Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
21 views9 pages

Comprehensive Study of IoT

The document is a comprehensive study on the security of the Internet of Things (IoT) by Mousa Faraj Mousa Alnjar, supervised by Mr. Saleh Awami. It discusses the importance of IoT in enhancing communication and safety, particularly in emergency situations like road accidents, while highlighting the significant security vulnerabilities that exist within IoT devices. The study aims to design a system that improves the response time of emergency services by accurately determining accident locations and addresses various challenges related to data security and privacy.

Uploaded by

mohaimenbolifa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views9 pages

Comprehensive Study of IoT

The document is a comprehensive study on the security of the Internet of Things (IoT) by Mousa Faraj Mousa Alnjar, supervised by Mr. Saleh Awami. It discusses the importance of IoT in enhancing communication and safety, particularly in emergency situations like road accidents, while highlighting the significant security vulnerabilities that exist within IoT devices. The study aims to design a system that improves the response time of emergency services by accurately determining accident locations and addresses various challenges related to data security and privacy.

Uploaded by

mohaimenbolifa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

University of Benghazi

Faculty of information technology

Computer network & communications department

Comprehensive study of Internet of things (IoT) - security


By

Mousa faraj mousa alnjar

4005

Supervisor

MR. Saleh Awami


Abbreviation and notation

IoT Internet of things


ITU International Telecommunication Union
WSN Wireless Sensor Networks
RFID Radio Frequency Identification

Title Table of contents page

Abbreviation and notation…………………………………………......II

Content index…………………………………………………………...II

Figure index………………………………………………………….....II

Chapter I: introduction………………………………………………....1

1.1 Introduction…………..……………………………..………………..2

1.2 problem……………………………………………………….………3

1.3 Objectives and Aim………………………………………….……….4

1.4 Motivation…………………………………………………….……...4

1.5 scope………………………………………………………………….5

1.6 Proposed Workflow Design (Project case study)……………………5

1.7 Project Timeline – Plan………………………………………………6

1.8 References……………………………………………………………7

List of figures

figure 1.1; A scheme providing IoT multi task funcions and uses……….3
Figure 1.2; availability of police and ambulance at crash scene…………4
Chapter I

Introduction

|P a g e 1
1.1 INTRODUCTION:

IoT "Internet of Things" ( figure 1.1 ) is described as an energetic internatio na l


network structure having self-configuring capabilities primarily based totally on
preferred and interconnected communication protocols, in which each virtual and
physical object/things have identities, physical traits, and virtual representation[1].
This term (IoT) become coined through Kevin Ashton, in the year 1999 [2] and later
become officially brought in 2005 with the aid of using the Internatio na l
Telecommunication Union (ITU). Due to fast improvements in cell communicatio n,
Wireless Sensor Networks (WSN), Radio Frequency Identification (RFID), and
cloud computing, communications amongst IoT devices have to grow to be extra
handy than they become before. IoT devices can co-running with one another. IoT
represents the determined magnificence for virtual and physical things in the
surroundings and permits smart communication incorporated with the data network.
The 4 most important capabilities of IoT are sensing; data accessing; heterogeneous
access, programs and services; and security privateness and trust [3]. The World of
IoT consists of a large sort of devices that encompass smartphones, personal
computers, laptops, tablets, and different handheld embedded devices. The IoT
devices are primarily based totally on cost-effective sensors and wi- fi
communication structures to communicate with each other and switch signific a nt
data to the centralized system. The data from IoT devices are in addition processed
withinside the centralized system and introduced to the meant destinations. With
the fast increase of communication and net technology, our day-by-day routines are
extra focused on a fictional area of the virtual world [4]. People can work, shop,
chat (hold pets and vegetation withinside the virtual world supplied with the aid of
using the network), while human beings stay in the actual world. Therefore, it's far
very tough to update all of the human activities with the computerized dwelling.
There is an abounding restriction of a fictional area that restricts the future
improvement of the net for higher services. The IoT has correctly incorporated the
fictitious area and the actual world at the identical platform. The essential objectives
of IoT are the configuration of smart surroundings and self-aware independent
devices including smart dwelling, smart items, smart health, and smart towns
amongst others [5]. Nowadays the adoption price of IoT devices could be very high,
an increasing number of devices are related through the net.

|P a g e 2
Figure 1.1; A scheme providing IoT multi task funcions and uses.

In the future, the IoT will alternate our dwelling patterns and business models. It
will allow human beings and devices to speak anytime, anyplace, with any tool
under perfect situations using any network and any service [6]. The most important
aim of IoT is to create a Superior world for humans in the future. Unfortunately, the
bulk of those devices and programs aren't designed to address the safety and
privateness assaults and it will increase plenty of protection and privateness troubles
in the IoT networks including confidentiality, authentication, data integrity, access
control, secrecy, etc.. On each day, the IoT devices are targeted with the aid of using
attackers and intruders. An appraisal discloses that 70% of the IoT devices are very
clean to attack. Therefore, an efficient mechanism is extraordinarily had to secure
the devices related to the net towards hackers and intruders[7].

1.2 Problem :

With population growth, there's a growth in the number of accidents that show up
each minute. These road accidents are unpredictable and There are situations where
most of the accidents could not be reported properly to nearby police stations and
ambulances on time. The failure of police to attain the scene of the accident quickly
will result in loss of lives of the drivers and occupants. Furthermore, police and
ambulances could know the reason of the accident and understanding the number
of motors that had beenenrolled in the accident and injured people to be sent by
ambulances to the most nearby hospitals respectively.

|P a g e 3
1.3 Objectives and Aim :

The study aims to design a system that determines the exact location of the accident
in order to facilitate the arrival of police cars and ambulances in order to preserve
as much as possible human lives.

- To study a IoT system which will increase the safety of the driver.

- To study how to understand the working principle of sensors and technologies


which will help implementing this project.

-To study how to make Cooperation with the police, ambulance and fire
departments in case of finding the location of the accident and the number of cars
involved in the accident in a short time.

- To study the confidentiality, challenges and security issues of the data revealed by
the IoT security services.

To implement the system using integrated system contains local server , IoT cloud
platform , SMS getway , SQL azure , notification service , IoT service.

1.4 Motivation :

- Saving human lives from the accident scene.

- Assisting the police in finding out the cause of the accident for crimina l
investigations. (figure 1.2)

- Assisting in the work of statistics to know the types of cars prone to accident.

Figure 1.2; availability of police and ambulance at crash scene.


|P a g e 4
- Assisting the police driver of the vehicle in identifying accidents near him and
dealing with them better

- Identify the ways in which accidents are more.

1.5 Scope :

Design the system using IOT to collect the generated data from the cars’ sensors
that have got an accetent across a road.

1.6 Proposed Workflow Design (Project case study)

Azure Notification
IoT serveries service
Cloud
Synchronous
API service
Synchronous API
service
Management Accident was
not harmful
Libyan Hospitals/
Context and location
Database awareness
Libyan Police stations \
SMS getaway Context and location
awareness
Dispatch ambulance
Libyan Traffic and
Licensing Department Dispatch police

GSM send
alert massage
Police
with location Ambulance
Driver reactive

Car accident

|P a g e 5
1.7 Project Timeline – Plan

Tasks Starting Date Expiry Date Duration


collect information abuot the project 1/1/2022 1/31/2022 30
writing chapter 1 2/1/2022 2/28/2022 27
prepear project presentation 3/1/2022 3/13/2022 12
On Vication 4/1/2022 4/30/2022 29
chapter II: prepear liteture review 5/5/2022 5/15/2022 10
chapter III: prepear IoT services 5/16/2022 6/15/2022 30
chapter IV: prepear IoT challenges and
6/16/2022 7/6/2022 20
security issues
chapter V: prepear IoT case study and
7/7/2022 8/8/2022 30
implemention
chapter VI: prepear conclusion and future
8/9/2022 8/19/2022 10
work
chapter VII: prepear final presentation 8/20/2022 8/30/2022 10

9/8/2022 7/20/2022 5/31/2022 4/11/2022 2/20/2022 1/1/2022

collect information abuot the project


writing chapter 1
prepear project presentation
On Vication
chapter II: prepear liteture review
chapter III: prepear IoT services
chapter IV: prepear IoT challenges and security issues
chapter V: prepear IoT case study and implemention
chapter VI: prepear conclusion and future work
chapter VII: prepear final presentation

|P a g e 6
1.8 References:

[1] C. R. Srinivasan, B. Rajesh, P. Saikalyan, K. Premsagar, and E. S. Yadav, “A


review on the different types of Internet of Things (IoT),” J. 0Adv. Res. Dyn.
Control Syst., vol. 11, no. 1, pp. 154–158, 2019.

[2] S. Sarma, D. L. Brock, and K. Ashton, “The networked physical world,” Auto-
ID Cent. White Pap. MIT-AUTOID-WH-001, 2000.

[3] A. Kamble and S. Bhutad, “Survey on Internet of Things (IoT) security issues
& solutions,” in 2018 2nd International Conference on Inventive Systems and
Control (ICISC), 2018, pp. 307–312.

[4] K. Ahir, K. Govani, R. Gajera, and M. Shah, “Application on virtual reality for
enhanced education learning, military training and sports,” Augment. Hum.
Res., vol. 5, no. 1, pp. 1–9, 2020.

[5] K. K. Patel, S. M. Patel, and others, “Internet of things-IOT: definition,


characteristics, architecture, enabling technologies, application & future
challenges,” Int. J. Eng. Sci. Comput., vol. 6, no. 5, 2016.

[6] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,”


Comput. networks, vol. 54, no. 15, pp. 2787–2805, 2010.

[7] M. A. Razzaq, S. H. Gill, M. A. Qureshi, and S. Ullah, “Security issues in the


Internet of Things (IoT): A comprehensive study,” Int. J. Adv. Comput. Sci.
Appl., vol. 8, no. 6, p. 383, 2017.

|P a g e 7

You might also like