Incorporating Environmental Protection Requirement in Industrial IoT Access Control Security Using Arduino Technology MQ2 and DHT11 Sensor Networks

Authors

  • Joseph Kalunga School of Engineering, University of Zambia Lusaka Zambia
  • Simon Tembo School of Engineering, University of Zambia Lusaka Zambia
  • Jackson Phiri School of Natural Sciences, University of Zambia Lusaka Zambia

DOI:

https://doi.org/10.31695/IJASRE.2022.8.4.9

Keywords:

Industrial IoT Security, Environmental Security, Critical Infrastructure Security, Arduino Technology, MQ2 Sensor, DHT1 Sensor

Abstract

This paper presents the development of environmental monitoring mechanism based on Arduino Sensor Technology for Industrial Internet of Things (Industrial IoT) Critical Infrastructure (CI) Protection in an Access Control role. Access control of hazardous substances is one of the most vulnerable aspects of Industrial IoT CI.  The idea behind this study is to harden environmental security through live ecological monitoring of Temperature, Humidity and emitted hazardous substances or gases due to Industrial activities and processes in Smart CI places such as Nuclear Processing Plant, Thermal Generation Power Industries, Fossil Processing Plant, Military Chemical warfare plant, food processing factory, Agriculture Chemical Manufacturing Plant and many other CI industries. Live monitoring is one of the most important security requirements for any cyber-Access Control Mechanism.  The literature revealed that similar systems were developed and implemented in different organizations and with different System Requirements and specifications. However, most CI industries have not automated environmental monitoring requirements and integrated the requirement into a broad institution security continuum. The consequence of neglecting environmental security is climate change. Furthermore, Toxic gas pollution affects millions of people around the world and contributes to about 5.4 percent of deaths worldwide. Pollution kills more people than the combination of malaria, AIDS, and tuberculosis hence the development of security mechanisms to monitor pollutants in the atmosphere.  The main objective of this study was to develop a computer-based application for monitoring environmental hazardous substances such as extreme temperature, humidity, carbon dioxide (CO2), carbon monoxide (CO), and Smoke in the atmosphere surrounding Industrial IoT CI Industries. The system development approach employed was the Arduino engineering process model. To achieve this objective, cheaper ecological sensor Networks that include MQ2 and DHT11 Arduino Sensors are connected to Arduino Uno Microcontroller through a solderless breadboard Arduino component. The backend database was MySQL Relational database management system. The developed prototype application produced a number of results including live monitoring of temperature, humidity, CO2, CO, Smoke, and many others. A system evaluation process was conducted and the result indicated 99.999% accuracy levels. The results, it evidence that the developed prototype application can improve environmental security in Industrial IoT CI institutions.

References

Sphera, ‘What Is Environmental Sustainability?’, May 19, 2020, 2020. [Online]. Available: https://sphera.com/glossary/what-is-environmental-sustainability/. [Accessed: 09-Feb-2022].

D. M. N. Rajkumar, S. M. S, and D. V. V. Kumar, ‘IOT Based Smart System for Controlling Co2 Emission’, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 2, no. 2, pp. 284–288, 2017, doi: 10.13140/RG.2.2.26703.33444.

WHO, ‘Climate change and health’, 30 October 2021, 2021. [Online]. Available: https://www.who.int/news-room/fact-sheets/detail/climate-change-and-health. [Accessed: 09-Feb-2022].

M. Sherrard, ‘Gases That Cause Air Pollution’, April 30, 2018, 2018. [Online]. Available: https://sciencing.com/gases-cause-air-pollution-7445467.html. [Accessed: 01-Mar-2022].

J. Kalunga, S. Tembo, and J. Phiri, ‘Development of Access Control Mechanism Based on Fingerprint Biometrics and Mobile Phone Identity for Industrial Internet of Things Critical Infrastructure Protection’, vol. 6, no. 12, pp. 15–34, 2020, doi: 10.31695/IJASRE.2020.33940.

T. P. Raptis, A. Passarella, and M. Conti, ‘State of the Art and Open Challenges’, IEEE Access, vol. PP, p. 1, 2019, doi: 10.1109/ACCESS.2019.2929296.

J. Kalunga, S. Tembo, and J. Phiri, ‘Industrial Internet of Things Common Concepts , Prospects and Software Requirements’, vol. 9, no. 1, pp. 1–11, 2020, doi: 10.5923/j.ijit.20200901.01.

C. Petrov, ‘49 Stunning Internet of Things Statistics 2021 [The Rise Of IoT]’, Techjury.net, 2021. [Online]. Available: https://techjury.net/blog/internet-of-things-statistics/#gref. [Accessed: 03-Feb-2022].

S. G. Abbas, F. Hashmat, and G. A. Shah, ‘A multi-layer industrial-iot attack taxonomy: Layers, dimensions, techniques and application’, Proc. - 2020 IEEE 19th Int. Conf. Trust. Secur. Priv. Comput. Commun. Trust. 2020, pp. 1820–1825, 2020, doi: 10.1109/TrustCom50675.2020.00249.

G. Kamieniecky and J. Bennet, ‘Emerging use of Industrial Internet of Things ( IIoT )’, 2019.

European Environment Agency, ‘Environment in the European Union at the turn of the century- 3.1. Greenhouse gases and climate change’, pp. 79–98, 1999.

C. International, ‘Carbon emission tax’, 2018, 2018. [Online]. Available: https://cuts-lusaka.org/carbon-emission-tax/. [Accessed: 02-Mar-2022].

H. Panchasara, N. H. Samrat, and N. Islam, ‘Greenhouse gas emissions trends and mitigation measures in australian agriculture sector—a review’, Agric., vol. 11, no. 2, pp. 1–16, 2021, doi: 10.3390/agriculture11020085.

Y. S. Kalinin, E. K. Velikov, and V. I. Markova, ‘Design of Indoor Environment Monitoring System Using Arduino’, Int. J. Innov. Sci. Mod. Eng., no. 7, pp. 2319–6386, 2015.

J. Kalunga and S. Tembo, ‘Development of Fingerprint Biometrics Verification and Vetting Management System’, Am. J. Bioinforma. Res., vol. 6, no. 3, pp. 99–112, 2016, doi: 10.5923/j.bioinformatics.20160603.01.

P. Samarati and S. De Capitani, ‘Access Control : Policies , Models , and’, pp. 137–196, 2001.

I. Indu, P. M. R. Anand, and V. Bhaskar, ‘Identity and access management in cloud environment: Mechanisms and challenges’, Eng. Sci. Technol. an Int. J., vol. 21, no. 4, pp. 574–588, 2018, doi: 10.1016/j.jestch.2018.05.010.

S. Ameer, J. Benson, and R. Sandhu, ‘An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach’, Information, vol. 13, no. 2, p. 60, 2022, doi: 10.3390/info13020060.

G. Feulner, ‘Global Challenges: Climate Change’, Glob. Challenges, vol. 1, no. 1, pp. 5–6, 2017, doi: 10.1002/gch2.1003.

J. Kalunga, ‘INTEGRATING FINGERPRINT BIOMETRICS SYSTEM INTO THE’, University of Zambia, 2015.

K. M. Baina a, Deswart Y, ‘Chapter 14 COLLABORATIVE ACCESS CONTROL FOR CRITICAL INFRASTRUCTURES’, Int. Fed. Inf. Process., vol. 290, no. Critical Infrastructure Protection II, pp. 189–201, 2008.

R. Belguechi, E. Cherrier, V. Alimi, P. Lacharme, and C. Rosenberger, ‘An Overview on Privacy Preserving Biometrics’, Recent Appl. Biometrics, no. July, 2011, doi: 10.5772/19338.

K. Dragerengen, ‘Access Control in Critical Infrastructure Control Rooms using Continuous Authentication and Face Recognition’, no. June, 2018.

H. L. Gawand, A. K. Bhattacharjee, and K. Roy, ‘Online Monitoring of a Cyber Physical System Against Control Aware Cyber Attacks’, Procedia Comput. Sci., vol. 70, pp. 238–244, 2015, doi: 10.1016/j.procs.2015.10.079.

D. Belfadel, M. A. Rodriguez, M. Zabinski, and R. Munden, ‘Use of the Arduino platform in fundamentals of engineering’, ASEE Annu. Conf. Expo. Conf. Proc., 2019, doi: 10.18260/1-2--33491.

H. Timmis, The Process of Arduino Engineering. In: Practical Arduino Engineering. CA, 2012.

B. Aston, ‘10 Best Requirements Management Tools & Software Of 2022’, 2022, 2022. [Online]. Available: https://thedigitalprojectmanager.com/tools/requirements-management-tools/. [Accessed: 29-Mar-2022].

N. Nhede, ‘Industry believes IIoT applications “essential to sustainability”’, Feb 11, 2022, 2022. [Online]. Available: https://www.smart-energy.com/industry-sectors/iot/industry-believes-iiot-applications-essential-to-sustainability/. [Accessed: 18-Feb-2022].

A. Ben Youssef, ‘How Can Industry 4.0 Contribute to Combatting Climate Change?’, cain.Info, 2020. [Online]. Available: https://doi.org/10.4000/rei.8911. [Accessed: 25-Aug-2021].

M. A. Moritz et al., ‘Climate change and disruptions to global fire activity’, Ecosphere, vol. 3, no. 6, p. art49, 2012, doi: 10.1890/es11-00345.1.

A. M. Abhilash Panda, nicholas j Ramos, ‘Making Critical Infrastructure Resilient Ensuring Continuity of Service Making Critical Infrastructure Resilient’, UNDRR, 2020.

H. Derhamy, ‘Architectural Design Principles For Industrial Internet of Things’, Lulea University of Technology, 2018.

M. Burhan and R. A. Rehman, ‘IoT Elements , Layered Architectures and Security Issues : A Comprehensive Survey’, pp. 1–37, 2018, doi: 10.3390/s18092796.

M. Burhan, R. A. Rehman, B. Khan, and B. S. Kim, ‘IoT elements, layered architectures and security issues: A comprehensive survey’, Sensors (Switzerland), vol. 18, no. 9, 2018, doi: 10.3390/s18092796.

R. de Oliveira Albuquerque, L. J. García Villalba, A. L. Sandoval Orozco, F. Buiati, and T. H. Kim, ‘A layered trust information security architecture’, Sensors (Switzerland), vol. 14, no. 12, pp. 22754–22772, 2014, doi: 10.3390/s141222754.

A. Henderson, ‘The CIA Triad: Confidentiality, Integrity, Availability’, 2019, 2019. [Online]. Available: http://panmore.com/the-cia-triad-confidentiality-integrity-availability. [Accessed: 29-Jun-2021].

J. Al-Jaroodi, I. Jawhar, A. Al-Dhaheri, F. Al-Abdouli, and N. Mohamed, ‘Security middleware approaches and issues for ubiquitous applications’, Comput. Math. with Appl., vol. 60, no. 2, pp. 187–197, 2010, doi: 10.1016/j.camwa.2010.01.009.

GeeksForGeens, ‘Unified Modeling Language (UML) | Activity Diagrams’, GeeksForGeens, 2018. [Online]. Available: https://www.geeksforgeeks.org/unified-modeling-language-uml-activity-diagrams/. [Accessed: 10-Sep-2020].

B. Li, Q. Zhou, S. Peng, and Y. Liao, ‘Recent Advances of SnO2-Based Sensors for Detecting Volatile Organic Compounds’, Front. Chem., vol. 8, no. May, pp. 1–6, 2020, doi: 10.3389/fchem.2020.00321.

Q. Zhang, Q. Zhou, Z. Lu, Z. Wei, L. Xu, and Y. Gui, ‘Recent advances of SnO2-based sensors for detecting fault characteristic gases extracted from power transformer oil’, Front. Chem., vol. 6, no. AUG, pp. 1–7, 2018, doi: 10.3389/fchem.2018.00364.

P. Education and P. Addison-wesley, ‘Chapter 9 Outline  Relational Database Design Using ER-to- Relational Mapping  Mapping EER Model Constructs to Relations’, 2011.

L. Louis, ‘Working Principle of Arduino and Using it as a Tool for Study and Research’, Int. J. Control. Autom. Commun. Syst., vol. 1, no. 2, pp. 21–29, 2016, doi: 10.5121/ijcacs.2016.1203.

M. Mahbub, ‘Toxic and hazardous gas detection , measurement and monitoring system for safety assurance in home and industrial application of wireless sensor node Toxic and hazardous gas detection , measurement and monitoring system for safety assurance in home and in’, Eng. Technol. Res., no. August, pp. 089–098, 2019, doi: 10.15413/etr.2019.0108.

T. Chennai, ‘Humidity and Temperature Monitoring System using IoT’, Int. J. Eng. Adv. Technol., vol. 9, no. 2, pp. 1353–1356, 2019, doi: 10.35940/ijeat.b2569.129219.

Asahi Kasei, ‘Gas Sensors types and mechanism’, Asahi Kasei Microdevices Corporation, 2018. [Online]. Available: https://www.akm.com/eu/en/products/co2-sensor/tutorial/types-mechanism/. [Accessed: 03-Oct-2021].

S. Campbell, ‘Python Tutorial for Beginners: Learn Programming Basics’, February 23, 2022, 2022. [Online]. Available: https://www.guru99.com/python-tutorials.html. [Accessed: 23-Feb-2022].

J. A. Langbridge, ‘Arduino Sketches: Tools and Techniques for Programming Wizardry’, January 2015, 2015. [Online]. Available: https://www.wiley.com/en-us/Arduino+Sketches%3A+Tools+and+Techniques+for+Programming+Wizardry-p-9781118919606. [Accessed: 23-Feb-2022].

L. R. Team, ‘IoT and Big Data: Understanding the relationship between these two technologies’, May 18, 2021, 2021. [Online]. Available: https://ryax.tech/iot-and-big-data-understanding-the-relationship-between-these-two-technologies/. [Accessed: 04-Mar-2022].

A. J. Kornecki, ‘Safety and security in industrial control Safety vs . Security in Industrial Control’, no. October, 2015.

Downloads

How to Cite

Joseph Kalunga, Simon Tembo, & Jackson Phiri. (2022). Incorporating Environmental Protection Requirement in Industrial IoT Access Control Security Using Arduino Technology MQ2 and DHT11 Sensor Networks . International Journal of Advances in Scientific Research and Engineering (IJASRE), ISSN:2454-8006, DOI: 10.31695/IJASRE, 8(4), 97–122. https://doi.org/10.31695/IJASRE.2022.8.4.9

Issue

Section

Articles