248 80 30MB
English Pages 919 [920] Year 2023
Lecture Notes in Networks and Systems 664
Sudeep Tanwar · Slawomir T. Wierzchon · Pradeep Kumar Singh · Maria Ganzha · Gregory Epiphaniou Editors
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security IC4S 2022
Lecture Notes in Networks and Systems Volume 664
Series Editor Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Advisory Editors Fernando Gomide, Department of Computer Engineering and Automation—DCA, School of Electrical and Computer Engineering—FEEC, University of Campinas—UNICAMP, São Paulo, Brazil Okyay Kaynak, Department of Electrical and Electronic Engineering, Bogazici University, Istanbul, Türkiye Derong Liu, Department of Electrical and Computer Engineering, University of Illinois at Chicago, Chicago, USA Institute of Automation, Chinese Academy of Sciences, Beijing, China Witold Pedrycz, Department of Electrical and Computer Engineering, University of Alberta, Alberta, Canada Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Marios M. Polycarpou, Department of Electrical and Computer Engineering, KIOS Research Center for Intelligent Systems and Networks, University of Cyprus, Nicosia, Cyprus Imre J. Rudas, Óbuda University, Budapest, Hungary Jun Wang, Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong
The series “Lecture Notes in Networks and Systems” publishes the latest developments in Networks and Systems—quickly, informally and with high quality. Original research reported in proceedings and post-proceedings represents the core of LNNS. Volumes published in LNNS embrace all aspects and subfields of, as well as new challenges in, Networks and Systems. The series contains proceedings and edited volumes in systems and networks, spanning the areas of Cyber-Physical Systems, Autonomous Systems, Sensor Networks, Control Systems, Energy Systems, Automotive Systems, Biological Systems, Vehicular Networking and Connected Vehicles, Aerospace Systems, Automation, Manufacturing, Smart Grids, Nonlinear Systems, Power Systems, Robotics, Social Systems, Economic Systems and other. Of particular value to both the contributors and the readership are the short publication timeframe and the world-wide distribution and exposure which enable both a wide and rapid dissemination of research output. The series covers the theory, applications, and perspectives on the state of the art and future developments relevant to systems and networks, decision making, control, complex processes and related areas, as embedded in the fields of interdisciplinary and applied sciences, engineering, computer science, physics, economics, social, and life sciences, as well as the paradigms and methodologies behind them. Indexed by SCOPUS, INSPEC, WTI Frankfurt eG, zbMATH, SCImago. All books published in the series are submitted for consideration in Web of Science. For proposals from Asia please contact Aninda Bose ([email protected]).
Sudeep Tanwar · Slawomir T. Wierzchon · Pradeep Kumar Singh · Maria Ganzha · Gregory Epiphaniou Editors
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security IC4S 2022
Editors Sudeep Tanwar Department of Computer Engineering, Institute of Technology Nirma University Ahmedabad, Gujarat, India Pradeep Kumar Singh Department of Computer Science and Engineering KIET Group of Institutions Ghaziabad, India
Slawomir T. Wierzchon Institute of Computer Science Polish Academy of Sciences Warsaw, Poland Maria Ganzha Faculty of Mathematics and Informatics Warsaw University of Technology Warsaw, Poland
Gregory Epiphaniou Department of Security Engineering University of Warwick Coventry, UK
ISSN 2367-3370 ISSN 2367-3389 (electronic) Lecture Notes in Networks and Systems ISBN 978-981-99-1478-4 ISBN 978-981-99-1479-1 (eBook) https://doi.org/10.1007/978-981-99-1479-1 © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore
Preface
The 4th International Conference on Computing, Communications, and CyberSecurity (IC4S-2022) held on 16–17 December 2022 at Krishna Engineering College (KEC), Ghaziabad, India. Scholars, researchers, and professionals from academia and industry can meet and discuss developments and share ideas at the annual International Conference on Computing, Communication, and Cyber-Security (IC4S). Participants will have the rare chance to share their research results, engage in fruitful discussion, and learn from the experiences and insights of peers from all around the world. The primary goal of the IC4S is to host a forum where experts from academia, government, and industry can debate the most recent innovations, trends, and issues in the realms of information technology, communications, and security. Conferenceattendees are able to hear about the most recent findings in the field and make connections with like-minded professionals at the same time. The goal of the conference is to provide guests from a wide variety of backgrounds with a platform to discuss and exchange solutions to common problems. There were five different technical tracks presented at the conference, it includes: (i) communication and networks technologies, (ii) advanced computing technologies, (iii) data analytics and intelligent learning, (iv) latest electrical and electronics trend, and (v) security and privacy issues. The conference was hosted by the Engineering of Krishna Engineering College (KEC), Ghaziabad, India. The welcome address was given by Director, Joint Director of KEC Ghaziabad followed by the address of general chair of the conference. Inaugural speech was delivered by Prof. Sanjeev Kumar, Dean Academics, KEC Ghaziabad, India. Prof. Yashwant Singh, Head CS & IT, Central University of Jammu, India, delivered the opening keynote address, titled “IoVT: Internet of Vulnerable Things:Issues, Challenges and Prospects”. “Deep Learning for Healthcare Management” was the topic of Prof. Mahesh K. Kholekar of IIT Patna’s second keynote address. Professor Anand Nayyar from Duy Tan University in Vietnam spoke on “Autonomous Vehicles: Research Issues, Challenges, and Prospects” as third keynote. Final
v
vi
Preface
keynote address on “SDN for Intelligent Transportation System: Opportunities and Challenges” was given by Dr. Jitender Bhatia of Nirma University in India. The organizing committee is thankful to anonymous reviewers, TPC members, and session chairs who have extended their technical support at various stages. Our special mention to following members for their tireless support for the event in various roles: Prof. Sara Paiva, Dr. Pljonkin Anton, Prof. Marcello Tivoti, Prof. Wei-Chiang Hong, Prof. Pao Ann Hsuing, Prof. Mahendra Kumar, Dr. Ashutosh Mishra, Dr. Anupam Singh, Dr. Farkhana Muchtar, Dr. Nagesh Kumar, Dr. Hari Mohan Rai, Dr. Sushil Kumar Singh, Dr. Mohd Zuhair, Dr. Pronanya Bhattacharya, Dr. Anand Nayyar, Dr. Rakesh Saini, Dr. Sudhanshu Tyagi, Dr. Jitendra Bhatia, Dr. Yugal Kumar, Dr. Amit Sharma, Dr. Smita Agarwal, Dr. Ashutosh Sharma, Dr. Brahmah Hazela, Dr. Parita Oza, Dr. Rohit Tanwar, Dr. Sachin Kumar, Dr. Vipin Balyan, Dr. Chaman Verma, and Dr. Zoltan Illes. Knowledge University in Erbil, Iraq, Southern Federal University in Russia, WSG University in Bydgoszcz, Poland, and CSRL in India all provided academic support for the conference’s planning and execution. Many professionals from these organizations assisted with the conference’s technical aspects in various capacities, including the call for papers, the review, the compilation of the programme schedule, the technical sessions themselves, and other technical support activities. For their time and effort, the authors of these articles have our deepest gratitude. The technical programme committee’s help throughout the evaluation process is much appreciated by the event’s organizers. We appreciate the hard work that went into hosting this event and running the programmes over the course of two days. The organizers of IC4S-2022 would like to express their gratitude to the session chairs who presided over the many technical sessions and offered insightful feedback to the writers. During the conference’s paper presentation sessions, the session chairs have imparted their technical knowledge to the attendees. The organizing team is grateful to Springer, LNNS Series for their support. Ahmedabad, India Warsaw, Poland Ghaziabad, India Warsaw, Poland Coventry, UK December 2022
Sudeep Tanwar Slawomir T. Wierzchon Pradeep Kumar Singh Maria Ganzha Gregory Epiphaniou
Contents
Communication and Network Technologies Design and Implementation of an IoT-Based Indoor Hydroponics Farm with Automated Climate and Light Control . . . . . . . . . . . . . . . . . . . . Swati Jain and Mandeep Kaur Drone Ecosystem: Architecture for Configuring and Securing UAVs . . . . Harsh Sinha, Nikita Malik, and Menal Dahiya An Improved Neural Network-Based Routing Algorithm for Mobile Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Nongmeikapam Thoiba Singh, Raman Chadha, Simarjeet Kaur, and Amrita Chaudhary
3 17
35
Energy Harvesting in Fifth-Generation Wireless Network: Upcoming Challenges and Future Directions . . . . . . . . . . . . . . . . . . . . . . . . . Neeraj Dwivedi, Sachin Kumar, Sudeep Tanwar, and Sudhanshu Tyagi
51
Develop a Quantum Based Time Scheduling Algorithm for Digital Microfluidic Biochips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . N. Nirmala and D. Gracia Nirmala Rani
69
Revolution in Agriculture with the Aid of Internet of Things . . . . . . . . . . . Abhishek Tomar, Gaurav Gupta, Kritika Rana, and Surbhi Bhatia Supercontinuum Generation in Dispersion-Tailored Tetrachloroethylene Filled Photonic Crystal Fibers . . . . . . . . . . . . . . . . . . . Sandeep Vyas, Girraj Sharma, Sudarshan Kumar Jain, Rukhsar Zafar, and Anand Nayyar
79
95
Early Detection of Covid-19 Using Wearable Sensors’ Data Enabled by Semantic Web Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Nikita Malik and Sanjay Kumar Malik
vii
viii
Contents
Cell Outage Detection in 5G Self-organizing Networks Based on FDA-HMM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Oluwaseyi Paul Babalola and Vipin Balyan IoT-Based Scalable Framework for Pollution Aware Route Recommendation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Jitendra Bhatia, Radha Govani, Parth Kakadia, Yash Modi, Dhrumin Thakkar, Heta Bhayani, Meshwa Patel, Uttam Chauhan, and Abdulatif Alabdulatif Drone: A Systematic Review of UAV Technologies . . . . . . . . . . . . . . . . . . . . 147 Tanvi Gautam and Rahul Johari Reconfigurable Intelligent Surface-Enabled Energy-Efficient Cooperative Spectrum Sensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 Girraj Sharma, Sudarshan Kumar Jain, Sandeep Vyas, and Anand Nayyar Resource Sharing in Back Haul Satellite-Based NOMA Network . . . . . . . 169 Gunjan Gupta and Robert Van Zyl Advanced Computing Technologies A Review on Various Deepfakes’ Detection Methods . . . . . . . . . . . . . . . . . . 179 Mayank Pandey and Samayveer Singh Proposed Framework for Implementation of Biometrics in Banking KYC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Ayushi Malik, Shagun Gehlot, and Sonali Vyas Paddy Pro: A MobileNetV3-Based App to Identify Paddy Leaf Diseases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 S. Asvitha, T. Dhivya, H. Dhivyasree, and R. M. Bhavadharini Cryptanalysis of RSEAP2 Authentication Protocol Based on RFID for Vehicular Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 N. V. S. S. Prabhakar, Srinivas Jangirala, and Surendra Talari A Survey on Code-Mixed Sentiment Analysis Based on Hinglish Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Rekha Baghel An Alternative to PHP for the Development of Web Applications: Java Server Pages Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 Ahmed Altameem Novel Load Balancing Technique for Microservice-Based Fog Healthcare Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Swati Malik and Kamali Gupta
Contents
ix
Self-improved COOT Algorithm for Resource Allocation in Cloud Data Centers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 Shubham Singh, Pawan Singh, and Sudeep Tanwar XGBoost-Based Prediction and Evaluation Model for Enchanting Subscribers in Industrial Sector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 S. Pradeep, M. Kishore, G. Oviya, S. Poorani, and R. Anitha CleanO-Renewable Energy-Based Robotic Floor Cleaner . . . . . . . . . . . . . 297 Khushboo Jain, Shreya Shah, Smita Agrawal, Parita Oza, and Sudeep Tanwar Impact of “COVID-19 Pandemic” on Children Online Education: A Review and Bibliometric Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 Rhea Sawant, Shivali Amit Wagle, R. Harikrishnan, and P. Srideviponmalar Digital-Based Learning in Indian Government’s Higher Education: Initiatives and Insights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 P. Srideviponmalar, Shivali Amit Wagle, R. Harikrishnan, and Rhea Sawant Autonomous Vehicles Adoption Classification for Future Mobility in UAE Using Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Bakhit Bin Jarn, Rahat Iqbal, Shadi Atalla, Obada Alhabshneh, and Mohammed Ahmed An Augmented Reality Framework as a Solution to Enhance the Experience of Visiting a Museum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355 David Verde, Pedro Miguel Faria, Sara Paiva, and Luís Romero Hybrid Real-Time Implicit Feedback SOM-Based Movie Recommendation Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 Saurabh Sharma and Harish Kumar Shakya Data Analytics and Intelligent Learning Automatic SMS Spam Filtering for Disaster Response Using Classification Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 K. Nitalaksheswara Rao, Shanmuk Srinivas Amiripalli, Venkata Rao Rampay, and M. S. N. V. Jitendra Lung Cancer Diagnosis Using X-Ray and CT Scan Images Based on Machine Learning Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 Sunil Kumar and Harish Kumar Hybrid Machine Learning Algorithm for Prediction of Malaria . . . . . . . . 413 Yusuf Aliyu Adamu and Jaspreet Singh
x
Contents
Yoga Pose Estimation Using Machine Learning . . . . . . . . . . . . . . . . . . . . . . . 425 Ishika Shah, Greeva Khant, Jitali Patel, Jigna Patel, and Rupal Kapdi COVID Detection from Chest X-Ray Images Using Deep Learning Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443 Parth Nimbadkar, Dhruv Patel, Aayush Panchal, Jai Prakash Verma, and Jigna Patel Impact of Boosting Techniques in AI-Based Credit Card Fraud Detection Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 Misri Parikh, Niket Kothari, Karan Patel, Jai Prakash Verma, and Pronaya Bhattacharya Stock Price Prediction for Market Forecasting Using Machine Learning Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477 Vivek Kumar Prasad, Darshan Savaliya, Sakshi Sanghavi, Vatsal Sakariya, Pronaya Bhattacharya, Jai Prakash Verma, Rushabh Shah, and Sudeep Tanwar Thyroid Carcinoma Prediction Using ACO and Machine Learning Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493 Shanu Verma, Rashmi Popli, and Harish Kumar Cyclone Intensity Detection and Classification Using a Attention-Based 3D Deep Learning Model . . . . . . . . . . . . . . . . . . . . . . . . . 505 Y. Vahidhabanu, K. Karthick, R. Asokan, and S. Sreeji Towards Development of Data Architecture for Learning Analytics Projects Using Data Engineering Approach . . . . . . . . . . . . . . . . . . . . . . . . . . 517 Valerii Popovych and Martin Drlik A Real-Time Road Crash Prediction Model by Hybridizing Multiple Learning Classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531 G. Arun, K. Anuguraju, A. Sangeetha, and K. Babu Machine Learning Assisted Intelligent Reflecting Surface MIMO Communication-Gateway for 6G—A Review . . . . . . . . . . . . . . . . . . . . . . . . . 543 Praveen Srivastava and Shelej Khera AI-Based Invoice Payment Date Prediction for B2B . . . . . . . . . . . . . . . . . . . 555 Mullapudi V. Ramanatha Subrahmanya Kiran, S. Suchitra, K. Arthi, and A. Shobanadevi Early Fault Detection for Rotating Machinery Onboard Ships Motor Using Fuzzy Logic and K-Means . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567 Vandan Pandya, Smita Agrawal, Swati Jain, and Bharat Jayaswal Intellectual Movie Recommendation System Using Supervised Machine Learning Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581 Priti Kumari and Vandana Dubey
Contents
xi
A Comparative Study on Different Machine Learning Algorithms for Predictive Analysis of Stock Prices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589 Aksh Gupta, Namrata Tadanki, Ninad Berry, Ramya Bardae, R. Harikrishnan, and Shivali Amit Wagle Opinion Mining-Assisted Intelligent Program Selection Employing Fuzzy SWARA Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599 Garima Srivastava, Vaishali Singh, and Sachin Kumar Deraining of Image Using UNet-Based Conditional Generative Adversarial Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615 Samprit Bose, Deep R. Chavan, and Maheshkumar H. Kolekar Video Indexing and Retrieval Techniques: A Review . . . . . . . . . . . . . . . . . . 629 R. J. Poovaraghan and P. Prabhavathy A Robust Deep Learning Techniques for Alzheimer’s Prediction . . . . . . . 641 Jayesh Locharla, Haswanth Kolanuvada, Kona Venkata Sai Ashrith, and S. Suchitra Latest Electrical and Electronics Trends Steganography Methods for GIF Images: A Review . . . . . . . . . . . . . . . . . . . 657 Anjali Gupta, Lalit K. Awasthi, and Samayveer Singh Image Interpolation-Based Steganographic Techniques Under Spatial Domain: A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671 Riya Punia and Aruna Malik A Comparative Review on Image Interpolation-Based Reversible Data Hiding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687 Raju Pratap Sharma and Aruna Malik Real-Time Face Mask Detection Using Convolution Neural Network and Computer Vision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701 V. Anusuya, K. Vignesh Saravanan, and V. Vishnu Praba A Video-Based System for Vehicle Tracking Based on Optical Flow and Shi-Tomasi Corner Detection Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 715 Nikesha Patel and Keyur N. Brahmbhatt Breast Cancer Classification Using a Novel Image Processing Pipeline and a Two-Stage Deep Learning Segmentation and Classification Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725 Dhruvin Kakadia, Het Shah, Parita Oza, Paawan Sharma, and Samir Patel Analysis of Malignant and Non-malignant Lesion Detection Techniques for Human Skin Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 741 Nikhil Singh, Sachin Kumar, and Shriram K. Vasudevan
xii
Contents
Implementation of Multi-input (MI) KY Boost Converter for Hybrid Renewable Energy System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757 M. Pushpavalli, R. Harikrishnan, P. Abirami, and P. Sivagami Security and Privacy Issues A Prevention Technique-Based Framework for Securing Healthcare Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777 Harsimran Jit Singh, Shubh Gupta, and Sonali Vyas An Enhanced Encryption Scheme for Cloud Security . . . . . . . . . . . . . . . . . 789 Pratyaksha Ranawat, Mayank Patel, and Ajay Kumar Sharma A Lightweight Authentication Scheme and Security Key Establishment for Internet of Medical Things . . . . . . . . . . . . . . . . . . . . . . . . 797 Gousia Nissar, Riaz A. Khan, Saba Mushtaq, Sajaad A. Lone, and A. H. Moon Performance of Machine Learning Models on Crime Data . . . . . . . . . . . . . 811 Geetika Bhardwaj and R. K. Bawa Improved Complexity in Localization of Copy-Move Forgery Using DWT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825 Saba Mushtaq, Riaz A. Khan, Sajaad A. Lone, A. H. Moon, and Maroof Qadri Non-Fungible Tokens’ Marketplace: A Secured Blockchain-Based Decentralized Framework for Online Auction . . . . . . . . . . . . . . . . . . . . . . . . 841 Pooja Khanna, Sachin Kumar, Ritika Gauba, and Aditya Untangling Explainable AI in Applicative Domains: Taxonomy, Tools, and Open Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857 Sachi Chaudhary, Pooja Joshi, Pronaya Bhattacharya, Vivek Kumar Prasad, Rushabh Shah, and Sudeep Tanwar AutoBots: A Botnet Intrusion Detection Scheme Using Deep Autoencoders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873 Ashwin Verma, Pronaya Bhattacharya, Vivek Kumar Prasad, Rajan Datt, and Sudeep Tanwar Study on Fuel Cell Vehicle Braking System Selection and Simulation . . . 887 Abhinav Bhardwaj, Raguel R. Marak, Babli Singh Gujar, Yash Anil Dandekar, and Harpreet Singh Bedi Deepfakes: A New Era of Misinformation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 897 Rushan Khan, Bramah Hazela, Shikha Singh, and Pallavi Asthana
Contents
xiii
Graph Neural Network-Based Anomaly Detection in Blockchain Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909 Amit Sharma, Pradeep Kumar Singh, Elizaveta Podoplelova, Vadim Gavrilenko, Alexey Tselykh, and Alexander Bozhenyuk Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 927
Editors and Contributors
About the Editors Dr. Sudeep Tanwar is a professor in the Computer Engineering Department at the Institute of Technology of Nirma University, Ahmedabad, India. He received his Ph.D. in 2016 from the Faculty of Engineering and Technology, Mewar University, India, with a specialization in wireless sensor networks. His current interests include routing issues in WSN, integration of sensors in the cloud, computational aspects of smart grids, and blockchain technology. He has authored or co-authored more than 150+ technical research papers published in leading peer-reviewed international journals and international conferences from the IEEE, Elsevier, Springer, and John Wiley and has authored five books. He is a recipient of the Best Research Paper awards from IEEE GLOBECOM-2018 and Springer ICRIC-2019. He is a TPC member and reviewer of many international conferences across the globe. He is an associate editor of the Security and Privacy Journal and is a member of the IAENG, ISTE, and CSTA. He has Google Scholar citations 8405, H-index 52 and i-10 index 140. Prof. Slawomir T. Wierzchon received M.Sc. and Ph.D. degrees in Computer Science from Technical University of Warsaw, Poland. He holds Habilitation (D.Sc.) in Uncertainty Management from Polish Academy of Sciences. In 2003, he received the title of Professor from the President of Poland. Currently, he is a full professor at the Institute of Computer Science of Polish Academy of Sciences. His research interests include computational intelligence, uncertainty management, information retrieval, machine learning, and data mining. He is an author/co-author of over 100 peer-reviewed papers in international journals and international conferences. He published, as author/co-author, 11 monographs from the field of Machine Learning. In the period 2000–2013, he co-organized 13 international conferences on intelligent information systems. Co-authored proceedings from these conferences were published by Springer. He co-edited two volumes of proceedings of the international
xv
xvi
Editors and Contributors
conference on Computer Information Systems and Industrial Management, and he has served as a guest co-editor of three special issues of Information and Control journal. Currently, he is a member of the editorial board for some international journals, as well as member of many program committees for international conferences. He cooperated with medical centers in the area of statistical data analysis and knowledge discovery in databases. For more information, visit his homepage. Dr. Pradeep Kumar Singh is currently working as a professor and head in the Department of Computer Science at KIET Group of Institutions, Ghaziabad, India. He is an associate editor of the IJISMD, [IJISMD is indexed by Scopus and Web of Science], IJAEC, IGI Global USA, SPY, Wiley, and IJISC from Romania. He is recently appointed as a section editor, Discover IoT, Springer Journal. He has published nearly 150 research papers. He has received three sponsored research project grant worth Rs 25 Lakhs. He has edited a total of 16 books from Springer and Elsevier and also edited several special issues for SCI and SCIE Journals from Elsevier and IGI Global. He has Google Scholar citations 1850, H-index 22 and i-10 index 50. Dr. Maria Ganzha is an associate professor in the Faculty of Mathematics and Information Science. She has an M.S. degree and a Ph.D. degree in Mathematics from the Moscow State University, Russia, and a Doctor of Science degree (in Computer Science) from the Polish Academy of Sciences. Maria has published more than 200 research papers, is on editorial boards of 6 journals and a book series, and was invited to program committees of more than 150 conferences. She is also the principal investigator, of the SRIPAS team, in the INTER-IoT project. Here, her team is responsible for use of semantic technologies in the context of interoperability of IoT platforms. She has 1594 Google citations, H-index 19 and i-10 index 58 in her account. Her area of interest includes computational intelligence, distributed systems, agent-based computing, and semantic data processing. Dr. Gregory Epiphaniou currently holds a position as an associate professor of security engineering at the University of Warwick. His role involves bid support, applied research, and publications. Part of his current research activities is formalized around a research group in wireless communications with the main focus on cryptokey generation, exploiting the time-domain physical attributes of V-V channels. He led and contributed to several research projects funded by EPSRC, IUK, and local authorities totaling over £8M. He is also the main inventor of a patented-pending technology on a distributed ledger system (GB2576160A/US200042497A1). He was previously holding a position as a reader in Cybersecurity and acted as deputy director of the Wolverhampton Cybersecurity Research Institute (WCRI). He has taught in many universities both nationally and internationally in a variety of areas related to proactive network defense with over 120 international publications in journals and conference proceedings and author in several books and chapters. He holds several industry certifications in Information Security and worked with several government agencies, including the UK MoD, in cybersecurity-related projects. He currently
Editors and Contributors
xvii
holds a subject matter expert panel position at the Chartered Institute for Securities and Investments. He acts as a technical committee member for several scientific conferences in information and network security. He serves as a key member in the development of WS5 for the formation of the UK Cybersecurity Council.
Contributors P. Abirami B. S. Abdur Rahman Crescent Institute of Science and Technology, Chennai, India Yusuf Aliyu Adamu Department of Computer Science and Engineering, GD Goenka University, Sohna, India Aditya Amity University Uttar Pradesh, Lucknow, India Smita Agrawal Department of Computer Science and Engineering, Nirma University, Ahmedabad, India Mohammed Ahmed Coventry University, Coventry, UK Abdulatif Alabdulatif Department of Computer Science, College of Computer, Qassim University, Buraydah, Saudi Arabia Obada Alhabshneh Mutah University, Mutah, Jordan Ahmed Altameem King Saud University, Riyadh, Kingdom of Saudi Arabia Shanmuk Srinivas Amiripalli Department of Computer Science and Engineering, GITAM School of Technology, GITAM (Deemed to be University), Visakhapatnam, Andhra Pradesh, India R. Anitha Department of CSE, Sri Venkateswara College of Engineering, Chennai, India K. Anuguraju Department of Computer Science and Engineering, Kongunadu College of Engineering and Technology (Autonomous), Trichy, India V. Anusuya Department of Computer Science and Engineering, Ramco Institute of Technology, Rajapalayam, India K. Arthi Department of Data Science and Business Systems, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Tamil Nadu, India G. Arun Department of Computer Science and Engineering, Kongunadu College of Engineering and Technology (Autonomous), Trichy, India Kona Venkata Sai Ashrith Department of Data Science and Business Systems, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu Dist, Tamil Nadu, India
xviii
Editors and Contributors
R. Asokan Department of Electronics and Communication Engineering, Kongunadu College of Engineering and Technology (Autonomous), Trichy, India Pallavi Asthana Department of Electronics and Communication Engineering, Amity School of Engineering and Technology Lucknow, Amity University, Lucknow, Uttar Pradesh, India S. Asvitha Department of CSE, Easwari Engineering College, Chennai, India Shadi Atalla University of Dubai, Dubai, UAE Lalit K. Awasthi Department of Computer Science and Engineering, National Institute of Technology, Srinagar, Uttarakhand, India Oluwaseyi Paul Babalola Department of Electrical, Electronics, and Computer Engineering, Cape Peninsula University of Technology, Bellville, South Africa K. Babu Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai, India Rekha Baghel Indira Gandhi Delhi Technical University for Women, New Delhi, India; Ajay Kumar Garg Engineering College, Ghaziabad, Uttar Pradesh, India Vipin Balyan Department of Electrical, Electronics, and Computer Engineering, Cape Peninsula University of Technology, Bellville, South Africa Ramya Bardae Symbiosis Institute of Technology, Pune Campus, Symbiosis International (Deemed University), Pune, India R. K. Bawa Punjabi University, Patiala, Punjab, India Harpreet Singh Bedi School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Punjab, India Ninad Berry Symbiosis Institute of Technology, Pune Campus, Symbiosis International (Deemed University), Pune, India Abhinav Bhardwaj School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Punjab, India Geetika Bhardwaj Punjabi University, Patiala, Punjab, India Jitendra Bhatia Computer Science and Engineering Department, Institute of Technology, Nirma University, Ahmedabad, Gujarat, India Surbhi Bhatia Department of Information Systems, College of Computer Science and Information Technology, King Faisal University, Al Hofuf, Saudi Arabia Pronaya Bhattacharya Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, Gujarat, India; Department of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University, Kolkata, West Bengal, India
Editors and Contributors
xix
R. M. Bhavadharini SCOPE, Vellore Institute of Technology, Chennai, India Heta Bhayani Computer Engineering Department, Vishwakarma Government Engineering College, Ahmedabad, India Samprit Bose Indian Institute of Technology Patna, Bihar, India Alexander Bozhenyuk Southern Federal University, Taganrog, Russia Keyur N. Brahmbhatt Birla Vishwakarma Mahavidyalaya, Anand, Gujarat, India Raman Chadha Department of Computer Science and Engineering, Chandigarh University, Mohali, Punjab, India Amrita Chaudhary Department of Computer Science and Engineering, Chandigarh University, Mohali, Punjab, India Sachi Chaudhary Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, Gujarat, India Uttam Chauhan Computer Engineering Department, Vishwakarma Government Engineering College, Ahmedabad, India Deep R. Chavan PDPM-IIITDM, Jabalpur, India Menal Dahiya Department of Computer Science, Maharaja Surajmal Institute, Janakpuri, New Delhi, India Yash Anil Dandekar School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Punjab, India Rajan Datt Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, Gujarat, India T. Dhivya Department of CSE, Easwari Engineering College, Chennai, India H. Dhivyasree Department of CSE, Easwari Engineering College, Chennai, India Martin Drlik Constantine the Philosopher University in Nitra, Nitra, Slovakia Vandana Dubey Ashoka Institute of Technology and Management, Varanasi, Uttar Pradesh, India Neeraj Dwivedi Amity University, Lucknow Campus, Lucknow, India Pedro Miguel Faria ADiT-LAB, Instituto Politécnico de Viana do Castelo, Viana do castelo, Portugal Ritika Gauba Zenith Ph.D. Training and Consultancy, Faridabad, Haryana, India Tanvi Gautam SWINGER (Security, Wireless, IoT Network Group of Engineering and Research), USAR (University School of Automation and Robotics), GGS Indraprastha University, Delhi, India; IMS Engineering College, AKTU, Ghaziabad, Uttar Pradesh, India
xx
Editors and Contributors
Vadim Gavrilenko Institute of Computer Technologies and Informational Security, Southern Federal University, Rostov-on-Don, Russia Shagun Gehlot UPES University, Dehradun, India Radha Govani Computer Engineering Department, Vishwakarma Government Engineering College, Ahmedabad, India D. Gracia Nirmala Rani Department of Electronics and Communication Engineering, Thiagarajar College of Engineering, Madurai, Tamilnadu, India Babli Singh Gujar School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Punjab, India Aksh Gupta Symbiosis Institute of Technology, Pune Campus, Symbiosis International (Deemed University), Pune, India Anjali Gupta Department of Computer Science and Engineering, Dr. B R Ambedkar National Institute of Technology, Jalandhar, Punjab, India Gaurav Gupta Yogananda School of Artificial Intelligence, Computers and Data Sciences, Shoolini University, Solan, India Gunjan Gupta Department of Electrical, Electronics and Computer Engineering, French South African Institute of Technology, Cape Peninsula University of Technology, Cape Town, South Africa Kamali Gupta Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India Shubh Gupta UPES University, Dehradun, India R. Harikrishnan Symbiosis Institute of Technology, Pune Campus, Symbiosis International (Deemed University), Pune, India Bramah Hazela Department of Computer Science and Engineering, Amity School of Engineering and Technology Lucknow, Amity University, Lucknow, Uttar Pradesh, India Rahat Iqbal University of Dubai, Dubai, UAE Khushboo Jain Department of Computer Science and Engineering, Nirma University, Ahmedabad, India Sudarshan Kumar Jain Department of ECE, Jaipur Engineering College and Research Centre, Jaipur, India Swati Jain Faculty of CSE Department, Institute of Technology, Nirma University, Ahmedabad, India; Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, Greater Noida, India
Editors and Contributors
xxi
Srinivas Jangirala Jindal Global Business School, O. P. Jindal Global University, Haryana, India Bakhit Bin Jarn University of Dubai, Dubai, UAE Bharat Jayaswal Faculty of CSE Department, Institute of Technology, Nirma University, Ahmedabad, India M. S. N. V. Jitendra Department of Computer Science and Engineering, GITAM School of Technology, GITAM (Deemed to be University), Visakhapatnam, Andhra Pradesh, India Rahul Johari SWINGER (Security, Wireless, IoT Network Group of Engineering and Research), USAR (University School of Automation and Robotics), GGS Indraprastha University, Delhi, India Pooja Joshi Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, Gujarat, India Dhruvin Kakadia Nirma University, Ahmedabad, Gujarat, India Parth Kakadia Computer Engineering Department, Vishwakarma Government Engineering College, Ahmedabad, India Rupal Kapdi Institute of Technology, Nirma University, Ahmedabad, India K. Karthick Department of Computer Science and Engineering, Kongunadu College of Engineering and Technology (Autonomous), Trichy, India Mandeep Kaur Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, Greater Noida, India Simarjeet Kaur Department of Computer Science and Engineering, Chandigarh University, Mohali, Punjab, India Riaz A. Khan Depaertment of Computer Science and Engineering, Islamic University of Science and Technology, Awantipora Kashmir, India Rushan Khan Department of Computer Science and Engineering, Amity School of Engineering and Technology Lucknow, Amity University, Lucknow, Uttar Pradesh, India Pooja Khanna Amity University Uttar Pradesh, Lucknow, India Greeva Khant Institute of Technology, Nirma University, Ahmedabad, India Shelej Khera School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Punjab, India M. Kishore Department of ECE, Sri Venkateswara College of Engineering, Chennai, India
xxii
Editors and Contributors
Haswanth Kolanuvada Department of Data Science and Business Systems, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu Dist, Tamil Nadu, India Maheshkumar H. Kolekar Indian Institute of Technology Patna, Bihar, India Niket Kothari Institute of Technology, Nirma University, Ahmadabad, India Harish Kumar Department of Computer Engineering, J.C. Bose University of Science and Technology, YMCA, Faridabad, India Sachin Kumar Amity University, Lucknow Campus, Lucknow, India Sunil Kumar Department of Computer Engineering, J.C. Bose University of Science and Technology, YMCA, Faridabad, India; Department of Information Technology, School of Engineering and Technology (UIET), CSJM University, Kanpur, India Priti Kumari Ashoka Institute of Technology and Management, Varanasi, Uttar Pradesh, India Jayesh Locharla Department of Data Science and Business Systems, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu Dist, Tamil Nadu, India Sajaad A. Lone Depaertment of Computer Science and Engineering, Islamic University of Science and Technology, Awantipora Kashmir, India Aruna Malik Department of Computer Science and Engineering, Dr. B R Ambedkar National Institute of Technology Jalandhar, Punjab, India Ayushi Malik UPES University, Dehradun, India Nikita Malik USIC&T, GGSIP University, Dwarka, Delhi, India; Department of Computer Science, Maharaja Surajmal Institute, Janakpuri, New Delhi, India Sanjay Kumar Malik USIC&T, GGSIP University, Dwarka, Delhi, India Swati Malik Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India Raguel R. Marak School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Punjab, India Yash Modi Computer Engineering Department, Vishwakarma Government Engineering College, Ahmedabad, India A. H. Moon Depaertment of Computer Science and Engineering, Islamic University of Science and Technology, Kashmir, India; Department of Computer Science Engineering, IUST, Awantipora Kashmir, India Saba Mushtaq Directorate of IT and SS, University Of Kashmir, Srinagar, Kashmir, India
Editors and Contributors
xxiii
Anand Nayyar Graduate School, Faculty of Information Technology, Duy Tan University, Da Nang, Vietnam Parth Nimbadkar CSE Department, Institute of Technology, Nirma University, Ahmedabad, India N. Nirmala Department of Electronics and Communication Engineering, Thiagarajar College of Engineering, Madurai, Tamilnadu, India Gousia Nissar Depaertment of Computer Science and Engineering, Islamic University of Science and Technology, Kashmir, India G. Oviya Department of ECE, Sri Venkateswara College of Engineering, Chennai, India Parita Oza Department of Computer Science and Engineering, Nirma University, Ahmedabad, Gujarat, India Sara Paiva ADiT-LAB, Instituto Politécnico de Viana do Castelo, Viana do castelo, Portugal Aayush Panchal CSE Department, Institute of Technology, Nirma University, Ahmedabad, India Mayank Pandey Department of Computer Science and Engineering, Dr. B. R. Ambedkar National Institute of Technology, Jalandhar, Punjab, India Vandan Pandya Faculty of CSE Department, Institute of Technology, Nirma University, Ahmedabad, India Misri Parikh Institute of Technology, Nirma University, Ahmadabad, India Dhruv Patel CSE Department, Institute of Technology, Nirma University, Ahmedabad, India Jigna Patel CSE Department, Institute of Technology, Nirma University, Ahmedabad, India Jitali Patel Institute of Technology, Nirma University, Ahmedabad, India Karan Patel Institute of Technology, Nirma University, Ahmadabad, India Mayank Patel Geetenjali Institute of Technical Studies, Udaipur, Rajasthan, India Meshwa Patel Computer Engineering Department, Vishwakarma Government Engineering College, Ahmedabad, India Nikesha Patel Gujarat Technological University, Chandkheda, Ahmedabad, India Samir Patel Pandit Deendayal Energy University, Gandhinagar, Gujarat, India Elizaveta Podoplelova Institute of Computer Technologies and Informational Security, Southern Federal University, Rostov-on-Don, Russia
xxiv
Editors and Contributors
S. Poorani Department of CSE, Sri Venkateswara College of Engineering, Chennai, India R. J. Poovaraghan School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu, India Rashmi Popli J.C. Bose University of Science and Technology, Faridabad, India Valerii Popovych Constantine the Philosopher University in Nitra, Nitra, Slovakia N. V. S. S. Prabhakar Department of Mathematics GIS, GITAM Deemed to be University, Visakhapatnam, Andhra Pradesh, India P. Prabhavathy School of Information Technology and Engg, Vellore Institute of Technology, Vellore, Tamil Nadu, India S. Pradeep Department of ECE, Sri Venkateswara College of Engineering, Chennai, India Vivek Kumar Prasad Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, Gujarat, India Riya Punia Department of Computer Science and Engineering, Dr. B R Ambedkar National Institute of Technology Jalandhar, Punjab, India M. Pushpavalli Sathyabama Institute of Science and Technology, Chennai, India Maroof Qadri Directorate of IT and SS, University Of Kashmir, Srinagar, India Mullapudi V. Ramanatha Subrahmanya Kiran Department of Data Science and Business Systems, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Tamil Nadu, India Venkata Rao Rampay Department of Computer Science and Engineering, Wollega University, Nekemte, Ethiopia Kritika Rana Yogananda School of Artificial Intelligence, Computers and Data Sciences, Shoolini University, Solan, India Pratyaksha Ranawat Geetenjali Institute of Technical Studies, Udaipur, Rajasthan, India K. Nitalaksheswara Rao Department of Computer Science and Engineering, GITAM School of Technology, GITAM (Deemed to be University), Visakhapatnam, Andhra Pradesh, India Luís Romero ADiT-LAB, Instituto Politécnico de Viana do Castelo, Viana do castelo, Portugal Vatsal Sakariya Institute of Technology, Nirma University, Ahmedabad, Gujarat, India A. Sangeetha Department of Computer Science and Engineering, Gnanamani College of Technology, Pachal, Namakkal, India
Editors and Contributors
xxv
Sakshi Sanghavi Institute of Technology, Nirma University, Ahmedabad, Gujarat, India Darshan Savaliya Institute of Technology, Nirma University, Ahmedabad, Gujarat, India Rhea Sawant Symbiosis Institute of Technology, Pune Campus, Symbiosis International (Deemed University), Pune, India Het Shah Nirma University, Ahmedabad, Gujarat, India Ishika Shah Institute of Technology, Nirma University, Ahmedabad, India Rushabh Shah Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, Gujarat, India Shreya Shah Department of Computer Science and Engineering, Nirma University, Ahmedabad, India Harish Kumar Shakya Assistant Professor, Department of Computer Science and Engineering, Amity School of Engineering and Technology (ASET), Amity University, Gwalior, India Ajay Kumar Sharma Geetenjali Institute of Technical Studies, Udaipur, Rajasthan, India Amit Sharma Institute of Computer Technologies and Informational Security, Southern Federal University, Rostov-on-Don, Russia; Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, India Girraj Sharma Department of ECE, Jaipur Engineering College and Research Centre, Jaipur, India Paawan Sharma Pandit Deendayal Energy University, Gandhinagar, Gujarat, India Raju Pratap Sharma Department of Computer Science and Engineering, Dr. BR Ambedkar National Institute of Technology Jalandhar, Punjab, India Saurabh Sharma Research Scholar, Department of Computer Science and Engineering, Amity School of Engineering and Technology (ASET), Amity University, Gwalior, India A. Shobanadevi Department of Data Science and Business Systems, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Tamil Nadu, India Harsimran Jit Singh UPES University, Dehradun, India Jaspreet Singh Department of Computer Science and Engineering, GD Goenka University, Sohna, India Nikhil Singh Amity University Lucknow Campus, Lucknow, India
xxvi
Editors and Contributors
Nongmeikapam Thoiba Singh Department of Computer Science and Engineering, Chandigarh University, Mohali, Punjab, India Pawan Singh Department of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University, Lucknow, Uttar Pradesh, India Pradeep Kumar Singh Narsee Monjee Institute of Management (NMIMS), STME, Chandigarh, India
Studies
Samayveer Singh Department of Computer Science and Engineering, Dr. B. R. Ambedkar National Institute of Technology, Jalandhar, Punjab, India Shikha Singh Department of Computer Science and Engineering, Amity School of Engineering and Technology Lucknow, Amity University, Lucknow, Uttar Pradesh, India Shubham Singh Department of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University, Lucknow, Uttar Pradesh, India Vaishali Singh Maharishi University of Information Technology, Lucknow, India Harsh Sinha Department of Computer Science, Maharaja Surajmal Institute, Janakpuri, New Delhi, India P. Sivagami Sathyabama Institute of Science and Technology, Chennai, India S. Sreeji Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Semmancheri, Chennai, India P. Srideviponmalar Department of Computational Intelligence, School of Computing, Faculty of Engineering Technology, SRM Institute of Science and Technology, Chennai, India Garima Srivastava Maharishi University of Information Technology, Lucknow, India; Amity University, Lucknow Campus, Lucknow, India Praveen Srivastava School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Punjab, India; Department of Electronics and Communication Engineering, Pranveer Singh Institute of Technology, Kanpur, India S. Suchitra Department of Data Science and Business Systems, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Tamil Nadu, India Namrata Tadanki Symbiosis Institute of Technology, Pune Campus, Symbiosis International (Deemed University), Pune, India Surendra Talari Department of Mathematics GIS, GITAM Deemed to be University, Visakhapatnam, Andhra Pradesh, India Sudeep Tanwar Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, Gujarat, India;
Editors and Contributors
xxvii
Department of Computer Science and Engineering, Nirma University, Ahmedabad, India Dhrumin Thakkar Computer Engineering Department, Vishwakarma Government Engineering College, Ahmedabad, India Abhishek Tomar Yogananda School of Artificial Intelligence, Computers and Data Sciences, Shoolini University, Solan, India Alexey Tselykh Department of Information and Analytical Security Systems, Southern Federal University, Rostov-On-Don, Russia Sudhanshu Tyagi Thapar Institute of Engineering and Technology, Deemed to be University, Patiala, Punjab, India Y. Vahidhabanu Department of Computer Science and Engineering, Kongunadu College of Engineering and Technology (Autonomous), Trichy, India Robert Van Zyl Department of Electrical, Electronics and Computer Engineering, French South African Institute of Technology, Cape Peninsula University of Technology, Cape Town, South Africa Shriram K. Vasudevan Evangelist Intel Software Innovator, Lucknow, India David Verde ADiT-LAB, Instituto Politécnico de Viana do Castelo, Viana do castelo, Portugal Ashwin Verma Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, Gujarat, India Jai Prakash Verma Institute of Technology, Nirma University, Ahmadabad, Gujarat, India; CSE Department, Institute of Technology, Nirma University, Ahmedabad, India Shanu Verma J.C. Bose University of Science and Technology, Faridabad, India K. Vignesh Saravanan Department of Computer Science and Engineering, Ramco Institute of Technology, Rajapalayam, India V. Vishnu Praba Department of Computer Science and Engineering, Ramco Institute of Technology, Rajapalayam, India Sandeep Vyas Department of ECE, Jaipur Engineering College and Research Centre, Jaipur, India Sonali Vyas UPES University, Dehradun, India Shivali Amit Wagle Symbiosis Institute of Technology, Pune Campus, Symbiosis International (Deemed University), Pune, India Rukhsar Zafar Swami Keshvanand Institute of Technology Management and Gramothan, Jaipur, India
Communication and Network Technologies
Design and Implementation of an IoT-Based Indoor Hydroponics Farm with Automated Climate and Light Control Swati Jain and Mandeep Kaur
Abstract With the boom of industrialization and the escalation of world population, there is a significant decline in the land suitable for farming and an increase in demand for food. Hydroponics, a branch of agriculture, facilitates the growth of plants in water without the use of soil. This offers a lifeline of sorts by making vertical farming possible. Hydroponics gives us the freedom to wholly control the parameters that affect plant growth, and if done correctly, it can be beneficial both commercially and environmentally. Manual monitoring of all the variables of plant growth is difficult and can lead to growth failures. This paper proposes how the Internet of Things (IoT), a revolutionary technology can be integrated with hydroponics to automate the process of climate monitoring and control. A practical model is implemented in this paper where IoT sensors are used to control the climate conditions and ambient lights of the hydroponic farm. Sensors monitor the climate and light conditions throughout the day and automatically maintain suitable growth conditions. Keywords Internet of things · IoT · Smart farming · Precision agriculture · Indoor farms · Hydroponics
1 Introduction Hydroponics, an agricultural branch that has plants growing in aqueous solutions and without any need for soil is based on the technique of precision agriculture (PA) [1]. PA is a farming technique that makes use of information technology to ensure that the crops get the right amount of nutrition and environmental growth conditions for optimal health and productivity. This is done by accessing real-time data of the farm conditions, such as air quality, climate conditions including humidity and temperature, and light intensity through the use of IoT sensors on the farms. The data coming from sensors is then used to control the ambient conditions through decision-making S. Jain (B) · M. Kaur Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, Greater Noida, India e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 S. Tanwar et al. (eds.), Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security, Lecture Notes in Networks and Systems 664, https://doi.org/10.1007/978-981-99-1479-1_1
3
4
S. Jain and M. Kaur
algorithms. For example, hydroponic farms require 60–70% humidity during the germination stage of plants, and the sensors constantly monitor the current humidity level in the farm, and when the level reaches below 60%, it automatically turns on the humidifier attached to the farm. This is how IoT can be integrated into hydroponics for automated climate and light control. In this paper, we propose and implement an IoT system that unceasingly monitors and maintains all the environmental parameters and light conditions necessary for the growth of plants in indoor hydroponic farms [2, 3]. As a whole, the system process works as follows: Create the IoT setup of sensors, actuators, and a microcontroller in the indoor farm and place the germinated plant in the hydroponic system. Once installed, this IoT-based climate control model will monitor and maintain the temperature, humidity, and ambient light levels of the hydroponics farm continuously in their optimal range resulting in faster and healthier growth of the plants. Classically, hydroponics and precision agriculture need support and interaction from humans for parameter maintenance. The intent of this system is to create an IoT-enabled indoor smart farm that is automated completely and works virtually without the need for any human intervention. The said IoT design was implemented using NodeMCU as a microcontroller, MQTT broker, sensors for parameter sensing, Firebase as the cloud platform for receiving sensor data, and a mobile application to operate the IoT system remotely. A literature study of the previously implemented hydroponic farms with IoT automation has been presented in Sect. 2. Section 3 titled proposed system design methodology discusses the proposed and implemented system architecture, the decision-making algorithm used for IoT automation for weather and light control, and the mobile application developed to support remote access to the farm at all times. In the next section, the results of the implemented system are presented in the form of IoT setup, indoor farm setup, and graphs to highlight the average ambient weather conditions of the indoor farm maintained automatically for the period. In the concluding section, the benefit and future scope of this study is discussed alongside how this study helps in solving the problems of food crisis due to urbanization and population explosion.
2 Literature Review Kulkarni and Surwade [4] in their work titled “The future of farming through the IoT perspective” identified the lack of real-time information for farming. A model was proposed to convert unstructured information collected through IoT sensors into structured information, saving this information on the cloud and using data mining algorithms to produce useful information important to predict good farming conditions for the future. Dagar et al. [5] proposed a model for a poly house implementation paired with a motion detection sensor of IoT. This sensor can recognize any unusual movement on the field and then informs the server about it. This is used to keep animals away from the farm in the absence of human supervision. Perwiratama et al. [6] in their work proposed a hydroponic farm with automated climate control and nutrient manipulation system through IoT sensors. A greenhouse system is proposed
Design and Implementation of an IoT-Based Indoor Hydroponics Farm …
5
where the inside environment will be controlled, and based on the measurements from multiple sensors, gates to the nutrient solution would be opened or closed and the pump would operate. The algorithm for nutrient manipulation and climate control was presented in the paper. Ruengittinun et al. [7] in their work proposed a Hydroponic Farming Ecosystem (HFE) with IoT-based weather monitoring and nutrient management. HFE is supported by an android application to control the IoT devices in HFE, and it has a feature of alarming the user when the farm is in any abnormal situation. Lakshmanan et al. [8] in their work implemented IoT functionality in an existing hydroponic farm where ambient weather and light conditions were monitored and sent to the cloud server NodeRed which is a free IoT server. A mobile app or a web app was proposed as a user interface to monitor farm conditions. Ani and Gopalakrishnan [9], Jaiswal et al. [11], Kaburuan et al. [12] and Dholu et al. [13] in their respective research work proposed monitoring of temperature and humidity conditions of the farm and presenting it to the user through the mobile app. Semi-automated farms were proposed since ambient light conditions were not monitored through sensors and to control the farm conditions user intervention is needed. Chowdhury et al. [10] in their work designed an IoT-based automated indoor vertical hydroponic farm in Qatar. The system mainly automated the temperature control and water flow control into the farm with the use of sensors, and the real-time updates were sent to the user through a mobile application. Bhojwani et al. [14] in their work proposed an IoT-based model for modeling and analysis of various factors affecting crop production in an agricultural field. This helps in deciding the ideal crop to be planted according to the environmental conditions sensed using the IoT setup.
3 System Design Methodology The proposed system design methodology is divided into three parts, namely system architecture, IoT system decision-making flow, and user interface mobile application.
3.1 System Architecture The block diagram of IoT system designed to automate weather and light controls in a hydroponic farm consists of three main parts: • Client-side sensing and control unit made up of microcontroller NodeMCU, relay switches attached to external appliances, and temperature and humidity sensors to transmit farm conditions. • Server-side cloud platform with a server and an online database. The server receives sensor data from the microcontroller through the MQTT broker and sends the same to the GUI applications for users, and the online database creates
6
S. Jain and M. Kaur
Fig. 1 Block diagram of IoT system for weather and light automation [17]
a log of all the sensor data for further evaluation and data analysis of ideal farm conditions. • GUI through a mobile application to provide remote access to the farm control to the user. Data collected from all the sensors connected to the microcontroller can be accessed through the mobile application. The complete block diagram of the system is presented in Fig. 1. The system starts when the temperature and humidity sensors continuously monitor the current climate conditions of the farm and NodeMCU, and the main microcontroller of the system receives the real-time data of sensors and shares it with other parts of the system. Based on the inherent logic and settings, NodeMCU processes the received data, shares it with the IoT database through the MQTT broker and server, and simultaneously sends action signals to the relay module to control connected climate control equipment. MQTT broker acts as an intermediary between NodeMCU and the server [15, 16]. It performs two tasks: First, it sends all the data to the server which in turn saves the data in the database or presents it to the users. Second, it receives control information from the users through the server and forwards it to the NodeMCU unit.
3.2 IoT System Decision Flow To constantly monitor and maintain the weather and light conditions of the farm in the ideal range of parameters, continuous decision making needs to happen in the client-side sensing and control. This decision making happens at regular intervals when the sensors transmit current parameters to the microcontroller which in turn decides whether the parameter is in the ideal range or not and if not, it sends a signal to the relay unit to turn on the corresponding appliance to maintain the ideal
Design and Implementation of an IoT-Based Indoor Hydroponics Farm …
7
Fig. 2 Flowchart of IoT system decision-making algorithm [19]
parameter [18]. The decision algorithms and control flow for temperature, humidity, and ambient lights work in the following way (Fig. 2): Temperature—The system works by getting the temperature reading (T ) from the DHT11 sensor after every 30 min. T is then compared with the required optimal temperature for the farm which is set to 25 °C in this case. If T is greater than 25 °C, a signal is sent to the relay to switch on the AC. Otherwise, if the ambient temperature T is below 25 °C, a check is made on the relay status and if it is already on then the signal is sent to the relay to turn off the AC switch. The complete process is repeated after an interval of 30 min (Fig. 2). Humidity—The humidity control process starts by reading the current ambient humidity value (H) from the DHT11 sensor. If current humidity is more than the optimal ambient humidity value of 70% and the humidifier is on, a humidifier off signal is sent to the relay. If H is less than 50% and the humidifier is currently off, it is turned on. The complete system goes to stand by and the whole process is repeated after 30 min. No action is taken when the H is in the range of 50–70% (Fig. 3). Lights—The light automation control starts by getting the current time (CT) from the internet. The CT, if available from the internet is updated in the RTC module and if not then, it is fetched from the RTC module. Once the CT is fetched, it is checked
8
S. Jain and M. Kaur
Fig. 3 a Hydro Robo—basic-level mobile app. b Hydro Robo—advanced level mobile app
whether it lies between the duration of lights_On and lights_OFF time. If it is true and light relay is Off, then the ON signal is sent to light relay, and if it is false and light relay is On, then the Off signal is sent to the light relay.
3.3 User Interface Mobile Application After designing the complete hardware architecture, IoT setup, and automation algorithms, the next necessary element to achieve a completely automated system is a way for farm owners to remotely access the farm so that there is no need for them to be physically present at the farm location at all times [19]. This can be accomplished by providing an interface between the users and the farm in the form of a mobile or a web application. In this study, an android OS-based mobile application named Hydro Robo has been designed to enable remote access to the farm. Hydro Robo provides two kinds of interfaces based on the access rights granted to the app user for the farm in the following two ways: • The first interface is that of the basic privilege level (Fig. 3a) wherein the interaction of the IoT system and app user is only one way. The user is only allowed to receive and visualize the data coming from the controller. User has no manual control over the controller or its actions. The app user can remotely monitor all the farm conditions, but the provision to make changes in the farm environment is not granted to the user.
Design and Implementation of an IoT-Based Indoor Hydroponics Farm …
9
• The second interface is of the advanced privilege level (Fig. 3b) wherein the app user can remotely monitor as well as control the farm conditions by turning on/off farm devices remotely through the app. At this level, additional privileges are given along with basic-level controls. User can now visualize the data and can take manual decisions to switch on/off the relay in addition to automatic controls, along with that the user can change certain Controller settings through the remote app such as optimal ambient temperature, minimum humidity level, maximum humidity level, and the system stand-by time.
4 Results In this automated indoor farm, all the sensors required for the automation are controlled and maintained by the NodeMCU central microcontroller. The relay unit connected to NodeMCU controlled the artificial lights, humidifier, and air conditioner to maintain optimal weather conditions. Finally, all the sensed data from the microcontroller is sent to the online platform Firebase for mobile application. After the tuning and testing of the sensors and all the components modules of the system (Fig. 5), the IoT-based and completely automated indoor vertical hydroponic system was employed and tested for a period of one month. In the initial execution, the hydroponic setup was used to cultivate lettuce in an indoor area as shown in Fig. 4. Table 1 represents the temperature, and humidity data sensed from the farm in real time for the duration of 15 days. The complete duration of 24 h was divided into eight time slots of 3 h each, and for each slot, the live temperature and humidity were recorded through the sensors as represented in Table 1. The daily average temperature Fig. 4 IoT setup for farm automation
10
S. Jain and M. Kaur
Fig. 5 Lettuce cultivation in the indoor hydroponic farm
and humidity levels were calculated to compare against the ideal growth conditions needed for the lettuce growth. In Fig. 6, the system performance is illustrated by graphically representing the average climate conditions automatically maintained at the farm for the period of 15 days the automated farm was put to test [20]. The entire automated system was effective in monitoring and controlling the ambient climate conditions of the indoor farm to provide favorable growth conditions for the lettuce plant as evidenced by the growth of lettuce in Fig. 5. For analysis purposes, the hourly temperature and humidity of the farm were recorded and the daily average was calculated. It is evident that the IoT setup of sensors and actuators was successful in maintaining the temperature at 25.14 °C (Fig. 6a) and humidity at 69.76% (Fig. 6b) both in the specified range with 25 °C being the optimal temperature and 70% being the optimal humidity required for lettuce growth, and whenever the parameters deviated from the expected range, the decision-making algorithm as discussed in Sect. 3.2 was able to control them with the system flow shown in Fig. 2.
5 Conclusion Factors like population explosion, industrialization, and urbanization have resulted in the decline in the amount of arable lands and the simultaneous surge in food demands. For decades, researchers are involved in finding out a smart and sustainable solution to agriculture that can work on limited resources and provide more yields. Hydroponic farming is one such sustainable farming method that was first introduced in the 1930s [10]. It allows the growth of plants in an indoor environment with a vertical structure
Temperature
25.8
24.4
24-09-2022
5
25.1
23.9
68.7
68.4
04-10-2022
Date
20-09-2022
21-09-2022
22-09-2022
15
S. No.
1
2
3
69.1
09:00 A.M
Humidity
25.5
03-10-2022
14
24.5
24.1
01-10-2022
02-10-2022
12
23.1
25.1
13
30-09-2022
11
25.3
28-09-2022
29-09-2022
9
10
24.8
27-09-2022
8
25.2
25-09-2022
26-09-2022
6
7
23.8
22-09-2022
23-09-2022
3
4
25.9
25.2
20-09-2022
21-09-2022
1
09:00 A.M
2
Date
S. No.
68.9
69.3
69.3
12:00 P.M
24.3
25.7
24.4
24.9
23.7
25.3
26.1
25.1
26.1
24.7
26.2
24.2
25.4
25.7
26.4
12:00 P.M
69.8
70.1
70.3
03:00 P.M
25.4
26.2
25.6
25.4
25.3
26.3
26.4
25.7
26.1
25.7
26.7
25.2
26.7
25.5
26.8
03:00 P.M
70.5
69.6
69.7
06:00 P.M
25.1
25.9
25.3
25.1
25.1
26.3
26.2
25.4
25.9
25.3
26.5
25.0
26.4
26.1
27.4
06:00 P.M
69.3
69.1
69.6
09:00 P.M
24.7
25.7
24.5
24.7
24.6
26.1
25.9
24.9
25.8
24.9
26.4
24.4
26.2
25.8
26.9
09:00 P.M
68.7
69.2
69.1
12:00 A.M
24.2
25.6
24.4
24.4
24.3
25.6
25.7
24.4
25.6
24.8
26.3
24.4
25.9
25.8
26.4
12:00 A.M
68.0
69.0
68.9
03:00 A.M
23.6
25.4
24.1
24.3
23.5
24.9
25.6
24.5
25.4
24.7
25.9
24.1
25.8
25.7
26.3
03:00 A.M
67.8
69.3
68.7
06:00 A.M
23.5
25.4
23.9
24.1
23.4
24.7
25.4
24.3
25.2
24.5
25.9
23.9
25.5
25.4
26.1
06:00 A.M
Table 1 Temperature and humidity levels of the farm maintained automatically throughout the day over the period of 15 days
68.93
69.29
69.34
(continued)
Average humidity
24.3
25.7
24.5
24.7
24.1
25.5
25.8
24.9
25.7
24.9
26.2
24.4
25.9
25.7
26.5
Average temperature
Design and Implementation of an IoT-Based Indoor Hydroponics Farm … 11
70.9
70.0
70.4
68.7
23-09-2022
24-09-2022
25-09-2022
26-09-2022
27-09-2022
28-09-2022
29-09-2022
30-09-2022
01-10-2022
02-10-2022
03-10-2022
04-10-2022
5
6
7
8
9
10
11
12
13
14
15
70.3
70.3
70.4
69.3
68.9
67.8
68.6
68.9
09:00 A.M
4
Humidity
Date
S. No.
Table 1 (continued)
70.9
70.6
70.9
70.2
68.6
68.2
68.7
70.5
69.6
69.3
70.5
70.9
12:00 P.M
71.1
71.2
71.4
69.6
69.8
69.2
69.4
71.2
69.9
69.8
70.8
71.4
03:00 P.M
70.8
71.3
70.7
69.4
69.6
69.3
69.9
71.1
69.2
70.6
71.1
71.7
06:00 P.M
70.3
70.8
70.6
69.4
69.0
68.4
69.6
70.8
68.8
69.8
71.4
70.9
09:00 P.M
69.9
70.4
70.4
69.0
69.0
68.2
69.9
70.6
68.7
70.2
70.5
70.7
12:00 A.M
69.7
70.1
70.4
69.4
68.5
68.1
69.7
70.3
68.6
69.6
69.7
70.5
03:00 A.M
69.6
69.9
70.2
69.1
68.4
67.9
69.3
70.2
68.4
68.8
69.8
70.4
06:00 A.M
70.33
70.58
70.63
69.43
68.98
68.39
69.40
70.64
68.98
69.63
70.48
70.93
Average humidity
12 S. Jain and M. Kaur
Design and Implementation of an IoT-Based Indoor Hydroponics Farm …
13
Fig. 6 a Average temperature of the farm maintained automatically over the period of one month. b Average humidity of the farm maintained automatically over the period of one month
thus reducing the need for arable lands by 75%. In this research, an automated indoor hydroponic farm system is implemented by using IoT to provide optimal growth conditions artificially. The parameters of the farm were sensed using the IoT sensors, and optimal parameters were calculated based on the type of crop cultivated. All the data from sensors were available at the firebase platform and can be accessed by the user remotely anytime through the android mobile application Hydro Robo. In conclusion, more indoor farms with optimal utilization of the available resources can provide a solution to the problem of the difference between the demand and supply of food resources and thus reduce the dependency on traditional farming methodologies to fulfill the food requirements of the world’s population.
14
S. Jain and M. Kaur
References 1. Ramos C, Nóbrega L, Baras K, Gomes L (2019) Experimental NFT hydroponics system with lower energy consumption. In: 2019 5th experiment international conference (exp. at ‘19), Funchal (Madeira Island), Portugal, pp 102–106. http://doi.org/10.1109/EXPAT.2019.8876479 2. Muralimohan G, Arjun SV, Sakthivel G (2021) Design and development of IoT based hydroponic farming setup for production of green fodder. NVEO Nat Vol Essent Oils 8(2021):4325–4340 3. Kori AA, Veena KN, Basarkod PI, Harsha R (2021) Hydroponics system based on IoT. Ann Rom Soc Cell Biol 9683–9688 4. Kulkarni CN, Surwade A (2019) The future of farming through the IoT perspective. Int Res J Eng Technol (IRJET) 500–503. e-ISSN: 2395-0056 5. Dagar R, Som S, Khatri SK (2018) Smart farming—IoT in agriculture. In: 2018 international conference on inventive research in computing applications (ICIRCA), Coimbatore, pp 1052– 1056. http://doi.org/10.1109/ICIRCA.2018.8597264 6. Perwiratama R, Setiadi YK, Suyoto (2019) Smart hydroponic farming with IoT-based climate and nutrient manipulation system. In: 2019 international conference of artificial intelligence and information technology (ICAIIT), Yogyakarta, Indonesia, pp 129–132. http://doi.org/10. 1109/ICAIIT.2019.8834533 7. Ruengittinun S, Phongsamsuan S, Sureeratanakorn P (2017) Applied internet of thing for smart hydroponic farming ecosystem (HFE). In: 10th international conference on Ubi-media computing and workshops (Ubi-Media), Pattaya, pp 1–4. http://doi.org/10.1109/UMEDIA. 2017.8074148 8. Lakshmanan R, Djama M, Selvaperumal SK, Abdulla R (2020) Automated smart hydroponics system using internet of things. Int J Electr Comput Eng (IJECE) 10:6389. http://doi.org/10. 11591/ijece.v10i6.pp6389-6398 9. Ani A, Gopalakrishnan P (2020) Automated hydroponic drip irrigation using big data, pp 370–375. http://doi.org/10.1109/ICIRCA48905.2020.9182908 10. Chowdhury MEH, Khandakar A, Ahmed S, Al-Khuzaei F, Hamdalla J, Haque F, Reaz MBI, Al Shafei A, Al-Emadi N (2020) Design, construction and testing of IoT based automated indoor vertical hydroponics farming test-bed in Qatar. Sensors 20(19):5637. http://doi.org/10.3390/ s20195637 11. Jaiswal H, Singuluri R, Sampson SA (2019) IoT and machine learning based approach for fully automated greenhouse. In: 2019 IEEE Bombay section signature conference (IBSSC), pp 1–6. http://doi.org/10.1109/IBSSC47189.2019.8973086 12. Kaburuan ER, Jayadi R, Harisno (2019) A design of IoT-based monitoring system for intelligence indoor micro-climate horticulture farming in Indonesia. Procedia Comput Sci 157:459–464. ISSN 1877-0509. https://doi.org/10.1016/j.procs.2019.09.001 13. Dholu M, Ghodinde KA (2018) Internet of things (IoT) for precision agriculture application. In: 2018 2nd international conference on trends in electronics and informatics (ICOEI), pp 339–342. http://doi.org/10.1109/ICOEI.2018.8553720 14. Bhojwani Y, Singh R, Reddy R, Perumal B (2020) Crop selection and IOT based monitoring system for precision agriculture. In: 2020 international conference on emerging trends in information technology and engineering (Ic-ETITE). http://doi.org/10.1109/ic-etite47903.202 0.123 15. Pravin A, Prem Jacob T, Asha P (2018) Enhancement of plant monitoring using IOT. Int J Eng Technol 7(3.27):53. http://doi.org/10.14419/ijet.v7i3.27.17653 16. Abhiram MSD, Kuppili J, Manga NA (2020) Smart farming system using IOT for efficient crop growth. In: 2020 IEEE international students’ conference on electrical, electronics and computer science (SCEECS). http://doi.org/10.1109/sceecs48394.2020.147 17. Joshitha C, Kanakaraja P, Kumar KS, Akanksha P, Satish G (2021) An eye on hydroponics: the IoT initiative. In: 2021 7th international conference on electrical energy systems (ICEES). http://doi.org/10.1109/icees51510.2021.9383694
Design and Implementation of an IoT-Based Indoor Hydroponics Farm …
15
18. Ethirajan L, Govindaraju C (2019) Hydroponic-based smart irrigation system using Internet of Things. Int J Commun Syst e4071. http://doi.org/10.1002/dac.4071 19. Ramakrishnam Raju SV, Dappuri B, Ravi Kiran Varma P, Yachamaneni M, Verghese DM, Mishra MK (2022) Design and implementation of smart hydroponics farming using IOT-based AI controller with mobile application system. J Nanomaterials 1–12. https://doi.org/10.1155/ 2022/4435591 20. Hermawan H, Uddin N, Darajat TM (2022) A development of web application for hydroponic monitoring systems. E3S Web Conf 348:00024. http://doi.org/10.1051/e3sconf/202234800024
Drone Ecosystem: Architecture for Configuring and Securing UAVs Harsh Sinha, Nikita Malik, and Menal Dahiya
Abstract Unmanned aerial vehicles (UAVs) are small aircraft that are guided autonomously, or by remote control, or both. Generally, these UAVs are used for providing aerial views when tackling complex scenarios in dangerous locations where human intervention is not possible. Internet of Drones (IoD) is a new term that has been created for separating general IoT devices like smart refrigerators, bulbs, cars, etc. from special use-cases drones. IoD is an infrastructure designed to provide access and control of UAVs over the cellular or internet via the ground station. The use of insecure drones in the civilian domain risks the general population to a very high privacy breach, as well as other domains such as policing, medical support, public safety, and industrial delivery system. Therefore, the concept of cybersecurity issues, privacy risks, and vulnerabilities introduced in the UAV ecosystem is important and is explored through this work. This research paper deals with UAV infrastructure and lays out a plan for the IoD communication architecture based on QUIC messaging protocol rather than TCP over the 5G cellular network. According to our research, over 87% of the UAVs are vulnerable to at least seven types of attack vectors and their variants that we have mentioned. Only high-end UAVs that are used for military reconnaissance and recovery operations are thoroughly secured to evade basic attacks but are still vulnerable to sophisticated attacks. Keywords Unmanned aerial vehicles · Internet of drones · QUIC protocol · Network slicing · 5G network · IoT
1 Introduction IoD is an emerging infrastructure concept from “drone on internet” due to the rapid and bulk usage of drones. It has gained the attention of academicians, researchers, scholars, students, and industrialists alike due to its vast usability in multiple domains H. Sinha · N. Malik (B) · M. Dahiya Department of Computer Science, Maharaja Surajmal Institute, Janakpuri, New Delhi 110058, India e-mail: [email protected] © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023 S. Tanwar et al. (eds.), Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security, Lecture Notes in Networks and Systems 664, https://doi.org/10.1007/978-981-99-1479-1_2
17
18
H. Sinha et al.
and different applications in the areas of civilian health, surveillance security, logistics supply, connectivity, smart agriculture, industry, safety, and the military usage that made the IoD/UAV ecosystem a critical infrastructure for the world [1]. UAVs are very small aircraft with a size range anywhere between 0.5 and 12.5 m. and are controlled and pivoted by an onboard computer system rather than an onboard pilot [2]. By understanding the crucial need and usability of UAV infrastructure in modern society, cybersecurity researchers have raised questions about security and privacy. The hype of this new technology has attracted Black Hats (a sect of the hacker community having mal-intentions) and individuals who are highly trained in finding vulnerabilities and creating custom exploits to fit their attack vector requirements. To aid them, there are already tools and exploits on the open-source platform ranging from easy distributed denial-of-service (DDoS) attacks to advanced remote code execution (RCE) attacks [3]. In order to obtain the desired performance from the IoD devices, it is therefore important to safeguard the UAV infrastructure, remove vulnerabilities, and stand against these threat walls, and this involves resources and energy being expelled. The nature of this paper is to provide the security and privacy aspects of the UAV ecosystem that is highly neglected during the production stage and the software updates. Even while configuring these drones, developers miss out on safeguarding these UAVs against new attack types. Understanding these attack vectors helps us in creating and implementing prevention methodologies for this complex infrastructure of interconnected technologies in the UAV ecosystem that have loopholes like protocol misconfiguration, open ports, weak or no firewalls, broken authentication, and insecure wireless access points (WAPs) that aid the Black Hats hackers in attacking the UAV system by utilizing these loopholes in the drone infrastructure. A major chunk of these attacks can be prevented just by implementing safeguards like firewalls and secure WAPs to defend against 0-day vulnerabilities and protocol misconfiguration. The use of Transmission Control Protocol (TCP) or Hypertext Transfer Protocol (HTTP) over Quick UDP Internet Connection (QUIC) is an example of protocol misconfiguration that results in insecure communication between UAV, ground station (GS), and the Cloud that can be intercepted because these protocols use plaintext communication which is not protected by Transport Layer Security (TSL) or Secure Socket Layer (SSL) security protocols, further on increasing the likelihood of signal-spoofing attacks [4]. This is just one example out of hundreds; therefore, understanding these components and core technologies that are used in the simple and complex UAV ecosystem is essential. Figure 1 summarizes the different sections discussed through this research work.
Drone Ecosystem: Architecture for Configuring and Securing UAVs
19
Fig. 1 Structure of the paper
Fig. 2 Combination of standard components in a UAV ecosystem
2 UAV Ecosystem Infrastructure There are multiple combinations in which UAV ecosystem’s architecture can exist where some additional components such as the SGS or Cloud Backup (CBu)/CloudBased Storage (CBS) may not be required [1]. These additional components are included to improve the robustness of the entire system; for our research, we will focus on a very standard-operated UAV architecture [2] such as given in Fig. 2, which is generally used for civilian safety, industrial delivery, military usage, etc. The entire data relay telemetry (as illustrated in Fig. 6 and explained in Table 2) including the drones, UAV cluster, ground station, and 5G cellular network has been divided into three stages and explained in the subsequent sections of the paper.
3 Communication Architecture-Stage One Stage one of data telemetry includes drone(s), light-weight cryptographic function, drone cluster, cluster heads, and ad hoc network. The entire telemetry of the data is shown in Table 2.
20
H. Sinha et al.
Fig. 3 Variations of UAVs based on factors [6]
3.1 UAV or Drones Drones are aircraft without a human pilot, crew, or passengers onboard and are the main component of the UAV ecosystem, operated by the GS or SGS with the help of an onboard computer system. They come in multiple variations such as given in Fig. 3, and some models are defined by their usage and requirements. But there are four types of UAV(s): multi-rotor drones, fixed-wing drones, single-rotor drones, and fixed-wing hybrid VTOLs [5] that are classified under six drone categories of Pioneer, Skyeye, Hunter, Watchkeeper, Fire scout, and Eagle eye [2].
3.2 Light-Weight Cryptographic Function Note light-weight cryptographic function like RSA based [7] on the Diffie–Hellman key exchange encryption protocol is necessary because it requires less computation complexity and memory to be implemented on an IOD device limited by the power supply. That can encrypt the entire firmware, onboard flight module, and telemetry data of the UAV(s) so that no data can be extrapolated or poisoned on the drone(s) [5] by an attacker.
Drone Ecosystem: Architecture for Configuring and Securing UAVs
21
3.3 Ad Hoc Network Ad hoc network is a connection between two or more wireless UAV(s) replacing the traditional use of network infrastructure equipment such as wireless access points (WAPs) [8]. Drones need to communicate with each other to share the navigation data, cluster integrity information, aerial scans, terrain depth, collected raw video, and essential datasets with other nodes, seemingly acting as one large sharing device that collectively shares data over the mobile ad hoc network (MANET). The entire cluster needs to relay intact data without sending redundant information from multiple drone(s) by the use of cluster optimization algorithms (routing algorithms), and cluster network infrastructures are necessary to decide autonomously for which node to relay the data to the GS. The use of MANET in the UAV cluster is suggested since it makes the cluster decentralized, where each node dynamically participates in routing by forwarding data to other nodes [8].
4 Communication Architecture-Stage Two Stage two of data telemetry includes 5G cellular network, 5G cellular tower, network slicing, and IoD network slice.
4.1 5G Cellular Network The entire telemetry between the UAV and GS to the Cloud is based on a multi-hop communication network [2] that operates on frequencies of 2.4 GHz and 5.8 GHz that can provide a swift and robust relay of data even during the rapid node switching [9]. Therefore, it is essential to select the network configuration that can improve the lifetime of the entire network.
4.2 5G Cellular Tower 5G cellular tower exhibited in Fig. 4 emits three operating bands for the 5G cellular network as given in Table 1. The higher we travel in the bandwidth spectrum, the closer we have to be to the cellular site. Building and maintaining a network is a high-value job, but in a 5G network, automating the process of network control and forwarding functions we decouple the manual architecture by using software-defined networking (SDN) [10]. This enables network controls to be directly programmable, allowing network managers
22
H. Sinha et al.
Fig. 4 5G cellular tower (site) semantics [11]
Table 1 5G cellular bandwidth operand name, spectrum, coverage, and bandwidth speed Bandwidth operands
Spectrum (GHz)
Area coverage
Bandwidth speed
Low band