Professional Documents
Culture Documents
in
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
About NPTEL 1) In an optical wireless channel, the temporal dispersion caused by multipath is characterized by 1 point
BER
How does an NPTEL
online course work? Outage rate
Delay Spread
MATLAB Data rate
Week 2
2) In order to have minimum delay spread in an optical wireless channel the LED semiangle and the receiver field of view, (Φ 1 , Ψc ) combination 1 point
2
Week 3 should be
(Wide, Narrow)
Week 4
(Wide, Wide)
Week 5 (Narrow, Narrow)
(Narrow, Wide)
Week 6
No, the answer is incorrect.
Score: 0
Week 7 Accepted Answers:
(Narrow, Narrow)
Week 8
3) In VLC, the LED radiation pattern is characterized by its Lambertian parameter, which is expressed as 1 point
Week 9
ln(2)
Week 10 m = −
ln(coscos Φ 1 )
Week 11 ln(2)
m = −
ln(sinsin Φ 1 )
Hybrid Network LiFi and WiFi 2
Coexistance
ln(coscos Φ 1 )
Vehicle to Vehicle m = −
2
light - No video
ln(sinsin Φ 1 )
2
Indoor Channel simulation m = −
ln(2)
Quiz: Week 11 : Assignment 4) In optical channel gain following the Lambertian radiation pattern the optical filter gain and concentrator gain is a function of 1 point
11
6) To access the jth user associated with ith LED with aij for 2<=i<=4 and 1<=j<=2 of a matrix a, of order 5 ∗ 6 , which code is used? 1 point
a (2;4,1;2)
a (2,4:1,2)
a (2:4,1:2)
a (2,4;1,2)
7) Name the functions used, for multiplication and division of two polynomials in MATLAB. 1 point
8) What is the size of the z vector in a mesh (x,y,z) if the sizes of x and y vectors are m, n respectively? 1 point
[m, n]
(m, n)
[m, n)
Independent of m and n
Integer
Vector
Matrix
String
10) Colorbar command gives different color to the bar chart following their ______ 1 point
height
width
length
independently
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
MATLAB
1 1 − −−−−
( )erfc( √ SN R)
2 2√ 2
Week 0
− −−−−
erfc(√ SN R)
Week 1
1 − −−−−
erfc( √ SN R)
2
Week 2
Yes, the answer is correct.
Score: 1
Week 3
Accepted Answers:
1 1 − −−−−
( )erfc( √ SN R)
2 2
Week 4
2) In BPSK, the binary symbols 1 and 0 are represented by the carrier with a phase shift of 1 point
Week 5
Week 6 Π/2
Π
Week 7
2Π
Week 8
0
NOMA VLC
3) On-off signaling is known as 1 point
MIMO, Zero Forcing (ZF) Rx,
MMSE Rx, Noise Bipolar signaling
enhancement in ZF Rx Polar signaling
6) The BER for OFDM with BPSK as a modulation scheme with L channel tap N subcarriers is: 1 point
−−−−−−−
1
SN R
1 N
(1 − √ )
2 L
2+ SN R
N
−−−−−−−
1
SN R
N
(1 − √ )
L
2+ SN R
N
−−−−−−−
1
SN R
N
2(1 − √ )
L
2+ SN R
N
−−−−−−−
1
SN R
1 N
(1 − √ )
2 L
1+ SN R
N
7) For 16 channel taps and 256 channel subcarriers with transmit SNR of 35 dB. What will be the BER for the OFDM system using BPSK as a 1 point
modulation scheme?
5 × 10-3
2.5 × 10-3
5 × 10-2
2.5 × 10-2
8) An OFDM system operates within a bandwidth of 6 MHz on 16 subcarriers with a bandwidth efficiency of 0.8. The transmitted data is modulated 1 point
by an 8-PSK scheme. The data rate R of the system will be
18 Mbps.
9 Mbps.
3 Mbps.
27 Mbps.
9) The traditional RF OFDM techniques cannot be directly applied to VLC because? 1 point
10) The following are the OFDM techniques used in VLC 1 point
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
Quiz: Week 9 : Assignment 4) ---------- as a multiple access technique efficiently utilizes the power domain to serve multiple users simultaneously in the same frequency band 1 point
9 and time slot using the same code
Lecture Material
Tuning the semiangle of the LEDs
Tuning the field-of-view of the PDs
None of a and b
Both a and b
6) With the help of the CIE 1931 chromaticity diagram we can implement infinite color band combinations for conventional CSK modulation scheme: 1 point
True
False
May be
7) The optical power of red, green and blue LEDs in CSK can be related to: 1 point
8) In standard CSK scheme, the channel gain matrix termed as H is a combination of how many IM/DD channels? 1 point
3x3
2x2
2x3
3x2
9) Assume P as optical power of LED and x and y as center of a color band in chromaticity coordinates. i, j, and k represents the red, green, and 1 point
blue LEDs in a standard CSK scheme. Which line of code should be there in implementing CSK?
P i + P j + P k == 1
x i × P i + x j × P j + x k × P k == 1
x i + x j + x k == 1
yi + yj + yk == 1
10) While implementing Optical-OFDM such as ACO-OFDM, why we use QAM modulation and demodulation? 1 point
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
About NPTEL 1) What processing step combines multiple OFDM subcarriers into a single signal for transmission? 1 point
FFT
How does an NPTEL
online course work? IFFT
RF Combining
MATLAB RF Combining
Week 2
2) Why is a cyclic prefix required in an OFDMA? 1 point
Week 8 3) In OFDMA, what is the relationship between the subcarrier spacing f and symbol time t? 1 point
6) The PAPR of the OFDM signal in the case of the BPSK signal is 1 point
2
a
2
a
7) For which modulation technique, the error performance is best described in terms of slot error rate. 1 point
OOK-RZ
PPM
DPIM
None of the above
Power efficient
Bandwidth efficient
Less complex
All of the above
9) The ratio of power requirement for OOK-RZ and OOK-NRZ modulation scheme is 1 point
0.707
0.5
0.1
0.577
4.77 dB
0 dB
4.5 dB
10.5 dB
11) In order to achieve the same throughput as OOK, PPM slot duration is shorter than the OOK bit duration by a factor of …………. where, L=2M . 1 point
L/M
M/L
1
0.5
12) 1
−
−−
Eb 1 point
Which one of the following digital modulation schemes has the bit error rate as 2
erf c (√
No
) ?
Analog modulation
Digital intensity modulation
Photodetector
Receiver structure
15) Which modulation scheme would you suggest for high speed data transmission over optical channel? 1 point
ASK
BPSK
FSK
OFDM
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
Quiz: Week 8 : Assignment 4) --------- as a multiple access technique efficiently utilizes the power domain to serve multiple users simultaneously in the same frequency band 1 point
8 and time slot using the same code.
Quiz: Week 7 & 8 : Revised
Power domain PD-NOMA
Assignment
Code domain NOMA (CD-NOMA)
Week 9 Both 1 & 2
Neither 1 & 2
Week 10
Yes, the answer is correct.
Score: 1
Week 11
Accepted Answers:
Power domain PD-NOMA
Week 12
5) NOMA performance in VLC by controlling the channel gain difference between users by 1 point
Download videos
Tuning the semiangle of the LEDs
Problem Solving Session -
Tuning the field-of-view of the PDs
Jan 2024
None of a and b
6) With the help of the CIE 1931 chromaticity diagram we can implement infinite color band combinations for conventional CSK modulation scheme: 1 point
True
False
May be
7) The optical power of red, green and blue LEDs in CSK can be related to: 1 point
8) In standard CSK scheme, the channel gain matrix termed as H is a combination of how many IM/DD channels? 1 point
3x3
2x2
2x3
3x2
9) Assume P as optical power of LED and x and y as center of a color band in chromaticity coordinates. i, j, and k represents the red, green, and 1 point
blue LEDs in a standard CSK scheme. Which line of code should be there in implementing CSK?
P i + P j + P k == 1
x i + P i + x j × P j + x k × P k == 1
x i + x j + x k == 1
yi + yj + yk == 1
10) While implementing Optical-OFDM such as ACO-OFDM, why we use QAM modulation and demodulation? 1 point
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
Week 3 2) NOMA performance in VLC by controlling the channel gain difference between users by 1 point
Differential Pulse Interval VLC systems offer high SNRs due to the short distance between the transmitter and the receiver.
Modulation (DPIM) and Both 1 & 2
Differential Amplitude Pulse
Neither 1 & 2
Position Modulation (DAPPM)
No, the answer is incorrect.
Variable Pulse Position Score: 0
Modulation (VPPM) Accepted Answers:
Both 1 & 2
Week 7 Feedback Form :
Optical Wireless
Communications for Beyond 4) MIMO uses the following diversity technique ----------- 1 point
5G Networks and IoT
Antenna diversity
Quiz: Week 7 : Assignment
Time diversity
7
Frequency diversity
Week 8 Polarization diversity
Week 11 5) In the MIMO-NOMA-VLC system the users are sorted (decoded) by 1 point
7) Assuming that P1 represents the weak signal power and P2 is the strong signal power. The receiver can decode the better signal (i.e., user 2), 1 point
and user 2 can efficiently support the rate that is described by
2
P 2 |h2 |
R2 = B(1 + )
N0
2
P 1 |h2 |
R2 = B(1 + )
N0
2
P 1 |h1 |
R2 = B(1 + )
N0
2
P 2 |h1 |
R2 = B(1 + )
N0
8) Based on (7) using SIC the rate user 1 can support reliable rate that is expressed as 1 point
2 2
(P 1 +P 2 )|h2 | P 2 |h2 |
R1 = B(1 + ) − B(1 + )
N0 N0
2 2
(P 1 +P 2 )|h1 | P 2 |h2 |
R1 = B(1 + ) − B(1 + )
N0 N0
2 2
(P 1 +P 2 )|h2 | P 2 |h1 |
R1 = B(1 + ) − B(1 + )
N0 N0
2 2
(P 1 +P 2 )|h1 | P 2 |h1 |
R1 = B(1 + ) − B(1 + )
N0 N0
9) The overall Sum Rate for MIMO-NOMA-VLC system for two users is given by 1 point
2
(P 1 +P 2 )|h2 |
R = B(1 + )
N0
2
(P 1 +P 2 )|h1 |
R = B(1 + )
N0
2
(P 1 )|h1 |
R = B(1 + )
N0
2
(P 2 )|h2 |
R = B(1 + )
N0
10) In MIMO-VLC NOMA, which factor has the greatest influence on data rates? 1 point
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
Week 3 2) The refractive index structure parameter Cn2 is a function of .......... 1 point
Wavelength
Week 4
Temperature
Week 5 Atmospheric altitude
Beam divergence angle
Week 6
No, the answer is incorrect.
Score: 0
Atmospheric
Turbulence...contd Accepted Answers:
Wavelength
Turbulence Mitigation Temperature
techniques Atmospheric altitude
Underwater OWC Channel
Model 3) In case of weak turbulence, the scintillation index for the plane wave is expressed as 1 point
Optical Wireless 2
1.23C n K 6
L 6
0.64C n K 6
L 6
Week 9
4) Under beam wander effect, diffraction effects are assumed to be ………., when the receiver aperture diameter D is greater than the size of 1 point
Fresnel zone.
Week 10
Significant
Week 11
Insignificant
Week 12 Large
None of the above
Download videos Yes, the answer is correct.
Score: 1
Problem Solving Session - Accepted Answers:
Jan 2024 Insignificant
Lecture Material 5) Under weak turbulence channel conditions, the longer wavelength will experience……………………. irradiance fluctuations for an FSO link range. 1 point
Moderate
Higher
Lesser
Negligible
6) The techniques employed to mitigate the channel fading due to atmospheric turbulence are 1 point
Increased power
Frequency diversity scheme
Spatial and temporal diversity scheme
Aperture averaging
Partially Correct.
Score: 0.67
Accepted Answers:
Frequency diversity scheme
Spatial and temporal diversity scheme
Aperture averaging
7) Which appropriate statistical model is used for characterizing the amplitude fluctuations specifically in weak atmospheric conditions? 1 point
Log- normal
Gamma-Gamma
I-K model
K model
9) Which statistical models are used for describing under water turbulence? 1 point
Log- normal
Gamma-Gamma
I-K model
Mixture Exponential- Generalized Gamma
10) The main sources of background noise in under water optical communication link are: 1 point
Dark noise
Background noise from the Sun
Scattered light collected by the receiver
Shot noise
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
Week 0 40 dBm
Week 3 2) When λ is the optical wavelength in vacuum, k is given by k=2Π/λ . What does k stand for ………............? 1 point
4) As light travels along a FSO link, it received optical power ………. with FSO link distance 1 point
Week 8
Increases
Week 9
Decreases
Does not affected
Week 10
None of the above
Week 11 Yes, the answer is correct.
Score: 1
Week 12 Accepted Answers:
Decreases
Download videos
5) Attenuation coefficient is commonly expressed in units of 1 point
Problem Solving Session -
dB/m
Jan 2024
dBm
Lecture Material dB/Km
dB
6) The beam divergence θb and transmitted aperture diameter D T are……………………. proportional to each other. 1 point
Directly
Inversely
Equally
None of the above
7) Which of the atmospheric turbulence effects is observed if the size of the turbulent eddy is larger than the transmitter beam size? 1 point
Beam wander
Beam scintillation
Beam spreading
Pointing error displacement
Partially Correct.
Score: 0.5
Accepted Answers:
Beam wander
Pointing error displacement
8) The free space loss of the FSO link is ………………. with respect to link distance. 0 points
Directly proportional
Inversely proportional
Equally
None of the above
Fog
Rain
Clear air
Very light mist
2
G = (4πAe )/λ
2
G = (4πλ )/Ae
G = 4πAe
2
G = Ae /λ
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
Week 3 2) The capacity of a MIMO system is maximized (in absence of CSI at transmitter) when the channel matrix (H) is 1 point
Unitary Matrix
Week 4
Orthogonal Matrix
Channel model for single Symmetric Matrix
source
Skew-symmetric Matrix
Channel model for multiple
No, the answer is incorrect.
sources
Score: 0
MIMO channel Accepted Answers:
Orthogonal Matrix
MIMO channel...contd
Week 4 Feedback Form : 3) Which of the following is not used to improve received signal quality over small scale times and distance? 1 point
Optical Wireless
Communications for Beyond Modulation
5G Networks and IoT Equalization
Week 7
4) Which of the following is not an algorithm for equalizer? 1 point
Download videos 5) Consider MIMO system with 3 transmit antenna and 4 receive antenna. What is the dimension of the channel matrix. 1 point
3x4
Problem Solving Session -
Jan 2024 4x3
3x3
Lecture Material 3x1
6) For N symbol inputs, the LMS algorithm requires ______ operations per iteration. 1 point
2N
N+1
2N+1
N2
7) In a VLC system that uses a zero-forcing receiver, the channel matrix can be made well-conditioned by following the PD receiver structure. 1 point
Spatial diversity
Time diversity
Frequency diversity
None of the above
Transmitter
Receiver
Communication channel
Transmitter and receiver
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
Week 3 2) In order to have minimum delay spread in an optical wireless channel the LED semiangle and the receiver field of view, (ϕ 1 , Ψc ) combination 1 point
2
should be
Photodetectors (to be contd)
Week 4 2
ln(2)
Week 5 m = −
ln(sinsinϕ 1 )
Week 6
ln(coscosϕ 1 )
2
m = −
Week 7 ln(2)
ln(sinsinϕ 1 )
Week 8 2
m = −
ln(2)
Week 12 4) In optical channel gain following the Lambertian radiation pattern the optical filter gain and concentrator gain is a function of 1 point
Download videos
LED semiangle ϕ 1
6) In a VLC system that uses a zero-forcing receiver, the channel matrix can be made well-conditioned by following the PD receiver structure. 1 point
7) In a VLC MIMO system, the channels between a given transmitter and two closely placed receiving photodetectors (PDs) with the same 1 point
orientation will be
8) In a VLC MIMO channel with multi-PD receiver with same FoV the channel matrix can be made well-conditioned by 1 point
Spatial Diversity
FoV Diversity
Both a and b
Neither a or b
10) A good optical MIMO receiver for indoor optical wireless applications should have three characteristics 1 point
It should have a large overall FOV so that it has line of sight (LOS) to as many luminaires as possible
It should have a compact structure compatible with incorporation in portable devices
Both a and b
Neither a or b
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
Optical Sources (LASER) 2) Calculate the responsivity of a p-i-n photodiode at 800 nm if the quantum efficiency is 90%. 1 point
Photodetecors
1.0 A/W
Week 2 Feedback Form : 0.84 A/W
Optical Wireless
0.93 A/W
Communications for Beyond
5G Networks and IoT 0.58 A/W
Week 4 3) A ruby laser contains a crystal of length 3 cm with a refractive index of 1.60. The peak emission wavelength from the device is 0.43 μm. What will 1 point
be the value of the number of longitudinal modes?
Week 5
5
1.2 × 10
Week 6
5
3.6 × 10
Week 7 5
2.2 × 10
Week 8 5.5 × 10
5
Week 11 4) When 800 photons per second are incident on a p–i–n photodiode operating at a wavelength of 1.3 μm they generate on average 550 electrons 1 point
per second which are collected. The responsivity of the device is
Week 12
1.0 A/W
Download videos 0.72 A/W
0.36 A/W
Problem Solving Session - 0.12 A/W
Jan 2024
Yes, the answer is correct.
Score: 1
Lecture Material
Accepted Answers:
0.72 A/W
Interference phenomenon
Spontaneous emission of light
Stimulated emission of radiation
Diffraction phenomenon
6) On which factor/s do/does the response time of the photodiode depend/s? 1 point
7) When 4 × 1011 photons each with a wavelength of 0.85 m are incident on a photodiode, on average 2.5 × 1011 electrons are collected at the 1 point
terminals of the device. Determine the quantum efficiency.
43%
82%
63%
52%
8) A photodiode has a quantum efficiency of 65% when photons of energy 1.5 × 10−19 J are incident upon it. At what wavelength is the photodiode 1 point
operating?
1.5μm
2.5μm
1.4μm
1.32μm
More in the higher energy state than in the lower energy state
More in higher energy state than in meta-stable state
More in the lower energy state than in the higher energy state
None of them
Directionality
Speed
Wavelength
Coherence
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
Week 2
3) If the channel is bandlimited to 6 kHz and signal to noise ratio is 16, what would be the capacity of the channel? 1 point
Week 8 4) In channel coding theorem, channel capacity decides the _________ permissible rate at which error-free transmission is possible. 1 point
Minimum
Week 9
Maximum
Week 10 Standard
Constant
Week 11
Yes, the answer is correct.
Score: 1
Week 12 Accepted Answers:
Maximum
Download videos
5) What is true about 5G? 1 point
Problem Solving Session -
Jan 2024 High increased peak bit rate
Lower battery consumption
Lecture Material
Larger data volume per unit area
All of the above
6) The term receiver sensitivity has which of the following meanings? 1 point
The range of optical power levels over which the receiver operates within specified values
The ratio of the output photocurrent to the incident optical power
The minimum amount of optical power required to achieve a specific receiver performance
The wavelengths over which the receiver will properly operate
Partially Correct.
Score: 0.33
Accepted Answers:
VLC uses electromagnetic spectrum wavelengths 375 to 780 nm
VLC can transmit large amounts of data faster than Bluetooth
VLC has no electromagnetic interference
9) The quantity that describes the light giving radiant power of a luminaire in any particular direction is called—---------- 1 point
Luminosity
Luminance
Luminous flux
Luminous intensity
10) The light energy radiated per second from the luminous body is known as? 1 point
Luminous flux
Watt
Candela
Lumen
Announcements About the Course Q&A Progress Mentor Review Assignment Course Recommendations
Binary Signaling
How does an NPTEL
online course work? M-array Signaling
Quadrature Amplitude modulation
MATLAB All of the above
Week 1 2) The change in amplitude of carrier in accordance to the digital message signal then it is called as 1 point
3) Which one is the non-coherent mode of binary phase shift keying? 1 point
Week 7
Quadrature Phase Shift Keying
Week 8
Differential Phase Shift Keying
Amplitude Shift Keying
Week 9
Binary Phase Shift Keying
Week 10 Yes, the answer is correct.
Score: 1
Week 11 Accepted Answers:
Differential Phase Shift Keying
Week 12
4) The modulation techniques used to convert analog signal into digital signal are 1 point
Download videos
Pulse code modulation
5) If bandwidth is of primary concern then which one of the following schemes is generally not considered? 1 point
ASK
PSK
FSK
DPSK
7) In which one of the following modulation techniques RF binary signals are transmitted as given? 1 point
0 : √(2)p(t)cos[wc + Δw/2]t
1 : √(2)p(t)cos[wc − Δw/2]t
ASK
PSK
FSK
MPSK
Thrice
Twice
Same
Four times
Entropy
Efficiency
Coded signal
None of the above
10) The frequency of carrier signal is modified in accordance to the message signal then it is called as _________ 1 point
11) Which of these values of μ would correspond to the linear amplification? 1 point
=0
=1
>0
<0
12) ____________ is defined as the ratio of the input signal-to-noise ratio to the output signal-to-noise ratio 1 point
Signal-to-noise ratio
Noise figure
Noise Temperature
None
13) Which one of the following noises arises in electronic devices, such as in diodes and transistors, due to the discrete nature of current flow? 1 point
Shot noise
Thermal noise
Gaussian noise
Random noise
Switching transients
Lightening strikes
Power line load switching
All of the above
16) ____________fading occurs if the coherence bandwidth happens to be smaller than that of the bandwidth of the given signal. 1 point
Time selective
Fast fading
Frequency selective
Flat
Error correction
Error detection
Error correction and detection
None of the above
Π/2
Π/4
2Π
20) Code rate r, k information bits and n as total bits, is defined as 1 point
r = k/n
k = n/r
r=k*n
n=r*k
1
CERTIFICATE
Certified that Ankit Kr.Pathak (2020UEI2806), Vineet (2020UEI2808),
Samyak (2020UEI2809) & Akshat Jain (2020UEI2847) has carried out
2
ABSTRACT
In today’s digital landscape, the proliferation of smart home Internet
of Things (IoT) devices has introduced new challenges in cybersecurity.
Intrusion Detection Systems (IDS) are crucial in safeguarding smart homes
from malicious activities. However, traditional IDS solutions often fall
short in detecting sophisticated attacks. This research proposes a novel
machine learning (ML) approach to develop an IDS specifically tailored
for smart home IoT devices. By addressing data imbalance, incorporating
explainable AI techniques, and adapting to evolving threats, our model
aims to enhance the security of smart home environments. Through
extensive experimentation and evaluation, we demonstrate the
effectiveness of our approach in accurately detecting intrusions, thereby
providing a robust defense against evolving cyber threats.
3
ACKNOWLEDGEMENT
Vineet
Samyak
Akshat Jain
4
CONTENTS
CERTIFICATE ......................................................................................... 1
ABSTRACT ............................................................................................. 2
ACKNOWLEDGEMENT ........................................................................ 3
5
CHAPTER 4 : WORK DONE TILL NOW .................................... 19 - 21
CHAPTER 5 : RESULTS................................................................. 22 - 38
APPENDIX ..................................................................................... 41 - 43
6
LIST’s
1 : List of Tables
2 : List of Figures
Figure 7: Services….......................................................................25
7
CHAPTER-1-INTRODUCTION
Smart home devices have made our lives extremely convenient but they have
also opened a gateway for potential cyber threats. Intrusion Detection Systems (IDS)
have tried to mitigate these threats by adopting various techniques such as monitoring
the network traffic, device interactions, and system behavior within the smart home
environment.
While all-purpose intrusion detection systems have been there for a while, smart
home environments pose unique risks due to interconnected systems for low-powered
devices running on different protocols. This paper focuses on Intrusion Detection
System for Smart Home IoT Devices tailored to suit the needs of smart homes while
also evaluating the existing technologies against the constraints of smart home
environments. The study also aims to provide valuable insights into the gaps in the
current Intrusion Detection System for Smart Home IoT Devices solutions and tries to
bridge them to encourage privacy and security. As the smart home industry expands,
understanding and enhancing security for our smart home devices is crucial to make
them less vulnerable to outside threats.
8
1.2 Solutions and Functionality
1) Data Processing and Exploration : In this, we load our data set and select the
relevant features to understand the data set’s traits before using it to train the
models.
2) Data Cleaning : Data Cleaning is done to better train our models by dropping
columns with null values for creating a cleaner dataset.
3) Model Building : Model Building involves crucial steps such as feature scaling
and splitting the dataset for training and testing purposes.
4) Neural Network Models : Our code creates three neural network architectures,
namely shallow, deep, and 1D-convolutional neural networks. These
architectures differ in complexities and structures for learning patterns in the
data, making them a crucial step in ensuring all-round intrusion detection.
5) Model Evaluation : In model evaluation, we train the previously defined neural
network models on the training dataset. Later, we assess its performance and
measure it using parameters such as accuracy and response rate. Evaluating the
models is crucial to understand the real-world performance of each model
In case of any security incidents, Intrusion Detection System for Smart Home
IoT Devices provides alerts and detailed information to aid in incident response and
facilitate post-incident forensics analysis. Organizations often use Intrusion Detection
System for Smart Home IoT Devices to ensure compliance with security policies and
regulations, providing a proactive approach to cybersecurity. Here are some of its
applications in the real world:
1) Real-time Threat Detection : Intrusion Detection System for Smart Home IoT
Devices swiftly detects and alerts security teams to potential threats or abnormal
behavior by monitoring network and system activities in real-time.
2) Incident Response and Forensics :Detection System for Smart Home IoT
Devices supplies comprehensive information about the nature and extent of the
attack, thereby assisting in effective incident response and forensic analysis.
3) Malware Detection : Intrusion Detection System for Smart Home IoT Devices
can detect and prevent malware-based attacks by identifying patterns and
behaviors associated with known malware.
9
4) Anomaly Detection : Some Intrusion Detection Systems (Intrusion Detection
System for Smart Home IoT Devices), particularly Anomaly-Based Intrusion
Detection System for Smart Home IoT Devices, can detect deviations from the
normal network or user behavior, helping to identify previously unknown
threats or zero-day attacks.
5) Unauthorized Access Detection : Unauthorized access attempts, such as login
failures and brute force attacks, are monitored by Intrusion Detection System
for Smart Home IoT Devices to protect against system security compromise.
10
CHAPTER-2-LITERATURE REVIEW
Pongle and Chavan [2] suggested a hybrid IDS architecture for detecting routing
attacks in IoT networks, with a focus on the wormhole attack. They implemented their
approach based on simulated scenarios and networks, using both centralized and
distributed methods.
Restuccia et al. [3] reviewed the security threats in IoT networks and proposed
a security solution that uses machine learning and polymorphic software and hardware
to detect and mitigate attacks. However, they did not provide any description of the
experimental setup, implementation, and evaluation of the proposed system.
Meidan et al. [4] and McDermott et al. [5] focused on detecting botnets in the
IoT ecosystem using deep learning techniques.
Amouri et al. [6] developed an IDS for IoT networks by applying supervised
machine learning to profile the benign behavior of the nodes and identify any anomalies
in network traffic.
Following is a general overview of key topics and areas which might to consider
when conducting a literature review for an Intrusion Detection System for Smart Home
IoT Devices:
11
● Network-Based IDS : Monitors and analyzes network traffic to detect
suspicious activities or security events from the network traffic.
● Host-Based IDS : Focuses on monitoring and analyzing activities on individual
devices (hosts) to respond to potential malicious activity at the host level.
● Wireless IDS : Specialized Intrusion Detection System for Smart Home IoT
Devices designed to detect and respond to unauthorized access, attacks, or
anomalies in wireless networks especially tailored for wireless communication
devices.
12
● Statistical Based : Analyzes patterns and statistical models of normal network
or system behavior. This Intrusion Detection System for Smart Home IoT
Devices raises alerts when observed behavior deviates significantly from
established statistical norms.
● Pattern Based : Utilizes predefined patterns or signatures to identify specific
sequences or structures associated with known malware and threats. This
approach further aids in the detection of familiar attack patterns.
● Machine Learning Based : Employs machine learning algorithms to
automatically learn and adapt to evolving threats. This Intrusion Detection
System for Smart Home IoT Devices analyzes historical data and patterns,
enabling the detection of anomalies or novel attack vectors.
● Deep Learning Based : Leverages deep neural networks to automatically
extract hierarchical and complex features from data. Moreover, it enables the
detection of intricate patterns and anomalies in network or system behavior for
improved threat identification
13
CHAPTER-3-Mathematical Modeling
in IDS for Smart Home IoT Devices.
3.1 Data Collection and Preprocessing
We utilize datasets containing network traffic data from smart home IoT
devices. These datasets are collected from real-world scenarios, such as the KDD CUP
'99 dataset.Data pre-processing involves cleaning, feature selection, and encoding
categorical variables.
Data Collection
evaluate different approaches to intrusion detection using network traffic data. KDD
Cup99 is a standard dataset employed in IDSs. There are around 5 million records
stored in the training set of the complete data and 2 million records in the testing set.
14
Data Preprocessing
Data preprocessing is a critical step in preparing the KDD Cup'99 dataset for
intrusion detection analysis. This process involves several key steps
1) Cleaning: The dataset may contain missing values, outliers, or inconsistencies
that need to be addressed. Cleaning techniques such as imputation, outlier
detection, and data normalization are applied to ensure the integrity and quality
of the dataset.
2) Feature Selection: Given the large number of features in the dataset, feature
selection techniques are employed to identify the most relevant and informative
attributes for intrusion detection. This helps reduce dimensionality and
computational complexity while retaining essential information for accurate
detection.
3) Encoding Categorical Variables: Many attributes in the dataset, such as
protocol types, service types, and flags, are categorical variables. These
variables are encoded into numerical format using techniques like one-hot
encoding or label encoding, enabling machine learning algorithms to process
them effectively
15
connected layers, CNNs can learn hierarchical representations of features in the input
data, enabling them to achieve impressive performance.
Performance Comparison:
Interpretability Enhancements
In addition to maximizing detection accuracy, we prioritize the interpretability
of our intrusion detection model. Enhancing interpretability is crucial for gaining
16
insights into the underlying reasons behind the model's decisions and improving the
trustworthiness of the IDS system.
To achieve this, we implement attention mechanisms and feature attribution
input data are most influential for making detection decisions. Feature attribution
methods, such as gradient-based approaches or integrated gradients, help to attribute
the model's predictions back to individual input features, enhancing transparency and
interpretability.
Precision quantifies the ratio of true positive predictions to the total number of
positive predictions, indicating the model's ability to avoid false positives. Recall, also
known as sensitivity, evaluates the proportion of true positives identified correctly out
of all actual positives. The F1 score, which combines precision and recall, offers a
balanced measure that considers both false positives and false negatives. These metrics
collectively offer a quantitative assessment of the model's performance, guiding
decision-making and allowing for comparisons with alternative approaches.This
metrics also contain macro average and weighted average for different values for
different parameters like precision,recall and F1-score.The F1-score is the harmonic
mean of precision and recall, providing a balance between the two metrics. It is
particularly useful when dealing with imbalanced datasets. The F1-scores range from
0.61 to 1.00, reflecting the balance between precision and recall across classes.
17
it calculates macro and weighted averages across all classes, which can provide insights
into overall model performance.Overall, the CNN model demonstrates strong
performance on the training set, with high accuracy and well-balanced precision, recall,
and F1-scores across parameters.
18
CHAPTER-4-WORK DONE TILL
NOW
19
𝑃 = 𝑇𝑃 / ( 𝑇𝑃 + 𝐹𝑃),
𝑅 = 𝑇𝑃 / ( 𝑇𝑃 + 𝐹𝑁),
𝐹 = 2 · 𝑃 · 𝑅 (𝑃 + 𝑅)
Accuracy, a fundamental metric, measures the proportion of correctly classified
instances among all instances. Precision quantifies the ratio of true positive predictions
to the total number of positive predictions, indicating the model's ability to
20
false negatives. These metrics collectively offer a quantitative assessment of the
model's performance, guiding decision-making and allowing for comparisons with
alternative approaches.
Creating a flowchart for a Convolutional Neural Network (CNN) based
Intrusion Detection System (IDS) involves representing the sequential steps of the CNN
model architecture, from input to output.Figure 4 flowchart outlines the fundamental
nodes and operations in a CNN-based IDS, illustrating how data flows through the
network, undergoes feature extraction and classification, and finally produces a
prediction regarding network activity.
The CNN model consists of three convolutional layers, each followed by max
pooling and dropout for feature extraction and regularization. After flattening, the
outputs from the convolutional layers are concatenated with the dense layer's output.
The dense layer with ReLU activation helps in feature learning, followed by dropout
for regularization. Finally, the softmax output layer classifies the input into one of five
classes. This architecture enhances the network's ability to learn hierarchical features
from sequential data, vital for tasks like intrusion detection, while dropout mitigates
overfitting, ensuring robust performance.
21
CHAPTER-5-RESULTS
5.1 CODE
22
23
Fig 5.1 Protocol Types
24
Fig 5.2 Services
25
Fig 5.3 Flag’s Data
26
Fig 5.6 Attack Type’s Data
27
28
29
30
31
32
33
5.2 Quantitative Analysis
The model has a larger true +ve rate and a lower false +ve rate, indicating its
ability to detect intrusions with minimal errors.In this study, we developed a model
for classification tasks. The performance of the model was evaluated on both the train
and test sets using various metrics including accuracy, precision, recall, and F1-score.
34
Table 3 Test Dataset
The classification report reveals that the model performs exceptionally well
across multiple classes, achieving high parameters for each class. Particularly
noteworthy is the model's ability to accurately classify class 0 and class 1 instances, as
indicated by their high parameters.. However, the performance for class 2, 3, and 4 is
slightly lower, especially for class 4, where some parameters are comparatively lower
due to the smaller number of instances and inherent class imbalance.
35
them. Here are some additional parameters that can be calculated based on the given
metrics:
𝑇𝑁
𝑆𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑡𝑦 = [9]
(𝑇𝑁+𝐹𝑃)
False +ve Rate (FPR): FPR calculates the proportion of actual negatives that
are incorrectly classified as positives.
𝐹𝑃
𝐹𝑃𝑅 = 1 − 𝑆𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑡𝑦 = [9]
(𝑇𝑁+𝐹𝑃)
False -ve Rate (FNR): FNR measures the proportion of actual positives that
are incorrectly classified as negatives.
𝐹𝑁
𝐹𝑁𝑅 = 1 − 𝑅𝑒𝑐𝑎𝑙𝑙 = [9]
(𝑇𝑃 + 𝐹𝑁)
True +ve Rate (Sensitivity): Sensitivity, also known as Recall, calculates the
proportion of actual positives that are correctly identified as such.
𝑇𝑃
𝑆𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦 = [9]
(𝑇𝑃+𝐹𝑁)
𝑆𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦 + 𝑆𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑡𝑦
𝐵𝑎𝑙𝑎𝑛𝑐𝑒𝑑 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = [9]
2
These additional parameters provide deeper insights into the performance of
the model, especially in scenarios with class imbalance or when considering different
types of errors.
36
The incorporation of explainable AI techniques enhances the interpretability of
our model, allowing users to understand the decision-making process behind intrusion
detection. This transparency fosters trust and confidence in the system. The saliency
maps show which features are most important for the model prediction, highlighting
the patterns and anomalies in the network traffic data.
For less frequent intrusion classes (Class 2, 3, and 4), the model still maintains
high precision and recall, although there's a slight decrease compared to the more
prevalent classes. This indicates that while the model may occasionally misclassify
these instances, it still demonstrates a strong ability to detect them.
The model's performance on the test set closely mirrors that of the train set,
indicating its ability to generalize well to unseen data.
Similar to the train set, the model achieves high accuracy, precision, recall, and
F1-score on the test set, reaffirming its effectiveness in detecting intrusions across
various classes.
Despite the slight decrease in performance for less frequent intrusion classes,
the model still maintains a high level of accuracy and robustness, which is crucial for
real-world deployment in security-sensitive environments.
5.4 Conclusion
37
In conclusion, our research showcases the effectiveness of machine learning
in enhancing the security of smart home IoT devices through an IDS solution. By
addressing data imbalance, incorporating explainable AI techniques, and adapting to
evolving threats, our model provides a robust defense against cyber threats in smart
home environments. Our future work will focus on improving the scalability and
efficiency of our model, as well as exploring other machine learning techniques such
as reinforcement learning and generative adversarial networks for intrusion
detection.This reflects the effectiveness of Convolutional Neural Networks in handling
classification tasks, particularly in scenarios where there are multiple classes with
varying degrees of complexity and class imbalance.
These findings suggest that the proposed IDS can serve as a valuable tool in
safeguarding computer networks against malicious activities, contributing to enhanced
cybersecurity measures. Additionally, the model's ability to generalize well to unseen
data underscores its potential for practical deployment in real-world network
environments, where timely and accurate intrusion detection is paramount. Further
research and refinement of the model could potentially address any minor performance
disparities across different intrusion classes, thereby bolstering its overall efficacy and
reliability in protecting network infrastructure from security threats.
38
REFERENCES
[1] Stephen and L. Arockiam, “Intrusion detection system to detect sinkhole attack
on RPL protocol in Internet of Things,” Int. J. Elect. Electron. Computer. Sci.,
vol. 4, no. 4, pp. 16–20, 2017.
[2] P. Pongle and G. Chavan, “Real time intrusion and wormhole attack detection
in Internet of Things,” Int. J. Comput. Appl., vol. 121, no. 9, pp. 1–9, 2015
[3] F. Restuccia, S. D’Oro, and T. Melodia, “Securing the Internet of Things in the
age of machine learning and software-defined networking,” IEEE Internet
Things J., vol. 5, no. 6, pp. 4829–4842, Dec. 2018.
[4] Y. Meidan et al., “N-BaIoT: Network-based detection of IoT Botnet attacks
using deep autoencoders,” IEEE Pervasive Comput., vol. 17, no. 3, pp. 12–22,
Jul./Sep. 2018.
[5] C. D. McDermott, F. Majdani, and A. V. Petrovski, “Botnet detection in the
Internet of Things using deep learning approaches,” in Proc. IEEE Int. Joint
Conf. Neural Netw. (IJCNN), 2018, pp. 1–8.
[6] A. Amouri, V. T. Alaparthy, and S. D. Morgera, “Cross layer-based intrusion
detection based on network behavior for IoT,” in Proc. IEEE 19th Wireless
Microw. Technol. Conf. (WAMICON), 2018, pp. 1-4.
[7] Ray, S.; Jin, Y.; Raychowdhury, A. The changing computing paradigm with the
internet of things: A tutorial introduction. IEEE Des. Test 2016, 33, 76–96.
[8] Khan, R.; Khan, S.U.; Zaheer, R.; Khan, S. Future internet: The internet of
things architecture, possible applications and key challenges. In Proceedings of
the 2012 10th International Conference on Frontiers of Information
Technology, Islamabad, India, 17–19 December 2012; pp. 257–260.
[9] B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga,“A survey
of intrusion detection in Internet of Things,” J. Netw. Comput.Appl., vol. 84,
pp. 25–37, Apr. 2017.
[10] Marsden, T.; Moustafa, N.; Sitnikova, E.; Creech, G. Probability risk
identification based intrusion detection system for SCADA systems. In
International Conference on Mobile Networks and Management; Springer:
Berlin, Germany, 2017; pp. 353–363.
39
[11] Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani“A
Detailed Analysis of the KDD CUP 99 Data Set”, Proceedings of the 2009 IEEE
Symposium on Computational Intelligence in Security and Defense
Applications (CISDA 2009).
[12] C. F. Tsai, Y. F. Hsu, C. Y. Lin, and W. Y. Lin, “Intrusion Detection
by Machine Learning: A Review,” Expert Systems with Applications, vol. 36,
no. 10, pp. 11994 –12000, 2009.
[13] Stephen Smaha. Haystack: An intrusion detection system. In Fourth
Aerospace Computer Security Applications Conference, pages 37–44, October
1988.
40
APPENDIX
The NSL KDD dataset used in the research contains various types of network
traffic data, including Probe Response Attacks, Denial of Service Attacks, and
Common Attacks. The dataset consists of both training and trial datasets for each
attack type.
41
○ Trial Dataset: 2,780 samples
➢ Denial of Service Attacks:
○ Training Dataset: 65,389 samples
○ Trial Dataset: 45,342 samples
➢ Common Attacks:
○ Training Dataset: 15,789 samples
○ Trial Dataset: 12,456 samples
Appendix D: References
42
➢ Collaborative Defense
➢ Determination of Security Posture
➢ Human-Centered Design
Appendix F: Conclusion
➢ In this section, you can summarize the key points from your conclusion
section in the main document.
➢ Please note that you should adapt and expand this appendix as needed to cover
all the relevant information and references in your document
43