Research Article |
Intelligent Solutions for Manipulating Purchasing Decisions of Customers Using Internet of Things during Covid-19 Pandemic
Author(s) : Dr Avinash Rajkumar1, Pankhuri Agarwal2, Dr Mohit Rastogi3, Dr Vipin Jain4, Dr Chanchal Chawla5 and Dr Manoj Agarwal6
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 10, Issue 2 , Special Issue on IIoT-WSN
Publisher : FOREX Publication
Published : 15 May 2022
e-ISSN : 2347-470X
Page(s) : 105-110
Abstract
It is a well-known fact that consumers may gain significant benefits from the effective use of IoT in pandemic and post-pandemic settings. Security vulnerabilities can be seen in the ever-increasing Internet of Things (IoT) ecosystem from cloud to edge, which is crucial to note in this particular circumstance. Most merchants, even luxury stores, have failed to implement robust IoT cyber security procedures. Therefore, the researchers sought to put forth secondary research methodologies to bring forward efficient scrutiny regarding this particular issue to properly comprehend the influence of IoT in various devices, including a smartwatch, power displaying metre, brilliant weight showing gadgets and many more. The secondary research approach allowed the researchers to collect a large quantity of data quickly, acquiring a wide range of possible solutions for security and privacy issues in Consumer IoT (CIoT) devices. Secondary research also will enable scholars to compare and contrast several papers' philosophies and research findings to get a quick conclusion. To gather information, the researchers used publications and the internet efficiently. In this situation, it helped to save a significant amount of time. Findings suggested that vulnerabilities occur in smart IoT gadgets, including the intelligent power consumption metre and brilliant weight displaying widget, due to their low-standard and conventional security system. Thus, this paper has suggested possible solutions to protect IoT devices against phishing and theft attacks.
Keywords: Artificial intelligence
, Consumer Internet of Things (CIoT)
, Secondary research analysis
, Smart gadgets
, Security
Dr Avinash Rajkumar, Asst.Prof., Teerthanker Mahaveer Institute of Mgmt. & Technology, Mahaveer University, Moradabad, Uttar Pradesh, India
Pankhuri Agarwal, Asst.Prof., Teerthanker Mahaveer Institute of Mgmt. & Technology, Mahaveer University, Moradabad, Uttar Pradesh, India
Dr Mohit Rastogi, Asst.Prof., Teerthanker Mahaveer Institute of Mgmt. & Technology, Mahaveer University, Moradabad, Uttar Pradesh, India
Dr Vipin Jain, Prof., Teerthanker Mahaveer Institute of Mgmt. & Technology, Mahaveer University, Moradabad, Uttar Pradesh, India; Email: vipin555@rediffmail.com
Dr Chanchal Chawla, Asso.Prof., Teerthanker Mahaveer Institute of Mgmt. & Technology, Mahaveer University, Moradabad, Uttar Pradesh, India
Dr Manoj Agarwal, Asso.Prof., Teerthanker Mahaveer Institute of Mgmt. & Technology, Mahaveer University, Moradabad, Uttar Pradesh, India
[1] Dankan Gowda V, K. R. Swetha, Namitha A R, Manu Y M, Rashmi G R and Veera Sivakumar Chinamuttevi (2022), IOT Based Smart Health Care System to Monitor Covid-19 Patients. IJEER 10(1), 36-40. DOI: 10.37391/IJEER.100105.
[2] Statista.com, (2021). Coronavirus impacts retail e-commerce website traffic worldwide as of June 2020 by average monthly visits. Available at: https://www.statista.com/statistics/1112595/covid-19-impact-retail-e-commerce-site-traffic-global/.[Cross Ref]
[3] Chaudhary, K., Alam, M., Al-Rakhami, M.S. and Gumaei, A., 2021. Machine learning-based mathematical modelling for prediction of social media consumer behavior using big data analytics. Journal of Big Data, 8(1), pp.1-20.[Cross Ref]
[4] Y. Y. Zheng, Y. T. Ma, J. Y. Zhang, and X. Xie, “COVID-19 and the cardiovascular system,” Nat. Rev. Cardiol., vol. 17, no.5, pp. 259–260, Mar. 2020.[Cross Ref]
[5] D. S. W. Ting, L. Carin, V. Dzau, and T. Y. Wong, “Digital technology and COVID-19,” Nat. Med., vol.26, no. 4, pp. 459–461, Mar. 2020.[Cross Ref]
[6] Alladi T, Chamola V, Sikdar B, Choo KK. Consumer IoT: Security vulnerability case studiesand solutions. IEEE Consumer Electronics Magazine. 2020 Feb 3; 9(2):17-25.
[7] Harvard College. Surveys, app. to track COVID-19. [Online]. Available: https://www.hsph.harvard.edu/coronavirus/covid-19-response-public-health-in-action/surveys-apps-to-track-covid-19/, Accessed on: Dec. 27, 2020.[Cross Ref]
[8] Eian, I.C., Yong, L.K., Li, M.Y.X., Qi, Y.H. and Fatima, Z., 2020. Cyber-attacks in the era of covid-19 and possible solution domains.[Cross Ref]
[9] Alladi, T., Chamola, V., Sikdar, B. and Choo, K.K.R., 2020. Consumer IoT: Security vulnerability case studies and solutions. IEEE Consumer Electronics Magazine, 9(2), pp.17-25.[Cross Ref]
[10] M. A. Ferran, L. Maglaras, and A. Derhab, “Authentication and authorisation for mobile IoT devices using features: Recent advances and future trends,” Secure. Commun. Netw, vol. 2019, May 2019[Cross Ref]
[11] Iqbal M, Riadi I. Analysis of security virtual private network (VPN) using openVPN. International Journal of Cyber-Security and Digital Forensics. 2019 Jan 1; 8(1):58-65.
[12] K. Sugiyama and T. Andree, TheDentsu Way: 9 Lessons for Innovation in Marketing from the World's Leading Advertising Agency, McGraw-Hill, 2018.
[13] Harsha, “What is machine learning? Machine learning for beginners,” Big Data Analytics, March, Edureka, 2018.[Cross Ref]
[14] M. A. Ghazanfar, S. A. Alahmari, Y. F. Aldhafiri et al., “Using machine learning classifiers to predict stock exchange index,” International Journal of Machine Learning and Computing, vol. 7, no. 2, pp. 24-29, 2017.[Cross Ref]
[15] Loi, F., Sivanathan, A., Gharakheili, H.H., Radford, A. and Sivaraman, V., 2017, November. Systematically evaluating security and privacy for consumer IoT devices. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy (pp. 1-6).
[16] Hood KM. Validity and reliability of body composition techniques in healthy adults (Doctoral dissertation, San Francisco State University).[Cross Ref]
[17] Dorri A, Kanhere SS, Jurdak R. Towards an optimized blockchain for IoT. In2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI) 2017 Apr 18 (pp. 173-178). IEEE.[Cross Ref]
[18] Wurm J, Hoang K, Arias O, Sadeghi AR, Jin Y. Security analysis on consumer and industrial IoT devices. In2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC) 2016 Jan 25 (pp. 519-524). IEEE.
[19] E. Alpaydin, Introduction to Machine Learning: MIT Press, 2015.[Cross Ref]
[20] Rauniar, R., Rawski, G., Yang, J. and Johnson, B., 2014. Technology acceptance model (TAM) and social media usage: an empirical study on Facebook. Journal of Enterprise Information Management.
[21] Maes, R., & Verbauwhede, I.M. (2010). Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. Towards Hardware-Intrinsic Security.
Dr Avinash Rajkumar, Pankhuri Agarwal, Dr Mohit Rastogi, Dr Vipin Jain, Dr Chanchal Chawla and Dr Manoj Agarwal (2022), Intelligent Solutions for Manipulating Purchasing Decisions of Customers Using Internet of Things during Covid-19 Pandemic. IJEER 10(2), 105-110. DOI: 10.37391/IJEER.100209.