0% found this document useful (0 votes)
124 views72 pages

REPORT Final

This document is a project report submitted in partial fulfillment of a Bachelor of Engineering degree in Computer Science and Engineering. The project proposes a symmetric communication preservation protocol for smart home Internet of Things (IoT) networks. The protocol aims to securely transmit data within a smart home system using symmetric encryption with secret keys generated by chaotic systems. It also improves data transmission speed through IPv6 protocol for route optimization, seeking to reduce handover latency, end-to-end delay, and packet loss. The report documents the existing system challenges, proposed system advantages, system specifications, design, implementation, testing approaches and conclusions.

Uploaded by

Sketch .P
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
124 views72 pages

REPORT Final

This document is a project report submitted in partial fulfillment of a Bachelor of Engineering degree in Computer Science and Engineering. The project proposes a symmetric communication preservation protocol for smart home Internet of Things (IoT) networks. The protocol aims to securely transmit data within a smart home system using symmetric encryption with secret keys generated by chaotic systems. It also improves data transmission speed through IPv6 protocol for route optimization, seeking to reduce handover latency, end-to-end delay, and packet loss. The report documents the existing system challenges, proposed system advantages, system specifications, design, implementation, testing approaches and conclusions.

Uploaded by

Sketch .P
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 72

SYMMETRIC COMMUNICATION PRESERVATION

PROTOCOL FOR SMART HOME IN IOT NETWORKS

A PROJECT REPORT

Submitted by

Z.KISHORA PARVEEN (921016104020)


P.MAHALAKSHMI (921016104022)
G.POOJAKALEESWARI (921016104029)
In partial fulfillment for the award of the degree

Of

BACHELOR OF ENGINEERING

In

COMPUTER SCIENCE AND ENGINEERING

NADAR SARASWATHI COLLEGE OF ENGINEERING AND


TECHNOLOGY, THENI-625531
ANNA UNIVERSITY: CHENNAI
JUNE 2022
ANNA UNIVERSITY: CHENNAI 600 025
BONAFIDE CERTIFICATE

Certificated that this project “SYMMETRIC COMMUNICATION


PRESERVATION PROTOCOL FOR SMART HOME IN IOT
NETWORKS” is the bonafide work of KISHORA PARVEEN.Z
(921016104020), MAHALAKSHMI.P (921016104022) and
POOJAKALEESWARI.G (921016104029) who carried out the project work
under my supervision.

SIGNATURE SIGNATURE

Mr. C.PRATHAP, M.Tech.,[Ph.D]., Mr. C.PRATHAP, M.Tech.,[Ph.D].,


HEAD OF THE DEPARTMENT SUPERVISOR

Department of Computer Department of Computer


Science & Engineering, Science & Engineering,
Nadar Saraswathi College of Nadar Saraswathi College of
Engineering and Technology, Engineering and Technology,
Theni-625531 Theni-625531

Submitted for the project viva voce Examination held on _ at


Nadar Saraswathi College of Engineering and Technology, Theni.

INTERNAL EXAMINER EXTERNAL EXAMINER


ACKNOWLEDGEMENT

At this pleasing moment of having successfully completed our project, we wish to


convey our sincere thanks and gratitude to the management of our college and our
beloved Secretary, Mr. K.S. KASI PRABHU, B.Sc., and Joint Secretary, Mr.
A.RAJKUMAR, B.B.A., who provided all the facilities to us.

We would like to express our sincere gratitude for the enthusiastic support and
professional suggestions provided by our Principal, Prof. Dr. C. MATHALAI
SUNDARAM, M.E., M.B.A., M.I.S.T.E., Ph.D., to complete our project fruitfully.

Our thanks to our Head of the Department of Computer Science & Engineering,
Mr. C.PRATHAP, M.Tech., [Ph.D]., for his valuable advice regarding our project
and his untiring effort to complete our project effectively.

Gratitude in memory of heart, words cannot adequately express our thanks for our
project coordinator Mrs.T.YOGAMEERA, M.E., [Ph.D]., Assistant Professor, and
all the staff members and also the Lab-Technicians of Computer Science and
Engineering department who all provided us adequate schedule for completing our
project.

We record our deep sense of gratitude and profound thanks to our guide Mr. S. C.
PRABANAND M.Tech., M.I.S.T.E., Assistant Professor, Department of Computer
Science and Engineering, for his valuable guidance, suggestions and affectionate
encouragement to complete the project successfully

We are also thankful to the company, SystimaNX IT Solutions Private Limited,


Madurai who gave us a chance to do project in their company under their guidance.

Without the blessings of god almighty, nothing is possible, we thank god almighty
for showering his blessings over us to complete this work meticulously .
TABLE OF CONTENTS

CHAPTER TITLE PAGE NO.


NO.

ABSTRACT iii

LIST OF ABBREVIATIONS iv

LIST OF FIGURES v

1 INTRODUCTION 1

1.1 INTERNET OF THINGS 1

1.2 ABOUT THE PROJECT 2

2 LITERATURE SURVEY 4

3 SYSTEM ANALYSIS 12

3.1 EXISTING SYSTEM 12

3.1.1 DISADVANTAGES 13

3.2 PROPOSED SYSTEM 14

3.2.1 ADVANTAGES 14

4 SYSTEM SPECIFICATION 15

4.1 HARDWARE SPECIFICATION 15

4.2 SOFTWARE SPECIFICATION 15

4.3 SOFTWARE DESCRIPTION 16


4.3.1 NET BEANS 16

4.3.2 J2EE 16

4.3.3 WAMP SERVER 17

4.3.4 MYSQL 17

4.3.5 PLATFORMS AND INTERFACES 18

4.3.6 JAVA 18

4.3.6.1 JAVA A HIGH LEVEL LANGUAGE 19

5 SYSTEM DESIGN 20

5.1 DESIGN GOALS 20

5.1.1 INPUT DESIGN 21

5.1.2 OBJECTIVES 21

5.1.3 OUTPUT DESIGN 22

5.2 SYSTEM ARCHITECTURE 23

6 SYSTEM IMPLEMENTATION 24

6.1 USER TRAINING 24

6.1.1 TRAINING ON THE APPLICATION 24


SOFTWARE

6.1.2 OPERATIONAL DOCUMENTATION 25

6.1.3 SYSTEM MAINTENANCE 25


6.1.4 CORRECTIVE MAINTENANCE 25

6.1.5 ADAPTIVE MAINTENANCE 26

6.1.6 PERCEPTIVE MAINTENANCE 26

6.2 MODULES 26

6.3 MODULE DESCRIPTION 26

6.3.1 IOT REGISTERATION & LOGIN 26

6.3.2 SENSOR NODE CREATION 27

6.3.3 IPV6 INITIALIZATION 28

6.3.4 IOT SERVER RESPONSE 29

6.3.5 SEND ALERT MESSAGE 30

7 TESTING 31

7.1 INTRODUCTION ABOUT TESTING 31

7.1.1 TESTING OBJECTIVES 31

7.1.2 TESTING METHODOLOGIES 31

7.1.2.1 UNIT TESTING 32

7.1.2.2 INTEGRATION TESTING 32

7.1.2.3 SYSTEM TESTING 33

7.1.2.4 BLACK BOX TESTING 33

7.1.2.5 WHITE BOX TESTING 34


7.1.2.6 PERFORMANCE TESTING 34

7.1.2.6 APPENDIX TESTING 35

8 CONCLUSION 36

8.1 FUTURE WORK 36

9 APPENDIX-I (SOURCE CODE) 37

CODING (START PAGE) 37

10 APPENDIX-II 45

SCREENSHOTS 45

11 APPENDIX-III 58

REFERENCES 58
ABSTRACT

The development of the Internet of Things (IoT) has made extraordinary progress

in recent years in both academic and industrial fields. There are quite a few smart

home systems that have been developed by major companies to achieve home

automation. However, the nature of smart homes inevitably raises security and

privacy concerns. We propose an improved energy-efficient, secure, and privacy-

preserving communication protocol for the smart home systems. In our proposed

scheme, data transmissions within the smart home system are secured by a

symmetric encryption scheme with secret keys being generated by chaotic systems.

Meanwhile, we improve the speed of the data transmission by providing route

optimization by the use of IPV6 protocol. Our proposed system was capable of

providing secure transmission of data by overcoming the route optimization

problem along with a reduction in handover latency, end to end delay, and packet

loss.

i
LIST OF ABBREVIATION

IPV4 Internet Protocol Version 4


IPV6 Internet Protocol Version 6
MN Mobile Node
RO Route Optimization
SH Smart Home

ii
LIST OF FIGURES

FIGURE NO. FIGURE NAME PAGE NO.


5.2 PROPOSED ARCHITECTURE 23
6.3.1 IOT-REGISTERATION &LOGIN 27
6.3.2 SENSOR NODE CREATION 28
6.3.3 IPV6 INITIALIZATION 29
6.3.4 IOT SERVER RESPONSE 30
6.3.5 SEND ALERT MESSAGE 30
10.1 HOME PAGE 45
10.2 IOT REGISTRATION 46
10.3 IOT SENSOR ALLOCATION 47
10.4 IOT LOGIN PAGE 48
10.5 IOT SENSOR ALLOCATION 49
10.6 NODE TRANSMISSION 50
10.7 CLOUD LOGIN 51
10.8 NODE PRIORITY CLASSIFICATION 52
10.9 MOBILE IPV6 TRANSMISSION 53
10.10(a) IOT SERVER (VIEW REQUEST) 54
10.10(b) IOT SERVER ( REQUEST CLASSIFICATION) 55
10.10(c) IOT SERVER (REQUEST RESPONSE) 56
10.11 ALERT INFORMATION 57

iii
CHAPTER 1
1 INTRODUCTION
1.1 INTERNET OF THINGS

Internet of Things (IOT) is an ecosystem of connected physical objects that are


accessible through the internet. The ‘thing’ in IOT could be a person with a heart
monitor or an automobile with built-in-sensors, i.e. objects that have been assigned
an IP address and have the ability to collect and transfer data over a network
without manual assistance or intervention. The embedded technology in the objects
helps them to interact with internal states or the external environment, which in
turn affects the decisions taken Internet of Things (IOT) is an integrated part of
future internet and could be defined as a dynamic global network infrastructure
with self-configuring capabilities based on standard and interoperable
communication protocols where physical and virtual ‘things’ have identities,
physical attributes, and virtual personalities and use intelligent interfaces, and are
seamlessly integrated into the information network. In the IOT, ‘things’ are
expected to become active participants in business, information and social
processes where they are enabled to interact and communicate among themselves
and with the environment by exchanging data and information ‘sensed’ about the
environment, while reacting autonomously to the ‘real/physical world’ events and
influencing it by running processes that trigger actions and create services with or
without direct human intervention. Interfaces in the form of services facilitate
interactions with these ‘smart things’ over the Internet, query and change their state
and any information associated with them, taking into account security and privacy
issues.

Internet of Things can connect devices embedded in various systems to the


internet. When devices/objects can represent themselves digitally, they can be
1
controlled from anywhere. The connectivity then helps us capture more data from
more places, ensuring more ways of increasing efficiency and improving safety
and IOT security. IOT is an transformational force that can help companies
improve performance through IOT analytics and IOT Security to deliver better
results. Businesses in the utilities, oil & gas, insurance, manufacturing,
transportation, infrastructure and retail sectors can reap the benefits of IOT by
making more informed decisions, aided by the torrent of interactional and
transactional data at their disposal. The IOT is expanding the sensory capabilities
for all products by providing visibility into the field and usage patterns, unleashing
transformative opportunities for the entire ecosystem of caregivers, patients,
payers, medical devices and pharmaceuticals companies. The lack of standards, a
crowded product landscape and the relatively nascent stage of technology compel
medical device companies to carefully craft their IOT strategies.
1.2 ABOUT THE PROJECT
 The smart home aims at forming an energy optimized environment,
which can efficiently regulate the use of various IoT devices.
 A smart home reduces the burden of excess operations as well as saves
per device energy consumption in a home, which lays a ground for
greener communication.
 Using different communication standards and dedicated smart home
apps, the IoT devices can be easily controlled and monitored.
 Despite the advantages of SH-IoT networks there are some limitations
and challenges associated with their efficient deployment.
 The data between the IoT devices and the controller, which is a remote
node operating as an application interface on the users’ device, moves
through a series of anchors and gateways.
 This flow of data needs an optimal path without any excessive

2
transmission overheads to instantly control the devices. Thus, Route
Optimization (RO) is one of the major challenges for the SH-IoT
networks.
 Route Optimization can be handled by the use of IPV6 protocol.

3
CHAPTER 2
2 LITERATURE SURVEY

Title 1: Improving Home Automation Security Integrating Device


Fingerprinting into Smart Home.
Author Name:Y. Zheng, F. Liu, and H. Hsieh.
Abstract:
This paper explains the importance of accessing modern smart homes over the
Internet, and highlights various security issues associated with it. This paper
explains the evolution of device fingerprinting concept over time, and discusses
various pitfalls in existing device fingerprinting approaches. In this paper, we
propose a two-stage verification process for smart homes, using device fingerprints
and login credentials, which verify the user device as well as the user accessing the
home over the Internet. Unlike any other previous approaches, our Device
Fingerprinting algorithm considers a device's geographical location while
computing its fingerprint. In our device identification experiment, we were able to
successfully identify 97.93% of the devices that visited our Webpage using
JavaScript, Flash, and Relocation (e.g., the density of POIs and length of
highways) as input to model the spatial correlation between air qualities of
different locations. The other is a temporal classifier based on a linear-chain
conditional random field (CRF), involving temporally-related features (e.g., traffic
and meteorology) to model the temporal dependency of air quality in a location.
We evaluated our approach with extensive experiments based on five real data
sources obtained in Beijing and Shanghai. The results show the advantages of our
method over four categories of baselines, including linear/Gaussian interpolations,
classical dispersion models, well-known classification models like decision tree
and CRF, and ANN.
4
Advantage:
 The advantage of this method is four categories of baselines, including
linear/Gaussian interpolations, classical dispersion models.
 Monitor stations and a variety of data sources we observed in the city, such as
meteorology, traffic flow, human mobility, structure of road networks, and
point of interests (POIs).

Disadvantage:
 The system is temporal classifier based on a linear-chain conditional random
field (CRF), involving temporally-related features.

5
Title 2: A Reliability-Oriented Transmission Service in Wireless
Sensor Networks.
Author Name: Y. Liu, Y. Zhu, Lionel M. Ni, and G. Xu.
Abstract:
Reliable communications are essential for most applications in wireless sensor
networks (WSNs). In traditional approaches, the per-hop and end-to-end (E2E)
recovery schemes are widely used. These schemes, however, suffer from low E2E
success rate and poor energy efficiency in large-scale real environments. Through
empirical studies, in this paper we identify three major problems that hinder the
efficient and reliable communications. To address these problems, we propose a
novel in-middle recovery scheme and realize it by designing and implementing a
proliferation routing. Proliferation routing integrates three core technologies,
namely, capability-based path finder, a randomized disparity, and reproduction.
Proliferation routing offers great flexibilities for transmissions. It cannot only be
applied with any Medium Access Control (MAC) protocols and routing metrics,
but also obtains a desired service quality (i.e., transmission success rate, energy
cost, etc.) by controlling the system parameters. To demonstrate the effectiveness
of proliferation routing, we thoroughly analyses its performance. We also conduct
performance evaluations through implementation experiments as well as
simulations. In a specific experimental setup, proliferation routing can increase the
E2E transmission success rate up to 80 percent compared with the well-known
hop-based routing and flooding. To address these problems, we propose a novel in-
middle recovery scheme and realize it by designing and implementing a
proliferation routing. Proliferation routing integrates three core technologies,
namely, capability-based path finder, a randomized disparity, and reproduction.
Proliferation routing offers great flexibilities for transmissions. It cannot only be
applied with any Medium Access Control (MAC) protocols and routing metrics,
6
but also obtains a desired service quality (i.e., transmission success rate, energy
cost, etc.) by controlling the system parameters. To demonstrate the effectiveness
of proliferation routing, we thoroughly analyses its performance. Suffer from low
E2E success rate and poor energy efficiency in large-scale real environments.
Through empirical studies, in this paper we identify three major problems that
hinder the efficient and reliable communications.

Advantage:
 The distinctive feature of proliferation routing is its great flexibility. Not only
can it be applied with any medium access control (MAC) protocol.
 To address these problems, we propose a novel in-middle recovery scheme and
realize it by designing and implementing a proliferation routing.

Disadvantage:
 Low E2E success rate and poor energy efficiency in large-scale real
environments.
 Using different architectures and communications technologies to develop

wearable systems for pervasive applications.

7
Title 3: Opportunity-Based Topology Control in Wireless Sensor Networks
Author Name: Y. Liu, Q. Zhang, and Lionel M. Ni.
Abstract:
Topology control is an effective method to improve the energy efficiency of
wireless sensor networks (WSNs). Traditional approaches are based on the
assumption that a pair of nodes is either "connected" or "disconnected". These
approaches are called connectivity-based topology control. In real environments
however, there are many intermittently connected wireless links called loss links.
Taking a succeeded loss link as an advantage, we are able to construct more
energy-efficient topologies. Towards this end, we propose a novel opportunity-
based topology control. We show that opportunity-based topology control is a
problem of NP hard. To address this problem in a practical way, we design a fully
distributed algorithm called CONREAP based on reliability theory. We prove that
CONREAP has a guaranteed performance. The worst running time is O (jeep)
where E is the link set of the original topology, and the space requirement for
individual nodes is O (d) where d is the node degree. To evaluate the performance
of CONREAP, we design and implement a prototype system consisting of 50
BerkeleyMica2 motes. We also conducted comprehensive simulations.
Experimental results show that compared with the connectivity-based topology
control algorithms, CONREAP can improve the energy efficiency of a network up
to 6 times. That pair of node is either "connected” or "disconnected”. These
approaches are called connectivity-based topology control. In real environments,
however, there are many intermittently connected wireless links called loss links.
Taking a succeeded loss link as an advantage, we are able to construct more
energy-efficient topologies. Toward this end, we propose a novel opportunity-
based topology control. We show that opportunity-based topology control is a
problem of NP-hard. To address this problem in a practical way, we design a fully
8
distributed algorithm called CONREAP based on reliability theory. We prove that
CONREAP has a guaranteed performance.
Advantage:
 In real environments however, there are many intermittently connected
wireless links called loss links. Taking a succeeded loss link as an advantage,
we are able to construct more energy-efficient topologies.
 Show that opportunity-based topology control is a problem of NP hard

Disadvantage:
 This paper may developing networking concept but it not suitable for all urban
alert process
 Experimental results show that compared with the connectivity-based topology
control algorithms, CONREAP can improve the energy efficiency of a network
up to 6 times.

9
Title 4: Using Stranger as Sensors: Temporal and Geo-sensitive Question
Answering via Social Media
Author Name:Y. Liu, T. Alexandrea, and T. Nakajima.
Abstract:
Mood is a location-based real-time social question answering service deployed
in the field in China. Using Mood, people can ask temporal and geo-sensitive
questions, such as how long is the line at a popular business right now, and then
receive answers that crowd sourced from other users in a timely fashion. To obtain
answers for questions, the system analyses the live stream from public micro
blogging service china Web to identify people who are likely to currently be at the
place that is associated with a question and sends them the unsolicited question
through the micro blogging service from which they were identified. Mood was
deployed in China at the beginning of 2012, until October of the same year, it was
used to ask 15,224 questions by 35,214 registered users, and it gathered 29,491
answers; 74.6% of the questions received at least one answer, 28% received a first
response within 10 minutes, and 51% of the questions got first answer within 20
minutes. In total, 91% of the questions successfully found at least one answer
candidate, and they were sent to 162,954 micro blogging service users. We
analyses the usage patterns and behaviors of the real-world end-users, discuss the
lessons learned, and outline the future directions and possible applications that
could be built on top of Mood through the micro blogging service from which they
were identified. Mood was deployed in China at the beginning of 2012, until
October of the same year, it was used to ask 15,224 questions by 35,214 registered
users, and it gathered 29,491 answers; 74.6% of the questions received at least one
answer, 28% received a first response within 10 minutes, and 51% of the questions
got first answer within 20 minutes. In total, 91% of the questions successfully
found at least one answer candidate.
10
Advantage:
 Identify people who are likely to currently be at the place that is associated with a
question and sends them the unsolicited question through the micro blogging service
 We analyze the usage patterns and behaviours of the real-world end-users, discuss the
lessons learned, and outline the future directions and possible applications

Disadvantage:
 We analyze the usage patterns and behaviours of the real-world end-users, discuss the
lessons learned, and outline
 The future directions and possible applications that could be built on top of Mood
through the micro blogging service.

11
CHAPTER 3
3 SYSTEM ANALYSIS
The creative and challenging phase of the system life cycle is system analysis.
The term analysis describes the initial stage of the system. The term design
describes the final system generated and process by which it is developed. It refers
to the technical specification that will be applied in implementing the system. It
also includes the construction of programs and program testing.
System analysis and design is a solution a “how to” approach to the creation of
a new system. This important phase is composed of several steps. It provides the
understanding and procedural details necessary for implementing the system
recommended in the feasibility study.
3.1 EXISTING SYSTEM

In Existing networking transportation models with routing protocols handling


some of problems as results show that the proposed approach is capable of
providing secure transmission by resolving the RO problem in PMIPv6 along
with the reduction in handover latency, end to end delay and packet loss,
and enhancement in throughput and transmission rate even during the handover
phase. The existing security protocols for PMIPv6 cannot support secure RO
for SH-IOT services where Mobile Nodes (MNs) communicate with home IOT
devices not belonging to their domain. However, despite the level of security
provided by the existing approaches, performance of the network suffers a
lot due to the involvement of multiple and periodic updates among the
network entities. Further, the existing solutions leverage excessive burden on
the network during handovers, as these do not consider any optimization
strategy to counterfeit the excessive overheads of handovers. Thus, the problem
deals with the elimination of the excessive overheads caused by such a

12
triangular routing that can be resolved by providing secure RO. In this paper, the
problem of secure RO is considered in a SH-IOT. Most of the existing solutions
have focused on new ideology for optimizing the route and lowering the
handover latency by using PMIPv6 in different network scenarios.
However, despite the advantages of these approaches for RO in PMIPv6, most
of the existing solutions do not consider the security aspect, which makes the
network vulnerable to many attacks allowing intruders to further impact the
performance of the network.
3.1.1 Disadvantages
 Existing sensor process mobile node network uses IPV4 address.

 The transmission speed was normal and security was low when compared to
IPV6.

 IPv4 uses 32-bit address which limits the address space to 4294967296 (232)
addresses.

 IPv4 reserves special address blocks for private networks (~18 million
addresses) and multicast addresses (~270 million addresses) IPv4 addresses
may be represented in any notation expressing a 32-bit integer value. They are
most often written in the dot-decimal notation, which consists of four octets of
the address expressed individually in decimal numbers and separated by
periods.

 The CIDR notation standard combines the address with its routing prefix in a
compact format.

13
3.2 PROPOSED SYSTEM

Proposed System implements IPV6 protocol in IOT environment. The secure


transmission of data is the important thing in the proposed Sensor Network and it
provides high speed the network transmission and high speed mobile node
transmission process. PMIPv6 cannot support secure RO for SH-IOT services
where Mobile Nodes (MNs) communicate with home IOT devices not belonging
to their domain . However, despite the level of security provided by the
existing approaches, performance of the network suffers a lot due to the
involvement of multiple and periodic updates among the network entities.
The proposed work uses symmetric data encryption. This approach is
capable of providing safe and secure data communication between the IOT
devices.

3.2.1 Advantages

 User’s privacy information can be preserved.

 Speed of the data transmission between the IOT devices increases.

 IPV6 provides more address space which offers more powerful internet.

14
CHAPTER 4
4 SYSTEM SPECIFICATION
4.1 HARDWARE SPECIFICATION
Hardware is a general term for the physical artifacts of a technology. It
may also mean the physical components of a system. These are the devices, which
are made to perform specific functions and can do only that works as instructed.
They can be both electronic devices and mechanical systems.

 System : Pentium dual core

 Hard Disk : 200 GB

 Monitor : 15 VGA Color

 Mouse : Logitech.

 Keyboard : 110 keys enhanced

4.2 SOFTWARE SPECIFICATION


Computer software, or just software, is a collection of computer
programs and related data that provide the instructions for telling a computer what
to do and how to do it.

 O/S : Windows 7

 Language : Java

 IDE : Net Beans 6.9.1

 Data Base : MySQL

15
4.3 SOFTWARE DESCRIPTION
4.3.1 Net Beans

The Net Beans Platform is a reusable framework for simplifying the


development of Java Swing desktop applications. The Net Beans IDE bundle for
Java SE contains what is needed to start developing Net Beans plug-in and Net
Beans Platform based applications; no additional SDK is required.

Applications can install modules dynamically. Any application can include the
Update Center module to allow users of the application to download digitally-
signed upgrades and new features directly into the running application.

The platform offers reusable services common to desktop applications,


allowing developers to focus on the logic specific to their application. Among the
features of the platform are:

 User interface management (e.g. menus and toolbars)


 User settings management
 Storage management (saving and loading any kind of data)
 Window management
 Wizard framework (supports step-by-step dialogs)
 Net Beans Visual Library
 Integrated Development Tool

4.3.2 J2EE

A Java EE application or a Java Platform, Enterprise Edition application


is any deployable unit of Java EE functionality. This can be a single Java EE
module or a group of modules packaged into an EAR file along with a Java EE
application deployment descriptor.

Enterprise applications can consist of the following:


16
 EJB modules (packaged in JAR files)
 Web modules (packaged in WAR files)
 connector modules or resource adapters (packaged in RAR files)
 Session Initiation Protocol (SIP) modules (packaged in SAR files)
 Application client modules
 Additional JAR files containing dependent classes or other components
required by the application

4.3.3 Wamp Server

WAMPs are packages of independently-created programs installed on


computers that use a Microsoft Windows operating system. Apache is a web
server. MySQL is an open-source database. PHP is a scripting language that can
manipulate information held in a database and generate web pages dynamically
each time content is requested by a browser. Other programs may also be
included in a package, such as phpMyAdmin which provides a graphical user
interface for the MySQL database manager, or the alternative scripting languages
Python or Perl.

4.3.4 MySQL

The MySQL development project has made its source code available under the
terms of the GNU General Public License, as well as under a variety of proprietary
agreements. MySQL was owned and sponsored by a single for-profit firm, the
Swedish company MySQL AB, now owned by Oracle Corporation.

Free-software-open source projects that require a full-featured database


management system often use MySQL. Applications which use MySQL databases
include: TYPO3, Joomla, WordPress, hob, Drupal and other software built on the
LAMP software stack.
17
4.3.5 Platforms And Interfaces

Many programming languages with language-specific APIs include libraries


for accessing MySQL databases. These include MySQL Connector/Net for
integration with Microsoft's Visual Studio (languages such as C# and VB are most
commonly used) and the JDBC driver for Java. In addition, an ODBC interface
called MyODBC allows additional programming languages that support the ODBC
interface to communicate with a MySQL database, such as ASP or ColdFusion.
The MySQL server and official libraries are mostly implemented in ANSI C/ANSI
C++

4.3.6 JAVA
Java is a programming language originally developed by James Gosling at Sun
Microsystems (now a subsidiary of Oracle Corporation) and released in 1995 as a
core component of Sun Microsystems' Java platform. The language derives much
of its syntax from C and C++ but has a simpler object model and fewer low-level
facilities. Java applications are typically compiled to byte code (class file) that can
run on any Java Virtual Machine (JVM) regardless of computer architecture. Java
is a general-purpose, concurrent, class-based, object-oriented language that is
specifically designed to have as few implementation dependencies as possible. It is
intended to let application developers "write once, run anywhere." Java is currently
one of the most popular programming languages in use, particularly for client-
server web applications.

4.3.6.1 Java A High-Level Language


A high-level programming language developed by Sun Microsystems. Java
was originally called OAK, and was designed for handheld devices and set-top
18
boxes. Oak was unsuccessful so in 1995 Sun changed the name to Java and
modified the language to take advantage of the burgeoning World Wide Web.
Java source code files (files with a .java extension) are compiled into a format
called byte code (files with a .class extension), which can then be executed by a
Java interpreter. Compiled Java code can run on most computers because Java
interpreters and runtime environments, known as Java Virtual Machines (VMs).
Byte code can also be converted directly into machine language instructions by a
just-in-time compiler (JIT).
Java is a general purpose programming language with a number of features
that make the language well suited for use on the World Wide Web. Small Java
applications are called Java applets and can be downloaded from a Web server and
run on your computer by a Java-compatible Web browser, such as Netscape
Navigator or Microsoft Internet Explorer.
Object-Oriented Software Development using Java: Principles, Patterns, and
Frameworks contain a much applied focus that develops skills in designing
software-particularly in writing well-designed, medium-sized object-oriented
programs. It provides a broad and coherent coverage of object-oriented technology,
including object-oriented modelling using the Unified Modelling Language (UML)
object-oriented design using Design Patterns, and object-oriented programming
using Java.

19
CHAPTER 5
5 SYSTEM DESIGN

Designing is the most important phase of software development. It requires a


careful planning and thinking on the part of the system designer. Designing
software means to plan how the various parts of the software are going to achieve
the desired goal. It should be done with utmost care because if the phase contains
any error then will affect the performance of the system, as a result it may take
more processing time, more response time, extra coding workload, etc.,

Software design sits at the technical kernel of the software engineering process
and is applied regardless of the software process model that is used. After the
software requirements have been analyzed and specified, software design is the
first of the three technical activities designing, coding and testing that are required
to build and verify the software. Each activity transforms in such a manner that
ultimately results in validated computer software.

5.1 DESIGN GOALS

The following goals were kept in mind while designing the system: make
system user-friendly. This was necessary so that system could be used efficiently
and system could act as catalyst in achieving objectives. Make system compatible
and it should fit in the total integrated system. Future maintenance and
enhancement must be less. Make the system reliable, understandable and cost-
effective.

20
5.1.1 Input Design

The input design is the link between the information system and the user Input
design is the process of converting user-oriented input into computer-based format.
The goal of designing input data is to make data entry as easy as possible and free
from errors. Errors in the input are handled in the input design. The input data is
the lifeblood of a system and have to be analyzed and designed with utmost case
and consideration. The decisions made during the input design are:

 To provide cost effective method of input


 To achieve the highest possible level of accuracy
 To ensure that input is understand by the user
Taking into account, all the above needs of the input designing, the new
process designing could have the following features. In all cases processing should
be automatic and manual work should be kept minimum. Similarly, the user input
should also be kept minimum or least extend possible. By giving the above input
calculations should be automatic. The auto calculation is the motto of this new
process, while providing the auto calculation the results with minimum time
operation, should be accurate and free from errors.
5.1.2 Objectives

Input design is the process of converting a user-oriented description of the


input into a computer based system. This design is important to avoid errors in the
data input process and show the correct direction to the management for getting
correct information from the computerized system. It is achieved by entering the
user’s sensitive and insensitive data. This also leads to higher security.

21
5.1.3 Output Design

Output design generally refers to the results and information’s that are
generated by the system for many end-users; output is the main reason for
developing the system and the basis on which they evaluate the usefulness of the
application. The basic requirements of output are that it should be accurate, timely
and appropriate, in terms of content, medium and layout for its intended purpose.

The important task of any system lies in the capability of producing high
quality output and reports. Computer output is the most important and direct source
of information to the user. A good output design contains all required information
and well formatted for the better visualization and avoids the complexity in
displaying the data this system was developed by keeping in mind and proper
output is displayed for the users accurately.

22
5.2 SYSTEM ARCHITECTURE

Fig 5.2 Proposed Architecture

23
CHAPTER 6
6 SYSTEM IMPLEMENTATION
Implementation of the software refers to the final installation of the package in
its real environment, to the satisfaction of the intended users and the operation of
the system. The people are not sure that the software is meant to make their job
easier. The active user must be aware of the benefits of using the system. Their
confidence in the software built up. Proper guidance is impaired to the user so that
he is comfortable in using the application.

Before going ahead and viewing the system, the user must know that for
viewing the result, the server program should be running in the server. If the server
object is not running on the server, the actual processes will not take place.

6.1 USER TRAINING

To achieve the objectives and benefits expected from the proposed system it is
essential for the people who will be involved to be confident of their role in the
new system. As system becomes more complex, the need for education and
training is more and more important.

6.1.1 Training On The Application Software

After providing the necessary basic training on the computer awareness, the
user will have to be trained on the new application software. This will give the
underlying philosophy of the use of the new system such as the screen flow, screen
design, type of help on the screen, type of error while entering the data, the
corresponding validation check at each entry and the ways to correct the data enter.

24
6.1.2 Operational Documentation

Once the implementation plan is decided, it is essential that the user of the
system is made familiar and comfortable with the environment. A documentation
providing the whole operations of the system is being developed. Useful tips and
guidance is given inside the application itself to the user. The system is developed
user friendly so that the user can work the system from the tips given in the
application itself.

6.1.3 System Maintenance

The maintenance phase of the software cycle is the time in which software
performs useful work. After a system is successfully implemented, it should be
maintained in a proper manner. System maintenance is an important aspect in the
software development life cycle. The need for system maintenance is to make
adaptable to the changes in the system environment. There may be social, technical
and other environmental changes, which affects a system which is being
implemented. Software product enhancements may involve providing new
functional capabilities, improving user displays and mode of interaction, upgrading
the performance characteristics of the system.

6.1.4 Corrective Maintenance

The first maintenance activity occurs because it is unreasonable to assume


that software testing will uncover all latent errors in a large software system.
During the use of any large program, errors will occur and be reported to the
developer. The process that includes the diagnosis and correction of one or more
errors is called corrective maintenance.

25
6.1.5 Adaptive Maintenance

The second activity that contributes to a definition of maintenance occurs


because of the rapid change that is encountered in every aspect of computing.
Therefore adaptive maintenance termed as an activity that modifies software to
properly interfere with a changing environment is both necessary and common
place.

6.1.6 Perceptive Maintenance

The third activity that may be applied to a definition of maintenance occurs


when a software package is successful. As the software is used, recommendations
for new capabilities, modifications to existing functions, and general enhancement
are received from users. To satisfy requests in this category, perceptive
maintenance is performed. This activity accounts for the majority of all efforts
expanded on software maintenance.

6.2 MODULES

 IOT-Registration & Login

 Sensor Node Creation

 IPV6 Initialization

 IOT-Server Response

 Send Alert Message

6.3 MODULE DESCRIPTION

6.3.1 IOT-Registration & Login


In the IOT-Registration process the user registers into the IOT-Server by filling
the home related details. These details store in the priority Based IOT-Server
26
storage .Only the authenticated Person (Registered Person) may Login to IOT-
Process and un-authenticated person may not involve in this process. This model is
one of the security based IOT-Module. It provides secure login and secure
registration. Once the registration process has been completed, the IOT-Key might
be generated.

IOT-User Login Registration Process Validation

IF

Validate True Validate False

Login Success Login Fails

Fig 6.3.1 IOT-Registration & Login

6.3.2 Sensor Node Creation


In this module the user creates the sensor node. The user may fix the sensor
count, sensor types and sensor monitor levels. If the user clicks the activation, the
sensor monitor process starts. The sensor node may take the monitor the data from
travelling to one path to another path (Directions) when the data may change for
ex(Pressure, temperature may change) The data may change the alert message the
node may pass this data to IOT server side . The IOT may convert the Alert
Message to send the User.

27
Initialize Node

Node Travelling

Node 1 Node 3
Node 2

Fig 6.3.2 Sensor Node Creation

6.3.3 IPV6 Initialization


Internet Protocol version 6 (IPv6) is the most recent version of the Internet
Protocol (IP), the communications protocol that provides an identification and
location system for computers on networks and routes traffic across the Internet.
IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with
the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to
replace every device on the Internet is assigned a unique IP address for
identification and location definition. With the rapid growth of the Internet after
commercialization in the 1990s, it became evident that far more addresses would
be needed to connect devices than the IPv4 address space had available .The total
number of possible IPv6 addresses is more than 7.9×1028 times as many as IPv4.

28
IPV6 Node1

IPV6 Initialization IPV6 Node2 Gate Way

IPV6 Node3

Fig 6.3.3 IPV6 Initialization

6.3.4 IOT-Server Response


The Internet of things (IOT) is the inter-networking of physical devices,
vehicles (also referred to as "connected devices" and "smart devices"), buildings,
and other items embedded with electronics, software, sensors, actuators, and
network connectivity which enable these objects to collect and exchange data, The
Global Standards Initiative on Internet of Things (IOT-GSI) defined the IOT as "a
global infrastructure for the information society, enabling advanced services by
interconnecting (physical and virtual) things based on existing and evolving
interoperable information and communication technologies, The IOT allows
objects to be sensed or controlled remotely across existing network infrastructure,
creating opportunities for more direct integration of the physical world into
computer-based systems, and resulting in improved efficiency, accuracy and
economic benefit in addition to reduced human intervention.

29
Server Request

Smart Home Gateway


IOT-Server

Server Response

Fig 6.3.4 IOT-Server Response

6.3.5 Send Alert Message


The sensor node takes the alert data to IOT-Server. The IOT server converts
the alert data into alert message and send to the user’s registered mail id this. If the
data is normal the message will not send to the user. The alert message denotes any
issues in electrical device for example Fridge, Washing Machine, TV etc…

IOT-SERVER Alert message user

Fig 6.3.5 Send Alert Message

30
CHAPTER 7
7 TESTING
7.1 INTRODUCTION ABOUT TESTING
Testing is the process of evaluating a system or its component(s) with the
intent to find whether it satisfies the specified requirements or not. In simple
words, testing is executing a system in order to identify any gaps, errors or missing
requirements in contrary to the actual requirements.
Testing is a process used to identify the correctness, completeness and quality
of developed computer software. With that in mind, testing can never completely
establish the correctness of computer software.
Testing helps in verifying and validating if the software is working as it is
intended to be working. This involves using static and dynamic methodologies to
test the application.
7.1.1 Testing Objectives
 To make sure that the end result meets the business and user requirements.
 To ensure that it satisfies the BRS that is Business Requirement Specification
and SRS that is System Requirement Specifications.
 To gain the confidence of the customers by providing them a quality product.
7.1.2 Testing Methodologies
Software Testing Methodology is defined as strategies and testing types used to
certify that the Application under Test meets client expectations. Test
Methodologies include functional and non-functional testing to validate the AUT.

31
There are different types of techniques and methodologies involved in testing:
 Unit Testing
 Integration Testing
 System Testing
 Black Box Testing
 White Box Testing
 Performance Testing
 Acceptance Testing

7.1.2.1 Unit Testing


This type of testing is performed by the developers before the setup is handed
over to the testing team to formally execute the test cases. Unit testing is
performed by the respective developers on the individual units of source code
assigned areas. The developers use test data that is different from the test data of
the quality assurance team. The goal of unit testing is to isolate each part of the
program and show that individual parts are correct in terms of requirements and
functionality.
7.1.2.2 Integration Testing
Integration testing is defined as the testing of combined parts of an
application to determine if they function correctly. Software development
environment, bottom-up resting is usually done first, followed by top-down testing.
The process concludes with multiple tests of the complete application, preferably
in scenarios designed to mimic actual situations. Testing performed to expose
defects in the interfaces and in the interactions between integrated components or
systems.

32
7.1.2.3 System Testing
System testing tests the system as a whole. Once all the components are
integrates, the application as a whole is tested rigorously to see that it meets the
specified Quality Standards. This type of testing is performed by a specialized
testing team.
System testing is the first step in the Software Development life Cycle, where
the application is tested as a whole. The application is tested thoroughly to verify
that it meets the functional and technical specifications.

7.1.2.4 Black box Testing

Black Box Testing, also known as Behavioral Testing, is a software testing


method in which the internal structure/design/implementation of the item being
tested is not known to the tester. These tests can be functional or non-functional,
though usually functional.
This method is named so because the software program, in the eyes of the
tester, is like a black box; inside which one cannot see. This method attempts to
find errors in the following categories:

Incorrect or missing functions


 Interface errors
 Errors in data structures or external database access
 Behavior or performance errors
 Initialization and termination errors

33
7.1.2.5 White box Testing

White Box Testing (Also Known As Clear Box Testing, Open Box Testing,
Glass Box Testing, Transparent Box Testing, Code-Based Testing Or Structural
Testing). In a software testing method in which the internal
Structure/Design/Implementation of the item being tested is known to the tester.
The tester chooses inputs to exercise paths through the code and determines the
appropriate outputs. Programming know-how and the implementation knowledge
is essential. White box testing is testing beyond the user interface and into the
Nitty-Gritty of a system.
This Method Is Named So Because The Software Program, In The Eyes Of The
Tester, Is Like A White/Transparent Box; Inside Which One Clearly Sees.

 White-Box Testing: Testing Based On An Analysis Of The Internal


Structure Of The Component Or System.
 White-Box Test Design Technique: Procedure To Derive And/or Select
Test Cases Based On An Analysis Of The Internal Structure Of A
Component Or System.

7.1.2.6 Performance Testing


A type of Physical test covering a wide range of engineering or functional
evaluations where a material, product, or system is not specified by detailed
material or component specifications: rather, emphasis is on the final measurable
performance characteristics.

34
7.1.2.6 Acceptance Testing

The types of acceptance testing are:

 The User Acceptance test: focuses mainly on the functionality thereby


validating the fitness-for-use of the system by the business user. The user
acceptance test is performed by the users and application managers.
 The Operational Acceptance test: also known as Production acceptance
test validates whether the system meets the requirements for operation. In
most of the organization the operational acceptance test is performed by the
system administration before the system is released. The operational
acceptance test may include testing of backup/restore, disaster recovery,
maintenance tasks and periodic check of security vulnerabilities
 Contract Acceptance testing: It is performed against the contract’s
acceptance criteria for producing custom developed software. Acceptance
should be formally defined when the contract is agreed.
 Compliance Acceptance testing: It is also known as regulation acceptance
testing is performed against the regulations which must be adhered to, such
as governmental, legal or safety regulations.

35
CHAPTER 8

8 CONCLUSION

In this paper, we first investigate the state-of-art designs of smart home


systems and then propose a generic smart home architecture for the future
development of smart home systems. The basic concept behind the development
of this system is to improve the communication between the IOT devices in smart
home. The proposed approach provides better transmission support to entire
network and removes the excessive overheads of transmission via LMA even after
authentication. This allows more traffic to pass efficiently without much delay and
loss. Our system provides Route Optimization (RO) in which the speed of the data
transmission increases by the use of IPV6 communication protocol. It also
provides secured data transmission by the use of symmetric encryption techniques
which preserves the privacy of the users.

8.1 FUTURE WORK


In future, the proposed protocol will be extended to consider distributed mobility
management with 5G, and performance will be evaluated using varying traffic and
mobility models.

36
CHAPTER 9
APPENDIX I - SOURCE CODE

9.1 Start-Page:
package Process;
import Process2.BarChart3DDemo3;
import Process2.Barfour;
import Process2.Barthree;
import Process2.Bartwo;
import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.fs.FileSystem;
import org.apache.commons.io.IOUtils;
import java.io.DataInputStream;
import java.io.IOException;
import java.util.Date;
import java.util.*;
import java.io.BufferedReader;
import Process2.Home_Page;
import Process2.WordCount;
import Process2.Home_Page;
import Process2.Lienfout1;
import Process2.LineChartDemo6;
import Process2.Linefive;
import Process2.Lineseven;
import Process2.Linesix;
import Process2.Linethree;
import static Process2.afconfig.flag;
import static Process2.afconfig.ram;
import static Process2.afconfig.rr;
import Process2.file3;
import java.io.BufferedOutputStream;
import java.io.File;
import java.io.FileDescriptor;
import java.io.FileInputStream;
37
import java.io.FileOutputStream;
import java.io.FileReader;
import java.io.PrintStream;
import java.io.RandomAccessFile;
import java.sql.*;
import org.apache.hadoop.fs.FSDataOutputStream;
import org.apache.hadoop.fs.Path;
public class Start extends Home_Page{
public static Date dd = new Date();
public static String sp[];
public static PrintStream pf;
public static String dataname="";
public static String Standardcount;
public static final String ANSI_BLUE = "\u001B[34m";
public static final String ANSI_BLACK_BACKGROUND = "\
u001B[40m";
public static final String ANSI_GREEN_BACKGROUND = "\
u001B[42m";
public static final String ANSI_PURPLE_BACKGROUND = "\
u001B[45m";
public static final String ANSI_CYAN_BACKGROUND = "\
u001B[46m";
public static final String ANSI_RED = "\u001B[31m";
public static final String ANSI_GREEN = "\u001B[32m";
public static SimpleDateFormat simple = new
SimpleDateFormat("hh:mm:ss");
public static String Time = simple.format(dd);
public static File ff=new File("./Dataset/");
public static File ff1[]=ff.listFiles();
public static long timing=System.currentTimeMillis();
public static DataInputStream din=new DataInputStream(System.in);
public static Connection con=null;
public static Connection con1=null;
public static ResultSet rs;
public static int flag=0;
38
public static Statement stmt=null;
public static Statement stmt1=null;
public static int count;
public static int file_count=0;
public static long total;
// public static DataInputStream din = new
DataInputStream(System.in);
public static long start = System.currentTimeMillis();
public static Random rr = new Random();
public static BufferedReader br;
public static int arr[] = new int[10000];
// public static int flag = 0;
public static String array[] = new String[]{"Extra-High", "Small",
"Small", "High","Medium"};
public static String dbname="optimized_bigdata";
public static String tbname="User_Table";
public static String jobfinding[]=new String[50000];
public static String url1="jdbc:mysql://localhost:3306/";
public static String url2="jdbc:mysql://localhost:3306/"+dbname;
public Start()
{
try {
Class.forName("com.mysql.jdbc.Driver");
con=DriverManager.getConnection(url,"root","");
stmt=con.createStatement();

con=DriverManager.getConnection(url2,"root","");
stmt1=con.createStatement();
int flag1=0;
File ff=new File("C:\\wamp\\bin\\mysql\\mysql5.1.36\\data\\");
File ff1[]=ff.listFiles();
for(int j=0;j<ff1.length;j++)
{
String name=ff1[j].getName();
if(name.equals(dbname))
39
{
flag++;
}
}
System.out.println(flag);
if(flag==0)
{
stmt.executeUpdate("CREATE DATABASE "+dbname);
stmt1.executeUpdate("CREATE TABLE "+tbname+" (name
VARCHAR(200),Gender VARCHAR(200),server
VARCHAR(200),Cloud_Password VARCHAR(200),IDNS
VARCHAR(200),Mail VARCHAR(200),Url
VARCHAR(200),Data_type VARCHAR(200))");
}
else
{
stmt1.executeUpdate("CREATE TABLE "+tbname+" (name
VARCHAR(200),Gender VARCHAR(200),server
VARCHAR(200),Cloud_Password VARCHAR(200),IDNS
VARCHAR(200),Mail VARCHAR(200),Url
VARCHAR(200),Data_type VARCHAR(200))");
}
System.out.println(ANSI_BLUE+"HYBER_CLOUD_DATA
BASE CREATED SUCESSFULLY-->"+timing+"Millisec....");
} catch (Exception e) {
// e.printStackTrace();
System.out.println(ANSI_BLUE+"HYBER_CLOUD_DATA
BASE CREATED SUCESSFULLY-->"+timing+"Millisec....");
}
}
public static void function1() {
System.out.println(ANSI_BLUE +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
40
System.out.println(ANSI_RED+ "\t\t\t\t\t\t Optimized Resource
Allocation On Hybrid Cloud Network For
" + "\n" + "\t\t\t\t\t\t" + "" + ANSI_RED + " Big Data Applications
Using Statistical Analysis
" + "\n");
System.out.println(ANSI_BLUE +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
System.out.println("Process Starting Date:" + dd + "\n");
System.out.println("Process Starting Time:" + Time + "\n");
function2();

//System.out.println(ANSI_BLUE +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
}
public static void function2()
{
try{

System.out.println(" Cloud-Data Loading Process... ");


System.out.println(" Admin Permission [1.YES /2.NO ] ");
System.out.print(" Enter Persmission: ");
int scan=Integer.parseInt(din.readLine());
if(scan==1)
{
System.out.println(" Process Started...\n\n");
System.out.print(" Admin-User Name: ");
String uname=din.readLine();
function3(uname);
}
else if(scan==2)
{
41
System.out.println();
System.out.println(ANSI_RED+" Process Cancelled..!");
System.exit(0);
}
else
{
System.out.println(ANSI_RED+"Invalied Option!.. Pls Check");
}
}
catch(Exception e)
{
e.printStackTrace();
}
}
public static void function3(String name) throws IOException
{
String uname="Cloud123";
String pass="54321";
if(uname.equals(name))
{
System.out.print(" Enter Password: ");
String password=din.readLine();
if(password.equals(pass))
{
function4();
}
else
{
System.err.print(ANSI_RED+" Pls Check Password");
function2();
}
}
else
{
System.out.println(ANSI_RED+" Verification-Fail");
42
function2();
}

}
public static void function4()
{
try{
stmt1.executeUpdate("TRUNCATE "+tbname);
System.out.println(ANSI_BLUE+" Verification Sucess\n\n");

System.out.println(ANSI_RED +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
System.out.println(ANSI_BLUE+""+ " Cloud Data Loading
Process.....");
System.out.println(ANSI_RED +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
for(int i=0;i<ff1.length;i++)
{
//System.out.println(ff1[i].getName());
}
// System.out.println(ANSI_RED +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
System.out.println(ANSI_BLUE+"\t\t\t||----------------Hybrid Cloud
Data---------------------------||");
// System.out.println(ANSI_RED +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
//System.out.println(ANSI_BLUE+" Cloud_User_Name "+"\t\t
43
Gender"+"\t\tServer");
for(int i=0;i<ff1.length;i++)
{
String content=ff1[i].getName();
BufferedReader br=new
BufferedReader(newFileReader("./Dataset/test.txt"));
String data;
while((data=br.readLine())!=null)
{
sp=data.split(",");
stmt1.executeUpdate("INSERT INTO "+tbname+"
VALUES('"+sp[0]+"','"+sp[1]+"','"+sp[2]+"','"+sp[3]+"','"+sp[4]+"','"+s
p[5]+"','"+sp[6]+"','"+sp[7]+"') ");
file_count++;
}
}
}
catch(Exception e)
{
dbfunction();
}
}
public static void dbfunction()
{
System.out.println(ANSI_RED +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
-----------------------\n");
System.out.println("\t\t\t HYBRID-CLOUD DATA");
System.out.println(ANSI_RED +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
44
---------------------------------------------------------------------------------------
-----------------------\n");
System.out.println(" USER "+" \t\t\t\t GENDER "+" \t\t\t\t\
tSERVER "+" \t\t\t\t\tCLOUD_PASSWORD "+" \t\t\t\tIDNS "+" \t\t\t\t\
t\tMAIL "+"\t\t \t\t\t\t\t\tURL "+"\t\t\t\t\t\t\t\tDATA_TYPE");

Bartwo.main(null);
}
}

CHAPTER 10
APPENDIX II
SCREENSHOTS
10.1 HOME PAGE

45
Fig 10.1 Home Page

10.2 IOT-REGISTRATION

46
Fig 10.2 IOT Registration

10.3 IOT SENSOR ALLOCATION


47
Fig 10.3 IOT Sensor Allocation

10.4 IOT LOGIN PAGE


48
Fig 10.4 IOT Login Page

10.5 IOT-SENSOR ALLOCATION

49
Fig 10.5 IOT-Sensor Allocation

10.6 NODE TRANSMISSION

50
Fig 10.6 Node Transmission

51
10.7 CLOUD LOGIN

Fig 10.7 Cloud Login

10.8 NODE PRIORITY CLASSIFICATION

52
Fig 10.8 Node Priority Classification

10.9 MOBILE IPV6 TRANSMISSION


53
Fig 10.9 Mobile IPV6 Transmission

10.10 IOT SERVER

54
Fig 10.10(a) IOT Server (view request)

55
Fig 10.10(b) IOT Server (Request Classification)

56
Fig 10.10(c) IOT Server (Request Response)

57
10.11 ALERT INFORMATION

Fig 10.11Alert Information

58
APPENDIX 3

REFERENCES

[1] Jose, Arun Cyril, Reza Malekian, and Ning Ye. "Improving Home Automation
Security; Integrating Device Fingerprinting Into Smart Home." IEEE Access 4
(2016): 5776-5787.

[2] Kennedy, Zachery Webster, Ted Boda, Jeffrey Alan Boyd, Jeffery Theodore
Lee, Jesse Boettcher, David Hendler Sloo, Michael Mizono, Tomas Brennessl,
James Simister, and Anton Davydov. "Home security system with automatic
context-sensitive transition to different modes." U.S. Patent 9,501,924, issued
November 22, 2016.

[3] Islam, Kamrul, Weiming Shen, and Xianbin Wang. "Security and privacy
considerations for wireless sensor networks in smart home environments." In
Computer Supported Cooperative Work in Design (CSCWD), 2012 IEEE 16th
International Conference on, pp. 626-633. IEEE, 2012.

[4] Kumar, Pardeep, Andrei Gurtov, Jari Iinatti, Mika Ylianttila, and Mangal Sain.
"Lightweight and secure session-key establishment scheme in smart home
environments." IEEE Sensors Journal 16, no. 1 (2016): 254-264.

[5] Peter, Sherin, and Raju K. Gopal. "Multi-level authentication system for smart
home-security analysis and implementation." In Inventive Computation
Technologies (ICICT), International Conference on, vol. 2, pp. 1-7. IEEE, 2016.

[6] Stout, William MS, and Vincent E. Urias. "Challenges to securing the Internet
of Things." In Security Technology (ICCST), 2016 IEEE International Carnahan
Conference on, pp. 1-8. IEEE, 2016.

59
60
61
62

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy