Project Report
Project Report
Project Report
1|Page
IoT Network Security and Applications via Long Range Technology
In this project report, we worked on make a long-range technology based IoT network security
system and the application which also worked on LoRa technology. The Long-range technology
advancement which is used to make a security system that system which is enlisting, where we
are used to constructing up an organization laborer have that assembles and cycles position signal
from the multi-sensor cycles and examination taking care of module, and in a part of moment
recognizes range modules ca part of momentum through the wireless sensor network, the Arduino
United Nation UNO which is used to make the easy for using the software and hardware, and the
multi-sensory combination handling stations, which send the pieces of information to the central
system which checks the information through the inaccessible contraptions of the Long-range
technology organization. The course of action of this venture contains LoRa has, which get
signals from distinctive center points and are related with a multi-sensory combination math
system through an inaccessible network.
INTRODUCTION:
IoT stand for internet of thing where number of devices connected to sever. The device and sever are
connect by using IP addresses. And the communication between the sever and devices are wireless
communicate. This wireless technology is also knowing as LoRa technology. LoRa stand for long-range
technology. Basically, our project is based on this technology to secure the IoT device which are connect
to sever.
There is the following attack on IoT system:
Botnets
Blockchain
Denial of Service
Identity and data theft
Social Engineering
Ransomware
In this project, we also discussed about the LoRa technology and its localization system security analysis.
In this report, we also discussed about the range free, range-based attack. To prevent the data information,
We used encryption and decryption system. And discussed about the system architecture which help us to
Understand the structure of our system.
2|Page
Fig(a)
Fig(b)
(a) Long-range technology network architecture. (b) Long-range technology (LoRa) class
comparison
3|Page
whole network can be divided into triangular regions and the localization effort will be to
determine whether each node falls inside or outside the triangle formed. This technique is known
as APIT. For example, replay, make, change, discard signal messages, wormhole attacks, and
Sybil attacks. Sybil's attack on the restriction framework means that harmful hubs will play
various roles. Subsequently, different centers that did not exist in the organization appeared,
which disrupted regular childbirth activities. To be more explicit, in the centroid algorithm, the
area of the abstruse hub is resolved as the polygonal centroid shaped of k adjoining signal hubs:
In any case, the security issue is less thought to be in the underlying plan of the LoRa IoT hub limitation
framework. For a while, space research has focused on the most proficient method to improve.
4|Page
when multiple sources were used to transfer the data between each other. Latency and
synchronization are another two problems with the ethernet. That's why we have moved to
automotive ethernet. In automotive industry robots find it hard to move because of poor mapping
and localization techniques. Mapping is nothing but making key areas of interest using the
topological area where the bot moves around. Localization is nothing but when the bot moves to a
certain location, it has to know what is the next location and what location it is at present. So
based upon the sensor readings it identifies the position of itself against the geometrical or
topological map and also how far it has moved from its previous position.
So, difference between localization and mapping is that mapping is having an idea about the
whole ground surroundings. While the localization is having details of particular location where it
is going to go around.
Two main sensors are camera and radar. The camera provides the vehicle visual surroundings and
the radar provides the physical surroundings of the car. Like what objects are present using
phenomenon called as doppler effect. Typically, radar might have ultrasonic sensors which sends
the signals and gets the echoes. Based on the echoes, the objects and their distance to the vehicle
are calculated. Radar can be called as environmental sensors and camera can be as processing
sensor
5|Page
(iii)
M1 = (a ×W1 + b×W3) mod N
M2 = (a ×W1 + b×W4) mod N
M3 = (a ×W2 + b×W3) mod N M4 = (a ×W2 + b×W4) mod N.
Four sets of plain text used to solve a cipher text by using Rabin asymmetric key encryption
algorithm.
The original text will be added to original text once the correct plain text is found.
The technique utilized in this article is to take a letter from the first plain text as the comparison
data and append it to the first plain text to frame another plain text for encryption.
System Architecture:
Positioning of nodes is vital here require an optimized positioning system to know the signal
strength, packet reliability, etc. This optimized system can be possible by using SIBMSFCL.
SIBMSFCL algorithm diagnoses the abnormal packets that are deviated from minimum security
standards it improves the
positioning of the system. Lora is
flexible by being tolerant to attacks
such in a situation of packet delays
and low power consumption
technology that make it
advantageous over the ZigBee
network (another low power
network but short in range as
compared to the Lora network)
because the probability rate of
transmission delay in Lora as
compared to ZigBee is
(10.5%<34.6%) (ref p.127). Lora
network is openly deployed and has
node resource constraints, it is
difficult to remove the natural or other external threats as well as tampering attack since it inherits
the radio broadcasting feature. Concluding that heart operation i.e., localization of system is the
core problem in security of LoRa network.
6|Page
3. Network server host (CMS)
Indoor Test: - we have used the HBE
(High balanced Enhancement) values in range
0f 1-4 m and proper method is proposed from
Eq 1(where d1 has effect of HBE while d2 is
without effect of HBE). In this test, every 1 m
is calculated multiple times and then taken
average for the purpose of relationship between
HBE and distance.
7|Page
Experimental Results and Analysis
This above table (referred to table2 p.129) shows that error correction of localization algorithm is
more accurate than RSSI primal algorithm (by 50%) and RSSI weighting method (by 8%).
Outdoor Test: - Like Indoor test we have used the reference points and HBE values in
range of 10-50 m and using the eq1-3 to determine the relationship between HBE and distance.
For comparison illustrate the following table (referred to table3 p.130)
8|Page
Also, if we consider the comparison between high energy consumption system (GPS) result with
the localization algorithm (using SIBMSFCL) result we find the error below 5% for localization
result.
Accuracy Test: - Below figure shows the result for sample test of LoRa network. It says
that there is 100% accuracy of localization result to the actual location when it is in range of 21m
however increasing the distance reduces the accuracy for instance in range of 32 m accuracy rate
is about 85%
Reliability Test: - For this test there were different environment test. In which we had test it on
different days (sunny, rainy, cloudy etc.) as well as the distance between source and destination.so we
found out that by increasing the transmission range there is reduction in the packet reliability. Below
is the table that verify this point.
Table5 (ref.p.132)
9|Page
Conclusion
In comparison to other network of LoRa type like Zigbee there is 30% increase in reliability i.e., both
network support low power and high range technique but LoRa has more advantage over Zigbee.
Therefore, in the era of rapid development of network security, multi-sensor fusion computing, and
LoRa technology, Localization system of national security monitoring system, energy or power
management, environment management, data management, factory monitoring, and renewable
energy management has become very important.
The main disadvantage of the LoRa module is that the bandwidth of LoRa system is low. Moreover,
it does not permit continuous transmitting of data. Hence, it is only used in periodic communication
system. The LoRa module can be used for long range communication. It is responsible to accomplish
the frequencies of communication, data rate and low power in any kind of devices. It mainly has
three components: such as End-note, Gateways and Network server. The End-note system contains
low powered sensors for transmitting the data. The Gateway system collects the
|Page
data from the end-note and sends them to the Network Server. The final component is mainly
responsible to scan the received data.
The following devices that are using this LoRa technology are Tracker’s device, Gas monitored
device and Fire detection modules.
Reference:
1). F. Y. Ren, H. N. Huang, and C. Lin: J. Software 14 (2008) 1282 (in Chinese with English
abstract). http://www. jos.org.cn/1000-9825/14/1282.htm
2). http://www.jos. org.cn/1000-9825/16/857.htm
3). https://www.semtech.com/lora/what-is-lora
4). https://ieeexplore.ieee.org/document/8115843
5). https://lora-alliance.org/wp-content/uploads/2020/11/lorawan_security_whitepaper.pdf
10 | P a g e
6).https://www.researchgate.net/publication/338489155_IoT_Network_Security_and_Application
s_via_Long_Range_Technology
11 | P a g e
7). https://link.springer.com/chapter/10.1007/978-3-319-95189-8
12 | P a g e
13 | P a g e