Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
43 results
Search Results
Item Impact of Blockchain for Internet of Things Security(wiley, 2020) Rudra, B.The Internet of Things (IoT) is playing a major role in the industry and is encouraging researchers to come up with various applications by bringing economical and social benefits to society. This is having an incredible impact on various environments using common operating picture ranging from mission-critical applications to business-oriented applications like healthcare, transportation, video surveillance, banking, etc. Common operating picture is achieved with the help of advancements seen in WSN devices, which are able to communicate with each other for the exchange of information and allow the data analysis for various purposes. The information is exchanged among the devices using the central server of cloud or fog, raising various security vulnerabilities. Not only the servers, but the IoT devices themselves will have security vulnerabilites which can be exploited by attacks like device spoofing, false authentication, etc. Taking into consideration the predicted evolution of IoT in the coming years, it is required to provide confidence in the users that the data they store or exchange and the devices they use for the purpose of security and privacy is preserved. The IoT objects are interconnected to each other but the functions of these vary from each other, which will not yield better security results with the conventional approaches. To address security and privacy concerns, the central server concept is eliminated and blockchain technology is introduced as a part of IoT. Blockchain, which is used for Bitcoin, has been recently used to provide security in peer-to-peer network, which is similar to IoT technology. This chapter explains the various applications of IoT fol lowed by the security and privacy issues. It discusses the challenges involved in securing IoT followed by an introduction to blockchain technology along with various advantages of blockchain for IoT. It also discusses the application domains of blockchain technology in IoT, classification of threat models that are considered by blockchain protocols for IoT networks, and a comparison of state-of-the-art secure models with respect to blockchain. At the end, the chapter highlights the open challenges and further research directions in blockchain technology for IoT. © 2020 Scrivener Publishing LLC.Item Impact of internet of things in smart cities(Institution of Engineering and Technology, 2020) Rudra, B.A smart city uses various technologies to make the lives more easy and simple fulfilling the demands of the increasing population. Internet of Things (IoT) plays a major role in making the city smart. It takes the required input and helps to make the things associated with it smart. Some of the smart operations include water and energy management which is becoming scarce. The system can be deployed in the cities to make things work and save future resources. A smart city can be empowered to increase the quality of life of the people and improve the environment to sustain for a long time. Implementing a smart city with IoT and connected technology helps enhance the quality, performance and interactivity of urban services, optimize resources and reduce costs. The chapter briefly discusses what is the role of IoT in smart cities describing the basics of what is IoT and what comprises a smart city followed by smart city segments. Benefits of IoT and their impact on the smart city along with the national and international case studies. At the end of the chapter, some of the challenges associated with the IoT with respect to smart cities. © The Institution of Engineering and Technology 2020.Item Futuristic AI convergence of megatrends: IoT and cloud computing(wiley, 2022) Pandey, C.; Sahu, Y.K.; Kannan, N.; Rashid Mahmood, M.R.; Sethy, P.K.; Behera, S.K.Recent years have seen increasing curiosity among users in migrating their cloud computing and internet-of-things apps. Cloud-based and internet-of-things infra-structures require specialized hardware to enable software and advanced manage-ment strategies to improve performance. Adaptability and autonomous learning capabilities are highly valuable in facilitating the configuration and complex transition of these infrastructures to customers' changing demands and designing adaptable applications. This capacity to self-adapt is increasingly essential, particularly for nonexpert managers and autonomous device applications. Cloud Networking (CN) and the Internet of Things (IoT) have arisen as modern outlets for the ICT movement of the 21st century. In this paper, we carry out a survey of nearly 183 articles on which the latest methodologies have been applied. Also, we discuss the proposed approaches and the reported advantages and limitations. The goal of this survey paper is to offer a brief idea to researchers working in this area. In order to consider the present and future challenges of such a framework, it is important to recognize critical innovations that will allow future implementa-tions. This article examines how three new paradigms (cloud computing, IoT, and artificial intelligence) can affect workspace and business. Also, we describe a range of innovations that propel these paradigms and encourage experts to address the current state and perspective directions. © 2023 Scrivener Publishing LLC.Item Operating systems for IoT devices: A critical survey(Institute of Electrical and Electronics Engineers Inc., 2015) Gaur, P.; Tahiliani, M.P.The future of communication resides in Internet of Things, which is certainly the most sought after technology today. The applications of IoT are diverse, and range from ordinary voice recognition to critical space programmes. Recently, a lot of efforts have been made to design operating systems for IoT devices because neither traditional Windows/Unix, nor the existing Real Time Operating Systems are able to meet the demands of heterogeneous IoT applications. This paper presents a survey of operating systems that have been designed so far for IoT devices and also outlines a generic framework that brings out the essential features desired in an OS tailored for IoT devices. © 2015 IEEE.Item Efficient key management in IoT using mobile aggregator(Springer Verlag service@springer.de, 2016) Saurabh, S.; Pais, A.R.; Chatterjee, S.Managing keys in Internet of Things (IoT) is challenging. With this proposed work we are trying to address an efficient key management protocol for specific application based scenario which enforces secure connectivity of devices and minimizes node capture attacks. There are a number of protocols that have been enforced and implemented for wireless sensor networks (WSN) and internet-enabled devices. We propose a protocol with mobility interface using combinatorial designs for key management in IoT devices. Mobile devices follow a dedicated path to collect data securely from installed devices in the network. We also compare our work with existing protocols and few mobility models. © Springer Nature Singapore Pte Ltd. 2016.Item Survey on Optimization in IoT(Institute of Electrical and Electronics Engineers Inc., 2018) Chenna Keshava, B.S.; Srinivasan, C.K.This paper gives a brief overview of the existing literature on Optimization in Internet of Things (IoT), which is a very critical technology in the 21stcentury. A few of the papers deal with the evolution of IoT as a technology in the past 20 years, whereas a majority of the papers deal with the challenges faced in the communication, modelling and deployment of IoT applications, few of which use optimization and which are exploding in their numbers and the diversity of the type of devices. © 2018 IEEE.Item Resource Provisioning Framework for IoT Applications in Fog Computing Environment(IEEE Computer Society help@computer.org, 2018) Rakshith, G.; Rahul, M.V.; Sanjay, G.S.; Natesha, B.V.; Guddeti, R.M.The increasing utility of ubiquitous computing and dramatic shifts in the domain of Internet of Things (IoT) have generated the need to devise methods to enable the efficient storage and retrieval of data. Fog computing is the de facto paradigm most suitable to make efficient use of the edge devices and thus shifting the impetus from a centralized cloud environment to a decentralized computing paradigm. By utilizing fog resources near to the edge of the network, we can reduce the latency and the overheads involved in the processing of the data by deploying the required services on them. In this paper, we present resource provisioning framework which provisions the resources and also manages the registered services in a dynamic topology of the fog architecture. The results demonstrate that using fog computing for deploying services reduces the total service time. © 2018 IEEE.Item GA-PSO: Service Allocation in Fog Computing Environment Using Hybrid Bio-Inspired Algorithm(Institute of Electrical and Electronics Engineers Inc., 2019) Yadav, V.; Natesha, B.V.; Guddeti, R.M.R.Internet of Thing (IoT) applications require an efficient platform for processing big data. Different computing techniques such as Cloud, Edge, and Fog are used for processing big data. The main challenge in the fog computing environment is to minimize both energy consumption and makespan for services. The service allocation techniques on a set of virtual machines (VMs) is the decidable factor for energy consumption and latency in fog servers. Hence, the service allocation in fog environment is referred to as NP-hard problem. In this work, we developed a hybrid algorithm using Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) technique to solve this NP-hard problem. The proposed GA-PSO is used for optimal allocation of services while minimizing the total makespan, energy consumption for IoT applications in the fog computing environment. We implemented the proposed GA-PSO using customized C simulator, and the results demonstrate that the proposed GA-PSO outperforms both GA and PSO techniques when applied individually. © 2019 IEEE.Item Security issues and challenges in Healthcare Automated Devices(Institute of Electrical and Electronics Engineers Inc., 2020) Jangid, A.; Dubey, P.K.; Chandavarkar, B.R.Automated devices can be seen everywhere be at home, office, medical devices, Mobiles, etc. This paper presents some of the healthcare-related automated devices with their shortcomings related to security. We are addicted to automated devices and in near future, we will be watching new emergence of devices with the increasing power of automation devices and their security is a big concern as the credibility of a machine is questionable and it's related to automated devices and we are left with many challenges to resolve those security threats. This paper reviews the automation devices primarily in the healthcare field and their security-related issues along with the challenges that we might face in the future while using them. Some already available solutions are presented to try to come up with possible new solutions. © 2020 IEEE.Item Hardcoded Credentials and Insecure Data Transfer in IoT: National and International Status(Institute of Electrical and Electronics Engineers Inc., 2020) Chandavarkar, B.R.Internet of Things (IoT) or Internet of Objects (IoO) is one of the emerging areas of accessing any device or object over the internet anytime, anywhere. The limited power, memory, and processing capabilities of these tiny devices result in many of the challenging issues such as connectivity, performance and scaling, mobility, interoperability/standards, security, and privacy. The essential requirement in the successful deployment of IoT is either a new way of addressing the issue or the lightweight solution of the existing approaches. This paper majorly focuses on the security aspects of IoT. Specifically, hardcoded or weak guessable credentials and insecure data transfer related security issues in IoT. Further, the national and international status of these two security issues followed by the mitigation approaches. Finally, the importance of the paper in the context of the current status of the Indian IoT market. © 2020 IEEE.
