This document proposes an Internet of Things (IoT)-based system for healthcare and an authentication scheme to secure it. It first reviews existing literature on IoT and healthcare systems. It then presents the architecture of the proposed system, which has perception, network and application layers. Devices in the perception layer would collect health data from patients. The network layer would communicate this data to cloud servers via gateways. The application layer would manage devices, analyze data and share it with applications. The document proposes authenticating healthcare devices during access of patient data. It aims to enhance security in IoT-based healthcare through device authentication.
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
Internet of Things (IoT) basically discusses about the connection of various physical devices through a network
and let them take an active part by exchanging information through Internet. This paper presents important applications of IoT and the different challenges of IoT. Out of the various challenges, attacks on the devices used in IoT are of serious concern. Device oriented attacks and the defensive mechanisms are studied in this paper. A comparison is done for the specific malicious attacks on the M2M communicating devices.
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IJNSA Journal
Smart cities are expected to significantly improve people's quality of life, promote sustainable development, and enhance the efficiency of operations. With the implementation of many smart devices, c problems have become a serious challenge that needs strong treatments, especially the cyber-attack, which most countries suffer from it.
My study focuses on the security of smart city systems, which include equipment like air conditioning, alarm systems, lighting, and doors. Some of the difficulties that arise daily may be found in the garage. This research aims to come up with a simulation of smart devices that can be and reduce cyber attach. Use of Cisco Packet tracer Features Simulated smart home and c devices are monitored. Simulation results show that smart objects can be connected to the home portal and objects can be successfullymonitored which leads to the idea of real-life implementation and see. In my research make manysolutions for attachingissues,which was great, and apply some wirelessprotocol.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
In recent times and as far as technological advancement goes, the Internet of
Things is the trending topic in the world. Internet of Things popularly called IoT is the
internetworking of interconnected devices over the internet to enable interaction
between those devices without any human interference. Cisco predicts at least 50
billion of such devices to be available by the year 2020. This leaves a huge gap as to
the appropriate awareness and literacy of the world as a collective to be receptive of
the massive IoT technology overhaul coming in the nearest future. This paper gives a
little insight into the basics of IoT, its core fundamentals, its architecture and
furthermore contributes to knowledge the application of IoT to the education sector.
Considering the number of connected devices expected to be produced, it is expected
also that sufficient amount of personnel are trained in IoT systems adequately to meet
with the rising demand
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSIJCNCJournal
Internet of things (IoT) is the integration of computer-based systems and the physical world in which things
interact with each other. Due to heterogeneity and resource-constrained feature of IoT devices, there are
many privacy and security challenges resulting in many threat vulnerabilities in IoT environments. After
reviewing and analyzing the recent IoT security, privacy, and authentication protocols, we will withdraw
research gaps focused on the elimination of human factors in IoT authentication. In order to fill these
research gaps, this paper proposes a privacy-preserving machine authenticated key agreement based on
IoT, denoted as IoTMAKA. IoTMAKA uses dynamic identity and machine fingerprint to provide security and
privacy. Security analysis shows that IoTMAKA provides anonymity and untraceability, provides freshness,
and is secure against passive and active attacks. IoTMAKA reduces communication overheads by 20% and
computational overheads by 25% on average as compared to the previous related works.
Wearables are small electronic devices, often comprising one or more sensors and having computational capability. Devices such as wrist watches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransomed collection and other illegal activities necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals. Dr. E. J. Thomson Fedrik | A. Vinitha | B. Vanitha ""Review on Vulnerabilities of IoT Security"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24020.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/24020/review-on-vulnerabilities-of-iot-security/dr-e-j-thomson-fedrik
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
IoT (Internet of Things) expands the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level.IoT today has a wide scope and researches say that IoT will definitely be a huge reason in the change of human lifestyle. But irrespective of the scope of IoT, we cannot be sure enough to implement it due to the security concerns. There is a genuine need to secure IoT, which has therefore resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper discusses about the flaws in the security structure of IoT, it is a study about the various layers of IoT and how differentattacks are possible in those layers.
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
In recent years, internet of things (IoT) represents a giant and a promoter area in innovation and engineering fields. IoT devices are spread in various fields and offer advanced services which assist their users to monitor and control objects remotely. IoT has a set of special characteristics such as dynamic, variety of data and huge scale which introduces a great challenge in the field of retrieval technologies, more precisely real-time retrieval. This paper addresses the issue of real-time retrieval of connected things and tries to propose an innovative solution which allows the retrieval of these things and their descriptive data. The paper proposes an on-line tool for real-time retrieval of connected things and their descriptive data based on network port scanning technique. The performance of this tool proves to be powerful under normal conditions, however more tests must be implemented in the aim to improve the proposed solution. The tool resulted from this work appears to be promising and can be used as a reference by network administrators and IT security managers for the development of new security mechanisms and security reinforcement.
DEDA: An algorithm for early detection of topology attacks in the internet of...IJECEIAES
The internet of things (IoT) is used in domestic, industrial as well as mission-critical systems including homes, transports, power plants, industrial manufacturing and health-care applications. Security of data generated by such systems and IoT systems itself is very critical in such applications. Early detection of any attack targeting IoT system is necessary to minimize the damage. This paper reviews security attack detection methods for IoT Infrastructure presented in the state-of-the-art. One of the major entry points for attacks in IoT system is topology exploitation. This paper proposes a distributed algorithm for early detection of such attacks with the help of predictive descriptor tables. This paper also presents feature selection from topology control packet fields. The performance of the proposed algorithm is evaluated using an extensive simulation carried out in OMNeT++. Performance parameter includes accuracy and time required for detection. Simulation results presented in this paper show that the proposed algorithm is effective in detecting attacks ahead in time.
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
INTERNET OF THINGS: A STUDY ON SECURITY AND PRIVACY THREATS
Md Husamuddin
Dept. of computer science
College of CS and IT, Al-Baha University
Al-Baha, Kingdom of Saudi Arabia
Dr. [email protected]
ABSTRACT
The current world is driven by new, developing technologies. This has resulted in a variety of smart devices in the society that has impacted positively on the lives of people in the community. However, the organization has been experiencing threats and cyberattacks that mostly targets the private information. Therefore, in this paper, my discussion is centered on the different applications of the internet of things as well as security threats that are involved.
Keywords: security, privacy.
INTRODUCTION
The Internet of things is the most significant of the future of the internet. IoT has a global network through which ant object can connect with the other devices that are also linked on the internet. These devices include computers, tabs, cell phones, among many others. Generally, the internet of things is a system made up of connected things. This machine contains a microchip that connects all the methods related to it. Microchips serve the function of tracking the surrounding of the network and to give the report in case of any findings pertaining to the internet. The meaning of PC wrongdoing and cloud wrongdoing will be come to out to the IoT wrongdoing, which talks to any malignant development that incorporates the IoT worldview as within the IoT contraptions, organizations, or correspondence channels can be a subject, thing, or gadget recognized with the infringement. To investigate these sorts of cases, it is required to execute computerized crime scene examination technique within the IoT to choose the substances around an event. The meaning of a capable and adjust IoT progressed lawful sciences method is still at its unimaginable intrigued (Husamuddin, 2015). The most significant part of IoT is that it makes it possible for different entities to be communicated and to be accessed via the internet. This is very economical as a result, attracts many devices to be connected to the internet (Balte &Patil,2015). Research shows that more than 40 billion devices in 2019 got connected, and a higher risk of this is expected in the current year.
SECURITY REQUIREMENTS
The rate at which technologies are emerging is so high, and this has lead to threats as well as a privacy issue. The smart devices arising from this technology will interact with other devices and transmit information in the network (Balte, &Patil,2015). If a computer gets infected, the effects ripples to other devices in the system; thus, the whole internet infrastructure would be at risk. As soon as an attack spot has been identified, it is feasible to enumerate the safety vulnerabilities and risk prone regions requiring defense-in-intensity protection. Such safety refers to a typically used approach to protect important data on company networks wherein security controls ...
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
Internet of Things (IoT) basically discusses about the connection of various physical devices through a network
and let them take an active part by exchanging information through Internet. This paper presents important applications of IoT and the different challenges of IoT. Out of the various challenges, attacks on the devices used in IoT are of serious concern. Device oriented attacks and the defensive mechanisms are studied in this paper. A comparison is done for the specific malicious attacks on the M2M communicating devices.
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IJNSA Journal
Smart cities are expected to significantly improve people's quality of life, promote sustainable development, and enhance the efficiency of operations. With the implementation of many smart devices, c problems have become a serious challenge that needs strong treatments, especially the cyber-attack, which most countries suffer from it.
My study focuses on the security of smart city systems, which include equipment like air conditioning, alarm systems, lighting, and doors. Some of the difficulties that arise daily may be found in the garage. This research aims to come up with a simulation of smart devices that can be and reduce cyber attach. Use of Cisco Packet tracer Features Simulated smart home and c devices are monitored. Simulation results show that smart objects can be connected to the home portal and objects can be successfullymonitored which leads to the idea of real-life implementation and see. In my research make manysolutions for attachingissues,which was great, and apply some wirelessprotocol.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
In recent times and as far as technological advancement goes, the Internet of
Things is the trending topic in the world. Internet of Things popularly called IoT is the
internetworking of interconnected devices over the internet to enable interaction
between those devices without any human interference. Cisco predicts at least 50
billion of such devices to be available by the year 2020. This leaves a huge gap as to
the appropriate awareness and literacy of the world as a collective to be receptive of
the massive IoT technology overhaul coming in the nearest future. This paper gives a
little insight into the basics of IoT, its core fundamentals, its architecture and
furthermore contributes to knowledge the application of IoT to the education sector.
Considering the number of connected devices expected to be produced, it is expected
also that sufficient amount of personnel are trained in IoT systems adequately to meet
with the rising demand
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSIJCNCJournal
Internet of things (IoT) is the integration of computer-based systems and the physical world in which things
interact with each other. Due to heterogeneity and resource-constrained feature of IoT devices, there are
many privacy and security challenges resulting in many threat vulnerabilities in IoT environments. After
reviewing and analyzing the recent IoT security, privacy, and authentication protocols, we will withdraw
research gaps focused on the elimination of human factors in IoT authentication. In order to fill these
research gaps, this paper proposes a privacy-preserving machine authenticated key agreement based on
IoT, denoted as IoTMAKA. IoTMAKA uses dynamic identity and machine fingerprint to provide security and
privacy. Security analysis shows that IoTMAKA provides anonymity and untraceability, provides freshness,
and is secure against passive and active attacks. IoTMAKA reduces communication overheads by 20% and
computational overheads by 25% on average as compared to the previous related works.
Wearables are small electronic devices, often comprising one or more sensors and having computational capability. Devices such as wrist watches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransomed collection and other illegal activities necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals. Dr. E. J. Thomson Fedrik | A. Vinitha | B. Vanitha ""Review on Vulnerabilities of IoT Security"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24020.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/24020/review-on-vulnerabilities-of-iot-security/dr-e-j-thomson-fedrik
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
IoT (Internet of Things) expands the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level.IoT today has a wide scope and researches say that IoT will definitely be a huge reason in the change of human lifestyle. But irrespective of the scope of IoT, we cannot be sure enough to implement it due to the security concerns. There is a genuine need to secure IoT, which has therefore resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper discusses about the flaws in the security structure of IoT, it is a study about the various layers of IoT and how differentattacks are possible in those layers.
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
In recent years, internet of things (IoT) represents a giant and a promoter area in innovation and engineering fields. IoT devices are spread in various fields and offer advanced services which assist their users to monitor and control objects remotely. IoT has a set of special characteristics such as dynamic, variety of data and huge scale which introduces a great challenge in the field of retrieval technologies, more precisely real-time retrieval. This paper addresses the issue of real-time retrieval of connected things and tries to propose an innovative solution which allows the retrieval of these things and their descriptive data. The paper proposes an on-line tool for real-time retrieval of connected things and their descriptive data based on network port scanning technique. The performance of this tool proves to be powerful under normal conditions, however more tests must be implemented in the aim to improve the proposed solution. The tool resulted from this work appears to be promising and can be used as a reference by network administrators and IT security managers for the development of new security mechanisms and security reinforcement.
DEDA: An algorithm for early detection of topology attacks in the internet of...IJECEIAES
The internet of things (IoT) is used in domestic, industrial as well as mission-critical systems including homes, transports, power plants, industrial manufacturing and health-care applications. Security of data generated by such systems and IoT systems itself is very critical in such applications. Early detection of any attack targeting IoT system is necessary to minimize the damage. This paper reviews security attack detection methods for IoT Infrastructure presented in the state-of-the-art. One of the major entry points for attacks in IoT system is topology exploitation. This paper proposes a distributed algorithm for early detection of such attacks with the help of predictive descriptor tables. This paper also presents feature selection from topology control packet fields. The performance of the proposed algorithm is evaluated using an extensive simulation carried out in OMNeT++. Performance parameter includes accuracy and time required for detection. Simulation results presented in this paper show that the proposed algorithm is effective in detecting attacks ahead in time.
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
INTERNET OF THINGS: A STUDY ON SECURITY AND PRIVACY THREATS
Md Husamuddin
Dept. of computer science
College of CS and IT, Al-Baha University
Al-Baha, Kingdom of Saudi Arabia
Dr. [email protected]
ABSTRACT
The current world is driven by new, developing technologies. This has resulted in a variety of smart devices in the society that has impacted positively on the lives of people in the community. However, the organization has been experiencing threats and cyberattacks that mostly targets the private information. Therefore, in this paper, my discussion is centered on the different applications of the internet of things as well as security threats that are involved.
Keywords: security, privacy.
INTRODUCTION
The Internet of things is the most significant of the future of the internet. IoT has a global network through which ant object can connect with the other devices that are also linked on the internet. These devices include computers, tabs, cell phones, among many others. Generally, the internet of things is a system made up of connected things. This machine contains a microchip that connects all the methods related to it. Microchips serve the function of tracking the surrounding of the network and to give the report in case of any findings pertaining to the internet. The meaning of PC wrongdoing and cloud wrongdoing will be come to out to the IoT wrongdoing, which talks to any malignant development that incorporates the IoT worldview as within the IoT contraptions, organizations, or correspondence channels can be a subject, thing, or gadget recognized with the infringement. To investigate these sorts of cases, it is required to execute computerized crime scene examination technique within the IoT to choose the substances around an event. The meaning of a capable and adjust IoT progressed lawful sciences method is still at its unimaginable intrigued (Husamuddin, 2015). The most significant part of IoT is that it makes it possible for different entities to be communicated and to be accessed via the internet. This is very economical as a result, attracts many devices to be connected to the internet (Balte &Patil,2015). Research shows that more than 40 billion devices in 2019 got connected, and a higher risk of this is expected in the current year.
SECURITY REQUIREMENTS
The rate at which technologies are emerging is so high, and this has lead to threats as well as a privacy issue. The smart devices arising from this technology will interact with other devices and transmit information in the network (Balte, &Patil,2015). If a computer gets infected, the effects ripples to other devices in the system; thus, the whole internet infrastructure would be at risk. As soon as an attack spot has been identified, it is feasible to enumerate the safety vulnerabilities and risk prone regions requiring defense-in-intensity protection. Such safety refers to a typically used approach to protect important data on company networks wherein security controls ...
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...ijtsrd
The Internet of Things IoT is a rapidly gaining in popularity technology that allows actual objects, such as cars, appliances, and other household items, to interact and even speak with one another. It has been extensively employed in social applications, such as smart homes, healthcare, and industrial automation, as well as in industrial production. While delivering previously unheard of ease, accessibility, and efficiency, IoT has recently generated serious security and privacy issues. Although more research is being done to lessen these hazards, many issues are still unresolved.This survey first suggests the idea of IoT characteristics in order to better comprehend the fundamental causes of future IoT dangers and the difficulties in present research. The effects of eight IoT features on security and privacy are then covered, along with the vulnerabilities they pose, current countermeasures, and unresolved research issues. This study examines the majority of current research works connected to IoT security from 2013 to 2017 in order to demonstrate how IoT features affect existing security research and to help academics keep up with the most recent developments in this field. Dr. Vishal Pareek | Mr. Ram Kumar Vyas "New Threats, Existing Remedies, and Unresolved Issues Related to the Effect of New IoT Capabilities on Security and Privacy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-1 , February 2023, URL: https://www.ijtsrd.com/papers/ijtsrd52754.pdf Paper URL: https://www.ijtsrd.com/computer-science/other/52754/new-threats-existing-remedies-and-unresolved-issues-related-to-the-effect-of-new-iot-capabilities-on-security-and-privacy/dr-vishal-pareek
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
Internet of Things (IoT) is an innovative paradigm
envisioned to provide massive applications that are now part of
our daily lives. Millions of smart devices are deployed within
complex networks to provide vibrant functionalities including
communications, monitoring, and controlling of critical infrastructures. However, this massive growth of IoT devices and the corresponding huge data traffic generated at the edge of the network created additional burdens on the state-of-the-art
centralized cloud computing paradigm due to the bandwidth and
resources scarcity. Hence, edge computing (EC) is emerging as
an innovative strategy that brings data processing and storage
near to the end users, leading to what is called EC-assisted IoT.
Although this paradigm provides unique features and enhanced
quality of service (QoS), it also introduces huge risks in data security and privacy aspects. This paper conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT. In particular, we first present an overview of EC-assisted IoT including definitions, applications, architecture, advantages, and challenges. Second, we define security and privacy in the context of EC-assisted IoT. Then, we extensively discuss the major classifications of attacks in EC-assisted IoT and provide possible solutions and countermeasures along with the related research efforts. After that, we further classify some security and privacy issues as discussed in the literature based on security services and based on security objectives and functions. Finally, several open challenges and future research directions for secure EC-assisted IoT paradigm are also extensively provided.
Novel authentication framework for securing communication in internet-of-things IJECEIAES
Internet-of-Things (IoT) offers a big boon towards a massive network of connected devices and is considered to offer coverage to an exponential number of the smart appliance in the very near future. Owing to the nascent stage of evolution of IoT, it is shrouded by security loopholes because of various reasons. Review of existing research-based solution highlights the usage of conventional cryptographic-based solution over the traditional mechanism of data forwarding process between IoT nodes and gateway. The proposed system presents a novel solution to this problem by a model that is capable of performing a highly secured and cost-effective authentication process. The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats. The outcome of the model shows better security strength with faster response time and energy saving of the IoT nodes.
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.
The Internet of things IoT is a relatively new concept. It presents numerous benefits to consumers and proves a financial boon for businesses. Pervasive introduction of sensors and devices into currently intimate spaces, such as homes, cars, and wearables, poses some challenges. There are also challenges in deploying IoT by government agencies and private industries. This paper attempts to address these challenges and offers solutions. Matthew N. O. Sadiku | Adedamola Omotoso | Shuza Binzaid | Sarhan M. Musa "Internet of Things: Challenges and Solutions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29302.pdf Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/29302/internet-of-things-challenges-and-solutions/matthew-n-o-sadiku
The Internet of Things (IoT) brings tremendous new capabilities .docxjmindy
The Internet of Things (IoT) brings tremendous new capabilities to the net -- but it also brings many new security issues. Watch the following video on securing the Internet of Things:
https://www.youtube.com/watch?v=rZ6xoAtdF3o
Discuss the challenges of securing the IoT. Then, list five or more best practices you would recommend.
Make sure you respond to at least two other learners.
Response#1(Leburu)
Internet of Things (IoT):
The digital space has undergone major changes over the past two years and will continue to evolve, according to industry experts. The last entry in digital space is the Internet of Things (IoT). IoT can also be defined as an interaction between the software, telecommunications and electronic devices industries and promises to offer enormous opportunities for many sectors. With the advent of the Internet of Things (IoT), powered by sensors that will soon be available for billions of dollars, that will work with billions of intelligent systems and cover millions of applications, the Internet of Things will ignite a spark. Launch new consumer and business behaviors requiring increasingly intelligent industrial solutions, which in turn create billions of dollars of opportunities for the IT industry and even more for companies that benefit from the Internet of Things. (Shackelford, S. 2020).
The Internet of Things has three distinct parts: Sensors that collect data (including sensor / device identifier and address), Decision-making and data transfer to decision servers, An application that collects and analyzes this data for greater integration.
Big data analytics and mechanisms can be used to make decisions. Several countries, such as the United States, South Korea and China, have taken the will to exploit the Internet. The main players in IoT initiatives are citizens, governments, and industry. Participation and cooperation of all interested parties at an appropriate time. At this point, we require instructions to link and select key areas, then emphasize the answers to the accumulation, The Internet of Things needs to have a clear strategy and follow a simple goal with the Value-Added and Reduce-cost models. With industry associations, experience in global forums, knowledge of other major IoT countries, and the active participation of global partners, we can promote an approach. More creative based on innovation. The key to the success of the Internet lies in the development of open platforms for scalable, easy-to-use and inexpensive models and citizens, such as sensors. Data should be clearly collected and shared between functions to maximize benefits.
Lack Of Compliance On The Part Of IoT Manufacturers:
New IoT devices come out almost daily, all with undiscovered vulnerabilities. The primary source of most IoT security issues is that manufacturers do not spend enough time and resources on security.
For example, most fitness trackers with Bluetooth remain visible after the first pairing, a smart ref.
Using Machine Learning to Build a Classification Model for IoT Networks to De...IJCNCJournal
Internet of things (IoT) has led to several security threats and challenges within society. Regardless of the benefits that it has brought with it to the society, IoT could compromise the security and privacy of individuals and companies at various levels. Denial of Service (DoS) and Distributed DoS (DDoS) attacks, among others, are the most common attack types that face the IoT networks. To counter such attacks, companies should implement an efficient classification/detection model, which is not an easy task. This paper proposes a classification model to examine the effectiveness of several machine-learning algorithms, namely, Random Forest (RF), k-Nearest Neighbors (KNN), and Naïve Bayes. The machine learning algorithms are used to detect attacks on the UNSW-NB15 benchmark dataset. The UNSW-NB15 contains normal network traffic and malicious traffic instants. The experimental results reveal that RF and KNN classifiers give the best performance with an accuracy of 100% (without noise injection) and 99% (with 10% noise filtering), while the Naïve Bayes classifier gives the worst performance with an accuracy of 95.35% and 82.77 without noise and with 10% noise, respectively. Other evaluation matrices, such as precision and recall, also show the effectiveness of RF and KNN classifiers over Naïve Bayes.
A signature-based data security and authentication framework for internet of...IJECEIAES
Internet of things (IoT) is the next big revolution in modernized network technologies connecting a massive number of heterogeneous smart appliances and physical objects. Owing to these technologies' novelty, various issues are characterized by security concerns are the most prioritized issue. A review of existing security approaches highlights that they are very particular about the solution towards a specific attack and cannot resist any unknown attacker. Therefore, this manuscript presents a novel computational model that introduces a unique authentication process using a simplified encryption strategy. The simulated study outcome shows that the proposed system offers efficient security and efficient data transmission performance in the presence of an unknown adversary. Hence, the study outcome exhibits better effects than frequently used security solutions when implemented in a vulnerable IoT environment.
Similar to Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data
1. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3283-3289 (2017) ISSN: 0975-0290
3283
Secure Modern Healthcare System Based on
Internet of Things and Secret Sharing of IoT
Healthcare Data
Aaditya Jain
M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical
University, Kota, Rajasthan, India
Email: aadityajain58@gmail.com
Bhupendra Kumar Soni
Associate Professor, Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical
University, Kota, Rajasthan, India
Email: bhupensoni1977@gmail.com
----------------------------------------------------------------------ABSTRACT------------------------------------------------------------
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and
negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors
keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities,
smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and
networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed
healthcare system is also present.
Keywords - Internet of things, Smart Healthcare System, Secure authentication, IOT Architecture.
---------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: April 24, 2017 Date of Acceptance: May 04, 2017
---------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
The term, Internet of Things (IoT) is coined by the
British technology pioneer, Kevin Ashton in 1999. It is the
emerging technology today. IoT will involve and do
wonders in many areas such as assisted-living, healthcare,
enhanced learning, computerization and engineering,
logistics, process administration and smart conveyance.
US National Intelligence Council named “Internet of
Things” as the “Disruptive Civil Technologies” in its
report [1]. A UN Report predicts a new age of ubiquity
where people become the minority as producers and
receivers of traffic and changes carried by the Internet [2].
This new scenario enables the connectivity from anywhere
and anytime with any communication device. It is highly
influential on several aspects of everyday-life. Though,
many researches are going on in this field it is still in
infancy and has many issues and challenges to be
resolved. Apart from heterogeneity, scalability,
connectivity and lot many other issues, security issues
prove to be major contributors in impinging the
development IoT and have to be dealt with effectively to
make IoT a fruitful reality. One such prominent security
issue is authentication of devices participating in IoT
among other security issues such confidentiality, integrity
etc. which is the main focus of this paper.
Rest of the paper is organized as follows. Section II a
briefs on the necessary background on Internet of Things.
Section III presents some of the authentication schemes
available in the literature. The proposed IOT based
architecture of smart healthcare system and its workflow
are describe in Section IV and V. Section VI and VII
presents idea behind proposed authentication scheme and
its scope in IOT base smart healthcare environment. Paper
concludes in Section VIII.
II. BACKGROUND
Research in Mobile Computing (MC), Pervasive
Computing (PC) and Wireless Sensor Networks (WSN),
Mobile ad-hoc Network (MANET) are in full swing for
more than a decade. Internet of Things which is a
combination of these has emerged recently and has gained
much popularity. Gartner defines Internet of Things as the
network of physical objects with embedded technology,
capable of communicating and sensing or interacting with
their internal states or the external environment [3] [4].
With IoT, smart objects or people can interrelate and
interconnect among themselves with the environment. An
IoT environment comprising various devices is depicted in
Fig. 1.
It is stated by Cisco that the number of devices connected
to the Internet will overtake the human total population
and there will be nearly 50 billion devices connected to the
internet by 2020 [19]. As more and more gadgets emerge,
these tend to participate in an IoT environment which in
turn leads to the generation and exchange of enormous
amount of data. Hence, provisioning security in an IoT
environment is more complex than imagined. To
guarantee security in IoT, properties such as
confidentiality, integrity, authentication, privacy,
authorization and availability must be assured. On one
hand ensuring ample security to the data is a herculean
2. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3283-3289 (2017) ISSN: 0975-0290
3284
task in such a scenario while on the other hand the source
of data themselves need to be authenticated for the user of
the data to rely on the data for further action.
Fig. 1 Basic IOT environment
Cryptographic mechanisms can be used as a healthy way
of safeguarding communication over the Internet of
Things mainly for embedded systems, where security
burdens are rising these mechanisms can be used to defend
against counterfeiting, firmware tampering and illegal
access. However, source authentication is the process of
recognizing users, computers, devices and machines in the
IoT environment and this actually rely on usernames and
passwords. To be secure enough, the username password
scheme requires frequent changing and do not work with
unattended devices in IoT.
Authentication of IoT devices in a healthcare domain is all
the more important, as the data source must be trustworthy
to provide proper treatment to the patient. Hence, in this
paper we propose a novel device authentication technique
based on device registration.
III. LITERATURE SEARCH
Eleonora Borgia offered vital features, the driving
technologies of IoT, focused on the research problems and
open disputes of it [3]. The author drew an image of the
IoT paradigm, and the recent IoT research
accomplishments. The author has highlighted the
contributions of recent research. Moreover, the author
emphasized the standardization activities to avoid
excessive fragmentation and discussed the key tactical
business priorities providing an overview of the key
sectors.
Andrew et al. presented the researches in IoT, categorized
current trends and the challenges of IoT diffusion [6].
They also listed IoT open research questions and future
directions to support scholars. They grouped the IoT
challenges based on technology, application and business
models. Hardware, software and architecture oriented
issues were also highlighted.
S. Madakam et al., presented a review of Internet of
Things by analyzing various white papers and online
databases [7]. They outlined the IoT overview,
architecture and technology used in it. John Pescatore
presented security concerns of IoT in the SANS analyst
report [8]. This report emphasized on securing IoT, which
would increase the visibility for common customer. The
author pointed out that Internet of Things too, have same
kind of security issues like other technologies.
Jorge Granjal et al. studied the protocols and mechanisms
to defend communications in IoT [9]. They examined the
already available approaches for security and outlined new
trials and 2policies for future. Communication protocols
according to the architecture of IoT such as 6LoWPAN,
ROLL, CoAP and IEEE 802.15.4 were listed and their
main characteristics were explained.
J. Sathish Kumar et al. introduced IoT as a unified system
[10]. The authors raised their concern over individual
privacy and access of personal information related to
devices. They summarized the security threats based on
Front-end Sensors and Equipment, network and Back-end
of it systems. Privacy in the device, in storage during
communication and at processing of IoT data and user
were addressed.
Md. Mahmud Hossain et al. articulated their concern over
on the security problems [11]. They pointed out that
though there is extensive distribution of IoT devices, there
are still many open problems in the IoT environment.
They explained the components of the IoT network and
conducted a deep analysis of the security issues based on
hardware, software and network. Factors that were
required while providing security solution to the IoT
devices based on information security, access level
security and functional security were also discussed. IoT
attack surfaces, forensics, security issues, threat models,
requirements and challenges were detailed by the authors.
They also highlighted IoT security and privacy.
Qi Jing et al., published a survey on IoT security
architecture and security issues concentrated on the three
layers such as perception, transportation and application
layers [12]. Security concerns of each layer were studied
and classic solutions were proposed for them. The features
of diverse solutions and the technology involved in them
were elaborated. The security issues of IoT were compared
with traditional network security issues. The authors
expressed their concern on the unsafe situation of the IoT
environment with inadequate resources and a reduced
amount of network guards. So they insisted on the
requirement of new lightweight solutions for IoT security.
J. H. Ziegeldorf et al., worked on the privacy disputes of
IoT [13]. They studied the privacy consequences and
threats. They elaborated on the privacy issue with an IoT
reference model for precise objects and current privacy
legislation. The impact of privacy threats in seven
3. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3283-3289 (2017) ISSN: 0975-0290
3285
categories such as identification, tracking, profiling,
linkage, Interaction and presentation, lifecycle transitions
and inventory attacks were also presented by the authors.
S. L. Keoh et al., elaborated the efforts of Internet
Engineering Task Force (IETF) to regulate security
solutions for IoT [14]. In particular, they explored the
features of Standard security protocols with the
Constrained Application Protocol (CoAP) which was
specifically tailored for IoT devices and underscored the
use of Datagram Transport Layer Security (DTLS) as a
channel for security under CoAP.
Security issues and challenges were discussed by Farooq
et al. They proposed architecture with reference to
confidentiality and privacy of the user [15]. They gave
high precedence to the security of IoT and defined security
infrastructure protocols that could address the challenges
of scalability, availability and security of IoT. The authors
pointed out the research achievements in IoT security and
insisted the need for the expansion of these security
solutions to satisfy the futuristic data-hungry devices.
S. R. Moosavi et al., designed a secure mutual
authentication scheme for RFID implant system [16].
They used elliptic curve cryptography and the D-Quark
lightweight hash design in their proposed scheme. The
small key sizes and the efficiency of the elliptic curve-
based cryptosystems made them to select this algorithm
for their computations. Moreover, they claimed that the D-
Quark lightweight hash design was best suited for resource
limited pervasive devices, and was cost effective, and
offered better performance. They projected that their
authentication scheme was secure against the pertinent
threat models and offered a higher security level. They
also proved that their system gave 48% less
communication overhead and 24 % less total memory than
the previous systems.
Manoj Kumar presented RFID based authentication
schemes [17]. He discussed the security necessities of
RFID authentication structures, and offered a review of
ECC-based RFID authentication schemes based on
performance and security, mutual authentication,
confidentiality and forward security. He also stated that
the heavyweight schemes involved very complex
operations such as public-key encryption and digital
signature. But the middleweight schemes used both elliptic
curve operations and hash functions.
Ushadevi et al. proposed a new authentication scheme
based on two different approaches [18]. When an IoT
device tried to connect from the same area of the network,
the basic information of the device was collected and
stored in a database for further references. These details
were updated frequently and maintained in a DBMS which
resides in the internet. The existing user was provided
authentication using his login id and a hashing password
or with the MAC passwords. Their method was proved for
resistance against node compromise, communication
overhead, computation overhead, robustness to packet loss
and message entropy.
IV. OBJECTIVE OF THE PROPOSED WORK
Though IoT is used in all scenarios, healthcare system
gains more attention because it concerns life. In healthcare
industry IoT increases efficiency, reduces costs and lays
the focus on better patient care. As the wide intention is to
create a patient centered healthcare, IoT helps to monitor
the patient continuously both in the hospital environment
and remotely. With the intelligent system of IoT, one can
obtain an exceptional level of real-time, life-critical data.
The data accumulated and saved is analyzed by the
intelligent system to drive efficacy, maintain compliance,
and help the healthcare people to advance research,
management and care. In this scenario, authentication of
IoT devices is a core issue. As there are multitude of
devices deployed to accumulate the healthcare data of a
patient, device authentication will play a crucial role. It is
the need of the hour to propose an IoT enabled
architecture with enhanced authentication for healthcare
environment. Hence, this paper aims to suggest a new
authentication scheme for IoT based healthcare devices.
V. ARCHITECTURE OF PROPOSED IOT BASED
SMART HEALTHCARE SYSTEM
The amount and the variety of user and medical devices
connected to the IoT healthcare system is on the rise.
There is a drastic development in connecting everything in
a patient’s room including lights, air-conditioner, patient’s
bed and so on. The physical and cyber world connectivity
of the IoT enabled healthcare system are in three different
layers.
They are: (i) Perception Layer (ii) Network Layer and (iii)
Application Layer. The proposed architectural design
based on layers that are presented in Fig. 2. Each layer has
different interacting technologies, protocols, purposes and
functions. They are explained below:
5.1. Perception Layer
The devices deployed in a room of the healthcare system,
sense the physical environment and collect the real time
data. RFID tags, sensors and IPV6 are used to identify the
medical devices along with their Electronic Product Codes
(EPC). ZigBee, Bluetooth, and 3G / 4G technologies are
used for communication.
5.2. Network Layer
This layer handles the communication of collected data to
the Cloud Central Servers (CCS), Gateway Servers (GS)
and different applications. Wired or wireless are used to
access the network through gateways and addressing and
routing of the data packets are handled by the routing
protocols such as LEACH and RPL.
4. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3283-3289 (2017) ISSN: 0975-0290
3286
Fig.2 Architecture of smart healthcare system
5.3. Application Layer
The collected data are managed by this layer and
processed information is sent to the applications.
Identification and management of user devices are the
responsibilities of this layer. Moreover, collection and
filtering of the data, data analysis and communication of
derived information to application are also managed by
this layer.
5.4. Workflow of Proposed Healthcare System
The proposed IoT enabled healthcare system setup is as
follows. Every device in the proposed system is
considered as individual nodes and they are interconnected
by direct Ethernet or Wi-Fi connectivity, Near Field
Communication, Bluetooth, ZigBee or other mesh radio
networks technologies. Two types of users namely
Privileged Users and Ordinary Users can only read the
data collected by these nodes. The doctors, nurses and the
close relatives of the patients come under the first group
namely Privileged Users. The other medical information
users such as medical researchers, medical insurance
companies and the drug designers are treated as Ordinary
Users. The details of the patients‟ relatives are collected at
the time of admission of the patient to the hospital. The
necessary information related to the physical condition of
the patient is sent to them as SMS along with the details of
the doctor. All the people other than the visitors of the
patient are authenticated by the RFID tag.
Two kinds of devices are involved in the system namely
User Device (ud) and Medical Devices (md). User Device
(ud) may be a desktop, laptop, tablet or mobile phone
using which the users access the medical information of
the patient from the Medical Devices (md) in the patients‟
room which record various health parameters of the
patient and store them in the cloud storage. When a user
wishes to access the information recorded by any of the
medical device, the user has to undergo an authentication
process. The user devices as well as the medical devices
participate in the authentication process using their IP
addresses (IPudi, IPmdj) where i and j are the user device
number and medical device number respectively.
Continuous medical information and streaming data of the
patients are stored in Cloud Central Repository (CCR) and
their meta-data such as CCR details, are stored in Gateway
Server (GS). The users of the system interact with the
Gateway Server through their user devices and access the
necessary data by providing their authentication
information. Moreover, streaming data from all the
deployed devices are aggregated in a Cloud Central
Repository (CCR) for future reference. The device
authentication details are also maintained in this Cloud
Central Repository. The workflow of the proposed IoT
enabled Healthcare System is presented in following steps.
Work Flow of Proposed Smart Healthcare System
Step 1: If Room(Temp) is high then open windows of the
Room, Else if
Room(Temp) is low then Close windows of the Room
End if
Step 2: If there is anybody in the room then Switch on the
lights
Else if
No motion in the room then Switch off the lights
End if
Step 3: If It is time for taking tablets then alarm the
patient in his mobile End if
Step 4: If the injected Glucose level is low then give call
to the ward nurse, Send SMS to the Doctor
End if
Step 5: if any variation in the ECG waves then send SMS
to the Doctor and Nurse End if
Step 6: If Heart beat becomes high / low then give call to
the Doctor and ward nurse, Send SMS to the Patient
relatives
End if
Step 7: If body sugar level becomes high / low then give
call to the Doctor and ward nurse, Send SMS to the Patient
relatives End if
Step 8: If blood pressure level becomes high / low then
give call to the Doctor and ward nurse, Send SMS to the
Patient relatives End if
VI. PROPOSED AUTHENTICATION SCHEME
Since, the applications of IoT is enormous and the number
of medical and user devices connected with the worldwide
web is keeping on growing, prevention of unauthorized
access to IoT data is essential. Since sharing the medical
facts of a patient is unethical, the data collected from such
environment should be maintained securely. To enhance
the security of IoT healthcare data, the user devices which
take part in this process must be authenticated. It is
important that the identity of the user and the devices have
to be managed properly.
5. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3283-3289 (2017) ISSN: 0975-0290
3287
Hence, authentication of devices and authorization of
access to the healthcare data are key challenges in IoT
enabled healthcare system. Normally, authentication and
access authorization to IoT user devices use single
password mechanism. But such mechanisms are often
vulnerable to attacks. Even though this single password
authentication technique is easy to remember, it paves
ways for the intruders to break it. If anybody gets the
password, he / she may try to access the healthcare data of
a patient intentionally. And also one may try to re-program
the medical devices which may collapse the entire system.
Based on the literature, we propose an authentication
scheme for user devices for securing healthcare data. The
authentication process in the proposed healthcare
environment is depicted in Fig. 3. And the User Device
Authentication Procedure is also presented.
Fig.3 Authentication process in healthcare environment
User Device Authentication Process
Step 1: The user requests data from a medical device
through his user device.
Step 2: The medical device forwards the user request to
the GS.
Step 3: GS sends an authentication request to the CCR.
Step 4: CCR checks whether IPud is present.
Step 5: If IPud is not present, the user is a new user. So Go
to Registration Phase
Else CCR challenges the device by asking its EPCud and
password
Step 6: Device responds by sending its EPCud and
password
Step 7: CCR checks the EPCud corresponding to the IPud
stored in the User Device Registration Table.
Step 8: IF EPCud matches, the CCR checks the Access
Control Table for providing access to the medical device.
Step 9: If access is allowed, CCR provides a key generate
response to the GS. The GS issues the session key to the
user.
Else the CCR sends an authentication failed message to
the GS which is forwarded to the user.
VII. IMPLEMENTATION OF THE PROPOSED
AUTHENTICATION SCHEME
There are three steps in the proposed authentication
namely registration, authentication of the user device and
authorization to a user device. They come under the
umbrella of the identity management.
7.1. Registration Phase
Anybody who tries to access the IoT data has to register
their user device (ud) before accessing the data. The IPv6
address of the device is collected along with its Electronic
Product Code (EPC) in the Registration Phase. When
registering the user device, the user selects a password. It
is immediately encrypted and the encrypted password is
stored in the User Device Registration Table in the CCR
along with the password selected by the user. Step by step
procedure of the Registration Phase is explained below:
User Device Registration Phase
Step 1: CCR asks for IP address of the User Device (IPud)
Step 2: User Device responds with the IPud
Step 3: CCR asks to select a password by following
Rules_Pass_Sel()
Step 4: Pass(ud) is encrypted using encry(pass(ud)) and
saved as pass(ud1)
Step 5: CCR asks the EPC of the device
Step 6: CCR sends the IPd, EPC(ud) and Pass(ud1) to the
GS
Step 7: GS sends the IPud , Pass(ud1) and EPC(ud) to the
CCR
Step 8: CCR saves all the information for further
references.
In the above mentioned procedure in Fig. 6, two functions
are employed namely Rules_Pass_Sel() and
encry(pass(d)). The Rules_Pass_Sel() displays the rules
for selecting a password. The function encry(pass(d)) uses
the ASCII code of the password and ceaser cipher to
encrypt and encrypted user password is saved in the CCR.
Pseudocode for function Rules_Pass_Sel() is presented
below:
Function
function Rules_Pass_Sel()
{
get pass(ud)
if len(pass(ud)) < 8 then
print “Password must have at least eight characters long”
end if
for i <- 1 to len (pass(ud))
if char(pass(d)) not having any digit then
print “Password must have at least one digit” end if
if char(pass(ud)) not having special characters <., -, _>
then
print “Password must have at least one special character”
end
if len(char(pass(ud))) <5 then
6. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3283-3289 (2017) ISSN: 0975-0290
3288
print “Password must have at least five character” end
if end for
pass(ud1) <- encry(pass(ud))
store pass(ud) and pass(ud1) in the CCR
}
Sample content of the User Device Registration Table is
shown in Table 1.
Table 1 User Device Registration Table
IP Address EP Code Encrypted Password
IPud1 EPCud1 E(Pass(ud1))
IPud2 EPCud2 E(Pass(ud2))
IPud3 EPCud3 E(Pass(ud3))
.. .. ..
.. .. ..
.. .. ..
IPudn EPCudn E(Pass(udn))
7.2. Authentication Phase
The users of the IoT enabled healthcare system are the
doctors, ward nurses, patient relatives, medical insurance
companies, medical researchers and the drug designers.
They can only read the medical information available in
CCR and they are restricted from performing any
modification in the CCR. The User Access Control Matrix
is presented in Table 2. In Table 2, “1” represents “access
allowed” and “0’ represents “access denied”.
For example the row1 of Table 2 suggests that User
Device IPud1 has read access to the data recorded by
Medical Device IPmd1, IPmd2 and IPmdn and no such access
is provided to the IPmd3.
Table 2 User Access Control Matrix
IPmd1 IPmd2 IPmd3 .. .. .. IPmdn
IPud1 1 1 0 .. .. .. 1
IPud2 0 0 1 .. .. .. 0
IPud3 1 1 0 .. .. .. 0
.. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. ..
IPudn 0 1 0 .. .. .. 1
During Authentication Phase, the user requests data from
medical device through his user devices such as laptop,
PDA, Tablet, Mobile phones and Desktop etc. When any
medical device receives such request from the user
devices, it immediately forwards the user request to its
Gateway Server. The Gateway Server sends an
authentication request containing <IDud, IPud, IPmd,> to the
CCR to check whether the user can access the data
corresponding to the medical device. CCR checks whether
IPud is present in the User Device Registration Table. If
IPud is not present in the User Device Registration Table,
then the request is from a new user. So the user has to
undergo the Registration Phase by registering his IPud,
EPCud and selecting a password for his device.
If requested user is an already registered user, CCR
challenges the device by asking its EPCud and password.
While the User Device responds to this challenge, the
CCR checks the EPCud corresponding to the IPud stored in
the User Registration Table. If the CCR finds the match in
EPCud, then, it checks the Access Control Table to ensure
whether the user device (IPud) can access the data
corresponding to the medical device (IPmd).
7.3. Authorization Phase
If access is allowed, CCR provides a key generate
response to the GS. After receiving such key generate
response from the CCR, the Gateway Server responds by
issuing the session key to the user for accessing the data
corresponding to the device. If access is not allowed for
the particular medical device to this user in the Access
Control Table then, CCR sends an authentication failed
message to the GS which is in turn forwarded to the user.
Once the user device receives a session key from the GS
then it has access to the data generated by that particular
medical device till the session key expires.
VIII. CONCLUSION
In this paper, an architecture that could enhance the
authentication of devices in the IoT enabled smart
healthcare system is presented. The mechanism proposed
to authenticate each IoT device is expected to assure
secure accessibility of medical data and is deployable, and
applicable to the IoT devices. In future we can develop
this system with strong encryption scheme to provide
more security to healthcare data.
ACKNOWLEDGEMENT
I would like to express my deep sense of respect and
gratitude towards all the faculty members, Department of
Computer Science & Engineering in R. N. Modi
Engineering College Kota, and thanks to each person who
has been the guiding force behind this work. Without their
unconditional support it wouldn't have been possible.
REFERENCES
[1] National Intelligence Council, Disruptive Civil
Technologies – Six Technologies with Potential
Impacts on US Interests Out to 2025- Conference
Report CR 2008-07, April 2008, Online:
www.dni.gov/nic/NIC_home.html.
[2] Maarten Botterman, “Internet of Things: an early
reality of the Future Internet”, European Commission,
Information Society and Media Directorate, 2009.
[3] Gartner-IT-Glossary, available at:
http://www.gartner.com/itglossary/ internet-of-things/
2015.
7. Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3283-3289 (2017) ISSN: 0975-0290
3289
[4] Aaditya Jain, Bhuwnesh Sharma, Pawan Gupta,
“Internet of Things: Architecture, Security Goals and
Challenges-A Survey”, 3rd
International Conference
on Recent Trends in Engineering Science and
Management (ICRTESM), ISBN:978-81-932074-4-4,
April 2016.
[5] Eleonora Borgia, "The Internet of Things vision: Key
features, applications and open issues", Computer
Communications Vol. 54, pp.1-31, 2014.
[6] Andrew Whitmore, Anurag Agarwal, and Li Da Xu.
"The Internet of Things-A survey of topics and
trends", Information Systems Frontiers Vol. 17, Issue.
2, pp. 261-274, 2015.
[7] Somayya Madakam, R. Ramaswamy, Siddharth
Tripathi, "Internet of Things (IoT): A Literature
Review", Journal of Computer and Communications,
Vol. 3, Issue. 05, pp. 164-173, 2015.
[8] John Pescatore, and G. Shpantzer, "Securing the
Internet of Things Survey", SANS Institute, pp. 1-22,
2016.
[9] Jorge Granjal, Edmundo Monteiro, and Jorge Sa
Silva, "Security for the internet of things: a survey of
existing protocols and open research issues",
Communications Surveys & Tutorials, IEEE, Vol. 17,
Issue 3, pp. 1294-1312, 2015.
[10] J. Sathish Kumar and Dhiren R. Patel, "A survey
on Internet of Things: security and privacy issues",
International Journal of Computer Applications, Vol.
90, Issue. 11, pp. 20-26, 2016.
[11] Md Mahmud Hossain, Maziar Fotouhi, and Ragib
Hasan, "Towards an Analysis of Security Issues,
Challenges, and Open Problems in the Internet of
Things", Services, IEEE World Congress on. IEEE,
pp. 1-8, 2015.
[12] Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan,
Jingwei Lu, and Dechao Qiu, "Security of the internet
of things: Perspectives and challenges.",Wireless
Networks, Vol. 20, Issue. 8, pp. 2481-2501, 2014.
[13] Jan Henrik Ziegeldorf, Oscar García Morchon, and
Klaus Wehrle, "Privacy in the Internet of Things:
threats and challenges", Security and Communication
Networks, Vol. 7, Issue. 12, pp. 2728-2742, 2014.
[14] Sye Loong Keoh, Sahoo Subhendu Kumar, and
Hannes Tschofenig, "Securing the internet of things:
A standardization perspective", Internet of Things
Journal, IEEE, Vol. 1, N0. 3, pp. 265-275, 2014.
[15] M. U. Farooq, Muhammad Waseem, Anjum Khairi
and Sadia Mazhar "A critical analysis on the security
concerns of internet of things (IoT)", International
Journal of Computer Applications, Vol. 111, No. 7,
pp. 1-6, 2015.
[16] Sanaz Rahimi Moosavi, Ethiopia Nigussie, Seppo
Virtanen and Jouni Isoaho, “An Elliptic Curve-based
Mutual Authentication Scheme for RFID Implant
Systems”, Procedia Computer Science (Elsevier),
Vol. 32, pp. 198 – 206, 2014.
[17] Manoj Kumar S, “An Analysis of Authentication
Schemes for Internet of Things”, International
Journal of Engineering Sciences & Research
Technology, Vol. 4, Issue 6, pp. 978 – 984, 2015.
[18] G. Usha Devi, E. Vishnu Balan, M. K. Priyan and
C. Gokulnath, “Mutual Authentication Scheme for
IoT Application”, Indian Journal of Science and
Technology, Vol 8. No. 26, pp. 2-5, 2016.
[19] Dave Evans, “The Internet of Things: How the
Next Evolution of the Internet Is Changing
Everything”, CISCO White paper, pp. 1-11, 2011.
Biographies and Photographs
Aaditya Jain is currently pursuing
M.Tech in Computer Science &
Engineering from R. N. Modi
Engineering College (RMEC) Kota
which is affiliated to Rajasthan
Technical University, Kota (Raj). He
received B.E. degree in Computer
Science & Engineering from Mandsaur Institute of
Technology Mandsaur which is affiliated to Rajiv Gandhi
Proudyogiki Vishwavidyalaya, Bhopal (MP) in 2013. He
is the author of many scientific publications in
International and National Conferences and Journals. His
two papers has awarded by “Best Paper Award” in
International Conferences. His areas of interests are
Internet of Things, Next Generation Techniques, Network
Security, Cryptography, Mobile Ad Hoc Networks, and
Wireless Sensor Networks.
Mr. Bhupendra Kumar Soni is the
Vice Principal of R. N. Engineering
College Kota (Raj). He has done his
Ph.D from Mewar University
Chittogarh (Raj.). He received
M.Tech from Rajiv Gandhi
Proudyogiki Vishwavidyalaya, Bhopal (MP) and B.Tech
from University of Rajasthan Jaipur with specialization in
Electronics & Communication Engg. He has 14 year of
academic experience. He has published many research
papers in International and National Journals and
Conferences. His research interests are computer network,
Wireless Sensor Network, Ad hoc Network, and VLSI
design.