Adil Khan 9 months ago
AdiKhanOfficial #FYP Ideas

Cyber security for smart Transportation System

We can actually make such a device which spoof the actual location and show the fake location to the location trackers for the ethical use such as for the crime investigator forces for example FIA etc. Smart transportation systems are  increasingly vulnerable to cyber attacks. Hackers sneak&nbs

Project Title

Cyber security for smart Transportation System

Project Area of Specialization

Cyber Security

Project Summary

We can actually make such a device which spoof the actual location and show the fake location to the location trackers for the ethical use such as for the crime investigator forces for example FIA etc. Smart transportation systems are  increasingly vulnerable to cyber attacks. Hackers sneak  into   the online inventory, navigation, tracking and positioning systems for their malicious activities.Human error from logistics employees also results information and operational security breaches.

                                                                                                          

Project Objectives

This project has following number of objectives.

The objective of  this project is give the security to the crime investigator agencies.

Also give security to the important transportation  system.

One purpose of location spoofing is to gain access to a networks that authenticate users based on IP addresses. More often, however, attackers will spoof a target's IP address in a denial-of-service attack to overwhelm the victim with traffic.

Project Implementation Method

Generally, there are two categories of attacks on localization systems. The first category is location concealing, where the adversary does not have a specific target fake location. The goal of location concealing is simply to distort the measurements of the localization system so that the true location of the adversary cannot be identified. The other category is location spoofing, where an attacker masquerades as being at another target location by falsifying the measurements of the localization system. (An illustration is given by Figure 1.) .

  • Use IOT access points and user equipment for location of users.
  • Monitoring software uses signal strength measurements to find location of any user in the IOT network.
  • Object teleportation to a different location using cyber.
  • Demonstration of proof of concept implementation of virtual object teleportation in a campus network.
  • Evaluation of different use case scenarios.
  • Determine limitation of each cyber security technique.

Benefits of the Project

Some of the application of this project is given below.

  • CPEC goods transportation from China to Gawadar safely.
  • KPK economic development organization ensuring transit security for CPEC goods and services.
  • Cyber security of IOT devices for monitoring of goods during transport.
  • Building inherent resilience and security in logistic systems both from hacking as well as human employee errors.
  • Spoof the location of the FIA force in case of any raid on the criminals

Technical Details of Final Deliverable

This project needs to be accomplished within a given time frame. We are planning to make a project for Cyber security of  IOT devices for monitoring of goods during transport. And spoof  the location of the crime investigators agencies for the security.

Final Deliverable of the Project

Hardware System

Core Industry

Transportation

Other Industries

Security , Telecommunication

Core Technology

Others

Other Technologies

Clean Tech

Sustainable Development Goals

Peace and Justice Strong Institutions, Partnerships to achieve the Goal

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
SmartRF06 Evaluation Board  Equipment14000040000
Patch Antennas Equipment31000030000
stationary Miscellaneous 11000010000
Total in (Rs) 80000
If you need this project, please contact me on contact@adikhanofficial.com
Crowd Assessment Solution

Managing, accommodating people on a large scale has always been a problem for every entity...

1675638330.png
Adil Khan
9 months ago
Karachi : The Rise of Mussa

The game is completely based on story of an agent named Mussa who is assigned to find the...

1675638330.png
Adil Khan
9 months ago
Prediction System

Heart disease and diabetes affect millions of people worldwide. Uncontrolled cases can cau...

1675638330.png
Adil Khan
9 months ago
PLC based SMART hydroponic system

In recent years, sensing, smart and sustainable (S3) technologies for Agri-Food 4.0 have s...

1675638330.png
Adil Khan
9 months ago
Artificial Intelligence Based Testing Service Assistance App

In less crowded area it is easier to identify and recognize humans and its actions and act...

1675638330.png
Adil Khan
9 months ago