Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Maharashtra State Board of Technical

Education, Mumbai.
GOVERNMENT POLYTECHNIC, KARAD.
Part [A]
MICROPROJECT PROPOSAL
For Micro-Project
“Case study on securing IOT networks”

Course: -
Emerging Trends in Computer and Information Technology (22618)

Submitted by:
2203 Anushka Sadanand Gurav 2100100001

2204 Tasnim Javed Shaikh Mulani 2100100002

Under the guidance of


Prof. Mrs. M. A. Birnale

Academic Year 2023-24


Department of Computer Engineering

GOVERNMENT POLYTECHNIC KARAD 2023-24


____MICROPROJECT PROPOSAL_____
COMPUTER ENGINEERING
TITLE: “Case study on securing IOT networks”

1.0 RATIONALE:
As the Internet of Things (IoT) continues to proliferate across industries, the security
of IoT networks becomes increasingly critical. This case study explores a holistic approach to
securing IoT networks by integrating blockchain technology, machine learning algorithms, ethical
hacking methodologies, and networking concepts. This comprehensive strategy helps safeguard
sensitive data, protect against emerging threats, and ensure the reliability and integrity of IoT
ecosystems across industries.

2.0 AIM AND BENEFITS:


1. Establish a secure and decentralized network architecture for IoT devices using blockchain
technology to ensure data integrity, confidentiality, and resilience against cyber attacks.
2. Utilize machine learning algorithms to detect anomalies and identify potential security
threats within IoT data streams, enabling proactive threat mitigation and incident response.
3. Conduct ethical hacking assessments to assess the security posture of IoT networks, identify
vulnerabilities, and implement appropriate security controls.
4. Incorporate networking concepts such as segmentation, encryption, and access control to
enhance the resilience and security of IoT network infrastructures.

3.0 COURSE OUTCOMES:


a) Describe machine learning and data concepts.
b) Interpret IoT concepts.
c) Describe Blockchain technology.
d) Describe Digital Forensic Models and Evidence Handling Procedures.
e) Describe Ethical Hacking process.
f) Detect Network, Operating System, and applications vulnerabilities.

GOVERNMENT POLYTECHNIC KARAD 2023-24


4.0 PROPOSED METHODOLOGY:
 We will communicate with each group member.

 From above discussion we will decide the topic of our microproject.

 We will plan the general structure of the whole project.

 Collect information regarding our project.

 After collecting all the information, we will create report on how to secure an IOT network.

 After that we will make the Final Project report on our project and we will submit it to our
respected subject teacher.

5.0 ACTION PLAN:

Names of responsible
Details of activity Start date Finish date
team members

Selection of topic 01-01-2024 15-01-2024 All team members

Write proposal 15-01-2024 20-01-2024 All team members

Collection of information 25-01-2024 15-02-2024 All team members

Prepare a report 15-02-2024 25-03-2024 All team members

6.0 RESOURCES REQUIRED:

Sr. No Name of Resources Specification

Device Name: DESKTOP –


SUS0KGR
Computer System
1. Processor: 11th Gen Intel(R) Core (TM)
i5- 1135G7 @ 2.40GHz 2.42 GHz
System.

2. Office S/W Package Microsoft word

GOVERNMENT POLYTECHNIC KARAD 2023-24


7.0 GROUP MEMBERS:

Roll No Name of team members Enrollment No.

2203 Anushka Sadanand Gurav 2100100001

2204 Tasnim Javed Shaikh Mulani 2100100002

GOVERNMENT POLYTECHNIC KARAD 2023-24

You might also like