Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 6 of 6
  • Item
    A Survey on Wired, Wireless, and Internet of Things Routing Protocols
    (Institute of Electrical and Electronics Engineers Inc., 2019) Kamble, S.; Chandavarkar, B.R.
    Delivery of data through the shortest path in a computer network is always a key area of research for academic as well as in industry. The routing protocols are extensively used in networking today to identify the shortest path. As technology is evolving in the wireless networks, Internet of Things (IoT), etc., routing protocols also need to be modified. The paper provides an overview of how routing protocols have changed from wired to wireless networks and for IoTs, different categories of the routing for wired and wireless networks. Though wired network provides fast and reliable communication as compared to wireless, due to the need of the internet everywhere, the wireless is preferred over wired. All three categories use the different IEEE standard for data transfer. The analysis of various routing protocols given in this paper may help the upcoming researchers to get a quick review of the existing protocol for wired, wireless and IoT networks. © 2019 IEEE.
  • Item
    Routing Criteria for Low Power and Lossy Networks
    (Institute of Electrical and Electronics Engineers Inc., 2021) Kamble, S.; Chandavarkar, B.R.
    The network types are getting updated from wired to wireless and wireless to Low Power and Lossy Networks (LLNs) based on the applications. Hence there is a need for a routing protocol that supports the latest properties of the network. The paper reviews the criteria defined by ROLL for LLNs. The paper also provides a discussion on how some of the protocols behave in context to these criteria. The paper also mentions the requirement of various categories of loT applications. A protocol that satisfies the criteria is considered to be suitable for LLNs with some necessary features. A protocol should also satisfy the requirements of a wide range of applications so that the protocol designed is reliably used. © 2021 IEEE.
  • Item
    Analysis of the Standard Objective Functions of RPL
    (Springer Science and Business Media Deutschland GmbH, 2022) Kamble, S.; Chandavarkar, B.R.
    Low power and Lossy Network (LLN) is a network widely used to connect objects nowadays, and routing in such type of network is a new research area to work. ROLL-WG developed a routing protocol for LLN called Routing Protocol for low power and lossy network (RPL). Here, the Objective Function (OF) defines the way the node should select the parent node. The two standard OFs are OF-0, and MRHOF developed in 2010 and 2012. The paper explains these OFs and presents the experimental results of the two OFs in Contiki-3.0. The experiments were carried out by varying the number of nodes and varying data rates. The experimental results show that due to low hop count and fewer nodes getting involved in OF-0, it performs better than MRHOF, as MRHOF requires more stable links to transmit the data. Thus, OF-0 is useful in the scenarios where there are fewer nodes, and the destination is closer. © 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
  • Item
    AuthBlock: Authentication Framework Using Ethereum Blockchain
    (Springer Science and Business Media Deutschland GmbH, 2023) Kamble, S.; Chandavarkar, B.R.
    When employing authentication mechanisms to store user credentials, a subtle point to note is that they are easily vulnerable to cyber attacks like sharing of user data without their consent, password stealing on a large scale, etc. By decentralizing ownership of credentials and providing a framework for confirming one’s record in an unalterable chain of data, i.e., Distributed Ledger Technology (DLT) in general and blockchain can provide a solution. Blockchain technology can help reduce the risk of attacks and user data leaks through backdoors by establishing a secure platform for online service providers to authenticate users without a single point of failure. Blockchain is being utilized increasingly for trusted, decentralized, secure registration, authentication, and valuation of digital assets (assets, real estate, etc.) and transactions, governing interactions, recording data, and managing identity among numerous parties. Smart contracts are used to do transactions on the blockchain. This work aims to analyze the shortcomings of traditional authentication systems and hence provide a blockchain-based authentication solution to address them. In this paper, we suggest AuthBlock, a robust, lightweight, and secure blockchain-based authentication system. It can be used by multiple parties as an authentication framework in parallel without any interference. The proposed approach leverages the Ethereum blockchain along with its provision of smart contracts. The proposed method is tested on the Ethereum localnet created using Go Ethereum (Geth) and evaluated to analyze user authentication, verification, and cost. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
  • Item
    BlockFIR: Blockchain based First Information Report System
    (Institute of Electrical and Electronics Engineers Inc., 2023) Kamble, S.; Chandavarkar, B.R.
    India is experiencing a sharp rise in criminal activity. This is a serious problem, as many of these crimes go unreported. Although there is an online platform for the police to store First Information Reports (FIR) and Non-Cognizable Reports (NCR), most FIRs are still written by hand. This is inefficient and can lead to errors. Additionally, the complainant must typically be at the police station to report a cognizable offense. This can be inconvenient and time-consuming, especially for victims who live in rural areas. In 2009, the Crime and Criminal Tracking Network and Systems (CCTNS) were launched as an efficient e-governance system. This system has helped to improve the reporting of crimes, but it is still a centralized system. This means that it is vulnerable to cyberattacks and can be easily shut down by a single point of failure. Therefore, a fully decentralized system is required to ensure no single point of failure and that complaints are handled safely and securely to prevent unauthorized access. This paper proposes a blockchain-based solution called BlockFIR to manage complaints against cognizable and non-cognizable offenses. Using this system, complaints can be registered by users. The police stations will be able to see complaints registered in their jurisdiction, register FIRs/NCRs accordingly, and take action on them. Through a prototype implementation using Go-Ethereum (Geth), smart contracts, and Django web server, we demonstrate the practical use of BlockFIR. We show that our system can be easily used by users, police personnel, and Higher Authorities to improve the current systems in India. © 2023 IEEE.
  • Item
    Anomaly Detection in Electric Powertrain System Software Behaviour
    (Institute of Electrical and Electronics Engineers Inc., 2023) Vyas, A.; Ghorpade, V.; Kamble, S.; Johnson, P.S.; Kamath, A.; Rawat, K.
    A software-in-loop (SIL) testing is a method of early testing of control software of a car in virtual environment. A system level testing is carried out on regular basis and it is important to see, if system is behaving as expected or unexpected. For unexpected behaviors, which test engineers not easily notice, modern techniques such as machine learning can give an advantage. This paper presents an application of machine learning algorithms that helps in identifying the abnormal patterns in time series data generated from electric powertrain system testing done in SIL environment for a Mercedes Benz Electric Car. Output of the SIL testing, results in time series data that is a collection of observations that are ordered chronologically and can be used to analyze trends, patterns, and changes over time. Anomaly detection in time series data is a process in machine learning that identifies data points, events, and observations that deviate from a dataset's normal behavior. By monitoring the expected and unexpected behavior of the electric powertrain system, anomaly detection can be a valuable tool for identifying potential issues. This study aims at coming up with an efficient process for anomaly detection in SIL. In order to get this process, various anomaly detection techniques are compared to detect a defined anomaly in time series data. Data pre-processing methods are also discussed before training the model. At the end, we conclude a best-fit method for identified anomaly. With finally identified method, a model was trained and used further in application. © 2023 IEEE.