Please take a look at my papers in the IoT field (Hope this is helpful):
■ A. Abusukhon Intelligent Shoes for Detecting Blind Falls Using the Internet of Things. KSII Transactions on Internet and Information Systems. Vol. 17, Issue 9. 2023
■ A. Abusukhon, A. Al-Fuqaha, B. Hawashin, A Novel Technique for Detecting Underground Water Pipeline Leakage Using the Internet of Things. Journal of Universal Computer Science (JUCS). Vol. 29, No. 8.
■ A. Abusukhon, IOT Bracelets for Guiding Blind People in an Indoor Environment, in Journal of Communications Software and Systems, vol. 19, no. 2, pp. 114-125, April 2023, doi: 10.24138/jcomss-2022-0160.
■ A. Abusukhon (2021) Towards Achieving a Balance between the User Satisfaction and the Power Conservation in the Internet of Things, IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3051764. impact factor 9.936. Published by IEEE. https://ieeexplore.ieee.org/document/9326414. [Science Citation Index].
■ Ahmad Abusukhon, Bilal Hawashin and Mohammad Lafi (2021) An Efficient Algorithm for Reducing the Power Consumption in Offices Using the Internet of Things, International Journal of Advances in Soft Computing and its Applications (IJASCA). http://ijasca.zuj.edu.jo/Volumes.aspx
■ A. Abusukhon, Z. Mohammad, A. Al-Thaher (2021) An authenticated, secure, and mutable multiple-session-keys protocol based on elliptic curve cryptography and text_to-image encryption algorithm. Concurrency and computation practice and experience. [Science Citation Index].
■ B. Hawashin, A. Abusukhon An Efficient Course Recommender Using Deep Enriched Hidden Student Aptitudes. ICIC Express Letters, Part B: Applications, 2022.
■ A. Abusukhon, N. Anwar, M. Mohammad, Z., Alghanam, B. (2019) A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm. Journal of Discrete Mathematical Sciences and Cryptography. 22(1) pp. 65- 81. (SCOPUS). https://www.tandfonline.com/doi/abs/10.1080/09720529.2019.1569821
■ A. Abusukhon, B.Wawashin, B. (2015) A secure network communication protocol based on text to barcode encryption algorithm. International Journal of Advanced Computer Science and Applications (IJACSA). (ISI indexing). https://thesai.org/Publications/ViewPaper?Volume=6&Issue=12&Code=IJACSA&Seri alNo=9
■ A. Abusukhon, Talib, M., and Almimi, H. (2014) Distributed Text-to-Image Encryption Algorithm. International Journal of Computer Applications (IJCA), 106 (1). [ available online at : https://www.semanticscholar.org/paper/Distributed-Text-to-Image-Encryption-Algorithm-Ahmad-Mohammad/0764b3bd89e820afc6007b048dac159d98ba5326]
■ A. Abusukhon (2013) Block Cipher Encryption for Text-to-Image Algorithm. International Journal of Computer Engineering and Technology (IJCET). 4(3) , 50-59. http://www.zuj.edu.jo/portal/ahmad-abu-alsokhon/wpcontent/uploads/sites/15/BLOCK-CIPHER-ENCRYPTION-FOR-TEXT-TO-IMAGE ALGORITHM.pdf
■ A. Abusukhon, Talib, M. and Nabulsi, M. (2012) Analyzing the Efficiency of Text-to-Image Encryption Algorithm. International Journal of Advanced Computer Science and Applications ( IJACSA )(ISI indexing) , 3(11), 35 – 38. https://thesai.org/Publications/ViewPaper?Volume=3&Issue=11&Code=IJACSA&Seri alNo=6
■ A. Abusukhon, Talib M., Issa, O. (2012) Secure Network Communication Based on Text to Image Encryption. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 1(4). The Society of Digital Information and Wireless Communications (SDIWC) 2012. https://www.semanticscholar.org/paper/SECURE NETWORK-COMMUNICATION-BASED-ON-TEXT-TO-IMAGE-Abusukhon-Talib/1d122f280e0d390263971842cc54f1b044df8161
Many topics in cybersecurity. Cybersecurity audit is becoming increasingly important. I hope the attached paper helps your literature review and helps you identify which topic you wish to research. You can access the full paper free of charge by following the link to the Institute of Internal Auditors.
Here are some project topics related to IoT (Internet of Things) and cybersecurity, with a focus on security and privacy, that can be implemented with relatively non-challenging artifacts:
IoT Device Security Assessment: Evaluate the security of a specific IoT device (e.g., a smart thermostat or a home security camera). Identify vulnerabilities, suggest improvements, and create a report on enhancing its security.
IoT Home Network Security Setup: Design a secure IoT network at home by implementing best practices like network segmentation, strong passwords, and firmware updates. Create a guide for users to follow to secure their IoT devices.
Privacy-Focused IoT Data Collection: Develop a simple IoT project that collects data (e.g., temperature or light levels) but focuses on privacy protection. Implement techniques like data anonymization and encryption for data transmission.
IoT Security Awareness Training: Create an educational program or presentation on IoT security and privacy for non-technical users. Address common risks and offer practical tips for securing IoT devices.
IoT Device Authentication: Build a basic system for authenticating IoT devices on a network. Use techniques like device certificates or secure tokens to ensure that only trusted devices can connect.
IoT Firmware Analysis: Analyze the firmware of a common IoT device, such as a smart bulb or smart plug. Identify security vulnerabilities or privacy concerns in the firmware and suggest improvements.
IoT Communication Protocol Analysis: Study and compare the security of different IoT communication protocols (e.g., MQTT, CoAP, HTTP). Create a report on their strengths and weaknesses.
IoT Penetration Testing Lab: Set up a controlled environment for testing the security of IoT devices. Perform penetration testing on various devices and document the vulnerabilities found.
IoT Privacy Policy Evaluation: Evaluate the privacy policies of popular IoT device manufacturers. Analyze how they handle user data and make recommendations for better privacy practices.
IoT Security Dashboard: Develop a basic security dashboard that displays the status of IoT devices on a network, including information about security patches and potential vulnerabilities.
IoT Secure Boot Implementation: Implement secure boot mechanisms on a Raspberry Pi or Arduino-based IoT device. Ensure that the device only runs authorized firmware.
IoT Device Access Control: Create a user-friendly access control system for IoT devices. Users can define who can control or access their devices, enhancing privacy and security.
IoT Threat Modeling: Develop a threat model for a specific IoT ecosystem, such as a smart home or industrial IoT network. Identify potential threats and propose countermeasures.
IoT Privacy Preservation for Wearables: Build a simple IoT wearable device (e.g., a fitness tracker) that collects user data while preserving privacy through techniques like data aggregation.
IoT Password Management: Design a secure password management system for IoT devices, ensuring that users can easily manage and update passwords for multiple devices.
These project ideas cover a range of aspects within IoT and cybersecurity, and they can be adapted to different levels of technical complexity depending on your skill level and resources. Always prioritize security and privacy when working on IoT projects to contribute to a safer and more privacy-aware IoT ecosystem.