Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
6 results
Search Results
Item Ubiquitous object categorization and identity(2006) Kulkarni, U.P.; Vadavi, J.V.; Joshi, S.M.; Chandra Sekaran, K.C.; Yardi, A.R.Ubiquitous computing technology provides an environment where users expect to access resources and services anytime and anywhere. Everyday objects communicate with each other and also with the Internet objects available today. People have an increasing desire for such ubiquitous access to information, anywhere, anyplace, and anytime. As ubicomp occurs everywhere, there may be a very large number of users/objects interacting with each other simultaneously in future. This necessitates the question of how to uniquely provide identity to infinitely growing objects and standard towards the uniformity of the data being exchanged by the various objects. The serious security risks and problems arise because resources can now be accessed by almost anyone with a mobile device in such an open model. In this paper, author proposes the way of providing uniqueness in scalable object identity, object categorization and standard in data being exchanged by various ubicomp compliant objects and explore the security issue in ubiquitous computing with a focus on authentication. © 2006 IEEE.Item Near field communication - Applications and performance studies(2012) Nambi, S.N.; Prabhakar, T.V.; Jamadagni, H.S.; Ganapathi, K.; Pramod, B.K.; Rakesh, C.M.; Sanjay Naik, R.Near Field Communication (NFC), is an integration of Radio Frequency Identification (RFID) technology with mobile devices. NFC offers a quick and convenient method of interaction between humans and NFC enabled devices. Current research concerning NFC appears to mainly focus on development of NFC enabled applications and services. In this paper, we study the performance of NFC devices by considering metrics such as achieved data rates and received power for several distances. Knowledge of these metrics may be useful for application developers to build applications efficiently. We have developed various applications on NFC enabled devices for public transport systems. We also describe the design of 13.56 MHz antenna which was used for measurements of the received power. © 2012 Springer-Verlag.Item Dual band operation using metamaterial structure for Radio Frequency Identification (RFID) system(IEEE Computer Society help@computer.org, 2014) Saha, R.; Bhattacharjee, S.; Bhunia, C.T.; Maity, S.The important functions of Radio Frequency Identification (RFID) technology are radiation and detection. So efficient antenna design and fabrication is the unique solution which perform a very crucial role for many applications. The reader and tag intense are component of the RFID system. In this paper designed has done on RFID antenna for tag and reader application, which also includes the different types of antenna (UHF application, wideband, multiband antenna) and the general consideration for design, them which are currently used for tag and reader application. In this paper we proposed a rectangular patch antenna and then designed a metamaterial structure on the patch to improve the antenna performance. © 2014 IEEE.Item Smart and secure monitoring of industrial environments using IoT(Association for Computing Machinery acmhelp@acm.org, 2015) Puranik, S.; Mohan, J.; Chandrasekaran, K.The Internet of Things (IoT) standard is giving rise to complex smart systems where in it has been made conceivable to captivate objects we experience in regular life, to interact and exchange information over a wireless network. The steep surge in industrialization and poor strategies used in controlling industrial pollution has resulted in degradation in the quality of environment around us. Negligence of leakage within an industry can result in massive hazards like the Bhopal Gas Tragedy. This paper proposes a secure IoT framework to smartly connect industrial surroundings. Our proposed framework helps in monitoring the level of pollutants, particulate matter and effluents released into the environment, notifying concerned authorities whenever their permissible level surpasses. Also we smartly connect the houses in close vicinity, so that precautionary measures can be taken to evacuate people in times of unexpected leakages. Our paper also discusses the various technologies and the security assessments being done to make it a complete secure system. © 2015 ACM.Item Revolutionizing Parking Management with IoT-powered Smart Car Parking Solutions(Institute of Electrical and Electronics Engineers Inc., 2023) Suresh, N.; Nitheesh, K.; Siva Chaitanya, R.V.; Vani, B.V.In densely populated areas, obtaining parking spaces is a major problem because the number of automobiles on the road is increasing daily. RFID is the most often used technique for removing or overcoming the cause. Checking the card's balance rather than hunting for parking spaces at far-off locations is the present RFID concept's procedure. The biggest problem with the existing approach is that it is hard to measure how much money is taken out because it varies over time and between various slots. Therefore, this research study provides a solution, namely the suggested method, which guarantees an efficient monitoring system and permits the monitoring of parking spaces in remote regions. These efforts The goal of this project is to tie the RFID concept to the Internet of Things (IoT). Users can communicate remotely regarding parking space availability thanks to IoT's client-server connection. The creation of a website that informs users when parking spaces are available would enhance the mobile-friendly environment. From a distance, users will be able to reserve a parking spot, and that spot will be held for 30 minutes while it waits for the user to arrive. After the time restriction has gone and the slot is still available, the user must rebook it. By doing this, parking lot traffic congestion is reduced to a minimum. This can be employed in retail areas where traffic congestion is regularly caused by parking concerns. © 2023 IEEE.Item PUF-Based Ownership Transfer Using Blockchain(Springer Science and Business Media Deutschland GmbH, 2025) Cunha, T.B.D.; Manjappa, M.; Singh, V.; Anand, A.Counterfeiting of electronic components in the branded products is one of the most important and difficult issues to deal with in national/international markets along with the trusted ownership transfer of the product. Today we have to trust an individual while buying a product believing that the product is not tampered. But, we do not have any trusted source which can back this claim. This creates a lot of speculation in the market. For a long time RFID tags were used to find the anti counterfeits in the supply chain, but the problem with the RFID tag is that they can be cloned and hence the authenticity of the tags over the network is questionable. Hence, in order to counter this, we are leveraging blockchain technology to build a novel ownership transfer protocol where the ownership transfer mechanism is secured and authenticated using Physically Unclonable Functions (PUF). The genuinity of the product is checked by PUF by using Challenge Response check during the ownership transfer. Further, the ownership transfer history of the particular product is also maintained in the blockchain which helps the buyer to get more details on the product. The proposed blockchain architecture also provides a temporary ownership transfer option for the owners during servicing or leasing. The proposed architecture is implemented in ethereum blockchain platform and tested for its efficiency. The architecture is found to be promising. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
