1 / 4

Realization of the Grapheme 'er' by Learners of English as Foreign Language The Case Study of Level One Students of Engl

This research work sets out to evaluate the spoken productions of foreign learners of English the case of students in the English Department of the University of Doba, i.e. students of Level One, who were 200 in number. To carry out the investigation, reading activity of a text was used to collect data. Variationism by Labov 1963 was the theory used to guide the analysis of data. The investigation arrived at the results that learners have very poor performance in the pronunciation of English sounds, which is due to the influence of French and lack of English practice. To improve the learning of EFL, students are recommended to practice English intensively and extensively. Ndikoua Ngaidandi | Michael Etuge Apuge ""Realization of the Grapheme 'er' by Learners of English as Foreign Language: The Case Study of Level-One Students of English Department, University of Doba in Chad"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30274.pdf<br>Paper Url : https://www.ijtsrd.com/other-scientific-research-area/other/30272/refrigeration-and-air-conditioning-breaking-barriers-among-practitioners-proficiency/mateo-a-alin

teamijtsrd
Download Presentation

Realization of the Grapheme 'er' by Learners of English as Foreign Language The Case Study of Level One Students of Engl

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 IoT Based Smart City: Security Issues and Tokenization, Pseudonymization, Tunneling Techniques used for Data Protection Reshma Sunil Mandlik, Charulata Rajesh Pawar Department of MCA, ASM Institute of Management & Computer Studies, Thane, Maharashtra, India ABSTRACT IoT(Internet of things) refers to the quickest developing number of digital devices and these devices can interconnect and speak with one another's over the network and they can be remotely checked and controlled. IoT in smart urban communities produced a large number of data consistently through different applications including transport application, commercial application, medicinal services application, and so forth. IoT is a standard technique to coordinate advanced gadgets or sensors with the ICT arrangements. The immense sending of IoT is permitting Smart City ventures and prompts all over. In this paper, we do a little report and feature all the difficulties with their fitting Solutions of applying the IoT advances dependent on Smart City. KEYWORDS: Internet of Things (IOT), Smart City, Privacy, Security, Tokenization, Pseudonymization How to cite this paper: Reshma Sunil Mandlik | Charulata Rajesh Pawar "IoT Based Smart City: Security Issues and Tokenization, Tunneling Techniques used for Data Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-4, June 2020, pp.946-949, URL: www.ijtsrd.com/papers/ijtsrd31233.pdf Copyright © 2020 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC (http://creativecommons.org/licenses/by /4.0) Pseudonymization, IJTSRD31233 BY 4.0) 1.INTRODUCTION As the world turns out to be dynamically interconnected and innovation reliant, a present influx of brilliant applications is changing how we approach regular exercises. Clever urban communities gather foundation and innovation to revamp the way of life of residents and improve their collaborations with the urban condition. The Internet of Things (IoT), could have some of the appropriate responses. Made as a piece of the shrewd innovation development, the IoT empowers different articles and elements to talk with each other through the net. By offering more innovative fit for conveying across stages, IoT creates more information that can improve different parts of the way of life. Urban areas can recognize the two possibilities and difficulties progressively. concentrating on diminishing these difficulties and improve the solace of residents, make a profitable turn of events and oversee current urban communities in a reasonable and brilliant manner, a developing number of urban communities all-inclusive have begun to advance their own keen strategies. As the world's second-most crowded country India alone has almost 100 shrewd cities extends in progress under the Government of India. Various keen arrangements have been executed and these shrewd arrangements or applications may likewise represent various security and protection issues because of Susceptibility to attack regularly existing in applications. In joining, some outsider subjects become protection dangers to occupants just as security, and security issues have become a vital test that requires successful strides to be taken to counter. 2.Smart city review - Smart cities utilize the Internet of Things (IoT) gadgets like associated sensors, lights, and meters to amass and break down information. The urban areas at that point utilize this information to upgrade framework, open utilities, and administrations, and the sky is the limit from there.[1] I. Smart city benefits – A.Secure Communities - The Safe City idea as one of the central, required conditions for the production of a Smart City. brilliant Cities center around the financial, political, and social exercises of the @ IJTSRD | Unique Paper ID – IJTSRD31233 | Volume – 4 | Issue – 4 | May-June 2020 Page 946

  2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 States yet in addition a large portion of the wrongdoing and dangers, for example, dealing, mechanical mishaps, catastrophic events, and so on. Guaranteeing resident's well- being is one of the urban position's preeminent occupations, both to fulfill populace needs and to update the personal satisfaction and city claim for visitors, organizations, capable employees.[7] The different Cities have as of late collaborated with nearby organizations to build up an attached cloud video stage that enables law requirement to get the film from business surveillance cameras continuously.[6] B.Life Quality - Smart city innovation has prone to patch up the key personal satisfaction components for city occupants. The ability of the shrewd city that organizes individuals both the occupants and the guests above everything else will in general improve the existence quality for everybody dwelling in the city. Smart parking, effective transportation administrations, open Wi-Fi, digitalize government, these innovations make a positive effect on the life of the residents as they make things trustworthy and easy for them. With applying the keen innovations to make brilliant urban areas, there are risks across practically all policy-driven issues-from lodging to ship, to instructive administrations, to natural conditions, to bliss, to well-being.[2] C.Reduced climate foot-mark - Nations around the globe have set threatening focuses for cutting ozone harming substance discharges. On the off chance that such points are to be satisfied, urban areas should utilize outstandingly less vitality. Vitality effective structures, air quality sensors, and sustainable power sources are furnishing urban areas with new instruments to contract their biological crash. building up air quality sensors around a city, for example, can give information to follow top occasions of low air quality, perceiving contamination starting points, and convey information scientific authorities need to create activity plans. These sensors can help put an establishment for diminishing air contamination in even the most occupied urban communities, something that makes certain to spare lives since clinical concerns identified with contamination guarantee a great many lives every year.[6] II. Smart Application - reasonable diagnostics. This should be possible by meeting various plans.[3] B.Smart Waste Management - Intelligent waste executives manage control of the express amount of waste made regularly. Shoppers hurl a huge number of pounds of trash every year. For the most part, we should concentrate on lower costs, as it is particularly expensive, since it includes numerous individuals from staff and vehicles just as refining the arranging of waste social occasion, since having a high coordination segment, permits a wide edge of progress through arrangements. Consequently, while the correct advancement of a Smart City tends to squander the executives in a total manner, the assortment of waste is basic to improve the support of the resident and furthermore on the ecological side, just as with the reason of acquiring a monetary putting something aside for the administration.[4] C.Efficient Water Supply - A smart water arrangement is a completely coordinated arrangement of items that gathers continuous significant and noteworthy information from the water organize. As keen water arrangements are completed, water administrations are made a similar amount of information in one day that they recently made in a year. The issue that administrations as of now face is that this information is put aside independently and in various zones of the business for various thought processes.[7] 3.Literature review - A smart city can be portrayed as the city which surprisingly changes from regular urban zones by merging current advancements, for example, big data, Internet of Things, Sensor organize, AI and new designs to help the life of its residents. It furnished with different electronic segments for different applications, similar to a road camera seeing system utilized for the vehicle arrangement of sensors, keen water the executive's system comprises of physical parts, for example, pipes, stores installed with sensors which deal with information investigation, the social insurance application which tracks the patient, staff. Also, the area of the emergency vehicle, blood items are observed to check the accessibility on-line, a brilliant vehicle parking through which new parking area for additional vehicles ought to be built up, etc. In a Smart City, wireless sensor systems are the significant wellsprings of the colossal and different data generation. At the point when all the data is accumulated and assessed in the equivalent IoT stage, the system may go up against various assaults, for example, cross-site scripting, Denial-of-service (DoS), Phishing attack, and so forth. Additionally, its multi-occupancy may prompt security issues also which brings about information spillage.[8] Without this assurance, residents can't trust to government, and furthermore the assortment of data turns out to be increasingly troublesome. Numerous protection strategies, for example, encryption, bio-metrics are generally applied in various application fields. Be that as it may, these strategies are not sufficient for the smart city condition. The principal reason is that the greater part of the sensors and gadgets have constrained computational force, so just basic cryptography calculations straightforwardly.[9] These incapable measures by implication present genuine threats to the entire framework. In addition, the heterogeneity, versatility, and dynamic A.Smart Health-care - One of the motivations behind the Smart Cities Mission is to upgrade personal satisfaction, particularly of the destitution stricken, so as to make Smart Cities complete in the world. The procedure of Smart Health depends on giving minimal effort specialist consideration, decently valued meds, and can be utilized @ IJTSRD | Unique Paper ID – IJTSRD31233 | Volume – 4 | Issue – 4 | May-June 2020 Page 947

  3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 highlights of IoT frameworks subject shrewd applications to high security and protection hazard. It is required to know about security and protection alerts when planning and applying new frameworks. As different IoT gadgets and sensors are interconnected through the Internet so security turns into a basic test. Making sure about IoT gadgets becomes fruitful when the entire IoT biological system is made sure about. To accomplish these IoT makers need to focus on security as a prerequisite from the earliest starting point of the item improvement to an arrangement. Protection is viewed as an urgent treatment in the IoT. The most compromising piece of IoT is that buyers are surrendering their privacy, without seeing it, since they are uninformed of what information is being controlled and how it is being utilized.[15] The developing number of Privacy concern makes hard for the client to distinguish their real information inclinations. The information made by a sensor or a machine will be transport through a wide range of systems of not at all like sorts having a place with an assortment of specialist organizations before broadening the focused on application server. so each specialist co-op is just liable for its security. 4.Research Methodology - The monstrous favorable circumstances that can emerge out of savvy city inventiveness, there's likewise a great deal that we should be careful about. Significant regions of concern incorporate the enormous measures of information gathered and its conceivable effect on the protection of residents, the likelihood of this information being taken by hackers, and contender starting to lead the pack of this interconnected innovation to dispatch attacks, disintegrate urban areas to a halt.[10] I. Tokenization - Tokenization is the way toward replacing delicate information with special acknowledgment signs that hold all the pivotal data in regards to information without bargaining its security.[11] Here we exchange a haphazardly or algorithmically produced esteem which is known as a token for sensitive information, for example, credit card number, bank account number, and social security number. along these lines, after tokenization, the mapping of the token to its essential information is put away in a hundred database.[12] Here we do the trading of sensitive information with a randomized number in some configuration however with no regular estimation of its own. The token doesn't contain any sort of unique information, it just fills in as an agent of it. In information, encryption is that it is reversible. By configuration, the encoded information can be arrival to its unique decoded structure. This implies any individual or element that approaches the key can utilize it to reveal sensitive information. the quality of the encryption depends on its key which is utilized to make sure about the data.[13] A long way from the encryption, there is no numerical relationship connecting the token and its unique information to turn around the tokenization, the hacker must approach the mapping database.[12] II. Pseudonymization - Pseudonymization replaces the identity of the data subject or persons involved in such a way that supplementary information is required to re-identify the data-subject. It forms the private information of the client in such a way, that the private information can never again appear comparable to a particular data subject. In straightforward terms, the technique for pseudonymization to private information and can reduce the hazard for the information client worries about their information security and furthermore help controllers and processors meet their information assurance commitment.[14] Without the utilization of additional data, if you can’t ready to re-distinguish the client, you need to give the extra data to recognize proprietor or client of information. Extra data is kept independently and is just managed specialized and business measures to guarantee that the individual information is not being depicted to a recognized or recognizable individual. This method utilizes encryption to make an interpretation of private recognizable information to limitless information where the information subject cannot be perceived. Here you are looking for a safety effort to the private information to forestall connecting that encoded information to the first character of the individual. The information can in any case be returned with the correct controls or the encryption keys to re- distinguish the information subject just inside the protected condition of the data controller.[14] III. Tunneling - In a smart city project, different IoT devices and sensors are established to collect and exchange information. So the information created by a sensor or machine is going to be shipped through various networks before arriving at the focused on an application server. As a consequence, the information has to be decrypted and re-encrypted inside every entryway, from one specialist organization to the next. It's said that the protection level of an entire system is characterized by its weakest connection. The burrowing convention allows for the safe movement of information between the systems. It permits private system interchanges to be sent over the open system, through a procedure called encapsulation.[16] The encapsulation procedure permits the information bundles to seem like an open information packets when they are really private information packet, permitting them to go through without notice. In tunneling, the information is broken into little pieces called packets. When the packets travel through the tunnel, they're encrypted and further the procedure of encapsulation happens. The private system data along with the convention data are encapsulated freely arrange transmission units for sending. The units appear as open information, permitting them to be transmitted across the internet.[16] Encapsulation permits the packets to reach their appropriate goal. Further at the goal stage, the method of de-capsulation and decoding happens. 5.Conclusion - In this paper, we see about the IoT Based smart city and its advantages and application like medicinal services, parking, smart waste management, and water supply, life quality. so it can facilitate the life of individuals lived in a smart city give them urban personal satisfaction. likewise, we get security and protection worries of the individuals wherein client- driven savvy city they have to reserve the option to offer access to the proposed individual or move his information starting with one service provider then onto the next service provider. A smart city ought to likewise support the possibility of attainable improvement as it is the central need of time and we can't settle in managing the important characteristic assets and fall into calamity. @ IJTSRD | Unique Paper ID – IJTSRD31233 | Volume – 4 | Issue – 4 | May-June 2020 Page 948

  4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 [6]https://www.thalesgroup.com/en/markets/defence- and-security/protection-systems/smart-and-safe-city 6.Future Enhancement - The IoT can be characterized as a network of networks, wherein heterogeneous systems, for example, the Internet, cell phone systems, social communities, and mechanical networks, are interconnected and coordinated. Most organizations that take a shot at IoT are at the preliminary stage, generally on the grounds that the sensor innovation, remote advances like 5G, and so forth are as yet getting created. So without having appropriate guidelines and security it's despite everything being an on-going issue. Thus, to fulfill solid portability, flexibility, dynamic, and ease necessities, further research is required to create lightweight countermeasures to limit overhead while all the while ensuring security. 7.Reference - [1]https://www.businessinsider.com/iot-smart-city- technology?IR=T [7]http://bwsmartcities.businessworld.in/article/Effectiv e-Water-Management-Indispensable-for-smart-cities- /09-05-2018-148681/ [8]Saber Talari, Miadreza Shafie-khah, Pierluigi Siano, Vincenzo Loia , Aurelio Tommasetti and João P. S. Catalão,” A Review of Smart Cities Based on the Internet of Things Concept.” [9]Youyang Qu and Longxiang Gao, “Security and Privacy in Smart Cities: Challenges and Opportunities. ” [10]https://www.comparitech.com/blog/vpn- privacy/smart-cities-privacy-risks/ [11]https://searchsecurity.techtarget.com/definition/toke nization [12]https://www.forbes.com/sites/gilpress/2017/10/17/ top-10-hot-data-security-and-privacy- technologies/#799d4d006b3f [2]https://www.iot-now.com/2019/09/06/98516- exploring-benefits-building-smart-city-countrypart- two/ [13]https://www.tokenex.com/blog/tokenization-vs- encryption-which-one-is-best-for-your-business [3]http://smartcities.gov.in/upload/advisiory/58a3de08 68e9dAdvisory6.pdf [14]https://www.youtube.com/watch?v=6Jl38L9ygiQ [4]https://geographica.com/en/blog/waste- management/ [15]https://techcrunch.com/2016/08/14/the-iot-threat- to-privacy/ [5]https://www.plantemoran.com/explore-our- thinking/insight/2018/04/thinking-about-becominga- smart-city-10-benefits-of-smart-cities [16]https://www.techopedia.com/definition/5402/tunneli ng @ IJTSRD | Unique Paper ID – IJTSRD31233 | Volume – 4 | Issue – 4 | May-June 2020 Page 949

More Related