The Fourth Industrial Revolution represents a fundamental change in the way we live, work and relate to one another. It is a new chapter in human development, enabled by extraordinary technological advances commensurate with those of the first, second, and third industrial revolutions. It refers to
Cyber-physical system for smart logistics based on enhanced honeypot framework
The Fourth Industrial Revolution represents a fundamental change in the way we live, work and relate to one another. It is a new chapter in human development, enabled by extraordinary technological advances commensurate with those of the first, second, and third industrial revolutions. It refers to how a combination of internet-connected technologies is integrating with our physical lives, blurring the boundaries between the physical world and the digital world. The Internet of Things (IoT) being an integral part of the Fourth Industrial Revolution holds great importance. IoT is a new technology paradigm that envisions a global network of interconnected equipment and devices. The IoT network is widely considered one of the most essential areas of future technology, and it is attracting significant interest from a variety of various applications i.e. smart home, smart agriculture, smart cities, smart logistics, etc. The logistics sector is evolving rapidly. Its integration with IoT is making it smart and advanced. As the logistics are becoming smart, it is becoming vulnerable. Today we are more exposed to the internet than ever. Attackers are coming up with more advanced techniques to hack IoT networks. To enhance the security of IoT networks, there are several methods, which include the use of an Intrusion Detection System, Honeypot, etc. IDS are mostly signature-based systems. They detect any intrusion and alert the owner of the system. Whereas Honeypots are decoy systems that mimic the original systems and are less secure and more vulnerable which gives the attacker enough loopholes to attack it using different techniques, thus attracting the attacker towards the honeypot and it also generates log files of the attacks. As the attackers are getting more intelligent day by day, so the conventional IDS and honeypots are incapable to provide security individually up to the par. Hence, we propose an IDS-based honeypot for the detection and prevention of malicious attacks on the IoT network, making the IoT Network secure. We are integrating advanced AI-based IDS with honeypot. The working of AI-based IDS is such that when an attacker attacks the system it detects the attack by checking the abnormality in the data packets. It helps in detecting the type of attack. As the honeypot detects intrusions with the help of the IDS, it is also logging the attacks, which are then analyzed and can be used for patching up any vulnerabilities and the generated logs can also be used for research purposes.
The main objectives of the proposed system are as under:
A honeypot is composed of different components. Its implementation is based on implementing those components. AI-Based IDS is implemented by training a model to detect different attacks while checking the abnormality in the data packet being transferred over the network. Then converting this model to act in real-time. In order to transform it into a honeypot, we generate logs to store the collected data and analyze it.
The hardware required to implement this project is as follows
Raspberry Pi is a single-board computer that can be programmed in multiple ways to perform different tasks. It includes four USB 3.0 ports, an HDMI port, a micro SD card slot for loading an OS, and a camera port for connecting the Pi Camera.

The TL-MR3420 3G/4G Wireless N Router provides 3G/4G and WAN (xDSL, static IP, or dynamic IP) two kinds of broadband connections to get on the Internet, you can via the Internet no matter at home or outside on business. The automatic 3G/4G and WAN failover feature just provide a nonstop internet connection.

Following are the main four benefits of our project,
The technical details of the final deliverable are as under:
The final deliverable will be in the form of a Hardware combined software system with the following capabilities;
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Raspberry Pi 4 Model B 8gb | Equipment | 1 | 35000 | 35000 |
| Raspberry Pi 3 Model B+ | Equipment | 1 | 12000 | 12000 |
| SD Card 128Gb | Equipment | 2 | 3200 | 6400 |
| Keyboard and Mouse | Equipment | 2 | 1600 | 3200 |
| Router (TP link TL-MR3420)) | Equipment | 2 | 4940 | 9880 |
| Network Cable | Equipment | 2 | 1500 | 3000 |
| Thesis Printing | Miscellaneous | 1 | 5000 | 5000 |
| Miscellaneous Printing | Miscellaneous | 1 | 1000 | 1000 |
| Payment for different Conferences | Miscellaneous | 1 | 4000 | 4000 |
| Total in (Rs) | 79480 |
This project is about automatic power source selection using Arduino. . The basic ob...
The main target of this smart dustbin is to monitor the trash level inside the dustbin. Th...
A system for localizing a differential three wheeler robot in a large scale indoor environ...
Provied a smart app application for UPR(university of poonch) which is more secure. a litt...
Summary A prototype of a Robotic Arm, which could be able to work in 5-dimensional movemen...