0% found this document useful (0 votes)
44 views21 pages

Development of A Smart Arduino System For Monitoring and Addressing Cybersecurity Threats

This document outlines a capstone project focused on developing a smart Arduino system aimed at monitoring and addressing cybersecurity threats. The project emphasizes real-time detection and response capabilities, utilizing Arduino technology to create an affordable and effective solution for small-scale environments. It aims to enhance cybersecurity awareness and education while providing a customizable tool for individuals and organizations to improve their security posture.

Uploaded by

joshuapatron261
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views21 pages

Development of A Smart Arduino System For Monitoring and Addressing Cybersecurity Threats

This document outlines a capstone project focused on developing a smart Arduino system aimed at monitoring and addressing cybersecurity threats. The project emphasizes real-time detection and response capabilities, utilizing Arduino technology to create an affordable and effective solution for small-scale environments. It aims to enhance cybersecurity awareness and education while providing a customizable tool for individuals and organizations to improve their security posture.

Uploaded by

joshuapatron261
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

DEVELOPMENT OF A SMART ARDUINO SYSTEM FOR

MONITORING AND ADDRESSING CYBERSECURITY THREATS

In partial fulfillments of the requirement of the course OLCAP1

Presented to:

Professor Jerico M. Vilog

Office in Charge, College of Computer Studies

ICCT Colleges Foundation, Inc

Presented by:

Zulueta, Paul Denzel D.

Colaler, Von Alecyss T.

Conde, Conjielha D.

Flores, Princess Ann S.

Arevalo, N-Jay G.

Rongap Jr. Mariano M.

Pullos, Jessan Hope C.

Empuerto, Christopher Ian C.

1
APPROVAL SHEET

This capstone project entitled "Design and Development of

Automated Plant Watering System Using Arduino and Soil

Moisture Sensor to Household Planting" prepared and submitted

by Paul Denzel Zulueta, Von Alecyss Colaler, Conjielha Conde,

Princess Ann Flores, N-Jay Arevalo, Jr. Mariano Rongap, Jessan

Hope Pullos, Christopher Ian Empuerto, in partial fulfillment for

degree Bachelor of Science in Information Technology (BSIT),

has been examined and is recommended for acceptance and approval.

JERICO VILOG

Adviser

PANEL EVALUATOR PANEL EVALUATOR

Accepted as partial fulfillment of the requirements for the degree

of Bachelor of Science in Information Technology (BSIT).

JERICO VILOG

(Office in Charge, College of Computer Studies)

(ICCT College Foundation, Inc.)

2
ACKNOWLEDGEMENT

This Capstone project is made possible by the generous assistance and

support of numerous people. The researchers want to express their profound

appreciation and gratitude for all of their tireless efforts and dedication on

their behalf.

With great appreciation, the researcher would like to thank their

instructor. Professor Jerico M. Vilog for his continuous encouragement,

patience, and great knowledge. They learned from his guidance as they

conducted their study and wrote their capstone project.

A particular thank you to their parents, who have provided them with

ongoing financial support to complete this study as well as advice,

encouragement, and inspiration throughout their lives through their parental

presence and unfailing guidance.

And lastly, the researcher also wants to express their gratitude to their

members for the joy they have had, the interesting conversation, and the

sleepless hours spent collaborating on deadlines.

3
ABSTRACT

The purpose of this study is to improve cybersecurity measures by

developing an innovative and affordable solution with Arduino technology.

Designing a system that can identify, track, and react to possible

cybersecurity threats instantly is the main goal of this project. A strong

foundation for data gathering and analysis will be offered by the system’s

integration of sensors and communication modules with Arduino. In addition

to providing useful application in home automation and small-scale network

security, this creative Arduino system aims to educate student about the

intricacies of cybersecurity. Its ultimate objective is to promote a culture of

proactive security management and technology awareness, which makes it a

vital tool for both aspiring engineers and educational institutions.

The smart Arduino system's development, deployment, and testing are

all included in the research's scope, with an emphasis on how well it can

identify and address cybersecurity threats. With an emphasis on the financial

advantages of utilizing Arduino technology, the project will investigate real-

world applications in home automation and modest security of networks.

Furthermore, the study will investigate the system's instructional value as a

means of teaching cybersecurity principles and procedures. Consideration will

also be given to prospective advancements and future improvements,

guaranteeing the system's flexibility and efficacy in changing cybersecurity

environments.

4
TABLE OF CONTENTS

ACKNOWLEDGEMENT................................................................2

ABSTRACT................................................................................3

TABLE OF CONTENTS................................................................4

CHAPTER I: INTRODUCTION.......................................................5

BACKGROUND OF THE STUDY..............................................................6

STATEMENT OF THE PROBLEM.............................................................7

SIGNIFICANCE OF THE STUDY..............................................................8

SCOPE AND DELIMITATION...................................................................9

CHAPTER II: CONCEPTUAL FRAMEWORK...................................10

REVIEW OF RELATED LITERATURE AND STUDIES...............................11

REVIEW OF LOCAL LITERATURE...................................................12

REVIEW OF LOCAL STUDIES.........................................................13

REVIEW OF FOREIGN LITERATURE...............................................14

REVIEW OF LOCAL STUDIES.........................................................15

DEFINITION OF TERMS.......................................................................16

CHAPTER III: TECHNICAL BACKGROUND....................................17

HARDWARE........................................................................................ 18

SOFTWARE......................................................................................... 19

CHAPTER IV: RESEARCH DESIGN..............................................20

METHOD OF RESEARCH.....................................................................21

SOURCE OF DATA...............................................................................23

BLIBLIOGRAPHY......................................................................24

CURRICULUM VITAE.................................................................25

5
CHAPTER I: INTRODUCTION

This chapter presents the introduction, background of the study,

statement of the problem, significance of the study, scope and delimitation

and used in the study.

BACKGROUND OF THE STUDY

With the state of technology today, the biggest issue facing people,

companies, and governments globally is cybersecurity. Granted, with the

Internet of Things essentially continuing to provide a never-ending

opportunity for connection, the issues surrounding cybersecurity are vast—

and highly complicated—from Internet of Things breaches to breaches of

networks and hacking of physical objects; the integrity of digital and physical

objects teeters on the edge. Therefore, the only solution to such fears is a

coming together of new technology that will be able to evaluate, detect, and

rectify security problems in almost real-time.

Over the last few years, incidents of cyberattacks and breaches have

increased at an exponential rate, revealing deficiencies across the real and

digital realms. Much of the real world and cyberspace inadequacies rely on

lockdowns in the digital realm—protecting application and digital space

environments and networks. However, the proactive and reactive approaches

and subsequent problem solutions fail to consider real-time interventions or

intrusions. Instead, they become penetration access holes through which

nefarious agents are welcomed. awareness and need for monitoring systems

for critical infrastructure security.

6
The emergence of "Smart" Systems. As the need for all-encompassing

security solutions has increased, so too has the emergence of "smart"

systems that monitor in real time, allowing for proactive and automated

threat detection and response. Deployed by many systems, this includes an

array of sensors, detection, and communication to create more elaborate

monitoring capabilities. In cybersecurity, this translation beyond digital

monitoring systems to include physical layer protection enhances the security

of all facets of a network and its infrastructure. Microcontroller platforms have

enabled the creation of inexpensive yet versatile "smart" systems. For

example, Arduino is an open-source hardware platform with a massive

community support system for ease of design. Essentially, Arduino is a

microcontroller in a box with built-in physical sensors (temp, motion, etc.) and

wireless sensing capabilities. One can create just about anything one desires.

Arduino systems can be effectively programmed to monitor physical

environments using sensors, integrate with network monitoring software for

security oversight, and implement real-time alarms and responses, making

them a reliable and cost-effective alternative to traditional security systems

where scalability and flexibility are essential.

Finally, incorporating smart Arduino systems for monitoring and

preventing cyber security attacks is unique and affordable means to boost

security both digitally and physically. These systems, powered by the

flexibility of Arduino platforms, can be developed to cater to the different

needs of diverse scopes ranging from small scale businesses to large

organizations. Developing such a system has the capability to enable

proactive, more efficient, and less expensive cybersecurity solutions,

7
especially in light of the rapid increase in the range and complexity of cyber

threats.

STATEMENT OF THE PROBLEM

The surge in IoT devices has greatly increased cybersecurity threats,

threatening the security of sensitive data, while current measures tend to be

expensive and complicated, leaving individuals and small organizations

without real-time protection and effective threat response. This study aims to

develop cybersecurity to monitor and address threats using an Arduino

device.

Moreover, this sought to answer the following question:

1. How can a Smart Arduino System be designed and developed to

monitor and address cybersecurity threats in real-time?

2. What are the essential components and features required for an

effective Smart Arduino System for cybersecurity threat monitoring

and mitigation?

3. How can the proposed Smart Arduino System be evaluated and

validated to ensure its effectiveness in addressing cybersecurity

threats?

SIGNIFICANCE OF THE STUDY

Given its several advantages, the creation of a smart Arduino system

for tracking and handling cybersecurity risks has great relevance. The system

8
can identify and react to threats in real-time, as well as the overall security

posture of networks and devices, by combining Arduino with cybersecurity

monitoring technologies. Since Arduino-based solutions are less expensive

than commercial cybersecurity systems, this strategy is especially cost-

effective and available to both individuals and small organizations. Because

Arduino is open-source, it can be customized to meet individual requirements,

allowing for the development of specialized security solutions that can adjust

to various threat scenarios. By integrating Arduino with cybersecurity

monitoring technologies, the system can detect and respond to threats in

real-time, as well as the general security posture of networks and devices.

Due to the lower cost of Arduino-based solutions compared to commercial

cybersecurity systems, this approach is particularly economical and

accessible to both people and small businesses. Due to its open-source

nature, Arduino may be tailored to specific needs, enabling the creation of

bespoke security systems that can adapt to different attack scenarios.

Lastly, open-source projects like Arduino encourage community

collaboration, leading to continuous improvement and innovation in

cybersecurity solutions knowledge and resources. By developing this smart

Arduino system, users can gain a robust and adaptable tool for monitoring

and mitigating cybersecurity threats, contributing to a safer digital

environment.

9
SCOPE AND DELIMITATION

This research focuses on the development of an Arduino-based system

for monitoring and addressing cybersecurity threats in small-scale

environments such as homes, small offices, or schools. The system will use

sensors and modules to detect unauthorized access, network intrusions, or

suspicious activities and provide alerts or countermeasures. Specifically, the

study will; Design and develop a functional prototype using Arduino. And

then, test the system’s ability to detect basic cybersecurity threats. Evaluate

its effectiveness based on accuracy, response time, and usability. Gather

feedback from IT professionals and potential users.

The system focuses only on basic cybersecurity threats like

unauthorized access and network anomalies, not advanced hacking

techniques. Since Arduino has limited processing power, the system cannot

analyze complex cyberattacks in real-time. -The study will be conducted in a

controlled environment, so real-world application may vary. -The evaluation is

based on a limited number of respondents, primarily IT students and

cybersecurity professionals.

CHAPTER II: CONCEPTUAL FRAMEWORK

This chapter discusses the critical role conceptual frameworks play in

all facets of qualitative research and highlights their significance in the field.

Establishing the conceptual framework and theoretical orientation (other

people's work) that serve as the study's frames is the goal of this chapter.

10
REVIEW OF RELATED LITERATURE AND STUDIES

This chapter's cited literature and studies address various concepts,

understandings, ideas, generalizations or conclusions, and developments

related to the development of a smart Arduino system for monitoring and

addressing cybersecurity threats from the past to the present. These studies

and literature also serve as a guide for the researchers as they develop the

project. Information that is pertinent to and related to the current study is

made easier to understand by those that were included in this chapter.

REVIEW OF LOCAL LITERATURE

a. Smart Home Automation and Security System using Arduino and IOT

According to Wadhwani et al. (2018), as technology advances

and people become more reliant on smartphones, it is crucial to have a

technology that can control both domestic and industrial applications

using the internet of things (IOT). Our paper, "Sensing and controlling

the world around using Arduino and IOT," discusses embedded

technologies and the internet of things (IOT) using Arduino, which uses

embedded blocks and script programming for Arduino and sensors like

flex sensors, accelerometers, flame sensors, magnetic sensors, and WI-

FI modules. We describe a home automation and security strategy in

this study. The Arduino will be used to interface with the sensors.

b. Design and Implementation of Surveillance Embedded IP Camera with

Improved Image Quality using Gamma Correction for Surveillance

Camera

11
Purbaya et al. (2017) found that the requirement for an area's

security to be improved is typically related to the assets that are

situated there. The necessity for a gadget that may be employed as a

monitoring tool arises from the protection mechanism of these assets.

A common tool for keeping an eye on a space is a security camera. IP

(Internet Protocol)-based camera surveillance is commonly utilized for

data integration. However, it takes a significant amount of money and

work to maintain a file server and provide data storage. Additionally, if

the surveillance activity is conducted indoors, the absence of lighting

may occasionally make it difficult to see the data being retrieved.

REVIEW OF LOCAL STUDIES

a. Development of Smart Farm Security System with Alarm Mechanism

using Image Processing

Area security is crucial these days, according to a study by

Mendoza et al. (2016). Nobody wants their investments to be harmed

by someone who plans to plunder or destroy the property. The purpose

of this research was to establish a novel method of securing a specific

area and to reinforce the current security system. Using image

processing, this system will identify the individual who entered and

determine whether they are an authorized employee, an intruder, or

an animal that is destroying crops. For security reasons, a closed-

circuit television (CCTV) system will be utilized to keep an eye on the

area and record video. The Graphical User Interface (GUI) will be

addressed by a motion detector that is managed by the Arduino

12
Microcontroller. The proponents will program the GUI to determine

when to take a picture of the video, which will then be shown on the

GUI for image processing to identify the object that was captured. The

alarming system's switch will be an opto-isolator, which is connected to

a parallel port that can be turned from a USB port to a command that

will turn the switch on or off. The device will sound an alert until the

responders turn it off if it detects an intruder or an animal that is

harming crops.

b. Arduino-based Smart Home Warning System

The research report by Sarhan et al. (2020) states that smart

house warning systems are in high demand these days since they alert

owners to potential undesirable circumstances that may arise while

they are distant from their homes. Presenting the design and execution

of a smart home warning system based on Arduino is the goal of this

study. To facilitate communication between users and the suggested

system, the Arduino Uno Microcontroller has been integrated with a

number of compatible sensors, actuators, and GSM. A range of

undesirable events can be effectively recognized, according to the

testing results of the suggested system. Users can receive notifications

about fire, gas leaks, and housebreaking scenarios through SMS

messages, emails with attached photos, and other means.

Furthermore, the suggested system can also take appropriate

measures, such as using water to put out a fire and air ventilation to

lower gas concentrations. The suggested system is very helpful in

13
preventing resource and human life losses brought on by unintended

circumstances.

REVIEW OF FOREIGN LITERATURE

a. Internet of Things (IoT) Security and the Role of Arduino-based Systems

According to Zhao & Ge (2020), IoT devices are highly

susceptible to cyber threats due to their connectivity and limited

security measures. Arduino-based security solutions have gained

attention due to their affordability, open-source nature, and ease of

integration with various sensors. The study emphasizes the importance

of real-time threat monitoring and automated response mechanisms in

securing IoT ecosystems. Zhao & Ge highlight the potential of Arduino

in cybersecurity applications, such as intrusion detection and anomaly

detection, by leveraging machine learning algorithms and encrypted

communication protocols.

b. Embedded Systems for Cybersecurity Threat Detection

A study by Patel et al. (2019) explores how embedded systems,

particularly microcontrollers like Arduino and Raspberry Pi, are being

utilized in cybersecurity frameworks. Their research demonstrates that

lightweight encryption algorithms and intrusion detection methods

implemented on Arduino-based platforms can effectively counter cyber

threats, such as Denial-of-Service (DoS) attacks and unauthorized

access. The study suggests that Arduino’s low-power consumption and

14
adaptability make it a feasible option for real-time monitoring in smart

security systems.

REVIEW OF FOREIGN STUDIES

a. IoT Security and the Role of Arduino-based Systems (Zhao & Ge, 2020)

Zhao & Ge (2020) provide an insightful analysis of the

vulnerabilities of IoT devices due to their connectivity and insufficient

security measures. Their research underscores the effectiveness of

Arduino-based security solutions in mitigating cyber threats. The study

highlights the advantages of Arduino, including its affordability, open-

source nature, and seamless integration with various sensors. A key

contribution of this research is its emphasis on real-time threat

monitoring and automated response mechanisms. The study also

explores how Arduino can be leveraged in cybersecurity applications,

particularly in intrusion detection and anomaly detection, using

machine learning algorithms and encrypted communication protocols.

While the study provides a strong foundation for understanding

Arduino's role in IoT security, it would benefit from a deeper

exploration of real-world implementations and comparative analyses

with other security frameworks.

b. Embedded Systems for Cybersecurity Threat Detection (Patel et al.,

2019)

Patel et al. (2019) examine the use of embedded systems,

specifically Arduino and Raspberry Pi, in cybersecurity frameworks.

Their research highlights the effectiveness of lightweight encryption

15
algorithms and intrusion detection methods implemented on Arduino-

based platforms in countering cyber threats, such as Denial-of-Service

(DoS) attacks and unauthorized access. One of the strengths of this

study is its focus on Arduino’s low power consumption and

adaptability, making it a viable option for real-time monitoring in smart

security systems. However, the study primarily concentrates on

theoretical implementations, with limited practical case studies

demonstrating real-world effectiveness. Further research incorporating

empirical data and field experiments would enhance the study’s

applicability in practical cybersecurity settings.

Both studies provide valuable insights into the role of Arduino in IoT

security. Zhao & Ge (2020) focus on the potential of Arduino in

cybersecurity applications through machine learning and encrypted

communication, while Patel et al. (2019) emphasize the role of

embedded systems in detecting and mitigating cyber threats. Future

research should explore practical implementations and scalability to

strengthen their findings.

DEFINITION OF TERMS

Automation- the technique of making an apparatus, a process, or a system

operate automatically.

IoT- Internet of Things (IoT) refers to a network of physical devices, vehicles,

appliances, and other physical objects that are embedded with sensors,

software, and network connectivity, allowing them to collect and share data.

16
Arduino- an Italian open-source hardware and software company, project,

and user community that designs and manufactures single-board

microcontrollers and microcontroller kits for building digital devices.

Microcontroller- a compact integrated circuit designed to govern a specific

operation in an embedded system.

Technology- the application of scientific knowledge for practical purposes or

applications.

Cybersecurity- the state of being protected against the criminal or

unauthorized use of electronic data, or the measures taken to achieve this.

Cyberthreats- a malicious act that seeks to damage data, steal data, or

disrupt digital life in general.

CHAPTER III: TECHNICAL BACKGROUND

This chapter covers the project's technical aspects, including how the

current system will function and the specifics of the technology that will be

developed and implemented.

Details of the Technology to be used

HARDWARE

17
SOFTWARE

CHAPTER IV: RESEARCH DESIGN

This chapter describes the research methodology utilized in this study,

including the research design, tools and procedures used for data collecting,

and statistical techniques applied to data analysis.

METHOD OF RESEARCH

In this study, the researcher will adopt a quantitative research

approach with a descriptive design to evaluate the effectiveness of a Smart

Arduino system in monitoring and addressing cybersecurity threats. This

method is particularly suited for gathering precise numerical data, enabling

the analysis of statistical relationships between variables involved in

cybersecurity challenges and their corresponding solutions in real-world

scenarios. Through quantitative research, the study will focus on assessing

the system’s performance, accuracy, and efficiency in detecting and

mitigating security risks.

To gain deeper insights into the system’s impact, the study will also

incorporate an experimental design to test the Arduino-based system under

controlled conditions. This will involve collecting data on the system’s

response to various types of cyber threats. The analysis will focus on

18
determining how well the system performs in comparison to traditional threat

detection methods and its scalability for broader application.

Furthermore, a benchmarking technique will be employed to compare

the Smart Arduino system’s performance with other established cybersecurity

solutions. This comparison will provide a clearer picture of the system’s

relative effectiveness in real-world settings. The statistical analysis of these

comparisons will identify key patterns, strengths, and areas for

improvement.

By utilizing a descriptive quantitative research design, this study will

generate measurable data on different aspects of cybersecurity, enabling a

comprehensive assessment of the Smart Arduino system’s capabilities. The

findings from this research will offer valuable contributions to the

cybersecurity field, particularly in providing affordable and adaptable

solutions for threat detection and mitigation.

SOURCE OF DATA

The researchers' primary technique for gathering data was surveys,

which were carried out using structured questionnaires. In order to guarantee

precision and dependability, the gathered data will undergo a methodical

analysis through statistical treatment techniques. The study used secondary

sources to augment the data in addition to primary sources, including

literature, reports, web articles, published journals, and other pertinent

materials. These sources were chosen because of their credibility and

pertinence to the research questions. To make sure they satisfied the

19
necessary requirements for originality, validity, and dependability, the data

gathered from primary and secondary sources was thoroughly examined.

The research's analysis and conclusions were supported by a thorough

and reliable foundation thanks to the combination of primary and secondary

sources. The information gathered from these sources was essential to

meeting the goals of the study and answering the research questions.

20
CURRICULUM VITAE

21

You might also like