Adil Khan 9 months ago
AdiKhanOfficial #FYP Ideas

Energy efficient and cyber secure smart monitoring system

With the widespread adoption of Internet of Things (IoT), the number of IoT devices that are being connected to the Internet is booming day-by-day. More than 20 billion devices are connected over the internet and will increase up to 75 billion in 2025 (Cisco, 2019). On the one hand, IoT is becoming

Project Title

Energy efficient and cyber secure smart monitoring system

Project Area of Specialization

Internet of Things

Project Summary

With the widespread adoption of Internet of Things (IoT), the number of IoT devices that are being connected to the Internet is booming day-by-day. More than 20 billion devices are connected over the internet and will increase up to 75 billion in 2025 (Cisco, 2019). On the one hand, IoT is becoming a sizeable and fast-growing economy. On the other hand, power and security are challenging issues in constrained IoT devices. Communication protocol selection plays a major role in managing power consumption of IoT devices. Devices in IoT usually have constrained resources in terms of memory, processing and power consumption. Also due to limitations of memory and processing capabilities, IoT devices do not have properly secured communication channels, data servers and user interfaces which can ensure user authentication, data privacy and restricted access to cloud resources. The vast amount of data shared across different insecure IoT devices makes these devices a target for hackers, fraudsters and other unethical users interested in such data. If this data falls in the wrong hands, it could compromise entire companies, organizations, military and government agencies not in terms of information but physical loss or damage also occur.

Existing protocols can overburden IoT devices. As a relief, certain light weight protocols (MQTT, CoAP) along with security protocols (TLS, DTLS) have been developed especially for devices that are part of an IoT network. Although application layer offers various communication protocols for IoT, however it is not possible to study every available protocol. In this project, a study and analysis of some of the advanced protocols that are candidates for network communication and security in the field of IoT.

The primary motivation of this project is overcoming security and energy related problems. A simulation based study would be undertaken for the analysis and selection of feasible light weight application layer protocols having lower power consumption and long battery lifetime for IoT devices along with security features. Implementation of selected protocols for secure message transmission in IoT networks for nodes embedded with constrained IoT devices would be done after simulation study. In short, application layer protocols for IoT devices would be developed with features such as lightweight in terms of spectrum utilization, low power network operation and high security.

After the implementation of communication protocol, integration of security protocols with communication protocols for security of IoT devices would ensure cyber security of IoT systems. By implementing communication and security protocols, it would be possible to develop less power consuming and cyber secure IoT based energy monitoring systems with efficient overall performance.

Project Objectives

The main goal of this project is to develop IoT based networks for energy monitoring systems embedded with nodes such as sensors and raspberry pi etc. that can ensure less power consumption, long battery lifetime and security of IoT devices. The primary objectives of this project are sumarized as

  1. Development of protocols for IoT systems
  2. Implementation of protocols in IoT based hardware system
  3. Reduction of power and energy consumption in IoT communication
  4. Improved latency and throughput performance
  5. Cybersecure IoT devices and communications
  6. Cloud data storage

Project Implementation Method

Implementation of the project involves two phases i.e. sensitivity analysis, hardware implementation and performance analysis.

1. Sensitivity analysis of application layer protocols through simulations.

           In sensitivity analysis, MQTT protocol based network will be developed using simulation tool Cooja. Simulation of IoT network using Cooja simulator for feasibility analysis of available protocols would be carried out. The performance of MQTT will be compared with HTTP in order to evaluate its benefits for WSNs. Then same simulations would be performed using CoAP in order to evaluate the performance of these protocols. After simulation results, selection of optimized protocol for implementation would be done. The Contiki operating system and the Cooja network simulator would be used to carry out these simulations. Contiki being a constrained system focuses on the low-power wireless IoT devices is an operating system for networked system.

2.  Implementation of protocols on hardware

           In implementation phase, the physical realization of the communication protocol over IoT network would be executed and integration with security protocol on actual hardware for designing efficient power consuming and cyber secure energy monitoring system would be performed.

3. Performance analysis

           Performance analysis of the final hardware implemented cyber secure monitoring system in different environments.

Benefits of the Project

Based on analysis of application layer protocols, we will implement energy efficient and cyber secure monitoring system. With this proposed system one can use and deploy it in industrial as well as home automation and military purpose.

In the available variants of such projects, communication protocols are implemented without any analysis of communication protocols. This project involves performance analysis and simulation-based implementation of protocols according to project requirements.

Previously no integration of security protocols with communication protocols for IoT systems has been done, specifically in Pakistan for monitoring systems. This project ensures cyber security of monitoring system so its can be used by military and other government and private sectors for monitoring to ensure their data integrity and confidentiality.

The novelty of the proposed solution and the growing demand of security in cyber physical systems mean that the business plan would work quite effectively in the coming years. The developed hardware would be provided to consumers with attractive price packages. Systems would be developed in terms of buying power of various segments of the society. Simple models with conventional lightweight security would be provided to domestic consumers. Organisational consumers would be provided with devices offering better security services such as authentication, confidentiality and integrity. Enterprise consumers could avail world class security features and state-of-the-art soultions with cutting edge technological features of IoT systems.

Technical Details of Final Deliverable

The final deliverable of the project includes

1. Hardware System

               The final deliverable of the project includes complete hardware system enclosed in frame box that can intended to be delivered to a customer and can easily be implemented anywhere like in buildings, organizations, militry basecamps and agriculture forms for secure and smart monitoring purposes.

The hardware of system consists of IoT devices such as sensor tags and rasphberry pi etc. that enclosed in frame box.

2. Simulation results for sensitivity analysis

                                                           The final deliverable of the project also includes simulation and performance analysis results that have been obtained before and after the implementation of monitoring system.

3. Documentation

                  Documentation regarding the smart monitoring system that includes implementation, localization, precautions and maintenance guide.

4. Intellectual property

                   Intellectual property of project idea to ensure register copyrights, trademarks, and patents of the final deliverable product.

                                         

Final Deliverable of the Project

Hardware System

Core Industry

IT

Other Industries

Energy , Health , Security

Core Technology

Internet of Things (IoT)

Other Technologies

Cloud Infrastructure, Others

Sustainable Development Goals

Good Health and Well-Being for People, Affordable and Clean Energy, Industry, Innovation and Infrastructure, Responsible Consumption and Production

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Official Raspberry Pi 4 Equipment11300013000
TI sensor tag CC2650STK long range wireless development kit Equipment3914527435
TI sensor tag CC1350STK long range wireless development kit Equipment2914518290
GPRS Module Equipment120002000
Frame box for project Equipment140004000
Barttery cost Equipment130003000
Thesis and Documentation print Miscellaneous 38002400
Memory card 32 gb Equipment1850850
System deployment cost Miscellaneous 130003000
Total in (Rs) 73975
If you need this project, please contact me on contact@adikhanofficial.com
IMU Based Namaz Khushoo Tracker

Project Summary:   Our project title is IMU Based Namaz Khushoo Tracker. This pr...

1675638330.png
Adil Khan
9 months ago
Lend and Rent

The project ?Lend and Rent? aims to mitigate the need of purchasing new occasional cl...

1675638330.png
Adil Khan
9 months ago
Deepfake detection

DeepFake is a generative deep learning algorithm that creates or changes facial features i...

1675638330.png
Adil Khan
9 months ago
Cloud Based Crime Awareness And Reporting System

The purpose of this project develops a web application for the general public awareness of...

1675638330.png
Adil Khan
9 months ago
Controlling Industrial Machinery & Equipment over Air Gestures

We are developing that will empower the handicap in releasing their mind to worry about pe...

1675638330.png
Adil Khan
9 months ago