0% found this document useful (0 votes)
22 views9 pages

DB Report RM

Db

Uploaded by

Mayank
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views9 pages

DB Report RM

Db

Uploaded by

Mayank
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

The Report is Generated by DrillBit Plagiarism Detection Software

Submission Information

Author Name Jishmitha Ramesh Moolya


Title review article
Paper/Submission ID 2581949
Submitted by [email protected]
Submission Date 2024-11-25 15:41:32
Total Pages, Total Words 7, 2625
Document type Article

Result Information

Similarity 8%
1 10 20 30 40 50 60 70 80 90

Sources Type Report Content


Words < Quotes
14, 0.84%
Internet 3.12%
2.51%

Journal/
Publicatio
n 5.49% Ref/Bib
19.24%

Exclude Information Database Selection

Quotes Excluded Language English


References/Bibliography Excluded Student Papers Yes
Source: Excluded < 14 Words Not Excluded Journals & publishers Yes
Excluded Source 0% Internet or Web Yes
Excluded Phrases Not Excluded Institution Repository No

A Unique QR Code use to View/Download/Share Pdf File


DrillBit Similarity Report

A-Satisfactory (0-10%)
B-Upgrade (11-40%)

8 12 A C-Poor (41-60%)
D-Unacceptable (61-100%)
SIMILARITY % MATCHED SOURCES GRADE

LOCATION MATCHED DOMAIN % SOURCE TYPE

1 www.dx.doi.org Publication
2

2 icrcet.org Publication
2

3 www.mdpi.com Internet Data


1

4 www.xorlogics.com Internet Data


<1

5 www.mdpi.com Internet Data


1

6 www.nsf.gov Publication
<1

7 au.int Publication
<1

8 cloudfront.escholarship.org Internet Data


<1

9 Gender Identification of Human Cortical 3-D Morphology Using Publication


<1
Hierarchical Sparsi by Luo-2019

10 philpapers.org Internet Data


<1

11 scholar.google.co.in Internet Data


<1

12 shs-conferences.org Publication
<1
INTERNET OF THINGS(IOT)

Ananya Jishmitha

4MW22CS019 4MW22CS066
2
Department of computer science and Department of computer science and
engineering engineering

SMVITM ,Bantakal SMVITM ,bantakal

[email protected] [email protected]

Neha Shetty
Anvitha v
4MW22CS100
4MW22CS028
Department of computer science and
Department of computer science and
engineering engineering
SMVITM,bantakal SMVITM ,bantakal
[email protected] [email protected]

Abstract to the internet, enabling seamless data


collection, analysis, and automation. This
The Internet of Things (IoT) has brought
7 connectivity drives innovation in numerous
groundbreaking advancements across various
industries, improving operational efficiency
sectors, including agriculture, urban
and decision-making. However, as IoT
infrastructure, and healthcare. Despite its
adoption grows, so do concerns about security
potential, IoT also introduces significant
and privacy. Malicious actors exploit
security and privacy challenges. This study
vulnerabilities within IoT networks, risking
focuses on addressing these issues by exploring
data breaches, operational disruptions, and
state-of-the-art security methods and creating a
physical harm.
resilient IoT framework. By delving into
domains like precision agriculture, smart home This project seeks to address these concerns by
5
technologies, and industrial monitoring, the exploring the security and privacy implications
research identifies critical vulnerabilities and of IoT across various domains, such as smart
proposes innovative solutions. Ultimately, the agriculture, industrial systems, and home
aim is to develop strategies that strengthen IoT automation. Through a thorough analysis of
systems against potential threats while existing research and real-world cases, the
facilitating secure and efficient operation. study identifies common vulnerabilities and
proposes advanced security solutions, including
Keywords:-IOT, Cyber security, Privacy,
encryption, authentication, and intrusion
Security, Network Security.
detection. By integrating cutting-edge methods
Introduction like chaos-based cryptography and machine
learning algorithms, this research aims to
The IoT has emerged as a transformative enhance IoT system security and protect
technology that connects a vast array of devices
sensitive information from unauthorized o Stage 1: Local clustering at
access. the gateway level to process
data closer to devices.
o Stage 2: Centralized clustering
Literature Review at the cloud level for detailed
analysis.
Paper 1: IoT for Precision Livestock Farming • Use of machine learning algorithms to
(Future Internet) improve device identification and
Techniques Implemented: classification accuracy.
• Integration of IoT devices (sensors, Contributions:
actuators, and controllers) with data • Improved accuracy in classifying IoT
analytics and machine learning. traffic, achieving up to 86.9%
• Real-time monitoring of livestock accuracy.
health, behavior, and environmental • Reduced communication overhead by
factors. processing data locally before
• Automation of tasks such as feeding transmission to the cloud.
and temperature regulation using • Optimized resource allocation for
connected devices. better IoT network efficiency.
Contributions: Advantages:
• Enhanced real-time tracking and Lower data transmission costs, efficient
predictive insights into livestock resource allocation.
health and productivity. Disadvantages:
• Automation reduces labor costs and Gateway-level processing complexity limits
improves animal welfare. scalability.
Advantages: Views:
Reduced labour costs, scalability for multi- While effective in small-scale systems,
farm operations. simplifying local algorithms could improve
Disadvantages: usability for larger networks.
High initial costs, energy inefficiency due Technique:
to reliance on non-renewable sources. The paper proposes a two-stage clustering
Technique: approach for analyzing IoT traffic data in
This paper discusses the integration of IoT smart homes. Data is first clustered locally at
devices such as sensors, actuators, and the gateway level and then refined centrally
9
controllers in livestock farming to monitor at the cloud level, improving classification
animal health, environmental conditions, and accuracy while reducing communication
automate farm operations. It employs data 1
overhead. Machine learning is employed to
analytics and machine learning for predictive classify device traffic with high accuracy.
insights, such as milk yield and animal health
trends, enhancing productivity and farm
efficiency. Paper 3: "Guidance Framework for
Views: Developing IoT-Enabled Systems’
This application of IoT transforms livestock Cybersecurity"
farming but requires more energy-efficient How the Technique Was Implemented:
and standardized solutions for broader The paper proposes a Security Level
adoption. Certificates (SLCs) Framework for IoT
ꢀ systems. This framework has five phases:
Paper 2: Two-Stage Clustering for IoT Traffic 1. Classification: Categorizes IoT objects
Analysis (Sustainability) based on hardware capabilities.
Techniques Implemented: 2. Mitigation Guidelines: Provides
• A two-stage clustering approach to security strategies for identified
classify IoT traffic. vulnerabilities.
3. SLC Assignment: Certifies devices scalability testing and dynamic adaptability
based on implemented protections. limits its application in larger, evolving IoT
4. Communication Plan: Ensures secure networks. Future research could focus on
interaction among IoT devices. expanding its applicability to broader IoT
5. Legacy Integration: Adapts older environments.
devices to meet current security
standards. Paper 4: "Review of Smart-Home Security
The framework was tested through a case Using the Internet of Things"
study of a smart home environment, analyzing How the Technique Was Implemented:
how different IoT devices respond to cyber This study reviews IoT architectures for smart
threats. homes, focusing on application, network,
Contribution, Advantages, and perception, and physical layers. It identifies
Disadvantages: vulnerabilities in these layers, such as
• Contributions: unauthorized access and tampering. The
o Provides a structured method paper proposes integrating modern
for assigning security technologies like blockchain, encryption
certificates to IoT devices. protocols, and intrusion detection systems
o Maps IoT-specific attacks to (IDS) to enhance security.
security goals, enhancing Contribution, Advantages, and
system robustness. Disadvantages:
• Advantages: • Contributions:
o Flexibility in adapting security o Comprehensive review of
measures for resource- threats in smart-home IoT
constrained devices. systems.
o Offers detailed mitigation o Highlights the importance of
strategies to handle specific unified security protocols.
IoT attacks. • Advantages:
• Disadvantages: o Focuses on integrating
o Lacks large-scale deployment blockchain and IDS for robust
testing. security.
8
o Limited focus on evolving, o Provides practical
dynamic IoT environments. recommendations for
Technique: addressing specific threats.
The paper proposes a Security Level • Disadvantages:
Certificates (SLCs) framework for IoT devices. o Lacks experimental validation;
It categorizes devices based on their hardware relies on theoretical analysis.
capabilities and assigns security certificates o Limited focus on scalability for
after analyzing vulnerabilities and larger IoT systems.
implementing mitigation measures. The Technique:
framework integrates legacy devices and The study reviews security threats in smart-
ensures secure communication plans between home IoT systems across layers such as
devices, making it adaptable for various IoT application, network, perception, and
ecosystems. The technique is demonstrated physical. It highlights vulnerabilities like
through a smart home case study. unauthorized access and device tampering
Views: while proposing the use of blockchain,
The SLC framework provides a structured intrusion detection systems (IDS), and
approach to addressing IoT security encryption protocols for securing smart
challenges, offering flexibility for devices with homes. The paper emphasizes the need for
limited resources. Its mapping of specific IoT unified security architectures tailored to IoT
attacks to mitigation strategies enhances environments.
system reliability. However, the lack of Views:
1
The paper provides a comprehensive analysis measures are taken in smart-city
of smart-home IoT vulnerabilities and offers environments.
actionable solutions such as robust encryption Views:
and IDS. Its emphasis on integrating modern The IoT-IDS technique is innovative,
technologies like blockchain is relevant to leveraging machine learning for real-time
current trends. However, the lack of threat detection in smart cities. Its
experimental validation limits the practicality applicability extends to diverse IoT use cases,
of its recommendations. Including real-world such as traffic monitoring and public safety.
testing would strengthen its utility for However, the computational overhead for ML
stakeholders. models makes it less suitable for resource-
constrained networks. Optimization of ML
Paper 5: "IoT-Based Intrusion Detection for algorithms is necessary to improve efficiency
Smart Cities" and scalability.
How the Technique Was Implemented:
The paper introduces an IoT-Based Intrusion Paper 6: Security and Privacy Issues in
Detection System (IoT-IDS) for smart cities. It Medical Internet of Things (MIoT)
combines machine learning (ML) with IoT Reference: Elhoseny et al., Sustainability,
sensor networks to detect unusual patterns 2021 【7†source】
and potential threats. The system uses 1. Technique Implementation
anomaly detection algorithms to classify data The paper examines the architecture of MIoT
from IoT devices in real time. systems, discussing their layered structure:
Contribution, Advantages, and Perception, Network, and Application layers.
12
Disadvantages: Security measures are proposed for each
• Contributions: layer, focusing on data confidentiality and
o Combines IoT data with ML attack prevention. Use cases, such as
for real-time intrusion wearable monitoring and real-time health
detection. analytics, illustrate MIoT implementation.
o Demonstrates significant 2. Contributions and Advantages
improvements in identifying • Defined a structured MIoT
anomalies in smart-city architecture and identified
networks. vulnerabilities in each layer.
• Advantages: • Suggested tailored countermeasures,
o Real-time threat detection such as encryption for data transit
ensures proactive measures. and secure cloud storage protocols.
o Can be extended to diverse • Highlighted future research directions
IoT use cases like traffic to advance MIoT security.
monitoring and public safety. Advantages: Enhanced understanding
• Disadvantages: of layered MIoT systems, improved
o High computational overhead data integrity through encryption
for ML models. strategies.
o Performance may degrade in 3. Disadvantages
resource-constrained IoT • Limited real-world implementation
networks. examples to validate proposed
Technique: security measures.
This paper introduces an IoT-based Intrusion • Challenges with scalability and
10
Detection System (IoT-IDS) that combines resource constraints in low-power IoT
machine learning with IoT sensor networks to devices.
6
detect threats in real time. The system 4. Evaluation
processes data using anomaly detection This paper provides a foundational
algorithms to identify unusual patterns and exploration of MIoT but could benefit from
classify potential threats, ensuring proactive more empirical testing. I appreciate its
systematic vulnerability analysis and potential The study introduces a novel modification to
research extensions. AES encryption using chaos theory and logistic
Technique Overview maps for dynamic key generation. A 3D
The authors analyze the architecture of substitution-box (S-box) is utilized to enhance
Medical Internet of Things (MIoT) systems and cryptographic security.
their layered structure: perception, network, 2. Contributions and Advantages
and application layers. The paper identifies • Demonstrated robustness by reducing
security vulnerabilities in these layers and predictability in key generation.
proposes various countermeasures, including • Evaluated performance using smart
encryption for secure data transmission, home IoT devices, ensuring
intrusion detection systems, and secure lightweight cryptography suitable for
storage solutions. The focus is on ensuring resource-constrained environments.
data confidentiality, integrity, and access Advantages: Enhanced AES security,
control within the MIoT ecosystem. adaptability to real-time IoT needs.
My Views 3. Disadvantages
This paper provides a systematic examination • Increased computational complexity
of security issues in MIoT systems, presenting for key generation may strain ultra-
4
a clear understanding of the ecosystem's low-power devices.
vulnerabilities. The layered approach to • Limited scope: Application is primarily
analyzing threats is commendable, as it allows for smart homes, with minimal
targeted solutions for each stage of data evaluation in broader IoT contexts.
handling. However, while the proposed 4. Evaluation
solutions are theoretically sound, their The innovative integration of chaos theory
practical implementation and validation in significantly strengthens AES. While resource-
real-world settings are missing. Future work intensity is a concern, the solution's focus on
should focus on empirical evaluations to improving security makes it a valuable
measure the effectiveness of these solutions. contribution to IoT cryptography.
Technique Overview
2
The authors propose an enhanced version of
the Advanced Encryption Standard (AES) by
integrating chaos theory and logistic maps for
dynamic key generation. This approach
replaces the traditional two-dimensional S-
box in AES with a three-dimensional S-box,
improving unpredictability and security. The
method is particularly designed for resource-
constrained IoT devices, such as those in
smart homes, offering lightweight
cryptographic security.
My Views
This paper introduces a creative and robust
solution to enhance encryption in IoT systems.
By leveraging chaos theory, the authors
effectively address key generation challenges,
3
Paper 7: Enhancing AES Using Chaos and making it difficult for attackers to predict or
Logistic Map-Based Key Generation break keys. However, the increased
Technique computational complexity of the proposed
Reference: Rahman et al., Electronics, 2022 【 method may not be ideal for ultra-low-power
8†source】 devices, a critical consideration in IoT
1. Technique Implementation environments. Despite this, the approach's
adaptability to real-time scenarios and its
focus on data confidentiality make it a My Views
valuable contribution to IoT security research. This paper provides a comprehensive review
of IoT cybersecurity issues, effectively
Paper 8: Cybersecurity in the Internet of covering various aspects like data integrity,
Things in Industrial Management privacy, and authentication. The exploration
Reference: Raimundo et al., Applied Sciences, of emerging technologies such as Blockchain
2022 【9†source】 and machine learning is insightful, offering a
1. Technique Implementation forward-looking perspective on IIoT security.
The paper reviews industrial IoT (IIoT) However, the lack of practical demonstrations
cybersecurity frameworks, focusing on or real-world validations of the proposed
decentralized solutions like Blockchain. It solutions limits its immediate applicability.
11
emphasizes the use of machine learning for Future research should focus on
intrusion detection and secure cloud implementing these ideas in industrial
platforms for data management. settings to evaluate their feasibility and
2. Contributions and Advantages scalability.
• Identified key IIoT challenges, such as
data integrity and authentication. References:-
• Proposed strategies leveraging 1. Rahman, Z., Yi, X., Billah, M., Sumi, M.,
Blockchain to decentralize and & Anwar, A. (2022, March 30).
improve trust among devices. Enhancing AES using chaos and
• Highlighted the potential of 5G logistic map-based key generation
networks in optimizing IIoT security. technique for securing IoT-based
Advantages: Comprehensive review smart home. Electronics, 11(1083).
of IIoT concerns, practical use of 2. Elhoseny, M., Thilakarathne, N. N.,
emerging technologies like Alghamdi, M. I., Mahendran, R. K.,
Blockchain. Gardezi, A. A., Weerasinghe, H., &
3. Disadvantages Welhenge, A. (2021, October 21).
• Lack of practical demonstrations or Security and privacy issues in medical
case studies for proposed solutions. Internet of Things: Overview,
• Over-reliance on Blockchain's countermeasures, challenges, and
scalability and cost-effectiveness, future directions. Sustainability,
which remains unproven in large-scale 13(11645).
IIoT systems. 3. Vardakis, G., Hatzivasilis, G., Koutsaki,
4. Evaluation E., & Papadakis, N. (2024, August 22).
This paper thoroughly discusses IIoT Review of smart-home security using
cybersecurity trends but needs practical the Internet of Things. Electronics,
validations. The exploration of Blockchain 13(3343)
and 5G as enablers of secure IIoT is 4. Terence, S., Immaculate, J., Raj, A., &
noteworthy. Nadarajan, J. (2024, May 13).
Technique Overview Systematic review on Internet of
The authors review cybersecurity challenges Things in smart livestock management
in the Industrial Internet of Things (IIoT) and systems. Sustainability, 16(4073)
discuss modern solutions like Blockchain, 5. Asano, M., Miyoshi, T., & Yamazaki, T.
machine learning, and secure cloud platforms. (2023, December 31). Internet-of-
They highlight the potential of Blockchain for Things traffic analysis and device
decentralized trust management and 5G identification based on two-stage
technology for optimized network clustering in smart home
performance. The paper also emphasizes the environments. Future Internet, 16(17).
role of intrusion detection systems and secure 6. Shah, K., Jadav, N. K., Tanwar, S.,
data exchange in safeguarding industrial IoT Singh, A., Plescan, C., Alqahtani, F., &
applications. Tolba, A. (2023, September 25). AI
and blockchain-assisted secure data-
exchange framework for smart home
systems. Mathematics, 11(4062).
7. Abdulghani, H. A., Collen, A., &
Nijdam, N. A. (2023, April 21).
Guidance framework for developing
IoT-enabled systems’ cybersecurity.
Sensors, 23(4174).
8. Raimundo, R. J., & Rosário, A. T.
(2022, October 20). Cybersecurity in
the Internet of Things in industrial
management. Applied Sciences,
12(1598).

Conclusion:
The Internet of Things (IoT) has revolutionized
many industries, from agriculture to
healthcare. While IoT offers incredible
potential, it also introduces significant
security and privacy risks.
This project explores these challenges as IoT
can be used for the good of mankind, such as
improving livestock farming, understanding
urban traffic, and making smart homes
smarter. The disadvantages are that the IoT
devices being interconnected are prone to
cyberattacks, resulting in the compromise of
data, system disruptions, and even physical
harm.
In order to address these concerns, we have
brainstormed the diverse security strategies,
including advanced encryption techniques,
intrusion detection systems, and strong access
controls. We can develop tailored security
solutions based on the specific vulnerabilities
present in different IoT domains, be it medical
devices or industrial systems.
Ultimately, it focuses on building a future
where IoT technology flourishes without
compromising our safety and privacy. Only by
prioritizing security from the outset do we
unlock the best potential of IoT while
safeguarding our digital world.

You might also like