Abstract
Internet of things is applied in the devices to enhance the efficiency of the devices by connecting the device from the internet. Internet of things is used in the devices that make the device smart enough & they are also able to communicate with the user. This helps to increase the several systems community & transferring of data in several systems is easy. IoT devices are connecting to the internet to make the operations smart & efficient. A review-based project is in which IoT devices are discussed. The main problem with the project is to enhancing security & privacy in IoT devices & to maintain the accuracy in the data fetched by the device as well. The IoT device is being created by using the machine learning project & in this project area professionals are involved to make the programs or operations secure in the organization. The project is intended for data security maintenance & to make the data private & confidential that is being used in the organization. The impact of making the IoT devices secure would be great on the organizations that concern with the data or information security & privacy. This would help in the data securing device in the organization (Huh, et al, 2017).
Rationale
The scope of the project is to create IoT devices that are connected to the internet by using technology such as artificial intelligence & machine learning. This technology helps to make the device smart into performing operations & also to make the devices intractable as well. The IoT devices would help into the data transformation into the system by making the process secure & effective. The aim of the project is to create IoT devices for the use of the organization that makes the device secure & private. The main of the IoT devices is to learn about the data secured technologies such as Big data & cloud. Developing devices with the use of the IoT & also connecting devices with the internet is the way to make the process more secure, private & confidential as well. The key area of the project is to develop the IoT secured devices that provide the security & privacy to the system & helps into the secured transformation of the data as well. In the final project output data, privacy & security would be achieved that can helps in the data security & confidentiality as well. Inventing IoT based secured devices is the main aim of this project (Huh, et al, 2017).
Purpose and Justification
The main purpose of this project is to learning about the IoT secured devices that is developed by using the machine learning & artificial intelligence devices that helps to achieve the data security & privacy. The aim of the project is to learning the technology that helps into the data security. Topic is important to achieve the data security that can helps into the data security. The plans is to learn about the IoT devices & the technology. This would help the wider community by providing the data secured device to them. This can be implemented in the several fields such as health care, education, agriculture & others as well (Huh, et al, 2017).
Brief Literature Review
According to the author, Huh, 2017, at present, the numbers of the IoT (Internet of Things) are increasing rapidly & the products are created by using technology such as artificial intelligence & the devices are available in the market. People are highly influenced by this type of technology that helps in achieving the data security at a good level. For capturing the environmental data, machine learning technologies are being used in the project or into creating the IoT devices effectively as well. IoT is being used in many factors that can help to achieve the data security & privacy of the data which is the main concern of the organizations & the communities such as in education the use of the IoT can be seen easily by creating the IoT smart device.
Apart from this, in agriculture, health-care, home automation & automobiles in all the fields the IoT is being used & the devices are easily available in the market also for the users to have this. Machine learning, artificial intelligence is the types of technology that helps to make device smart into performing operations & also to make the devices intractable as well. The IoT devices would help into the data transformation into the system by making the process secure & effective. The aim of the IoT technology is to create the IoT devices for the use of the organization that makes the device secure & private. Wider community in the country uses the devices created by the IoT technology. This helps into the several ways that make the data transmission secure & safe as well (Xiao, et al, 2018).
Key area of the project is to develop the IoT secured devices that provides the security & privacy to the system & help into the secured transformation of the data as well. Data is gathered in the IoT devices into the database that is created by big data or others. All such methods or technologies are used in the creation of the IoT devices effectively. Currently, the demand of the IoT device is increasing & this is required to learning the technology that helps into the secured & privately data transmission over the internet. To communicate with the devices over the internet such devices are being created to attract the wider communities. Learning the technologies & the methods such as ML, AI & Big data or cloud to apply in the IoT device creation is a need for the future to available the devices for the users.
Research Questions
To conduct the research on the IoT devices & the technology some research questions are created that would help to achieve & to know about the data security technologies that can help the wider community in many ways. So the list of such questions are:
Que. 1) What are the methods or techniques that are implemented into the IoT devices?
Que. 2) How data security can be achieved in the devices connected to the IoT?
Que. 3) What technologies are implemented in the devices to make it secure & private?
Que. 4) How IoT devices help into the fast data transmission into the several data systems?
Que. 5) What are the effective ways of creating the secured IoT devices?
Conceptual Framework
In the above section, several questions are created to perform research & to collect the data or the information to use in the project. In the start of the project all the data & the information related to the project is created & this would be implemented in the project to achieve the data security & privacy effectively or the technology to implement in the project. Such questions & performing research on those would help to increase the several systems communication capabilities & transferring of data in several systems easily. IoT devices are connecting to the internet to make the operations smart & efficient (Peng, et al, 2018).
A review-based project this is in which IoT devices are discussed. The main problem with the project is to enhancing security & privacy in IoT devices & to maintain the accuracy in the data fetched by the device. All the approaches that can be implemented in the project would help to achieve the target of the project. There are two kinds of approaches that help into the effective data collection methods & they are qualitative & quantitative. These are methods that help into the several ways of data collection such as data by research papers & surveys or interviews. All such questions are used to integrate the data & to use them effectively in the project. This framework is designed for the project in which a number of issues & consent by the user are involved & research would be completed.
Methodology
Research Methods
A methodology is created to use in the project that would help to perform research in the project. The methodology involves some steps such as analysing the information sources. Multiple sources are there on which data can be collected & used in the development of the project as well. By using the qualitative & quantitative research methods data or the related information can be easily achieved into the creation of the device by learning the technology such as artificial intelligence & machine learning. These methods are used to collect data from the articles & surveys & applying this into the device creation as well (Sivanathan, et al, 2018).
Data Collection Methods
Several data collection methods are used in the project to gather several information. There are two types that help into the effective data collection methods & they are qualitative & quantitative. These are methods that help into the several ways of data collection such as data by research papers & surveys or interviews. These two methods are effective to collect content on the project to complete it. Quantitative method is to conducting survey & interview & qualitative method is to collecting the research paper & article & short-listing content of them to use them in the project to achieve aim (Tang, et al, 2017).
Ethical Issues
- Low risk – There are possibilities of some risk that can impact the data & can affect the data security. The low risk that can impact the project is data security, authenticity & confidentiality as well. These are the major issues that can occur in the project & this also can impact the project brutally.
- Informed consent from participants: Participants or the user of the IoT are highly attractive to the IoT devices. The user of the IoT shows their consent or approval on the technology that is being involved to make the data secure & safe. Data transformation is easy & fast & in the devices by containing the security or confidentiality of the data.
- Data collection and secure storage: Data is collected into the database that is created by big data or other. Methods such as quantitative & qualitative helps into the several ways of data collection such as data by research papers & surveys or interviews. These two methods are effective to collect content on the project to complete it.
- Confidentiality of data and data analysis: This is a major challenge in the creation of the data security devices to use in the organization. The aim of the IoT device is to gaining data security but this is a challenge to use this type of device by the wider community.
- Compliance with regulations and standards: The standards of the IoT devices are to using or applying the technology that helps in the data security.
- Personal Ethics: Privacy & limitation & the data transparency are the personal ethics that comes in the way of creating the IoT devices.
- What will be the benefit to society by evaluating potential positive and negative impacts: The created project would help to achieve the positive impacts of the project such as data security, privacy & confidentiality & all. This would help the wider community to get success (Min, et al, 2019).
Project plan
Table 1: Project Plan
| Project Milestone | Deliverable | Expected Date |
| Planning Completed | Project Proposal + Plan | 10/08/2020 |
| Literature reviews | Annotated Bibliography | 14/09/2020 |
| Progress reports | Progress reports | Variable |
| Final report and presentation | Final report and presentation | 06/10/2020 |
Risk Analysis
Table 1: Risk Analysis
| Threat Event | Threat Source | Threat Source characteristics | Relevance | Likelihood of Attack Initiation | Vulnerabilities and Predisposing Conditions | Likelihood Initiated Attack Succeeds | Overall Likelihood | Level of Impact | Risk | ||
| Capability | Intent | Targeting | |||||||||
| Risk in the data security | Wrong method implementation | The devices would not be able to data transmission. | Internet is not secured without making secure. | This would target the data transformation | High | High | This can impact the device highly & the created device would not be usable for the wider communities. | High |
High |
High | This is a type of risk that affects the data transformation process in the system. |
| Risk in the operations involved in the project | Wrong data process | The device would not be able to give effective outcome | Wrong operation would impact the device. | This would target the process need to complete in project. | High | High | This can impact the device highly & the created device would not be usable for the wider communities. | High | High | High | This is a type of risk that makes insecure data process. |
Impacts and Challenges
Several impact or challenges are there that can occur in the project. Such impacts are given below:
1) Data security challenge: This is a major challenge in the creation of the data security devices to use in the organization. The aim of the IoT device is to gaining data security but this is a challenge to use this type of device by the wider community.
2) Implementing wrong methods in the device: If the wrong approach of the technology is implemented in the project then this could be a great impact or challenge in the device that can affect the whole process.
3) Data accuracy: Data accuracy or integrity is also a great challenge in the devices. If the IoT devices are created to make the data transformation fast & secure then must be secured otherwise this is a great challenge in the creation of the device.
4) Relevancy Result: If the created data or output from the device that is being used in the organization is not relevant then this is a major issue in the creation of the IoT device. This is a great challenge if the effective outputs are not achieved from the created IoT device (Khutsoane, et al, 2017).
Summary
IoT (Internet of Things) is the current effective technology that helps to create the secured data transmitting device to make it useful for the wider communities. A review based project is in which IoT devices are discussed. The main problem with the project is to enhancing security & privacy in IoT devices & to maintain the accuracy in the data fetched by the device as well. The IoT device is being created by using the machine learning project & in this project area professionals are involved to make the programs or operations secure in the organization. The project is intended to data security maintenance & to make the data private & confidential that is being used in the organization. The methodology that is used in the project is a survey & qualitative to collect the data or information about the project. In this project effective learning of the technology to implement the innovative IoT device. This is assumed that at the end of the project all the task would be achieved effectively that includes the data security technology learning & creating the innovative secured devices by the use of the IoT device & also learning machine learning & artificial intelligence as well (Wurm, et al, 2016).
References:
Huh, S., Cho, S., & Kim, S. (2017, February). Managing IoT devices using blockchain platform. In 2017 19th international conference on advanced communication technology (ICACT) (pp. 464-467). IEEE.
Xiao, L., Wan, X., Lu, X., Zhang, Y., & Wu, D. (2018). IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?. IEEE Signal Processing Magazine, 35(5), 41-49.
Peng, X., Ren, J., She, L., Zhang, D., Li, J., & Zhang, Y. (2018). BOAT: A block-streaming app execution scheme for lightweight IoT devices. IEEE Internet of Things Journal, 5(3), 1816-1829.
Sivanathan, A., Gharakheili, H. H., Loi, F., Radford, A., Wijenayake, C., Vishwanath, A., & Sivaraman, V. (2018). Classifying IoT devices in smart environments using network traffic characteristics. IEEE Transactions on Mobile Computing, 18(8), 1745-1759.
Tang, J., Sun, D., Liu, S., & Gaudiot, J. L. (2017). Enabling deep learning on IoT devices. Computer, 50(10), 92-96.
Min, M., Xiao, L., Chen, Y., Cheng, P., Wu, D., & Zhuang, W. (2019). Learning-based computation offloading for IoT devices with energy harvesting. IEEE Transactions on Vehicular Technology, 68(2), 1930-1941.
Khutsoane, O., Isong, B., & Abu-Mahfouz, A. M. (2017, October). IoT devices and applications based on LoRa/LoRaWAN. In IECON 2017-43rd Annual Conference of the IEEE Industrial Electronics Society (pp. 6107-6112). IEEE.
Wurm, J., Hoang, K., Arias, O., Sadeghi, A. R., & Jin, Y. (2016, January). Security analysis on consumer and industrial IoT devices. In 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC) (pp. 519-524). IEEE.
Appendix A
| Name of the task | Time to complete the task |
| Planning | 10-08-2020 (August) |
| Selecting the suitable topic for project | |
| Finalizing the topic | |
| Milestone 1 | |
| Requirements | |
| Listing the data collection methods | |
| Gathering the information or the data on IoT | |
| Creating number of questions to work in project | |
| Listing key words to find information | |
| Milestone 2 | |
| Designing | |
| Finding the research papers or articles on internet | |
| Short listing the research papers | |
| Creating the questions to perform research | |
| Learning the technologies to use in the IoT devices | |
| Learning the data security techniques to implement in the IoT | |
| Milestone 3 | |
| Implementation | |
| Applying the technology in the IoT devices | |
| Milestone 4 | |
| Testing/ Evaluation | |
| Testing the performance of the device | |
| Milestone 5 | |
| Closure of the project | 10-10-2020 (September) |
Editorial Notes:
- Ensure you use full justification, not left or centred.
- Make sure there are no orphaned headers (headings by themselves at the bottom of the page).
- Make sure all pictures have captions under them (See Figure 1).
- Ensure pictures are referred to in the text.
- Ensure all images sources from elsewhere are properly referenced.
- Ensure you use APA6 referencing style.
- Ensure all work is written in your own words and all ideas are referenced back to the original author.
- Ensure all Tables have captions above them (see Table 1) and ensure they are referred to in your text.
Pointers for Success
- In your brief literature review do not get hung up on the details, you will have time later to cover that in your project output. Cover enough to highlight the problem and the knowledge gap and to show the trend of the research in the area.
- Take time to create a proper WBS and Gantt chart. These will act as tools to help you through the project. Spending sufficient time planning now will make the rest of the project easier to handle.
- Ensure you are aware of when the yet assessment pieces are due and your plan your activities accordingly. Clear define the deliverables in your WBS and Gantt chart.
- Make sure you have a realistic time line. Configure your project tool to reflect the number of hours you intend to work each week on the project. Mention your proposed working time in your plan.
- Clearly define your tasks, do not use umbrella terms. Integrate your research questions into your tasks. The goal is to have it clearly defined so you don’t need to think about what to do later. Detail in the WBS and Gantt is extremely important.

Recent Comments