Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760900
P. Reshmanth, P. Sushanth, Chowdary Yogitha, R. R., Aishwarya
During this pandemic situation most of the people's health are in the need of medicine and doctors suggestions to improve and protect their health. Also, have seen many such cases where many people have been infected by COVID. To reduce the physical contact and help the people from the spread of diseases the proposed methodology is to implement the medibot in hospitals. A medical bot is a Chatbot which uses NLP (Natural Language Processing) by text-format. The medibot is supported by AI and Deep Learning for Medical Diagnostics. The goal of the project is to create a medibot that overcomes the proposed methodology. There were many people who could not meet the doctors for simple problems such as cold and fever. To reduce these cases will implement the medibot. This medibot can communicate with the patients and understand the symptoms, it will also give them medicines.
{"title":"Deployment of Medibot in Medical Field","authors":"P. Reshmanth, P. Sushanth, Chowdary Yogitha, R. R., Aishwarya","doi":"10.1109/ICSCDS53736.2022.9760900","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760900","url":null,"abstract":"During this pandemic situation most of the people's health are in the need of medicine and doctors suggestions to improve and protect their health. Also, have seen many such cases where many people have been infected by COVID. To reduce the physical contact and help the people from the spread of diseases the proposed methodology is to implement the medibot in hospitals. A medical bot is a Chatbot which uses NLP (Natural Language Processing) by text-format. The medibot is supported by AI and Deep Learning for Medical Diagnostics. The goal of the project is to create a medibot that overcomes the proposed methodology. There were many people who could not meet the doctors for simple problems such as cold and fever. To reduce these cases will implement the medibot. This medibot can communicate with the patients and understand the symptoms, it will also give them medicines.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124750792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760854
Xinxin Yuan
This paper studies the intelligent online system of art design based on human-computer interaction and visual perception. By analyzing the impact of artificial intelligence on artistic design, it is demonstrated that under the promotion of concept and tool innovation, the Arduino development board is used as the system control processor, and it has a multi-function integrating gesture recognition technology, face recognition technology, and voice recognition technology. The control system is the development path of stylization and commercialization. This article analyzes the impact of artificial intelligence on art design, and demonstrates that the combination of artificial intelligence and art design can provide a more intelligent, stylized and commercialized development path for future art design, promoted by the innovation of ideas and tools.
{"title":"Research on Intelligent Online System of Art Design Based on Human-Computer Interaction and Visual Perception Technology","authors":"Xinxin Yuan","doi":"10.1109/ICSCDS53736.2022.9760854","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760854","url":null,"abstract":"This paper studies the intelligent online system of art design based on human-computer interaction and visual perception. By analyzing the impact of artificial intelligence on artistic design, it is demonstrated that under the promotion of concept and tool innovation, the Arduino development board is used as the system control processor, and it has a multi-function integrating gesture recognition technology, face recognition technology, and voice recognition technology. The control system is the development path of stylization and commercialization. This article analyzes the impact of artificial intelligence on art design, and demonstrates that the combination of artificial intelligence and art design can provide a more intelligent, stylized and commercialized development path for future art design, promoted by the innovation of ideas and tools.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129379799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760934
Viral Parmar, Harshal A. Sanghvi, Riki H. Patel, A. Pandya
In the technology today, user-based authentication and password are now widely used in all information systems and services. Most of the university also uses this type of authentication method for many services, but the password is in danger. By providing a password-protected verification system for the most usable and secure organization. In the old days, the password was used as the best authentication system to prevent unauthorized access. Now the technology in the authentication system is growing day by day so that the password is changed to be more secure. However, the vulnerability of this traditional system has prompted the industry and researchers to find a new alternative where there is no threat such as theft, hacking and cracking passwords. This study discusses in more detail the key strategies for verifying the authenticity of a password in detail and sets out an attempt to explain details and process of each technology. The paper consists of an extensive review of the research conducted in past several years and this research study has presented a review of recent research works which are mainly conducted for improvising the security with the end to end encryption process.
{"title":"A Comprehensive Study on Passwordless Authentication","authors":"Viral Parmar, Harshal A. Sanghvi, Riki H. Patel, A. Pandya","doi":"10.1109/ICSCDS53736.2022.9760934","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760934","url":null,"abstract":"In the technology today, user-based authentication and password are now widely used in all information systems and services. Most of the university also uses this type of authentication method for many services, but the password is in danger. By providing a password-protected verification system for the most usable and secure organization. In the old days, the password was used as the best authentication system to prevent unauthorized access. Now the technology in the authentication system is growing day by day so that the password is changed to be more secure. However, the vulnerability of this traditional system has prompted the industry and researchers to find a new alternative where there is no threat such as theft, hacking and cracking passwords. This study discusses in more detail the key strategies for verifying the authenticity of a password in detail and sets out an attempt to explain details and process of each technology. The paper consists of an extensive review of the research conducted in past several years and this research study has presented a review of recent research works which are mainly conducted for improvising the security with the end to end encryption process.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129678466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760715
N. Sangavi, V. R. Kiruthika, K. Premalatha
Recently, data mining has been used in wide range of domains to gain the knowledge from the insights present in the datasets. In medical field, Cancer is the most effective disease that has been spread across the world. Particularly, cervical cancer is a cancer that happens mostly in women. In order to analyze the symptoms most effectively and to prevent cancer, the analysis of cervical cancer in women has been done using classification algorithms such as neural network, decision tree, random forest, SVM and linear regression algorithm. Data preprocessing and feature selection has been done with the features present in the dataset. The performance of the classification algorithms has been measured by the performance measures such as accuracy specificity, sensitivity, recall and F-measure. Based on the confusion matrix values such as true positive, true negative, false positive and false negative values, the performance measures such as accuracy specificity, sensitivity, recall and F-measure has been calculated. The target variable of the cervical cancer dataset is whether the person affected by cervical cancer or not. The analysis of the cervical cancer has been done with models and based on the performance measure calculated for each models brings out the Random Forest as the best suited model with 80% accuracy among the other models.
{"title":"Impact of Classification Algorithms on Cervical Cancer Dataset","authors":"N. Sangavi, V. R. Kiruthika, K. Premalatha","doi":"10.1109/ICSCDS53736.2022.9760715","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760715","url":null,"abstract":"Recently, data mining has been used in wide range of domains to gain the knowledge from the insights present in the datasets. In medical field, Cancer is the most effective disease that has been spread across the world. Particularly, cervical cancer is a cancer that happens mostly in women. In order to analyze the symptoms most effectively and to prevent cancer, the analysis of cervical cancer in women has been done using classification algorithms such as neural network, decision tree, random forest, SVM and linear regression algorithm. Data preprocessing and feature selection has been done with the features present in the dataset. The performance of the classification algorithms has been measured by the performance measures such as accuracy specificity, sensitivity, recall and F-measure. Based on the confusion matrix values such as true positive, true negative, false positive and false negative values, the performance measures such as accuracy specificity, sensitivity, recall and F-measure has been calculated. The target variable of the cervical cancer dataset is whether the person affected by cervical cancer or not. The analysis of the cervical cancer has been done with models and based on the performance measure calculated for each models brings out the Random Forest as the best suited model with 80% accuracy among the other models.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9761015
Divya V Chandran, J. Anitha
Normal peculiarities and human activities change the earth's surface consistently. There exists a requirement for concentrating on the progressions that occur. Change detection is the process of recognising the progressions that have happened over various occasions because of many reasons. It has got great importance in remote sensing, land use - land cover change detection, monitoring the various environmental changes such as due to flood, natural disasters, etc. The primary goal of this paper is to investigate the various methodologies in change detection because of floods and various difficulties andissues confronted. The change detection techniques have been created over years and still, investigators are done to work on the accuracy and execution of the framework. These can be applied to multi-temporal datasets to analyze the temporal changes in a particular area.
{"title":"Change Detection & Flood Water Mapping from Remotely Sensed Images- A survey","authors":"Divya V Chandran, J. Anitha","doi":"10.1109/ICSCDS53736.2022.9761015","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9761015","url":null,"abstract":"Normal peculiarities and human activities change the earth's surface consistently. There exists a requirement for concentrating on the progressions that occur. Change detection is the process of recognising the progressions that have happened over various occasions because of many reasons. It has got great importance in remote sensing, land use - land cover change detection, monitoring the various environmental changes such as due to flood, natural disasters, etc. The primary goal of this paper is to investigate the various methodologies in change detection because of floods and various difficulties andissues confronted. The change detection techniques have been created over years and still, investigators are done to work on the accuracy and execution of the framework. These can be applied to multi-temporal datasets to analyze the temporal changes in a particular area.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129795859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760936
B. H. Yogeshwary, K. S. Shivaprakasha, N. Yashwanth
The localization of non-localized sensor nodes is considered as a vital task in underwater communication, as it functions as the basic building block for several other capabilities, including tracking underwater nodes, coordinating the movements of an array of nodes and locating the underwater targets. Moreover, the localization also plays a key role in optimizing the medium access and routing protocols that facilitates the successful execution of Georouting, which in turn helps to get useful location-aware data. However, the localization is not an easy task as it faces several challenges, such as displacement of sensor nodes by water currents, multipath interference, high propagation delay, and fluctuations in the amplitude, etc. Another major challenge is the accurate determination of sensor node's 3D position coordinates in actual water environment. In this paper an attempt has been made in studying various approaches of existing localization and deployment techniques.
{"title":"Node Localization Techniques in Underwater Sensor Networks","authors":"B. H. Yogeshwary, K. S. Shivaprakasha, N. Yashwanth","doi":"10.1109/ICSCDS53736.2022.9760936","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760936","url":null,"abstract":"The localization of non-localized sensor nodes is considered as a vital task in underwater communication, as it functions as the basic building block for several other capabilities, including tracking underwater nodes, coordinating the movements of an array of nodes and locating the underwater targets. Moreover, the localization also plays a key role in optimizing the medium access and routing protocols that facilitates the successful execution of Georouting, which in turn helps to get useful location-aware data. However, the localization is not an easy task as it faces several challenges, such as displacement of sensor nodes by water currents, multipath interference, high propagation delay, and fluctuations in the amplitude, etc. Another major challenge is the accurate determination of sensor node's 3D position coordinates in actual water environment. In this paper an attempt has been made in studying various approaches of existing localization and deployment techniques.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127086617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760892
Z. Zhao
Based on the analysis of my country's cross-border e-commerce air freight industry, for cross-border e-commerce air freight based on cross-border e-commerce platforms, the dual game theory is used to analyze the cross-border e-commerce platforms, logistics service providers and logistics service providers in the alliance. During the dynamic game process between merchants, a binary game model of the three under different strategies is constructed, and the dynamic game of the three-party strategy selection is simulated and analyzed in combination with system dynamics. The results show that during the operation of the alliance: all participants will eventually reach an equilibrium state of “platform supervision, logistics enterprise efforts, and merchant participation”, and the state based on artificial intelligence will increase by 7.3%.
{"title":"Artificial Intelligence-Based Binary Game Modeling of Cross-Border E-Commerce to Air Cargo Industry","authors":"Z. Zhao","doi":"10.1109/ICSCDS53736.2022.9760892","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760892","url":null,"abstract":"Based on the analysis of my country's cross-border e-commerce air freight industry, for cross-border e-commerce air freight based on cross-border e-commerce platforms, the dual game theory is used to analyze the cross-border e-commerce platforms, logistics service providers and logistics service providers in the alliance. During the dynamic game process between merchants, a binary game model of the three under different strategies is constructed, and the dynamic game of the three-party strategy selection is simulated and analyzed in combination with system dynamics. The results show that during the operation of the alliance: all participants will eventually reach an equilibrium state of “platform supervision, logistics enterprise efforts, and merchant participation”, and the state based on artificial intelligence will increase by 7.3%.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127251824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Different countries have mostly been missing in recent conversations about AI-powered autonomous autos. Several worldwide polls and other research on the acceptability, popularity, and trust in autonomous cars were also eliminated. Accordingly, this is in view of its many advantages, such as the reduction of road accidents, the implementation of an efficient car sharing and transportation system, and precise navigation without regard to distractions. In certain circumstances, self driving technology may be used in commercial vehicles as well as passenger cars, as they improve in sophistication and accessibility. Extreme and unexpected situations, including their moral dimensions, will be handled by technology in the future. Human mistake or omission is considered to be the primary cause of most road accidents. These incidents are expected to decrease as autonomous technology become more widely available gravity, but the limited tests that are now available have not been able to properly prove underlie the problem at hand. Vehicle automation is on the rise, and this development will have far-reaching consequences for society, auto industry companies, since mechatronics will not only be a complementing component but also it's an essential aspect of the vehicle business.
{"title":"Recent Trends and Challenges of Diverless Vehicles in Real World Application","authors":"Tanuj Manglani, Rimma Rani, Rajkumar Kaushik, Prasang Kumar Singh","doi":"10.1109/ICSCDS53736.2022.9760886","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760886","url":null,"abstract":"Different countries have mostly been missing in recent conversations about AI-powered autonomous autos. Several worldwide polls and other research on the acceptability, popularity, and trust in autonomous cars were also eliminated. Accordingly, this is in view of its many advantages, such as the reduction of road accidents, the implementation of an efficient car sharing and transportation system, and precise navigation without regard to distractions. In certain circumstances, self driving technology may be used in commercial vehicles as well as passenger cars, as they improve in sophistication and accessibility. Extreme and unexpected situations, including their moral dimensions, will be handled by technology in the future. Human mistake or omission is considered to be the primary cause of most road accidents. These incidents are expected to decrease as autonomous technology become more widely available gravity, but the limited tests that are now available have not been able to properly prove underlie the problem at hand. Vehicle automation is on the rise, and this development will have far-reaching consequences for society, auto industry companies, since mechatronics will not only be a complementing component but also it's an essential aspect of the vehicle business.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127490051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760969
Y.Lakshmi Kamala, K. Rao, B. Josephine
Precision medicine is a therapeutic idea that advocates tailoring treatment to a specific group of individuals rather than a one-size-fits-all approach. Artificial intelligence provides insights through advanced processing and reasoning, allowing the device to reason and learn while also assisting physicians in their outcomes. Precision medicine helps to cure critical diseases like Cancer, Cardiovascular diseases, Covid-19, and etc. This review paper aims on discussing how Artificial intelligence techniques in diagnosing critical diseases and how AI is helpful to patients and clinicians by using different methodologies.
{"title":"Comparison and Evaluation of Studies on Precision Medicine using AI","authors":"Y.Lakshmi Kamala, K. Rao, B. Josephine","doi":"10.1109/ICSCDS53736.2022.9760969","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760969","url":null,"abstract":"Precision medicine is a therapeutic idea that advocates tailoring treatment to a specific group of individuals rather than a one-size-fits-all approach. Artificial intelligence provides insights through advanced processing and reasoning, allowing the device to reason and learn while also assisting physicians in their outcomes. Precision medicine helps to cure critical diseases like Cancer, Cardiovascular diseases, Covid-19, and etc. This review paper aims on discussing how Artificial intelligence techniques in diagnosing critical diseases and how AI is helpful to patients and clinicians by using different methodologies.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130029477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-07DOI: 10.1109/ICSCDS53736.2022.9760927
M. Alam, F. Reegu, A. A. Dar, W. A. Bhat
Described as the Internet of Things, this pioneering breakthrough links everything from sensors to automobiles to hospitals to businesses and customers all over the world through the use of a global network of computer networks. Smart cities, smart houses, smart agriculture and a smart planet have all been produced as a result of this type of construction. Since there are so many things involved in this system-devices, link layer technologies, and services-creating an Internet of Things system is quite difficult. Devices that can exchange data and communicate with one other are referred to as “Internet of Things” devices. By utilizing this technology, two or more devices may connect with one another through the internet. Smart gadgets have accelerated the growth of the Internet of Things. Smart devices, such as sensors and grids, are being used by an increasing wide range of businesses for the collecting and processing of data. As more and more IoT devices are being deployed, consumers are at greater danger of being hacked. Network layer security issues linked with IoT are examined in detail in this article. It also examines and analyses current network-layer IoT security concerns and threats, as well as mitigation strategies and counter measures.
{"title":"Recent Privacy and Security Issues in Internet of Things Network Layer: A Systematic Review","authors":"M. Alam, F. Reegu, A. A. Dar, W. A. Bhat","doi":"10.1109/ICSCDS53736.2022.9760927","DOIUrl":"https://doi.org/10.1109/ICSCDS53736.2022.9760927","url":null,"abstract":"Described as the Internet of Things, this pioneering breakthrough links everything from sensors to automobiles to hospitals to businesses and customers all over the world through the use of a global network of computer networks. Smart cities, smart houses, smart agriculture and a smart planet have all been produced as a result of this type of construction. Since there are so many things involved in this system-devices, link layer technologies, and services-creating an Internet of Things system is quite difficult. Devices that can exchange data and communicate with one other are referred to as “Internet of Things” devices. By utilizing this technology, two or more devices may connect with one another through the internet. Smart gadgets have accelerated the growth of the Internet of Things. Smart devices, such as sensors and grids, are being used by an increasing wide range of businesses for the collecting and processing of data. As more and more IoT devices are being deployed, consumers are at greater danger of being hacked. Network layer security issues linked with IoT are examined in detail in this article. It also examines and analyses current network-layer IoT security concerns and threats, as well as mitigation strategies and counter measures.","PeriodicalId":433549,"journal":{"name":"2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129123280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}