Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
6 results
Search Results
Item Security issues and challenges in Healthcare Automated Devices(Institute of Electrical and Electronics Engineers Inc., 2020) Jangid, A.; Dubey, P.K.; Chandavarkar, B.R.Automated devices can be seen everywhere be at home, office, medical devices, Mobiles, etc. This paper presents some of the healthcare-related automated devices with their shortcomings related to security. We are addicted to automated devices and in near future, we will be watching new emergence of devices with the increasing power of automation devices and their security is a big concern as the credibility of a machine is questionable and it's related to automated devices and we are left with many challenges to resolve those security threats. This paper reviews the automation devices primarily in the healthcare field and their security-related issues along with the challenges that we might face in the future while using them. Some already available solutions are presented to try to come up with possible new solutions. © 2020 IEEE.Item Hardcoded Credentials and Insecure Data Transfer in IoT: National and International Status(Institute of Electrical and Electronics Engineers Inc., 2020) Chandavarkar, B.R.Internet of Things (IoT) or Internet of Objects (IoO) is one of the emerging areas of accessing any device or object over the internet anytime, anywhere. The limited power, memory, and processing capabilities of these tiny devices result in many of the challenging issues such as connectivity, performance and scaling, mobility, interoperability/standards, security, and privacy. The essential requirement in the successful deployment of IoT is either a new way of addressing the issue or the lightweight solution of the existing approaches. This paper majorly focuses on the security aspects of IoT. Specifically, hardcoded or weak guessable credentials and insecure data transfer related security issues in IoT. Further, the national and international status of these two security issues followed by the mitigation approaches. Finally, the importance of the paper in the context of the current status of the Indian IoT market. © 2020 IEEE.Item Essential Requirements of IoT’s Cryptographic Algorithms: Case Study(Springer Science and Business Media Deutschland GmbH info@springer-sbm.com, 2021) Kumar, S.; Lone, Z.A.; Chandavarkar, B.R.Internet of Things (IoT) devices are increasing rapidly in today’s world, but the security of devices remains a major concern due to the unavailability of the memory and processing power in these devices, which is because of their smaller size. The trade-off lies between security and performance, i.e. if security is increased, which will come with high complexity and hence would deter the performance. On the other hand, if performance has to be increased, it would come with a cost in terms of security. Also, IoT devices can be used as bots as they are globally accessible without much of a security. The most secure cryptographic algorithms use a lot of resources, and in case of IoT, resources are not available on that scale, so there is a need to design a secure algorithm (lightweight cryptography) that would use less resources and hence won’t affect the performance either. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Item Data Processing in IoT, Sensor to Cloud: Survey(Institute of Electrical and Electronics Engineers Inc., 2021) Sandeep, M.; Chandavarkar, B.R.IoT is connecting Things over the Internet and the realization of the environment through smart things to create a responsive space. Many surveys predicted the growth of IoT devices is going to be around 50 billion and an average of 7 devices per person. IoT has shown promising future with its applications like smart city, connected factories, buildings, roadways, smart health and many more. To make the promise a reality IoT has to overcome many hurdles like scalability, connectivity, architectural, big data, analysis, security, and privacy. In this literature survey, an attempt has been made to identify current challenges faced by IoT implementation and possible solutions, future opportunities, and research openings. Further, the processing of sensed data at IoT device, edge/fog layer, and the cloud is discussed in detail. © 2021 IEEE.Item Survey on Game Theory-Based Security Framework for IoT(Springer, 2023) Joshi, P.; Kamediya, S.; Kumar, R.; Chandavarkar, B.R.The large network of smart devices and the complexity of networks have made it almost impossible to make the data and communication between devices more secure. The number of cyber-attacks on these IoT devices has been steadily increasing. So here a survey on game theory model is presented, and the attackers are rational human beings, so they try to harm the system to their best of ability and so their moves can be predicted which can be used by the defenders with some game theory concepts to take proper security decisions and make an efficient security framework. This chapter is a survey on game theory-based security frameworks and explores and evaluates different types of threats, security requirements and constraints related to IoT, how Game Theory can be used in field of IoT, along with the game theory models used is to develop security frameworks for IoT. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.Item Integration of Synergetic IoT Applications with Heterogeneous Format Data for Interoperability Using IBM ACE(Springer, 2024) Sandeep, M.; Chandavarkar, B.R.Data interoperability is a crucial requirement in IoT to improve services and enhance business opportunities and innovation. Integrating synergetic applications with heterogeneous data formats is a critical issue that needs to be addressed to achieve interoperability. The use cases indicate IBM ACE is promising in resolving integration issues among on-premises and cloud applications. Further, many efforts are observed to address the interoperability issue apart from the IBM ACE approach. However, they are complex, restricted to few data formats, and use proprietary solutions. To address these above-mentioned issues, this paper proposes the Integration of Synergetic IoT applications with Heterogeneous format data for Interoperability using IBM ACE (ISHII). Further, an intelligence-based data recognition module in the proposed ISHII is trained with standard features defined in RFC 7111, 8259, 8996, JSON-LD of W3C, and Google’s Protobuf. Subsequently, recognized heterogeneous format data are integrated and translated to interoperable format using Data Format Description Language (DFDL) with Extended SQL codes on IBM ACE. Finally, the performance of ISHII has been evaluated with synthetically generated patient monitoring and room ambiance datasets with reference to accuracy, time required for integration, and translation efficiency. © 2023, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
