Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 3 of 3
  • Item
    Application of non-linear Gaussian regression-based adaptive clock synchronization technique for wireless sensor network in agriculture
    (Institute of Electrical and Electronics Engineers Inc., 2018) Upadhyay, D.; Dubey, A.K.; Santhi Thilagam, P.S.
    Efficient and low power utilizing clock synchronization is a challenging task for a wireless-sensor network (WSN). Therefore, it is crucial to design a light weight clock synchronization protocols for these networks. An adaptive clock offset prediction model for WSN is proposed in this paper that exchanges fewer synchronization messages to improve the accuracy and efficiency. Timing information required is collected by setting a small WSN set up to investigate the soil condition to control the irrigation in agriculture. The networks investigate soils moisture, temperature, humidity, and pressure content along with the sensors clock offset. First, the prediction model perceives the existing sensor clock offset to observe the clock characteristics and delay. Then, a Gaussian function is applied for adjusting the parameters weight of the observed value in the prediction model. The system results demonstrate that the proposed adaptive non-linear Gaussian regression synchronization model utilizes 20% less energy as consumed by time sync protocol for sensor-network and reference broadcast synchronization Protocol. It also reduces the synchronization error with respect to root-mean-square error (RMSE) by 24.85% as compared to linear prediction synchronization with RMSE 28.72% in terms of accuracy. © 2001-2012 IEEE.
  • Item
    A statistical tool for time synchronization problem in WSN
    (Bentham Science Publishers P.O. Box 294 Bussum 1400 AG, 2019) Upadhyay, D.; Dubey, A.K.; Santhi Thilagam, P.S.
    Background: In recent research, time synchronization has a great importance in the various application of wireless sensor network. Localization, tracking, message passing using contention-based schemes and communication are some of the fields where synchronization between sensor clocks is highly required. Therefore, several algorithms were designed to achieve a rational and reliable frame of time within the wireless sensor network. Patents related to time synchronization in WSN were also analyzed. Methods: This paper discusses the powerful statistical tool using maximum probability theory for synchronizing the time within the sensor's clock. In this paper, maximum probability theory is applied to estimate the best value of clock offset between two sensor clocks. The proposed algorithm is analyzed by exchanging timing messages between nodes using two-way message exchange schemes. Results: The proposed algorithm is also implemented along with a Time-Sync Protocol for Sensor Network. It reduces error deviation from 2.32 to 0.064 ms as compared with Time-Sync Protocol for Sensor Network without proposed works. Conclusion: It was observed that for a small network, proposed work gives better and efficient results with Time-Sync Protocol for Sensor Network. © 2019 Bentham Science Publishers.
  • Item
    Securing the IoT Application Layer from an MQTT Protocol Perspective: Challenges and Research Prospects
    (Institute of Electrical and Electronics Engineers Inc., 2024) Lakshminarayana, S.; Praseed, A.; Santhi Thilagam, P.S.
    The Internet of Things (IoT) is one of the most promising new millennial technologies, having numerous applications in our surrounding environment. The fundamental goal of an IoT system is to ensure effective communication between users and their devices, which is accomplished through the application layer of IoT. For this reason, the security of protocols employed at the IoT application layer are extremely significant. Message Queuing Telemetry Transport (MQTT) is being widely adopted as the application layer protocol for resource-constrained IoT devices. The reason for the widespread usage of the MQTT protocol in IoT devices is its highly appealing features, such as packet-agnostic communication, high scalability, low power consumption, low implementation cost, fast and reliable message delivery. These capabilities of the MQTT protocol make it a potential and viable target for adversaries. Therefore, we initially emphasize on the emerging MQTT vulnerabilities and provide a classification of identified MQTT vulnerabilities for the IoT paradigm. Then, this paper reviews attacks against the MQTT protocol and the corresponding defense mechanisms for MQTT-based IoT deployments. Furthermore, MQTT attacks are categorized and investigated with reference to crucial characteristics that aid in comprehending how these attacks are carried out. The defense mechanisms are discussed in detail, with a particular focus on techniques for identifying vulnerabilities, detecting and preventing attacks against the MQTT protocol. This work also discloses lessons learned by identifying and providing insightful findings, open challenges, and future research directions. Such a discussion is anticipated to propel more research efforts in this burgeoning area and pave a secure path toward expanding and fully realizing the MQTT protocol in IoT technology. © 2024 IEEE.