security and
protection measures ought to be interface-
accommodating and perfect with different sorts of
IoT equipment.[8]
Specificity: Vast dominant part of current IoT
gadgets (e.g., SmartBand) are intended for a
specific utilize and could gather delicate individual
data (e.g., circulatory strain, heart rate, living
propensity, and so on.), in which case how to
viably secure client protection will be a major
concern. In expansion to buyer hardware, IoT
gadgets are more utilized in modern and rural
computerization. For instance, IP observation
cameras are generally used to screen resource
status in the inventories. Bargained IoT gadgets
could uncover huge competitive advantages.
Asset Constrained: Most IoT gadgets are minimal
effort equipment with obliged assets as far as
figuring, correspondence, and capacity capacities,
which requires comparing security and protection
measures to be lightweight and practical. For
instance, latent RFID labels utilized to track and
follow products in the store network are normally
prepared with straightforward read/compose
operations, XORing with irregular numbers, and
cyclic redundancy check (CRC) capacities. Remote
sensor system (WSN) sensors are normally
outfitted with ease microcontrollers with little piece
width.[10]
Fig, Sensors
Infectivity: Since more often than not IoT gadgets
are associated with the system and more often than
not have the same system key or gathering key
inside of a apparently trusted range (e.g.,
amusement parks, music shows, sports diversions,
and so forth.), if one gadget is traded off, the
enemy could undoubtedly hack its neighbouring
gadgets with the deciphered system/bunch key. For
instance, IoT gadgets inside of the same ZigBee
system will scramble parcels utilizing the common
system key subsequent to confirming themselves to
the trust focus with their connection keys .
Portability: Many IoT gadgets (e.g., advanced
mobile phones) are versatile and would move
together with their clients. Therefore, their
correspondence neighbourhood will be changed a
periodically.Dynamic correspondence
neighbourhood will be a test to verification
techniques in view of altered IP locations or
communication with neighbouring gadgets.
Versatility: The quantity of IoT gadgets on the
earth have been developing exponentially. The
administration of such countless gadgets will be a
major test. Besides, the quantity of IoT gadget sorts
is likewise on the ascent, which raises another test
to gadget confirmation.
Security Challenges
The aforementioned properties raise new
difficulties to security and protection support for
IoTs. General ways to deal with equipment,
programming and system security can't be basically
received to determine the security and privacy
issues related with IoTs. New less weight and
financially savvy arrangements particular to
worldwide supply chains of IoT gadgets should be
proposed to make room for expansive scale
arrangement of IoT gadgets in different territories.
The security and protection challenges related with
IoTs are recorded as takes after:
Component Trust: Against the scenery of
worldwide supply chains, more also, more IoT
gadgets are amassed at abroad assembling plants.
7. Lilima Jain.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 2) April 2016, pp.46-53
www.ijera.com 52|P a g e
components on IoT gadgets are given by various
sellers and pass through numerous elements on
various landmasses before they are introduced in
their last applications. In this connection, fake ICs
or ICs containing equipment Trojans might have
been mounted on the PCBs of IoT gadgets
deliberately or unexpectedly by constructing agents
before they enter the inventory network.
Instruments guaranteeing trust towards segments
given by untrusted merchants ought to be
incorporated into security conventions. As an
illustration, DARPA propelled the SHIELD project
to build up a dielet that empowers IC confirmation
by incorporating solid encryption, sensors, close
field force and interchanges into an infinitesimal
scale chip equipped for being embedded into the
bundle of an IC.
Gadget Authentication: Before touching base at
end-clients, IoT gadgets generally need to go
through numerous substances over the worldwide
inventory network. Cloned or fake IoT gadgets
might likewise enter the store network and be
blended with the credible ones. A few clients might
buy cloned or fake IoT gadgets from dark market
intentionally or unwittingly to spare cash. More
than 700 seizures of fake Cisco system equipment
and marks with an expected retail estimation of
more than $143 million were accounted for by
Division of Justice in 2010 . the remote server
ought to validate one another before getting system
administrations (e.g., downloading important
firmware upgrades).
Equipment Theft: IoT gadgets and now and then
costly segments on them (e.g., focal preparing
units) might be lost or stolen in inventories, amid
conveyance or even after sending. In 2012, 117
electronic robberies were accounted for in the US
with the normal loss of $382,500 per burglary
occurrence . In 2014, 1 million dollars worth of
costly focal handling units were supplanted with
less expensive parts before they were stolen from
Hewlett-Packard distribution center in And over .
Access Control: We allude to the specific
limitation of access to certain equipment or
programming assets as access control. Whenever
stopped into the system, IoT gadgets might be
gotten to by malignant system hubs. True blue
imparting gatherings might likewise attempt to get
to substance surpassing their entrance benefits.
Access control counteracts exercises that could
endanger framework security by obliging what a
client can do straightforwardly, and also what
programs running in the interest of the clients are
permitted to do . Part based access control models
dole out least benefits to framework parts to
complete their professional details. In this instance,
if any of the part is swapped or its qualification is
stolen, the interloper will have negligible access to
different parts of the framework and the effect of
security rupture will be minimized.
Information Confidentiality: Communications
between IoT gadgets and between IoT gadget and
trust focus might experience the ill effects of
listening stealthily since they more often than not
work reporting in real time channel and are secured
by powerless conventions (e.g., ZigBee , EPC
C1G2 , and so forth.). Correspondence in the
middle of door and remote server is more secure
since it is more often than not ensured by solid
conventions (e.g., TLS , IPsec , and so forth.).
Information Integrity: Sensor information and
validation data might be noxiously adjusted in
travel for dissent of-administration assault.
Advanced marks furthermore, message validation
codes can be utilized to secure information
respectability.
Data Confidentiality: Communications between
IoT devices and between IoT device and trust
center may encounter the evil impacts of listening
stealthily since they as a general rule work
reporting progressively channel and are secured by
feeble traditions (e.g., ZigBee , EPC C1G2, et
cetera.). Correspondence amidst entryway and
remote server is more secure since it is as a rule
guaranteed by strong traditions (e.g., TLS, IPsec ,
etc.).
Data Integrity: Sensor data and acceptance
information may be poisonously balanced in go for
difference of-organization ambush. Propelled
marks besides, message acceptance codes can be
used to secure data respectability.
V. CONCLUSION
The Internet of Things provides the vision
of its security and privacy. The paper proposed a
systematic and cognitive approach for IoT security.
The development of embedded devices leads to the
new directions for both research and business. In
this review paper, given a overview for the security
issues and challenges in the Internet of Things. By
the use of IoT we can operate our machines or
systems from remote places. Many industries are
using IoT nowadays for their work purpose to keep
their industries secure and to make the work easier.
We do hope that this review will be useful for the
practitioners and researchers in this field of IoT.
8. Lilima Jain.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 2) April 2016, pp.46-53
www.ijera.com 53|P a g e
REFERENCES
[1]. Arbia Riahi, Enrico Natalizio, Yacine
Challal, Nathalie Mitton, Antonio Iera “A
systemic and cognitive approach for IoT
security”, 2014 International Conference
on Computing, Networking and
Communications.
[2]. Open Web Application Security Project-
Internet of Things -2014-OWASP.
[3]. Kun Yang, Domenic Forte, and Mark M.
Tehranipoor “Protecting Endpoint Devices
in IoT Supply Chain”- 2015-IEEE.
[4]. Ivor D. Addo, Sheikh I. Ahmed, Stephen
S Yau, Arun Buduru “A Reference
Architecture for Improving Security and
Privacy in Internet of Things
Applications” - 2014 IEEE International
Conference on Mobile Services.
[5]. Tuhin Borgohain, Uday Kumar, Sugata
Sanyal “Survey of Security and Privacy
Issues of Internet of Things”.
[6]. [6] Daniele Miorandi , Sabrina Sicari ,
Francesco De Pellegrini , Imrich Chlamtac
“Internet of things: Vision, applications
and research challenges”- April 2012-
Elsevier.
[7]. Luigi Atzori , Antonio Iera , Giacomo
Morabito “The Internet of Things: A
survey” - Computer Networks, Vol. 54,
No. 15, 2010, pp. 2787-2805-Elsevier.
[8]. Huansheng Ning, Hong Liu “ Cyber-
Physical-Social Based Security
Architecture for Future Internet of Things”
Advances in Internet of Things ”, 2012, 2,
1-7-Scientific Research Publishing.
[9]. R. Roman, C. Alcaraz, J. Lopez and N.
Sklavos, “Key Management Systems for
Sensor Networks in the Context of the
Internet of Things,” Computers &
Electrical Engineering, Vol. 37, No. 2,
2011, pp. 147-159
[10]. ]Kun Yang, Domenic Forte, and Mark
Tehranipoor. ReSC: RFID-enabled Supply
Chain Management and Traceability for
Network Devices. In The11th Workshop
on RFID Security, 2015
[11]. A. Riahi, Y. Challal, E. Natalizio, Z.
Chtourou, A. Bouabdallah, "A Systemic
Approach for IoT Security," , 2013 IEEE
International Conference on Distributed
Computing in Sensor Systems (DCOSS),
pp.351,355, doi:
10.1109/DCOSS.2013.78IoTIP,Boston,
USA, May 2013.
[12]. M. Abomhara and G. Koien, “Security and
privacy in the internet of things: Current
status and open issues,” in Privacy and
Security in Mobile Systems (PRISMS),
2014 International Conference on, May
2014, pp. 1–8.
[13]. L. Zhou and H. C. Chao, “Multimedia
Traffic Security Architecture for the
Internet of Things,” IEEE Network, Vol.
25, No. 3, 2011, pp. 35-40.
[14]. R. Roman, P. Najera, J. Lopez, "Securing
the Internet of Things", IEEE Computer,
vol. 44, no. 9, pp. 51-58.
[15]. Sen, Jaydip. "Security and privacy
challenges in cognitive wireless sensor
networks." arXiv preprint arXiv:
1302.2253 (2013).