csic 2014( april )

52
www.csi-india.org ISSN 0970-647X | Volume No. 38 | Issue No. 1 | April 2014 ` 50/- Cover Story The Internet of Things: Technologies, Communications and Computing 7 Technical Trends Human Gait- Using Biometric for Mobile Phone Security 22 CIO Perspective Transforming the Automotive Industry with Connected Cars 31 Technical Trends Building Intelligent Internet of Things Applications using Microsoft StreamInsight 13 Security Corner Security Aspects in Internet of Things Domain 36

Upload: vanhanh

Post on 14-Feb-2017

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CSIC 2014( April )

CSI Communications | April 2014 | 1ww

w.c

si-in

dia.

org

ISSN

097

0-64

7X |

Vol

ume

No.

38

| Is

sue

No.

1 |

Apr

il 2

014

` 50

/-

Cover StoryThe Internet of Things: Technologies, Communications and Computing 7

IT Industry PerspectiveInterview with Mr. Deepak Ghaisas 32

Technical TrendsHuman Gait- Using Biometric for Mobile Phone Security 22CIO PerspectiveTransforming the Automotive Industry with Connected Cars 31

Security CornerInformation Security »

Enhancing Security of Websites with Content Security Policy 38

Technical TrendsBuilding Intelligent Internet of Things Applications using Microsoft StreamInsight 13

Security CornerSecurity Aspects in Internet of Things Domain 36

Page 2: CSIC 2014( April )

Happenings@ICT H R MohanPresident, CSI, AVP (Systems), The Hindu, ChennaiEmail: [email protected]

ICT News Briefs in March 2014The following are the ICT news and headlines of interest in March 2014. They have been compiled from various news & Internet sources including the dailies – The Hindu, Business Line, and Economic Times.

Voices & Views • Indian Healthcare industry to spend

$1.08 billion on IT products and services in 2014 – Gartner.

• The engineering services outsourcing currently stands at about $10 billion will further expand with increased adoption of 3D printing – CEO, Mindtree.

• The global 3D printing industry to reach $10.8 billion from the current $2 billion by 2012. – Wohlers Associates

• National Skill Development Corporation has provided skills training to 13,49,742 people in its first three years of operations. It has also created a capacity to train 7.5 crore people over the next 10 years – S Ramadorai, Chairman, NSDC.

• Telcos are natural partners for Facebook’s initiative of internet.org, a global partnership with the goal of making Internet access available to the next 5 billion people – Director, Facebook

• India’s e-commerce to go up from $1 billion to $76 billion by 2020. In 2013 alone, online shopping has increased by 88%

• The media and entertainment industry grew by around 12% in 2013 – FICCI-KPMG report.

• ‘We don’t really see a slowdown in the IT market’. ‘Internet of Things’ is the next big thing to happen – Founder & Chairman, Persistent Systems.

• ‘Our technology can pack more in same spectrum’ – Ashish Chowdhary, EVP/President, Nokia Solutions and Networks.

• MOOCs are surely the way forward for India which faces the shortage of good faculty. They are the great democratiser. Anyone can register and take courses, as there is no application process, and no costs – Anant Agarwal, President, edX.

• Hardware sector is a ‘victim’ industry. It has become far weaker than it was in 1970s, at least in relation to the global industry – R Chandrashekhar, President, Nasscom.

• There are four types of applications that define a connected vehicle - infotainment/media, advanced telematics, vehicle-to-X communications and autonomous driving capabilities – Forrester research on connected cars.

• Indian companies represent 3% of the global IT and BPO outsourcing market.

• Intel forecasts that 40 million tablets would be sold worldwide next year.

• The topline of many IT companies will grow in the 15-18% range in 2014 – higher than Nasscom’s 13-15% growth projections – Analysts.

• With a stagnant $32-billion domestic market contribution, the size of the IT-BPO industry would grow to $118 billion in 2013-14 from $108 billion in 2013. Social, mobility, cloud chip in 5-10% of IT firms’ income – Nasscom.

• Indian IT laws ‘ill-suited’ for social media. Reforms could see Net platforms contributing Rs. 2.5 lakh cr to economy by 2015 – GNI Report.

• Mobile data use zooms 87% riding the 3G wave. Data usage has gone up from about 26 petabytes (PB) a month in 2012 to 50 petabytes in 2013 – MBit Index study.

• Out sourcing destinations: India is the clear global leader by revenue, while China is the most serious challenger by scale – a study of nine Asia-Pacific (APAC) countries.

• Digital marketing is the new frontier for IT sector – Nasscom.

Govt, Policy, Telecom, Compliance • DOT panel wants penalties for violation

by telcos as per gravity of the offence with a fine of Rs. 1 lakh for a warning, Rs. 1 crore for a minor breach, Rs. 5 crore for moderate, Rs. 20 crore for major and Rs. 50 crore for severe offences.

• Mobile phone production sees drastic decline due to Govt. regulations and taxation rules.

• BSNL has the largest fixed-line infrastructure in the country, with a network of over 600,000 route kilometres of optical fibre cable. It’s optical fibre network may be hived off into a new unit.

• Chinese state firms ‘not blocking’ Indian IT companies – Vice-Minister for Industry and Information Technology.

• India ready to join the 4G club; voice-over-LTE is Achilles Heel.

• By 2017, India to have 67 million LTE (4G) subscribers – Broadcom.

• Competition panel clears Lenovo’s acquisition of IBM server business.

• M-Pesa, an alternative to credit/debit card – Vodafone.

• Walden’s semiconductor fund plan hits a roadblock, with the Planning Commission yet to approve the project.

IT Manpower, Staffing & Top Moves • IT companies planning to hire people from

the IIIT-Hyderabad will have to pay a fee of 8% (of the annual package a candidate gets) will get a chance to pick the best.

• A non-engineering science graduate can aspire for a monthly stipend of Rs. 11,500 during the first year of service in Wipro and an MS degree at the end of the fourth year under the company’s ‘earn while you learn’ programme.

• Nandan Nilekani, the former head of UIDAI to contest in the Lok Sabha elections 2014 from Bangalore South constituency.

• Vodafone to offer 9% average salary hike this year.

• Nasdaq-listed Syntel has about 80% of its global workforce of 23,652 (as of Dec 2013) employed across its 12 development centres in India.

• Nokia hints at job cuts in Chennai unit.

Company News: Tie-ups, Joint Ventures, New Initiatives • Karbonn mobiles is developing a

smartphone that can accommodate both Android and Windows operating systems.

• LG India bets big on mobile, flat panel TVs to drive growth. Plans to invest Rs. 800 crore this year on R&D, production and marketing.

• At $19 billion, Facebook valued each of WhatsApp’s current 450 million users at roughly $400.

• Mobile video ad firm Vdopia eyes overseas expansion. Almost 7 out of 10 Internet users in India watch online videos.

• Australian National University has even created the first ever Hindi MOOC, a 10-week course, called ‘Engaging India’ which will start on April 29.

• Veeble Softtech, developes a new app – LocoMapia (LM) – a real time location sharing mobile app that works even without GPS.

• TNQ Books introduces browser-based proofing technology replacing the traditional PDF-based proofing.

• India Post which has 1,39,086 post offices in its network is open to e-commerce prospects.

• Mobiado, luxury mobile brand, set to enter India with handsets priced between Rs. 2.6 lakh and Rs. 20 lakh.

• IIT Bombay students working on a data analysis app for AAP.

• Microsoft woos small enterprises with Azure cloud platform. Announces its hardware trade-in scheme.

• Airtel’s Rs. 200-cr venture capital fund finds no takers.

• SAP Labs India opens its projects to employees as crowdsourcing model across its R&D centres who can work on them depending on their level of interests.

n

Page 3: CSIC 2014( April )

CSI Communications | April 2014 | 3

ContentsVolume No. 38 • Issue No. 1 • April 2014

CSI Communications

Please note:CSI Communications is published by Computer Society of India, a non-profit organization. Views and opinions expressed in the CSI Communications are those of individual authors, contributors and advertisers and they may differ from policies and official statements of CSI. These should not be construed as legal or professional advice. The CSI, the publisher, the editors and the contributors are not responsible for any decisions taken by readers on the basis of these views and opinions.Although every care is being taken to ensure genuineness of the writings in this publication, CSI Communications does not attest to the originality of the respective authors’ content. © 2012 CSI. All rights reserved.Instructors are permitted to photocopy isolated articles for non-commercial classroom use without fee. For any other copying, reprint or republication, permission must be obtained in writing from the Society. Copying for other than personal use or internal reference, or of articles or columns not owned by the Society without explicit permission of the Society or the copyright owner is strictly prohibited.

Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093. Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Printed at GP Offset Pvt. Ltd., Mumbai 400 059.

Editorial Board

Chief EditorDr. R M Sonar

EditorsDr. Debasish JanaDr. Achuthsankar Nair

Resident EditorMrs. Jayshree Dhere

Published byExecutive Secretary Mr. Suchit GogwekarFor Computer Society of India

Design, Print and Dispatch byCyberMedia Services Limited

P L U SBrain Teaser Dr. Debasish Jana

40

Ask an Expert Dr. Debasish Jana

41

CSI Reports 42

CSI News 44

Cover Story

7 The Internet of Things: Technologies, Communications and Computing Tadrash Shah and Chintan M Bhatt

10 Origin and Applications of Internet of Things Dr. Murugavalli Subramaniam and B Ganesh

11 Internet of Things: A Birds Eye View Mr. Sarwesh P, Dr. N S V Shet and Dr. K

Chandrasekaran

Technical Trends

13 Building Intelligent Internet of Things Applications using Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra

16 Indoor Positioning System (IPS) using Beacons Venkatesh Babu and Ashok Yalamanchili

19 The Need to use ‘Near-Source’ Processing in Internet-of-Things Solutions Bipin Patwardhan

22 Human Gait- Using Biometric for Mobile Phone Security Kamal Sharma

Research Front

25 Resource Allocation Algorithm to Improve the Quality-of-Service in OFDMA System

R L Ujjwal, Prof. C S Rai and Prof. Nupur Prakash

Article

28 Cellular Automata Dr. Rupali Bhardwaj

Practitioner Workbench

29 Programming.Tips() » Fun with ‘C’ Programs Wallace Jacob

30 Programming.Learn(“R”) » Packages in R Umesh P and Silpa Bhaskaran

CIO Perspective

3 1 Transforming the Automotive Industry with Connected Cars Madhusudhan Reddy Nukala, Shreyas Bhargave and Bipin Patwardhan

Security Corner

33 Information Security »

Security Features in Contemporary Browsers and Tips for Safe Browsing Krishna Chaitanya Telikicherla, Harigopal K B Ponnapalli and Dr. Ashutosh Saxena

36 Information Security »

Security Aspects in Internet of Things Domain Tapalina Bhattasali, Dr. Rituparna Chaki and Dr. Nabendu Chaki

Page 4: CSIC 2014( April )

CSI Communications | April 2014 | 4 www.csi-india.org

Important Contact Details »For queries, correspondence regarding Membership, contact [email protected]

Know Your CSIExecutive Committee (2013-14/15) »

President Vice-President Hon. SecretaryMr. H R Mohan Prof. Bipin V Mehta Mr. Sanjay Mohapatra [email protected] [email protected] [email protected]

Hon. Treasurer Immd. Past PresidentMr. Ranga Rajagopal Prof. S V [email protected] [email protected]

Nomination Committee (2014-2015)Prof. P. Kalyanaraman Mr. Sanjeev Kumar Mr. Subimal Kundu

Regional Vice-PresidentsRegion - I Region - II Region - III Region - IVMr. R K Vyas Mr. Devaprasanna Sinha Prof. R P Soni Mr. Hari Shankar Mishra Delhi, Punjab, Haryana, Himachal Assam, Bihar, West Bengal, Gujarat, Madhya Pradesh, Jharkhand, Chattisgarh, Pradesh, Jammu & Kashmir, North Eastern States Rajasthan and other areas Orissa and other areas inUttar Pradesh, Uttaranchal and and other areas in in Western India Central & Southother areas in Northern India. East & North East India [email protected] Eastern [email protected] [email protected] [email protected]

Region - V Region - VI Region - VII Mr. Raju L kanchibhotla Dr. Shirish S Sane Mr. S P Soman Karnataka and Andhra Pradesh Maharashtra and Goa Tamil Nadu, Pondicherry, [email protected] [email protected] Andaman and Nicobar, Kerala, Lakshadweep [email protected]

Division ChairpersonsDivision-I : Hardware (2013-15) Division-II : Software (2014-16) Division-III : Applications (2013-15) Prof. M N Hoda Dr. R Nadarajan Dr. A K Nayak [email protected] [email protected] [email protected]

Division-IV : Communications Division-V : Education and Research (2014-16) (2013-15) Dr. Durgesh Kumar Mishra Dr. Anirban Basu [email protected] [email protected]

Important links on CSI website »About CSI http://www.csi-india.org/about-csiStructure and Orgnisation http://www.csi-india.org/web/guest/structureandorganisationExecutive Committee http://www.csi-india.org/executive-committeeNomination Committee http://www.csi-india.org/web/guest/nominations-committeeStatutory Committees http://www.csi-india.org/web/guest/statutory-committeesWho's Who http://www.csi-india.org/web/guest/who-s-whoCSI Fellows http://www.csi-india.org/web/guest/csi-fellowsNational, Regional & State http://www.csi-india.org/web/guest/104Student Coordinators Collaborations http://www.csi-india.org/web/guest/collaborationsDistinguished Speakers http://www.csi-india.org/distinguished-speakersDivisions http://www.csi-india.org/web/guest/divisionsRegions http://www.csi-india.org/web/guest/regions1Chapters http://www.csi-india.org/web/guest/chaptersPolicy Guidelines http://www.csi-india.org/web/guest/policy-guidelinesStudent Branches http://www.csi-india.org/web/guest/student-branchesMembership Services http://www.csi-india.org/web/guest/membership-serviceUpcoming Events http://www.csi-india.org/web/guest/upcoming-eventsPublications http://www.csi-india.org/web/guest/publicationsStudent's Corner http://www.csi-india.org/web/education-directorate/student-s-cornerCSI Awards http://www.csi-india.org/web/guest/csi-awardsCSI Certification http://www.csi-india.org/web/guest/csi-certificationUpcoming Webinars http://www.csi-india.org/web/guest/upcoming-webinarsAbout Membership http://www.csi-india.org/web/guest/about-membershipWhy Join CSI http://www.csi-india.org/why-join-csiMembership Benefits http://www.csi-india.org/membership-benefitsBABA Scheme http://www.csi-india.org/membership-schemes-baba-schemeSpecial Interest Groups http://www.csi-india.org/special-interest-groups

Membership Subscription Fees http://www.csi-india.org/fee-structureMembership and Grades http://www.csi-india.org/web/guest/174Institutional Membership http://www.csi-india.org /web/guest/institiutional-

membershipBecome a member http://www.csi-india.org/web/guest/become-a-memberUpgrading and Renewing Membership http://www.csi-india.org/web/guest/183Download Forms http://www.csi-india.org/web/guest/downloadformsMembership Eligibility http://www.csi-india.org/web/guest/membership-eligibilityCode of Ethics http://www.csi-india.org/web/guest/code-of-ethicsFrom the President Desk http://www.csi-india.org/web/guest/president-s-deskCSI Communications (PDF Version) http://www.csi-india.org/web/guest/csi-communicationsCSI Communications (HTML Version) http://www.csi-india.org/web/guest/csi-communications-

html-versionCSI Journal of Computing http://www.csi-india.org/web/guest/journalCSI eNewsletter http://www.csi-india.org/web/guest/enewsletterCSIC Chapters SBs News http://www.csi-india.org/csic-chapters-sbs-newsEducation Directorate http://www.csi-india.org/web/education-directorate/homeNational Students Coordinator http://www.csi- india .org /web/national-students-

coordinators/homeAwards and Honors http://www.csi-india.org/web/guest/251eGovernance Awards http://www.csi-india.org/web/guest/e-governanceawardsIT Excellence Awards http://www.csi-india.org/web/guest/csiitexcellenceawardsYITP Awards http://www.csi-india.org/web/guest/csiyitp-awardsCSI Service Awards http://www.csi-india.org/web/guest/csi-service-awardsAcademic Excellence Awards http://www.csi-india.org/web/guest/academic-excellence-

awardsContact us http://www.csi-india.org/web/guest/contact-us

Page 5: CSIC 2014( April )

CSI Communications | April 2014 | 5

At the outset, let me thank you all for providing me a great opportunity to serve as the President of the Computer Society of India at the time the society is in its Golden Jubilee period. For me, it has been a long journey from being a student member during my studies at IIT Madras way back in 1973. In fact, I literally grew with CSI throughout my career in the field of Information Technology. While I have been in touch with you through various columns of the CSI Communications over the last several years, from this month onwards, I will be sharing my views and interacting with you through this exclusive column – President’s Desk. I had the rare opportunity of being directly mentored by a number of past presidents of CSI, several of whom hail from Chennai. These include Major General A. Balasubrahmanian, Prof. S. Sampath, Prof. H. N. Mahabala, Prof. C.R. Muthukrishnan, Mr. S. Mahalingam and the immediate past president Prof. S.V. Raghavan. My association with CSI for a little over 40 years as a member and 30 years in various capacities, with the Chennai chapter and at the national level, had provided me with excellent volunteering and networking opportunities. It also provided me with a chance to interact with eminent academicians, industrialists, professionals, and government officials across the country who had served in various roles and nurtured the growth of CSI. Let me also state that I may be one of the very few who had the opportunity to work with 13 out of 27 past presidents of CSI directly and two more indirectly – a rare opportunity to learn from their expertise and management style in creating opportunities, mentoring & supporting young talents, strategizing and handling tasks, organizing events, and building relations. All of these had given me the strength and adequate confidence to carry out my responsibilities as your president this year. With the continued support and guidance from them along with the volunteering spirit and cooperation of my executive committee members, the chairs of the CSI chapters, student branch councilors & coordinators across the country, and the staff at the CSI HQ and CSI Education Directorate, I hope to steer the CSI ship to new lands and ensure a safe & enjoyable journey. I look forward to serving a heterogeneous group of members, numbering over one lakh in this Golden Jubilee period. As you are aware, the role of CSI and its mode to serve its members have changed significantly over the years and so have the expectations of the members. The majority of our current members is from academia and constitutes a young student community who would require mentoring, guidance, support, and skill development during their academic period and, opportunities for their entry into job market and in establishing their entrepreneurship ventures. A small proportion of professional members look forward to inputs and updates in the fast developing world of Information and Communication Technologies to sustain, excel and grow in their current position. Another segment of our members who have superannuated from their service should be engaged productively. This means, CSI has to adopt diversified strategies to achieve these varying expectations. I seek valuable inputs and suggestions from all of you in this regard. Our strength has been in organizing technical meetings, seminars, workshops, conferences, conventions in all areas of ICT and creating awareness, updating on the emerging trends and opening research opportunities. However, the advent of the Internet and its vast information sharing capabilities propel us to go beyond. The consumerisation of IT and penetration of mobile technology have changed the way businesses are started, run, managed and expanded. We need to focus our attention in these aspects and give our members a share in the global opportunity.

CSI has several MOUs and established associations with organisations such as CDAC, SETS, ISACA, PMI, Media Lab Asia, international societies such as IFIP, IEEE & IEEE CS, SEARCC, BCS, SCS and national associations such as NASSCOM, MAIT, CII, FICCI and government agencies such as DEITY, STPIs, State IT Depts. DST, DOT, AICTE, UGC to name a few. We need to fully utilize these collaborations so our members receive utmost benefits. As the chair of Conference Committee during 2013-14, I am happy to inform that the year has been eventful. A list of activities held by the CSI is being complied and presented at http://goo.gl/EnUqXE. A significant milestone is the commissioning of the student portal at http://studentportal.csidiscoverthinking.com/,which we expect to grow and be used by a large section of our members. The month of March 2014 has been extremely busy with a number of activities including several conferences, student conventions, programming contest, Alan Turing quiz contest, YITP awards etc. The RVPs, division chairs, national student coordinator supported by a team of state student coordinators, and awards committee all deserve a sincere appreciation. I would like to place on record the excellent work done by the outgoing team led by Prof. S.V. Raghavan for providing us the directions to move forward. I welcome my new executive committee members. Mr. Bipin Mehta and Mr. Sanjay Mohapatra are joining as Vice President and Hon. Secretary respectively. Mr. Ranga Rajagopal continues as the Treasurer, working hard to balance the accounts and sensitizing the chapters with the compliance aspects in the context of Govt. rules and regulations. Mr. S. Ramanathan, steps out as the Hon. Secretary after steering the administration of CSI for two years. Prof. S.V. Raghavan will be with us as the immediate past president and chair the awards and academic committees. There are several new initiatives being planned during this Golden Jubilee period. The new executive committee in its first meeting will deliberate, brainstorm, and determine an action plan and share it with you to seek your support in executing them. In this process, we would like to have your involvement in a proactive way right from the planning stage to execution of plans as volunteers. Let us work together collaboratively for the growth of CSI and its mission to be of service to the masses.

With regardsH R MohanPresidentComputer Society of India

President’s Message H R Mohan

From : President’s Desk:: [email protected] : President's MessageDate : 1st April, 2014

Dear Members

Page 6: CSIC 2014( April )

CSI Communications | April 2014 | 6 www.csi-india.org

Editorial Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree DhereEditors

Most of us can not imagine our world without the Internet. The Internet is becoming more and more accessible, ubiquitous and cost-effective to communicate without worrying about geographic boundaries and underlying technologies. Billions of people are connected through the Internet. Physically they can be at any place on earth and still remain connected virtually. However, such interactions are no more limited amongst only human beings. Sensors and embedded systems are making living and non-living objects (anything in fact!) express, talk, think, react, interact and communicate amongst themselves. Although it sounds like science fiction, it is already happening now. People can monitor growth of their plants/crops sitting anywhere in the world. One thing is talking to another – e.g. a water tank telling water pump when to stop and start pumping water based on sensors that monitor water level and communicate the same to sensors which operate the water pump. Billions of such objects can talk to each other over the internet the way human beings do and that is what makes the Internet of things. We bring this issue with cover theme as ‘Internet of Things (IoT)’ to let you all know about happenings, technologies, applications, current trends and issues around IoT. Since such a topic is more applied in nature, we received good response from industry.

We start our cover story with The Internet of Things: Technologies, Communications and Computing by Tadrash Shah, Master student, State University of New York and and Chintan M Bhatt, Asst. Professor, CE Dept., Chandubhai S. Patel Institute of Technology. They mention about 6 As of IoT: Anything, Anytime, Anyone, Any place, Any services and Any network. The article covers genesis, historical evidence, current trend and concerns. The second article is on Origin and Applications of Internet of Things by Dr. Murugavalli Subramaniam and B Ganesh, CSE, Panimalar Engineering College, Chennai. They write about industry and social applications and suggest applications in various domains such as: medical, public distribution system, traffic regularization and for physically challenged persons. The third article takes a Birds Eye View on IoT, it is by Mr. Sarwesh P, Dr. N S V Shet and Dr. K Chandrasekaran of NITK, Surathkal, Karnataka, introducing the readers to the notion, evolution, working processes, challenges and applications of IoT.

In Technical Trend section, we have four articles. The first three are from iGATE professionals. First one titled: Building Intelligent Internet of Things Applications using Microsoft StreamInsight by Ramakrishnan Iyer and Radharaman Mishra of Research & Innovation Tech CoE Group of iGate Global Solutions. They illustrate iGATE’s iStreamAnalytics Solution based on StreamInsight. The second article is by Venkatesh Babu and Ashok Yalamanchili, Technology CoEs in R&I group on Indoor Positioning System (IPS) using Beacons. The

third one is written by Bipin Patwardhan of Research & Innovation, iGATE on the Need to use 'Near-Source' processing in IoT Solutions. The last interesting article in the section is by Kamal Sharma titled: Human Gait- Using Biometric for Mobile Phone Security, covering how gait (pattern of limb movements while using devices!) can be effectively used for security as every individual has unique gait, which cannot be copied or imitated.

In research front section, we have one article by R L Ujjwal, Prof. C S Rai, University School of Information and Communicaton Technologyand Prof. Nupur Prakash, VC, Indira Gandhi Delhi Technological University for Women titled: Resource Allocation Algorithm to Improve the Quality-of-Service in OFDMA System. They propose an algorithm and results of the algorithm indicate that optimum allocation of resources under OFDMA (Orthogonal Frequency Division Multiple in Access) system could be achieved to improve quality of service (which includes parameters like data transfer rate, signal to noise ratio and bit error rate). In Article section, we have an article by Dr. Rupali Bhardwaj, Assistant Professor, Thapar University, Patiala on Cellular Automata.

In our section named Practitioner Workbench we have articles from our regular contributors. Article in Programming.Tips() is by Wallace Jacob, Sr. Asst. Prof. at Tolani Maritime Institute covering Fun with C Programs and under Programming.Learn(“R”) we have continued series on “R” by Umesh P and Silpa Bhaskaran Department of Computational Biology and Bioinformatics, University of Kerala writing on Packages in R.

In CIO section, under Managing Technology we have industry experts: Madhusudhan Reddy Nukala, Shreyas Bhargave and Bipin Patwardhan of iGATE talking about Transforming the Automotive Industry with Connected Cars–An Internet of Things Perspective.

In Security Corner column’s Information Security section we are concluding the series of web application security articles with an article on Security Features in Comtemporary Browsers, which also provides Tips for Safe Browsing. This is the tenth article by Krishna Chaitanya Telikicherla, Harigopal K B Ponnapalli and Dr. Ashutosh Saxena of Infosys and the series ends with this article. Next article under Information Security is about Security Aspects of IoT Domain by Tapalina Bhattasali, Dr. Rituparna Chaki and Dr. Nabendu Chaki of University of Calcutta covering technical aspects, security issues and requirements.

In other regular sections, we have Dr. Debasish Jana’s (Editor, CSI Communications) crossword to test readers’ knowledge on IoT and he is answering the readers’ questions in Ask an Expert section. Mr. H R Mohan, President, CSI, AVP (Systems), The Hindu, Chennai brings the readers Happenings@ICT in March 14.As usual there are features such as CSI Reports and CSI News.

Please note that we welcome your feedback and suggestions at [email protected]

With warm regards,Rajendra M Sonar, Achuthsankar S Nair,Debasish Jana and Jayshree DhereEditors

Dear Fellow CSI Members,

Sensors and embedded systems are making living and non-living objects (anything in fact!) express, talk, think, react, interact and communicate amongst themselves. Although it sounds like science fiction, it is already happening now. People can monitor growth of their plants/crops sitting anywhere in the world. One thing is talking to another – e.g. a water tank telling water pump when to stop and start pumping water based on sensors that monitor water level and communicate the same to sensors which operate the water pump.

Page 7: CSIC 2014( April )

CSI Communications | April 2014 | 7

At a very generic level of understanding we can say that Internet of Things (IoT) is a global network infrastructure where in the physical and virtual objects are all made equipped with data capture and communication capabilities so that they can use the ubiquitous internet to transmit data and other controlling purposes. This definition may seem rather dubious at the first read. The inferences and the implications of the definition will be clearer as we move forward with the content of this article.

The time to dream is over and now is the time to get up and set to work towards realization of what was dreamt decades back. The physical objects of the world will be seamlessly integrated into information network. The integration may be various purposes like – data capture, monitoring and controlling among many others. Wireless links must spread beyond smart phones, PCs and Tablets.

Since the existence, the planet itself – be it nature, humans or physical objects, has been generating enormous amount of data and we have just lost it. We have not been able to hear or capture the data, but now IoT seems to fulfill its promise. Also, with the parallel growth of the cloud technologies, the data can be accessed, manipulated and controlled from anywhere. To put this simply = “IoT is a scenario in which objects, animals or people are provided with unique identifiers and the ability to automatically transfer the data over a network without requiring human-to-human or human-to-computer interaction[2].” Hence, we can say the IoT to be the convergence of following technologies –1. Wireless and Bluetooth – QoS,

latency and security2. Microsystems, Sensors and Actuators &

miniaturization of the same.3. Cloud technologies – security,

privacy,4. Networks – Ipv6, lower latencies,

security

6 A connectivity is there in IoT:Anything, Anytime, Anyone, Any place, Any services, Any network

Genesis To map these physical devices to the information network, they must be made uniquely identifiable by some way. In today’s scenario the network devices in the internet of the intranet are addressable by the IP (IPv4 and IPv6) or the URI. But in the view of Semantic Web, there are more technologies evolving which could be used, infect a few of them are already put to test, like RFID. RFID tagging has been demonstrated in various parts of the world successfully.

Internet of Things Consortium[4] mentions 4 principles for IoT – 1. Value –Make consumers live more

efficient, safer and seamless.2. Data – help consumers understand

the benefits and value of their data.3. Security – build consumer confidence

around IoT experiences4. Design–delight consumers with

intuitive design and usability. Cisco puts it the best way – calling it “Internet of Everything”.

Historical Evidence The systems got the name IoT lately, but they have been in existence since quite long. In 1980 at Carnegie Mellon University there was this Internet Appliance Coke machine such that programmers can connect to the machine and determine whether or not there would be a cold drink in the machine to vend or not and whether they should make a trip down to machine.

Post that, actual roots of IoT can be traced back to the MIT from the work of Auto-Center. In 1999, this group was working in domain of networked RFID and other sensing technologies. Together with seven other research universities from 4 different continents were chosen to design architecture for IoT.

There are various IoT Software Development Kit that are available, few of them under open source, to be used for programming of the devices. One of them can be found at http://developer.peoplepowerco.com. Giants like Intel and ARM are too in the market with

IoT development kits namely Galileo Development Kit (http://www.intel.com/content/www/us/en/do-it-yourself/galileo-maker-quark-board.html) for IoT and MBed (http://mbed.org/).

Trend In today’s scenario, where IT companies want to stay, rather need to stay, competitive by adopting new and innovative technologies – not just using them but also developing them – IoT opens up a whole new world of possibilities.

Wall Street Journal puts it the best – “…a long-awaited trend that is causing a surge of optimism in the tech sector…”

Business Insider (BI) stated in the latest March 14, 2014 report the numbers forecast for IoT, “1.9 billion devices today, and 9 billion by 2018, according to BII (Business Insider Intelligence) estimates, roughly equal to the number of smart phones, smart TVs, tablets, wearable computers and PC combined[1]”. Now that is huge! This makes to believe the forecast myth that potentially every tangible item, animate and inanimate, shall be connected to the internet in near future. This has been penetrating the consumer and business lives.

Thomas Lee, a Stanford university professor of Electrical Engineering and co-founder of Ayla Networks Inc. says that “The value of the devices will be secondary to the services they enable”. Which seems so true and bears the promise of IoT as a coming era of change?

So far, the smart-home products (a few them listed in the applications section of this article) seem mainly to be attracting technology enthusiasts.

Yet another point to be noted is that, due to the smart phone proliferation across of segments of society, the IoT can be realized deep and wide. Hopefully, the market will be flooded with so many products, few of which extensively customizable, that users can pick the one that suit their needs the best.

Applications 1. Fish aquarium is made to be

connected to Raspberry Pi which is

The Internet of Things: Technologies, Communications and Computing

Cover Story

Tadrash Shah* and Chintan M Bhatt***Master student, State University of New York**Asst. Professor, CE dept., Chandubhai S. Patel Institute of Technology, CHARUSAT

Page 8: CSIC 2014( April )

CSI Communications | April 2014 | 8 www.csi-india.org

further connected to a temperature sensor and actuator. With the help of Pi, the thermometer delivers the real-time temperature to any computer which queries for it on local network. This temperature can be controlled from this computer.

2. Smart Dust –a device made up of tiny sensors that are capable of wireless communication and RFID which can be deployed over a region to record data for metrological, geophysical and planetary research. The dust in fields can be used to monitor the

crops, dust In factories can monitor the output of machines, and dust in human body to monitor the entire state of well being.

3. Much awaited and market flooded with a couple of wonderful products is the Home Automation. The fantasy becomes the reality. ONIDA launched an air-conditioner with a remote that accepts the SMS sent to it and turns on the AC at the desired temperature so that by the time you are home, the home is all cozy for you. There are video surveillance products which

can be installed in your house and you can monitor your house, in real-time as well as recorded data on cloud, when you are on a tour. These systems can also intimate you any suspicious activities by email or SMS or a call.

4. Another concept -Smart Garden. Each plant in your garden can be equipped with a RFID tag so that remotely you can decide whether you need to water them more, fertilize them or transfer them to a sunnier spot.

Figure: Smart Garden [5]

5. Companies like Silver Spring Networks sell the wireless meters to manage the energy usage.

6. GE uses the data generated by the sensors to monitor the health of Jet engines and gas turbines.

7. Another example of smart cards can be – where insurance companies can respond to sensors and wireless connections on the cars to charge drivers by the mile and speed they drive instead of where they live.

8. The following figure shows a clip-on wireless and Bluetooth clip-on device on dog’s collar that tracks the dog activity levels on your Smartphone (Price $129.95).

Figure: Whistle Dog Collar [7]

Figure: Insider Intelligence[1]

Figure: The Internet of Things - How the Next Evolution of the Internet (CISCO)[3]

Page 9: CSIC 2014( April )

CSI Communications | April 2014 | 9

9. A wearable baby monitor that sends the data about baby’s vital signs to the users’ smart phones. (Developed by : Sproutling)

Figure: Wearable baby monitor[8]

10. Apple Smart Body Analyzer–An another mind-boggling Apple product that is lesser known, which measures the air quality in your room, your heart-rate, weight and other body compositions which are then uploaded to the cloud or Bluetooth over all your Apple devices. The HealthMate App uses this data to coach you about changing your lifestyle, setting weight goals, and other weekly achievable targets.

11. Washing machines turning on only when the energy demand on the grid is minimum as controlled from your smart phone.

12. A car will automatically call an emergency service sending its location and other important data after an accident. Hence, apart from being saved by the SRS airbags the emergency help is also called for you after an accident.

13. Animals and birds can be tagged with RFID and their migration, behavior patterns and other data can be captured and analyzed for a better study. This has been found successful and implemented successfully. A couple of these technologies are mature and well standardized in some domains.

14. BigBelly is a solar-powered trash receptacle and trash compactor that alerts sanitation crews when it is full.

Having listed a dozen of applications of IoT, few of which at conceptual level and others already in the market. World’s top 10 innovative companies in IoT and their products can be read about at http://goo.gl/zs6WND. Also http://iotlist.co/ lists

all the mind-boggling IoT products if you wish to discover more. Yet another list is at http://goo.gl/838dsg.

Concerns Data privacy, data integrity and data sovereignty - A common consensus needs to be reached where-in how and who should exploit the data that has been captured by these IoT devices.

Another concern at the hardware level is that various manufacturers may design and produce several different devices. The consensus needs to be reached here too for defining the conventions that tell these manufactures what to do and how to work together. Apple has been so far successful in allowing wonderful and seamless communication across various other and heterogeneous Apple devices, but we need to break those bounds and make a reference model that is platform independent and also cross-proprietary enabled.

There is this term in US called that we bumped into – “Big Brother”. These terms is referred to the Federal Government that uses your data from myriad sources for your monitoring. Example, thermal imaging of private homes for marijuana lamps, phone and internet data from private companies to ensure no individual is breaking law, and much more. Any human in USA is under constant surveillance of Federal government. This surveillance is termed as “Big Brother”. They say that Big Brother is getting bigger these days with IoT. Any car equipped as a smart-car monitors all your where-about, web surveillance is getting thicker in name

of public safety and much more. This is an important concern when a person is losing his privacy at all nodes, and may not like that. Hence, IoT data sovereignty is a major concern these days.

Listing many other concerns in brief – 1. Architecture – no unanimous

consensus has been reached upon regarding the architecture of IoT.

2. The IoT devices needs to be connected to the power supply and internet all the time, round the clock, hence the energy efficiency of the sensing is also a primary concern.

3. Apart from data privacy the network security should be considered – someone can disable the network availability, push erroneous data, breaking in to the network, etc. Depending on the application either or all of these can be hazardous and even life-threatening.

4. Mentioned that heterogeneous networks and devices will be put to use the QoS needs to fine-tune for current protocols or may be new protocols need be devised.

5. Extracting useful information from the sensor data is also a challenge. At the hardware level the sensors are all affected by spatial and temporal data and hence the data may create noise. Having said that perhaps next generation of data mining algorithms need to be used.

P.S.: The issue of Telemedicine rose in the December 2013 issue of CSI Communications written by Tadrash Shah

Figure: IoT-enabled home with connected devices and appliances working invisibly for consumer[6]

Continued on Page 21

Page 10: CSIC 2014( April )

CSI Communications | April 2014 | 10 www.csi-india.org

IntroductionInternet of things refers to identifying a physical Object through internet. Any object even a human being, animal or anything else can be connected in Internet so that they can be accessible from anywhere in the world through internet.

In early days, communication was difficult among people. Communication between neighboring cities, towns or villages used to take several days/hours. It depended only on human messengers/birds that used to carry the message and deliver it to appropriate destination. This was the early postal/communication system. Later invention of motor vehicles eased the message delivery process. Invention of telegram and telephone made possible quick communication among the various persons and entities near and far away.

After invention of computers and network, information started getting exchanged through the computers. Initially, they used some sort of cables to provide information sharing among the computer systems. But such connection had some limitations; it only connected systems in nearby locations. For connecting systems in remote locations cables need to be laid for a long distance, which is very expensive.

To overcome this limitation, telephone lines were used for connecting the computers with the help of modem. This is how internet evolved; it led to a huge revolution in the globe, communication was made easy and information sharing between the systems was no longer complex.

Earlier the internet was used for information sharing, sending mails, download and upload of files. But now it is being used for many applications and in many fields which were unimaginable a decade ago.

Industry and Social ApplicationIn a boiler industry its temperature and pressure should be kept under the control, if it exceeds certain value the boiler blows up. So the temperature

and pressure needs to be monitored regularly. Human being going near the boilers having heavy temperature around 1000° C or more is not possible. Here comes the help of internet.

In a forest, the major problem is forest fire which burns the trees and animals. Deforestation brings imbalance in the eco system, and effects climate change. The solution to this is to detect early so that it can be prevented or controlled. But how the forest fire can be identified in early stage?

In the above two scenarios remote sensors can be used which can be connected to the network, and information about the environment like temperature, pressure etc. can be received for further analysis and action. The smoke detecting sensors can be deployed in forest so that they can send the information about the fire quickly to the control station in order to control the fire in early stage to save the forest.

Wireless Sensor Networks, are the best examples of how non-computers can be interconnected. These wireless sensors are used in many fields, in Forest to monitor and send alarm regarding the Forest fire, in Military field it will be deployed in multiple remote locations so that information can be exchanged among them.

Radio-Frequency Identification (RFID) is a wireless device used to identify any device or a person. It is mostly used to authenticate a person, to track the device progress in assembly line. For avoiding traffic at toll gates RFID can be used. In a car, bus or lorry, RFID tag can be fixed in the front Glass, so that the vehicles need not stop there. In India most of the toll gates use RFID tags to identify the public vehicles in order to minimize the traffic jam in toll gates.

Both Wireless sensors and RFID are used to track or observe the status of a vehicle, person, location etc.

Suggested ApplicationsFor MedicalThere exist wearable sensors which can be used to identify or track person’s or

an object’s movements. Such sensors can also be used to get the information regarding patient’s body temperature, pulse rate, sugar and blood pressure levels etc. In a hospital it can be used to observe the patient, and such information can be recorded automatically in a system and if anything goes wrong send alarm to the doctor or a patient by means of SMS or to a dedicated application in a mobile.

For Public Distribution System (PDS)In India one of the major problems is civil supply trafficking. Goods supplied to one particular area can be taken away by strangers. This affects the needy people and it’s a big headache for the government to stop this kind of activity. To prevent this, the GPS can be fixed in each public goods carrying vehicle, so that its movement can be recorded and they can be tracked completely from source to destination.

For Physically ImpairedThe sensors can be used for the blinds to identify the objects ahead when they walk on the road. Normally, they use a stick to identify the objects in their way. Instead sensors can be fixed on the stick which emit some ultrasonic sound and observe back like the principle of SONAR. If the reflection is quicker we can calculate the distance between object and blind person. The distance can be intimated to the blind through the headphone. Integrating such sensors and navigators will help them walk anywhere without anyone’s assistance. Using the navigator they can specify the destination, the navigator will calculate the optimal route and tell the route to them through the headphone.

For Traffic RegularizationThe traffic violators can be identified using the RFID enabled number plates. When a person violates the traffic automatically the vehicle id can be obtained using the RFID number plate if the RFID detectors are placed in the junctions. For example, the speed violators can be identified easily by keeping two RFID receivers about 100m apart. If a vehicle crossed the first detector it will read the number of that vehicle and

Origin and Applications of Internet of Things

Cover Story

Dr. Murugavalli Subramaniam* and B Ganesh***Professor and Head, Department of CSE, Panimalar Engineering College, Chennai**Assistant Professor (Grade-I), CSE, Panimalar Engineeering College, Chennai

Continued on Page 21

Page 11: CSIC 2014( April )

CSI Communications | April 2014 | 11

Notion of Internet of Things Internet of things (IoT) is a fast growing, user friendly technology which allows everything to be connected together and also allows effective communication between the connected “things”. These “things” can include any object ranging from a small pen to a big car.

This technology has expanded to such an extent that even living organisms are considered as the part of Internet of things. In IoT, intelligent devices such as Passive RFID Tag [Los Alamos], Smart Dust [Kristofer S. J. Pister, Joe Kahn, and Bernhard Boser] etc., are connected together in a large network with unique accessibility. IoT exchanges data in a fraction of second and also it consumes less power. It makes the human life more comfortable and it helps to build a smarter world.

Evolution of Internet of Things Before 1990’s communication happened between computers which was called as electronic data transfer. These computers formed a network and it was further classified as Local area network (LAN), Metropolitan area network (MAN) and Wide area network (WAN). This WAN was called as Internet where, several computers around the world were able to communicate each other. Subsequently

further improvements in networks allowed external peripheral devices to be connected to internet. In present we are giving instruction to devices instead IoT will make the devices to think and act according to our needs.

[Kevin Ashton] the co-founder of Auto-ID Center at the Massachusetts Institute of Technology coined the term IoT in 1999, after him [Ashton] discussed about IoT in RFIDJournal.com in 2009. The white paper of [Texas instruments] says that till now, the world has deployed about 5 billion “smart” connected things. Predictions say that there will be 50 billion connected devices by 2020 and in our lifetime we will experience life with a trillion-node network. The current network infrastructure is a barrier in realizing those numbers. The industry will achieve the reality of 50 billion connected devices only by simplifying the way in which things are connected. People are trying to optimize the process of internet of things because in future the trillion-node network may be implemented.

In many places people have started implementing the smart things/devices in real-time applications such as RFID tracking, smart dust implementation in battle field, smart health care system,

smart irrigation system for agriculture and smart grid for power consumption management, wildlife monitoring by multimedia sensor networks and some sensors implemented under the ground, sea, forest and bank of rivers to prevent the world from natural disasters like tsunami, earthquake, forest fire, flood etc .

Working Process of Internet of Things IoT handles all types of devices from a simple device to an intelligent device. These devices should have certain basic capabilities namely sensing, data capture, data storage, data processing and it should also be uniquely accessible. In IoT architecture, devices can communicate with each other by forming a network. This network is similar to computer network but here computers are replaced by things. In IoT devices can communicate with each other directly or through a gateway. It manages resources, services and collects the information for sending it according to requirements of user. There are four types of communications involved in IoT,

a) Device-to-device: In Fig.1 we can see that in section 1 and section 2 there are two ways connecting the devices,

Internet of Things: A Birds Eye View

Cover Story

Mr. Sarwesh P*, Dr. N S V Shet** and Dr. K Chandrasekaran****Research Scholar, E & C Department, NITK, Surathkal, Karnataka **Associate Professor, E & C Department, NITK, Surathkal, Karnataka ***Professor, CSE Department, NITK, Surathkal, Karnataka

Fig. 1: Working process of IoT

Page 12: CSIC 2014( April )

CSI Communications | April 2014 | 12 www.csi-india.org

either they can connect directly or they can connect through the gate way. It is clearly differentiated by two kinds of dotted lines.

b) Device-to-user: The user can be in section 1, section 3 or section 4 in either of the cases he has to access the data from the device only through service management system section 4. Because all the data related controls are handled by the section 4.

c) Device-to-server: The device to server interaction involves all the four sections. Hence the two domains

d) Server-to-applications: This process is fully related to section 4 where the user can access the data directly from the server.

By seeing the Fig.1 we can clearly understand the working process of internet of things.

Challenges for Internet of Things • Connectivity and identification: Proper

standards have to be developed for connectivity and there should be a unique identification mechanism for accessing all kind of devices. For this IPv6 was proposed as one of the solution but there is no standard mechanism till now that can be used for identification.

• Reliable and scalable Network: Here ubiquitous things are connected together and hence efficient network with good reliability and scalability is required with a Quality of service protocol which would maintain the data flow.

• Power management: Power is one of the important parameters to be considered. Energy harvesting by smart devices should be implemented and IoT devices should be self sustainable.

• Security: Security is a very important aspect of IoT. The built-in security should be implemented in devices and protocols. Usually IoT uses wireless infrastructure for communication which is prone to several attacks. Thus proper security measures should be taken to protect the data being transferred.

• Multi device adoption: Thousands of new devices are working and hundreds of new devices will be implemented each and every day. For that, our network should be able to adopt all kinds of devices from lower end to higher end. For example, it should manage RFID

tag, temperature sensor, smart dust, multimedia sensor, server, router, bio sensor, smart chip, server, database system etc in a single track.

The above challenges are considered as the important requirements for developing IoT. The researchers are working through it and they are trying to optimize the different parts of architecture.

Applications of Internet of Things Smart marketing: In supermarket this technology can be used to provide the information to the customers without any human intervention. For example, A passive RFID tag can be placed in a cocoa bean package such that whenever a customer comes near to the package it will intimate the customer about the details of beans automatically through a voice signal.

Smart Products: Using IoT products can be developed such that they will instruct the user based on the application. For example, a RFID tag can be attached with a shirt to monitor the body temperature of the user and instruct him accordingly.

Smart eHealth care: In eHealth care system the doctor can see the body condition of patient without testing him physically, by using a smart product called biochip which is inserted in the patient’s body. It can measure the blood pressure, cholesterol content, heartbeat, body temperature, viral infection etc., and it will report to his family doctor.

Smart Automation: We can implement intelligent multimedia sensor in car, designed in such a way that it will focus and analyze the retina of the person who is driving the car and it will instruct the driving person that to stop the car. If the person still drives the car it will park the car in a parking area of the road automatically. This will prevent the accidents.

Smart Pollution monitoring system: If some person is throwing plastics in ground the multimedia sensor will monitor and it will warn the person and it will indicate the fine amount that has to be paid by the person. So pollution will be reduced and next time people won`t do such kind of mistakes.

Smart grid Technology: In smart grid technology the excess of power which generated by means of

windmill, thermal power plant, solar power plant, etc., will be directed and distributed to places where energy is required. For example, if a wind mill is generating 1000 mega watts of power in place A and if the people require the power of only 700 mega watts. Remaining 300 mega watts can be sent to Place B otherwise it will be wasted. To save such resources a technology called smart grid technology is booming with the help of IoT.

Internet of Things in Future In ITU people are working on a Packet based service related network which is called as “Next Generation Network”. It handles billions of things together. For example, it is possible to get the current information about animals in the amazon’s forest with in a second, by sitting in our home. In future devices will sense, speak, hear and at last it might even start thinking.

Conclusion IoT is a recent technology which is booming and it has a good rate of acceptance among the people. Industries are spending a considerable amount of money and many researchers are working towards the improvement and development of IoT. The applications of IoT are many and so are the users. This technology can be considered as one of the most promising technologies of the 21st century. It is needless to say that the future wouldn’t exist without IoT. It would become as an integral part of the day-to-day human life. People would become extensively dependent on IoT, at least to satisfy their medical needs. The day is not far when each person would directly or indirectly be related to at least two or three IoT networks.

References [1] www.ti.com/iot-intro - Strategic marketing,

Texas Instruments, Sep-2013 [Jim Chase] [2] IERC - Internet of Things European Research

Cluster 3rd edition of the Cluster Book 2012 [Ian G Smith, Ovidiu Vermesan, Peter Friess, Anthony Furness, Martin Pitt]

[3] Internet of things the legal perspectives – 2010 [Rolf H. Weber, Romana Weber]

[4] The Internet of Things, ITU Internet reports, Nov-2005 [Lara srivastava, Comprising Phillippa Biggs, Tim Kelly, Youlia Lozanova, Lilia Perez Chavolla, Jaroslaw Ponder, Raushan Sagalbayeva, Svetlana Skvortsova and Christine sund]

[5] Rethinking the Internet of things-A scalable Approach to Connecting Everything, 2013 [Francis daCosta]

[6] ITU Workshop on the “Internet of Things -Trend and Challenges in Standardization” (Geneva, Switzerland, 18 February 2014)

[7] http://www.iot-a.eu/public [8] http://www.internet-of-things-research.eu

n

Page 13: CSIC 2014( April )

CSI Communications | April 2014 | 13

Key IT Challenges with Internet of Things ImplementationIoT based business applications have some signature characteristics:• Very high event data rates• Huge volume of continuous data• Need for continuous monitoring • Minimal latency • High level of complexity in finding

meaning in the data• Immediate response in case of an

alert situation

A typical IoT application will be connected to a huge number of devices that will continuously provide it with the input data in the form of events. Traditional relational database centric application development models may not be sufficient for building such applications and they can use “Complex Event Processing (CEP)” technology instead. The application will need to capture the events, analyze the data to come up with insights and

patterns. IoT applications by nature will be not only complex but also critical, because the insight provided by its output will be often triggering some other event of decision making. Due to these reasons an enterprise will need to come up with a robust, scalable and proven CEP and analytics platform, which can leverage this online data for providing advanced CEP solution for various benefits such as business insight, better decision making and cost reduction etc.

IoT applications and traditional applications (e.g., native or web based applications) are significantly different in many ways. Technological and architectural implications of these differences are profound. It will bring big

opportunities and even bigger challenges such as:

• Processing large volumes of data published at a high speed needs a matching infrastructure

• Effective, meaningful and cost effective mining and analysis of the input events needs a robust analytics platform

• Since the number of connected devices might increase drastically, the architecture need to be scalable

• Applications has to have integration capabilities with different types of devices and systems

• Considering the high volume of data, need to ensure the data quality

• High network bandwidth is required to read all the raw data generated by millions of connected devices

• No uniform standards for data generated from devices which may result in data silos and can prevent widespread adoption

Building Intelligent Internet of Things Applications using Microsoft StreamInsight

Ramakrishnan Iyer* and Radharaman Mishra***Principal Architect, Research & Innovation Tech CoE Group of iGATE Global Solutions**Technical Architect, Research & Innovation Tech CoE Group of iGATE Global Solutions

Technical Trends

Abstract: The Internet of Things (IoT) is a web of objects with unique identifiers that can communicate with each other with or without the aid of a computer or internet. The communication is enabled through the sensors installed into the participating devices. Several technologies like wireless technologies, micro-electromechanical systems (MEMS) and the Internet have contributed to the emergence of the IoT. Due to availability of low-cost sensor devices, market analysts estimate that there could be around 26 billion installed units by 2020 and the market size to be around 2.2 trillion by 2025. IoT has become one of the most talked about emerging technologies, given the potential to come up with various innovative products and services. Since it enables the devices to come alive and be interactive, the product companies and service providers will be using it for continuing with their services even after the product has been actually sold. IoT applications will be smarter than the applications we use currently in a way that they would be able to communicate with each other and enable decision-making giving them intelligence of their own. IoT has the potential for new opportunities across vertical markets such as insurance, consumer electronics, medical, transportation to develop use cases which can leverage this technology to reduce costs, improve customer satisfaction, and create new business models based on the analysis of the data collected. Microsoft StreamInsight is a powerful platform for developing and deploying highly scalable and low latency CEP applications. It is designed to provide event-driven processing solution to continuously arriving data without writing the data to disk for analysis and querying. With StreamInsight, IoT applications can provide better and faster CEP solutions to incoming data in near-real time, as the data gets acquired from the sources as compared to the analytics solutions based on the traditional database reports and dashboards. The primary intent of this paper is to provide enterprises an overview of Microsoft StreamInsight features and capabilities and iGate iStreamAnalytics platform that can be used to develop online complex event processing solutions for quick insights in various verticals.

A typical IoT application will be connected to a huge number of devices that will continuously provide it with the input data in the form of events. Traditional relational database centric application development models may not be sufficient for building such applications and they can use “Complex Event Processing (CEP)” technology instead.

IoT applications and traditional applications (e.g., native or web based applications) are significantly different in many ways. Technological and architectural implications of these differences are profound.

Page 14: CSIC 2014( April )

CSI Communications | April 2014 | 14 www.csi-india.org

• There could be potential security implications since the connected devices can be vulnerable to hacking and hence need a secure identity management and authentication to be implemented

• Defining the data retention, archival and purging could be a challenging task for the massive amount of data that get generated from devices

Microsoft StreamInsight CapabilitiesMicrosoft StreamInsight provides a powerful platform for implementing robust and highly efficient IoT applications involving the complex events processing. The technologies advancements in the devices together with the capabilities of StreamInsight will allow the possibility of building intelligent applications where StreamInsight will play a pivotal role in transforming the raw data from the

input devices into intelligence for the business. Some of the key capabilities, StreamInsight offers are:• Ability to process multiple data

streams over the internet from multiple, heterogeneous data sources and apply business rules to generate meaningful patterns, exceptions and trends

• Adapter model to interoperate with all kinds of data sources and facilitate seamless integration with both the incoming and outgoing event traffic

• Declarative query language (LINQ) to formulate queries, rules, and patterns

• Parallel processing and use of in memory cache for delivering better performance

• Event driven, continuous and incremental processing for high throughput, low latency

• Familiar Microsoft .Net based development platform that allows leveraging the existing skill sets and infrastructure investments in VisualStudio and .Net framework

• Reduced and optimized storage requirements since the streams need not be persisted for the processing

• Event Flow Debugger tool for monitoring the running queries, replaying the data processing, and performing root-cause and event-propagation analysis

iGATE iStreamAnalytics SolutioniGATE iStreamAnalytics is a Microsoft StreamInsight based solution that is designed to process events, received as input data, from multiple sources in real time. Key solution features are: • Capability to receive input data

from multiple sources in multiple

Fig1: iStreamAnalytics- High Level Architecture

Page 15: CSIC 2014( April )

CSI Communications | April 2014 | 15

formats and can be configurable to be processed in StreamInsight engine

• Prebuilt and configurable simple rules and alerts

• Capability to display the data flow and alerts in near real time

• Services based integration with the StreamInsight (for both the Event generator and the Dashboard)

Following diagram shows the high level architecture of the iStreamAnalytics solution.

Event GeneratorThis application will act as a gateway for the various input sources (e.g., device sensors- speedometer of a vehicle, device on a patient, smart meters etc.) to read the data and transform them into a configurable format to the service that inputs to the StreamInsight engine.

CEP EngineCEP Engine will be responsible for processing the events that has been submitted by the devices/sensors (or the Events Generator). It will be applying the business rules over the streams and generating the appropriate alerts. The rules can be classified into two types:• Pre-built Rules: The parameter for

the rules will be configurable where thresholds could be defined and alerts could be triggered for data that does not meet the threshold values. An example could be if the speed exceeds 100 miles per hour, trigger an alert for over speeding.

• Custom Rules: These rules will be specific to business scenarios and

will need to be developed for the application.

Dashboard Dashboard application will be responsible for showing the data and alerts generated by the CEP. The dashboard has the capabilities to plot the data in the chart format and displaying alerts in near real time.

Applications Enabled due to iStreamAnalytics SolutionAny business scenario where an event generated is of importance, will need to be monitored (often together with some other events) and analyzed for myriad purposes like generating alert, decision making, triggering some associated event and so on will benefit from the IoT applications. Financial services, health care, insurance, utilities, telecommunication, manufacturing and web analytics are some of the business domains that will need to implement CEP/IoT applications.

Following is a list of some of the specific examples of new potential IoT-based applications that use sensor devices:• Usage-based insurance: Using

sensors in vehicles, monitor the driving behaviors using the data generated from sensors, profile driver to provide calculate auto insurance premium policies

• Healthcare sensing: Collect, monitor and analyze data at real-time from patients/consumers to provide a better healthcare facilities

• Smart meters: Monitoring of various utilities like electricity, gas and water etc. and analyze data to trigger

alerts and provide analysis of the usage, remotely control as well as automation of utilities and prevent any critical situations

• Real-time manufacturing intelligence: Monitor real-time data of manufacturing operations and analyze the data to provide insightful information for improving the entire manufacturing processes

• Fleet management: By having sensor devices on the vehicle fleet, track and monitor vehicles, optimize routing operations, vehicle utilization and improve the overall efficiency of their fleets

• Fraud Detection: Monitor all financial & non-financial transactions, do analysis based on business rules and detect any fraudulent or suspicious activities being done

ConclusionThough IoT is still in its early stages, IoT will need enterprises to gear up for a highly connected world and come up with new business models and processes to have a better competitive edge in the market. Also the sensor devices will bring a new transformation in how to detect any change in parameters, use this information to trigger new events to help save costs and better decision making. New analytics tools like Microsoft StreamInsight are emerging to provide scalable high performance architecture to process this massive amount of data.

iGATE is well-positioned with its new iStreamAnalytics platform which is a real-time business analytics solution to enable rapid development of new IoT solutions for fast-time-to-market in any verticals. It will allow configuring usage of any devices data and providing device monitoring, dashboards and analytics reports to enable better decision making. n

Abo

ut th

e A

utho

rs

Ramakrishnan Iyer is a Principal Architect working in Research & Innovation Tech CoE Group of iGATE Global Solutions, and is responsible for developing technology solutions. He has more than 20 years of experience in Information Technology with strong expertise in Microsoft technologies, Application Portfolio Rationalization, applications assessment, and Application Portfolio Modernization. He has extensive experience in architecting and designing large business applications in various technologies.

Radharaman Mishra is a Technical Architect with the Research & Innovation Tech CoE Group of iGATE Global Solutions. With over 14 years of experience in the IT services industry, he has worked on software application architecture and design, development, architecture assessment and consulting. His expertise includes .Net, ASP.Net and Microsoft SQL Server. He has been working with iGATE’s Fortune 500 customers on various Microsoft-specific enterprise application architectures and design. He has also published papers of technical interests in various external and internal forums.

Though IoT is still in its early stages, IoT will need enterprises to gear up for a highly connected world and come up with new business models and processes to have a better competitive edge in the market.

Page 16: CSIC 2014( April )

CSI Communications | April 2014 | 16 www.csi-india.org

IntroductionWhat is IPS? An indoor positioning system (IPS) is a network of devices used to wirelessly locate objects or people inside a building.

Why IPS?Due to the signal attenuation caused by construction materials, the satellite based GPS signal loses significant power indoors. For this reason the receiver cannot get coverage of 4 satellites which atleast is needed to accurately get the location coordinates.

The consumer devices will have a maximum location accuracy of 10 mts when the location is set by the GPS. This accuracy is not acceptable with respect to the use cases for indoor positioning and navigation as a lot of things change at indoor level, for eg. aisles are placed adjacent to each other within a distance

of 1-2 metres in a retail store or there can be multiple stores within a distance of 10 meters in a mall.

Also due to the nature of indoor environment, GPS cannot provide information about the floor and building level at which user is located.

This brings up the need for a system where a user/object has to be located inside a building accurately and precisely to make positioning and navigation inside indoors as easy as outdoors.

Current ScenarioEven though there was a market pull for this technology from a long time, it didn’t come into mainstream due to limitations of the software / hardware available with consumers in general. Now that smart phones are ubiquitous, the technology is gaining momentum in terms of scale and variety with the entry of innovative companies.

Future MarketThe global indoor positioning market is estimated to grow from $448.6 million in 2013 to $2.60 billion in 2018. (Source: www.marketsandmarkets.com)

Usage of IPSIndicative list of use cases and scenarios where IPS can be used are given below

Consumer: • Transportation hubs like Airports,

Railway & Bus stations • Indoor venus like university campus,

hospitals • Commercial venus like shopping

malls, offices

Non Consumer: • Emergency services like fire rescue,

police and medical • Asset tracking & logistics for offices,

hospitals, industries and retail stores • Industrial Automation

Indoor Positioning System (IPS) using Beacons

Venkatesh Babu* and Ashok Yalamanchili** *Sr. Principal Architect, Technology CoEs in R&I group @ iGATE**Technical Lead, Technology CoEs in R&I group @ iGATE

Technical Trends

Source: www.extremetech.com (http://www.extremetech.com/extreme/126843-think-gps-is-cool-ips-will-blow-your-mind)

Page 17: CSIC 2014( April )

CSI Communications | April 2014 | 17

Enabling Technologies for IPS SolutionSome of the enabling technologies used for an IPS solution are listed below • Wi-Fi access points • BLE Beacons • Sensors (Accelerometer, Gyro,

Compass, etc.) • Indoor Lights • Magnetic Field • Low Orbit Satellites • Camera Technology

iGATE chose to experiment with BLE Beacons and Wi-Fi access points. Sample BLE beacons images are given below.

Source: Beacon’s images are from their respective vendor websites

iGATE’s Exploratory Activities iGATE has worked on the PoCs for proximity using Estimote’s iBeacons, positioning and navigation using indoo.rs bluetooth beacons and its framework.

Proximity PoC: In this PoC, bluetooth beacons are placed in the store at strategic positions and configured with their major and minor identifiers. If the user with the mobile app comes into the field of the beacons, then an offer that is configured for that beacon will be pushed to the user.

Indoor positioning and Navigation PoC: This PoC will provide the user his current location with an accuracy of 1 meter which gives accurate results from an analytics perspective. The user can also navigate inside the store based on the products he has in his shopping cart.

iGATE is building a omni channel solution which will enable retailers to push real time personalised promotions and offers to the customers, also identify the customer behaviour across physical stores. The offers that are pushed are based on the users past shopping history across different channels like web, mobile, and physical store. In addition to this the product also gives insights like how the customer has moved inside the store, dwell times at particular aisles.

Source: Internet, Enhanced by iGATE

Page 18: CSIC 2014( April )

CSI Communications | April 2014 | 18 www.csi-india.org

ChallengesThere were many challenges encountered by iGATE while implementing an indoor positioning system. Some of the these challenges are mentioned below

Precision and Latency - The amount of time for which the user can get his current position with maximum accuracy varied a lot from vendor to vendor. We got a precision of 1-2 mts for 70% of the time by using Bluetooth Low Energy (BLE) beacons based IPS. When the Wi-Fi Access Points were used for positioning, we got a precision of 5-8 mts for 60% of the time. Latency is the time taken by the system to identify the users position from the time the request to get location is sent from the device to the server. Typical latency of 5-6 seconds was observed to get the position with good accuracy.

Signal accuracy & stability - The signals emitted from either Wi-Fi AP’s / Bluetooth beacons are prone to be absorbed by human bodies, walls, aisles and other structural elements. This creates interference to these signals and it gets more complicated if people are

moving which creates more fluctuations ultimately leading to stability issues. One of the main challenges for the IPS to work consistently is to minimize the effect of these interferences by filters implemented by IPS providers.

Structural movements – Any change in the position of a sensor or change in the structure will need a recalibration of the entire area of interest, so that accurate results are provided by the IPS.

Power consumption - Although Bluetooth LE consumes less power on a mobile device compared to Bluetooth 2.0/3.0, continuously fetching the position will involve significant battery consumption as the location has to be fetched from the server. Beacon vendors typically specify a battery life of 1-2 years per beacon, but during our solution implementation, we found that batteries drained out in less than 6 months.

Supporting multiple devices - Another major challenge for these IPS solutions is to have compatibility with multiple platforms, device and Operating System versions. As the current mobile market is

highly fragmented this becomes a major challenge in selecting the IPS solution.

ConclusionIPS seems very promising which can be leveraged in many scenarios / areas. There are many vendors that are heavily investing in this space. Some of the major players that are having a considerable impact in this space are• Navizon (http://navizon.com/

indoors-solutions)• Meridian apps (http://www.

meridianapps.com/)• Aisle411 (http://aisle411.com/

solutions/publisher-solutions/)• Indoors (http://indoo.rs/)

Even though there are many vendors out there in this space, the technology is still at a very nascent stage, accurate and easy-to-setup solutions can make IPS realize its full potential in many areas.

References[1] marketsandmarkets.com. (2013).

Indoor Positioning and Indoor Navigation (IPIN) Market [(Network-based Positioning; Independent Positioning; Hybrid Positioning); by Solutions (Maps and Navigation; Location based Analytics)]: Worldwide Market Forecasts and Analysis (2013 - 2018). Dallas: Markets and Markets.

[2] Naguib, D. A. (2011, 9 11). The Great Indoors: Challenges and Use Cases: Qualcomm.

[3] Indoors. (2013, 09 07). Indoors. Retrieved 12 26, 2013 from Accurate indoor localization: http://indoo.rs/features/

[4] Loctronix. (2011, 09 26). Consumer Applications for Indoor Positioning. Retrieved 26 12, 2013 from Loctronix: http://www.loctronix.com/news/Insider/I1-1-A2-ConsumerApps.html

[5] Indoor LBS. (2014, 01 16). Indoor Location & Mapping Services Report. Retrieved 01 24, 2014 from Indoor LBS: http://www.indoorlbs.com/p/market-report.html n

Abo

ut th

e A

utho

rs

Venkatesh Babu is a Sr. Principal Architect working in the Technology CoEs in R&I group @ iGATE. He has more than 20 years of experience in IT industry and is currently involved with R & D of emerging trends & technologies. The R&I Technology CoE team works on PoCs, Solutions, and provides thought leadership for evangelization of new trends / technologies for solving business problems of clients.

Ashok Yalamanchili is a Technical Lead with more than 7 years of experience in IT industry. At iGATE, he is currently working in the Technology CoEs in R&I group working on emerging technologies and trends. The R&I Technology CoE team works on creating POCs, Solutions, evaluating new technologies and helps in client engagements.

Page 19: CSIC 2014( April )

CSI Communications | April 2014 | 19

Introduction Most people are familiar with common means of data processing – data generated by a device is transmitted to a central location where it is processed and used for business reporting or for making business decision. In recent time, this method of data processing is facing a challenge not only from the volume of data that is being generated, but also from the fact that a wide variety of sources are generating data, adding to the complexity of data processing. While it may be relatively easy to address the problem of data variety by using well-defined data formats, it seems that the problem of data volume can only be addressed by essentially using more and more processing power – be it either by using ever-larger processing systems or by using clusters of distributed systems.

'Smart' Devices Though the landscape is changing, most data being generated is by conventional methods of business, like collecting electricity consumption data at the end of the month, mobile usage on a daily basis, and so on. While 'smart devices' like music enabled shoes and watches are not a new phenomenon, recently there has been an enormous interest in applying 'smart' concepts not just for consumer gadgets, but also to enterprise applications and enterprise processes. Hence, concepts like 'smart meters' are being actively installed in homes to monitor electricity consumption, 'smart cars' are being developed to monitor driver as well as car performance and use that information for insurance offerings and vehicle maintenance, to name a few applications. Such 'smart' devices when connected (mostly wirelessly) to enterprise applications over the Internet, constitute the area of 'Internet-of-Things', IoT for short.

While many IoT solutions are still in development phase, the number of solutions is expected to grow. As per the Gartner 2013 Hype Cycle, IoT is reaching the peak of expectations and expected to reach mainstream in the next 5 to 10 years, if not earlier. Thus, it is expected that this interest will not only drive creation of innovative and novel gadgets and devices, but will also be the prime drivers for applications to be developed that consume such data and use it to influence business decisions.

As per Gartner reports, the impact of connected smart devices is expected to add $1.9 trillion to the global economy. Not only are conventional devices like servers, storage equipment, network devices expected to become 'smarter', but many other devices like cardiac monitors, health monitors, automobile and devices like washing machines and air conditioners are also expected to become 'smart'. This is expected to drive around $3.8 trillion in spending on information technology, to monitor, manage and derive meaningful inferences from data generated.

Challenges with Existing Architectures With tremendous growth in volume of data, most enterprises are exploring and/or working with Big Data technologies like Hadoop, MongoDB, Cassandra and others to manage data and extract business benefits from it. Enterprises are using a combination of tools and technologies to handle volume, velocity and variety of data (three Vs of data). While it is complex to address data on these axes, what adds to the complexity is that Big Data solutions need to be integrated with existing Data Warehouse + Business Intelligence + reporting solutions. Traditionally, Business Intelligence (BI) and Data Warehouse (DW) solutions have addressed the

problem of data processing and reporting. While these solutions have been very successful and can address data volume to a certain extent, their Achilles heel has turned out to be data variety – as these solutions depend on an underlying RDBMS for data storage – where data can be received in different formats.

To manage increasing data volumes and the increased urgency around actionable information, Big Data Analytics seems to be the most natural solution. Big Data solutions try to address all three Vs of data, by using a combination of tools and technologies and by keeping data in as near-native format as possible (rather than retrofitting it to a specific structure). However, BI and DW based solutions as well Big Data based solutions most commonly persist the data before processing it and hence put heavy demands on the infrastructure in terms of huge processing power as well as extremely large storage capacity.

'Near-Source' Processing With smart devices expected to add exponentially to the data volumes, an already challenged area – processing the data - will be stretched to its limits. Not only will processing and storing these data volumes pose difficulties, but transmitting such data and extracting 'on time' inferences from them will also be a challenge.

To overcome some of these stated problems of data processing, we would like to suggest the concept or 'near-source' processing. But, what is 'near-source' processing? As we define it, 'near-source' processing is nothing but placing computing technology as near to the source as possible, and processing the data as soon as possible, for immediate insights.

But, how different is it from using an intermediate computer system that collects data and processes it before

The Need to use 'Near-Source' Processing in Internet-of-Things Solutions

Bipin Patwardhan Research & Innovation, iGATE, Mumbai, India

Technical Trends

Abstract: The 'Internet-of-Things' revolution is about making ordinary devices more 'intelligent' regarding their environment and more 'adaptive' to user needs. As making devices 'intelligent and adaptive' means these devices monitoring their environment and reacting to it, it involves collection of a lot of data, as well as processing it into insights. With the installed base of such devices expected to explode into multi-billions, the amount of data that is expected to flow and be processed is going to be mind boggling. Hence, we believe that Internet-of-Things solutions should consider some form of 'near-source' processing in order to provide more immediate feedback to users and also to reduce the amount of data transferred from the device to the system/application where it is processed.

Page 20: CSIC 2014( April )

CSI Communications | April 2014 | 20 www.csi-india.org

sending it to a central server? While the concept many not be very different, the way it differs, is its use of low-cost computing elements to receive and process the data. While earlier, one would have needed to use a full-fledged desktop-class system for this purpose, with the availability of low-cost computing hardware like Aurdino, Raspberry Pi and Intel Edison, 'near-source' processing solutions will be easier to implement and will also be cost effective. Additionally, such low-cost hardware will serve the stated purpose as in most cases, the amount of data to be processed will not be extremely large. The 'near-source' processing unit will be expected to store and process only a limited set of data, the size of which can be defined as per the business requirement. Extremely complex processing tasks will continue to be performed by data centers using BI and DW or Big Data setups. In fact, in addition to such low-cost, dedicated hardware platforms, smartphones with suitable applications can also be used to perform the task of 'near-source' processing units.

Architecture The architecture for a 'near-source' processing system is given in Fig. 1.

As depicted, raw data generated by smart devices can be received by one

or more 'near-source' processing units. Each unit can process the data to identify events and/or alerts based on provided rules, which in turn are made available to the user. After processing the data, the 'near-source' processing units can send either event data or the raw data to other analytic systems, for detailed processing and analysis.

While 'near-source' processing solutions will not be expected to crunch Terabytes and Petabytes of data, they will be able to process a few Megabytes of data within milliseconds and generate immediate feedback for users. Such immediate feedback in terms of 'actionable insights' can help businesses benefit from favorable conditions as well as take preventive actions in case of adverse conditions. Additionally, by processing data near to the source, it will be possible to generate 'higher-level' events from the raw data and transmit these to downstream systems for further processing, reducing the need to transmit all the raw data 'as-is' for processing.

It should be noted that 'near-source' processing is by no means meant to replace analytic systems, but can be used to provide immediate, relevant feedback to users and also help reduce the amount of data transferred from the 'smart' device, to the place where it is to be processed.

Benefits Some of the benefits of 'Near-Source' processing can be 1. Immediate feedback by processing

data without delay. 2. Improved visibility for users, as they

will get feedback about how data is being processed.

3. Reduced transmission costs – transmitting only high-level events and their related information instead of raw, unprocessed data.

4. Reduced central infrastructure costs – central processing centers will not need to store and process the full raw data set. Only specific event data need be stored for analysis.

5. Privacy, Security, Compression – raw data, as generated by 'smart' devices will mostly not be encumbered by privacy and security layers. For sensitive data sets, 'near-source' processing can be used to encrypt the data before it is transmitted over networks. To reduce the amount of data transmitted, data compression techniques can also be used.

Application Areas Some of the application areas for 'near-source' processing can be 1. Connected automobiles –

Automobiles that are able to process inputs from their surroundings to take appropriate action.

2. Home medical care – Data collected from medical devices can be processed within the confines of the patient's home, before it is transmitted to the healthcare worker.

3. Traffic Management – Traffic patterns can be identified from one or more traffic signals, to build a comprehensive picture of local conditions, before transmitting events of significance to the central system.

Conclusion With the expected wide proliferation of smart devices in coming years, the amount of data generated and processed is expected to go up dramatically. While many enterprise data processing needs can be addressed by using suitably powerful Big Data deployments, in case of 'smart' devices, it is worthwhile to explore avenues that will help reduce the amount of data transmitted over the network and also to extract insights 'on time'. Fig. 1: Architecture for 'Near-Source' Processing

Page 21: CSIC 2014( April )

CSI Communications | April 2014 | 21

For addressing the need of 'on time' processing, we believe that enterprises need to explore the avenue of 'near-source' processing units. Such units can monitor data generated by smart devices, identify patterns, generate suitable 'events of significance' and only transmit relevant,

reduced data sets (along with event data) back to the enterprises for additional processing. For detailed analysis, 'near source' processing units can store a copy of the generated data for a suitable period of time, making it available on demand. Thus, 'near-source' processing units can

provide 'local' intelligence and provide 'on time' analytics, helping design responsive systems, thereby reducing the amount of data transmitted over the network and processed centrally.

n

Abo

ut th

e A

utho

r

Bipin Patwardhan is a Technical Architect with more than 15 years of experience in the IT industry. At iGATE, he is leading the High Performance Computing CoE. The CoE builds capabilities around technologies that help delivery high performance for enterprise applications. Presently, the CoE covers areas like Parallel Programming, GPU Programming, Grid Computing, Real-time Analysis and In-Memory Computing.

and Prof. Chintan Bhatt also points back to IoT where patients can be monitored remotely through halter that can transfer the data to the hospital. In this setup patient is granted greater freedom and independence in monitoring their health and simultaneously frees up the hospital or equipment for treating other emergencies.

References[1] http://www.businessinsider.com/

growth-in-the-internet-of-things-market-2-2014-2

[2] http ://what is .techtarget .com/definition/Internet-of-Things

[3] h t t p s : //w w w.c i s co .co m /we b/a b o u t /a c 7 9/d o c s /i n n ov/ I o T _IBSG_0411FINAL.pdf

[4] http://iofthings.org/[5] http://readwrite.com/2013/11/04/

g a rd e n i n g - c o n n e c t e d - h o m e # awesm=~oyWPdTWxhOVfRo

[6] http://www.ti.com/lit/ml/swrb028/swrb028.pdf

[7] http://gigaom.com/2013/06/05/quant i fy ing-your-pup-whist le-wants-to-create-the-worlds-largest-database-on-dog-behavior/

[8] http://www.medgadget.com/2013 /09/sproutlings-wearable-baby-monitor.html

n

Abo

ut th

e A

utho

rs

Tadrash Shah obtained his bachelor’s degree, B.E. in Computer Engineering from Gujarat Technological University and currently pursuing Master’s Degree at State University of New York - Stony Brook. He stood first in his college in Degree Engineering. He has published two research papers and a book in his undergraduate level. He is interested in the research in the subjects like Algorithms, High-performance computing and Databases. He has worked and undertook projects at IIT-Gandhinagar, IIT-Bombay and IIM Ahmedabad.

Prof. Chintan M Bhatt received B.E. and M. Tech. Degrees from Gujarat University (CITC (now CSPIT)) and Dharmsinh Desai University in Computer Engineering. He is a member of CSI, AIRCC (Academy & Industry Research Collaboration Center) and IAENG (International Association of Engineers). His areas of interest include Data Mining, Web Mining, Networking, Security and Software engineering. He has more than 3 years of teaching and research experience.

when it crosses the second detector it reads the number again and calculates the speed using the time taken to cross that 100m distance. If a vehicle crosses 100m distance in 5secs then its speed is 72kmph. If the speed limit of that location

is only 20kmph then it’s clear violation. The intimation can be sent to the control room so that the vehicle can be tracked in some other detector.

The RFID, Wireless sensor and GPS can together connect any object

in the world so that it is possible to do information sharing, retrieval, monitoring and taking necessary steps to control them with less effort and in quick time.

n

Abo

ut th

e A

utho

rs

Dr. Murugavalli Subramaniam is Professor and Head, Department of CSE at Panimalar Engineering College, Chennai. She has 18 years of teaching experience and 9 years of research experience. She completed her Doctoral Programme in the area of Image Processing, Anna University. She is a member and Student Branch Coordinator of Computer Society of India.

B Ganesh is Assistant Professor (Grade-I), CSE, at Panimalar Engineeering College, Chennai. He studied B.E. CSE in VRS College of Engineering Villupuram and M.E. CSE in AVIT, Chennai. He is having 12 years of experience in Teaching and Industry together.

Continued from Page 9

Continued from Page 10

Page 22: CSIC 2014( April )

CSI Communications | April 2014 | 22 www.csi-india.org

Introduction Mobile phones has become important part of our life, almost every individual carries a mobile phone these days and will be more critical part in years to come. We use mobile phone more than just talking; we use it for browsing internet, booking ticket, hotel, online shopping and the most important online banking. Value of phone is more than the value of the hardware; it has important personal and financial information like bank details. Security of the phone plays important role users today, OEM provide method of authentication such as pin and pattern lock (dots to connect). Study carried out on 464 participants shows need for an alternative security system for mobile uses. Study shows that users do not lock their phone due to various reason top most being the ease of use as they have to unlock the phone and users are afraid to forget the password or pin which results in wiping the data and setting phone to factory default (Asher, et al., 2011).

Researchers are looking for an alternative approach such as biometric for authentication such as imagine biometric, fingerprint, voice recognition and gait of the owner. Biometric such as fingerprint, face and voice recognition and active biometric, that is it requires user intervention, the pattern of human walk also know humangait has a pattern which can be used to lock the mobile devices, also known as passive biometric since it does not requires human intervention.

Human gait is a tried and test as passive biometric, and very difficult to copy a human gait. The report focuses on human gait and various methods of human gait (see 3). It also discusses how it can be effectively used to secure a mobile phone (see 4). Challenges and its countermeasures (see 5) based on the literature available.

What is Human Gait?In early 1900's Marks suggested that walking patter can be divided into series of phase (Marks, 2010). Human Gait

takes top-down approach. It starts as impulse in human brain and end with movement of the body in form of walking, running or dancing. Loco motor programming happens in surpraspinal centre, which leads the idea in to pattern of muscles activities required for walking as suggested by Enoka (Vaughan, et al., 1999). The human gait is divided into gait cycles, which start from one foot and ends with the same foot in the process of walking (Marks, 2010; Ayyappa, 1997). Gait cycle is further divided into three main tasks. • The first task is a weight acceptance

period, in which body balances itself on one foot and prepare itself to lift another foot maintaining its balance and absorbing shock.

• Next task is "single limb support task", which is a mid state phase. In this phase one foot is lift in air and swing forward while balancing the body weight on one foot.

• The last task is "limb advancement phase", in this phase foot is rested on the ground maintain the body balance and preparing the other foot for the gait cycle.

The above gait behaviour is study in detail in clinical gait analysis, which does not focus on identifying uniqueness of the person (BenAbdelkader, et al., 2002), studies in field of medicine (Kale, 2004), psychology (Birren & Schaie, 2005) and biometrics (Gafurov, 2008; Mäntyjärvi, et al., 2005), had provided various evidence that human gait contains distinctive pattern which is unique to every individual and can be used as an authentication mechanism.

Various Methods Used in Biometric GaitThere are three different methods used in biometric gait recognition: Machine Vision Based, Floor Sensor Based and Wearable Sensor Based Gait Recognition. In machine vision based gait approach, cameras are place strategically to capture gait data. Captured image is

pixelated and converted into black and white, and recognises the movement. It can be effectively used for surveillance, which out obstructing the users (Nixon, et al., 1999; Han & Bhanu, 2006). In the floor sensor approach[12], [13], sensors mats are place on the floor to collect gait data. Ground reaction forces generated during normal walk is used to generate the pattern and uniqueness of the individual. It is effectively used in building, museums to restrict physical access to certain area based on the walking pattern (Jenkins & Ellis, 2007; Nakajima, et al., 2000). Last approach is wearable sensor,, name itself says that the sensors are wear by the used and they are placed on different body parts such as leg, foot, thigh, hip and wrist. Examples of the wearable sensors are accelerometers (measuring acceleration), gyro sensors (measuring rotation and number of degrees per second of rotation), force sensors (measuring the force when walking) etc (Mäntyjärvi, et al., 2005; Søndrol, 2005). Gait analysis has been used as one of the method in forensics analysis. Gait analysis data captured from the surveillance camera was used to find the murderer of Swedish Foreign Minister, Anna Lindh[20]. Various incidents of robbery has been used to identify the robber for example a back robbery in Aalsgarde Denmark [42] and Norwegian NOKAS robbery[25, 24].

Performance and Effectiveness of Human GaitBiometric has been proved an effective mean of security, but compared to other biometric mechanism gait can be with minimal or almost non user intervention (Bashir, et al., 2010). For example, to measure finger print, hand needs to be place on the sensor and to measure face or iris recognition, user has to pause their work and wait at the scanner. Incase of gait using any of the above 3 methods mention above users do not need to wait or pause their work it can be done smoothly.

Human Gait- Using Biometric for Mobile Phone Security

Kamal Sharma MSc Computing

Technical Trends

Page 23: CSIC 2014( April )

CSI Communications | April 2014 | 23

A study by Mjaaland, et al., (2011) was carried out on 50 participants so see if the gate can be copied or imptate, it produded EER of 6.2 %, and has been proved that it is impossible to imitate or copy the gate (Mjaaland, et al., 2011). Results indicate the result worsen then more training was provided to participants.

Modern smart phones such as iPhone, android and blackberry phone has built-in piezoresistive MEMS accelerometers, which can measure acceleration in three axis (x,y,z) to measure gyration in three dimensions of movement when users walks with the phone either in pocket or in hand.

The iPhone's accelerometer and A-GPS module has been used by researchers in the study of gait analysis using Fast DTW algorithm which is a variant of Dynamic Time Warping (DTW) algorithm called FastDTW (Tanviruzzaman, et al., 2009).

Challenges and Countermeasures of Using Human GaitHuman gait is a passive biometric technique, will keeps looking for the owner of the phone. Like other bio-metric system human gait is not stable and has false-positive. Most of the research done of gait focuses on walking normally (60 gait cycles per minute), at normal speed (132 milliseconds) on the flat surface (Chan & Rudins, 1994). Study by Tanawongsuwan and Bobick(2002), shows that by changing walking pattern such as speed and surface can result to a different gait. This is one of the biggest limitations in applying human gait in practical implementation. Change is clothing and footwear can produce different gait and fail in verification process. Some other example such as accident or injury, emotional state (sad or over excited) or even if the user is drunk can result a different gait. The best way to countermeasure is to have a secondary authentication in place which would be pin or password (Derawi, et al., 2010). An "Adaptive Component and Discriminant Analysis" (ACDA) is designed by (Bashir, et al., (2010) which seamlessly integrates with subspace analysis for robust recognition and more accurate result. Study by Derawi, et al., (2010) show error rate of 20.1% indicated biometeric gate is not mature enough as practical solution and requires some enhancements. Derawi, et al., (2010) suggets cycle extraction technique should

be enhanced to get more accurate result. Geng, et al., (2010) suggest use of multiple biometric to improve the accuracy and efficient. Study was carried out using gait and face recognition and resulted more reliable result, although it can argued the challenges of implementing the same in mobile phone and it's increase cost. So more economical and practical approach would be use of traditional pin or password based authentication.

Gait (Biometric) AuthenticationAuthentication is means of securing access, for example you need to have username and password to access a system. For more secure system tokens are you which are two factor authentication, you have (password) and you are(tokens). And in biometric you have and you are clubbed in one where you are the key or password.

Authentication process can be broken into three process illustrated in Fig. 1 below enrolment, verification and identification (Maltoni, et al., 2009).

The above figure shows process related to fingerprint authentication but it is also been applied to gait authentication process. The process of registering or enrolling the users gait data into database is done in the enrolment process.

Verification process is the process in which users gait data is verified against the gait data of other user in the database. And finally result of the records match is returned in the identification process. Based on the result of the process user is authenticated and decided if users should be allowed or restrict the access (BenAbdelkader, et al., 2002).

We have seen earlier that every walk will not result in the same gait data, so that system is designed to enter more than one gait data per user, where users is advised to walk at different pace, and in the process of identification systems uses a preset threshold value to identify the user. Success or failure of the implementation of gate depends on the degree threshold configured. If the threshold is set to smaller

Kamal Sharma; M Sc Computing; 08 - Dec - 2013; Page 6 of 10

Authentication process can be broken into three process illustrated in Figure 1 below enrolment, verification and identification (Maltoni, et al. , 2009).

Figure 1 Enrolment, Verification and Identification (Maltoni, et al., 2009)

The above figure shows process related to fingerprint authentication but it is also been applied to gait authentication process. The process of registering or enrolling the users gait data into database is done in the enrolment process. Verification process is the process in which users gait data is verified against the gait data of other user in the database. And finally result of the records match is returned in the identification process. Based on the result of the process user is authenticated and decided if users should be allowed or restrict the access (BenAbdelkader, et al. , 2002). We have seen earlier that every walk will not result in the same gait data, so that system is designed to enter more than one gait data per user, where users is advised to walk at different pace, and in the process of identification systems uses a preset threshold value to identify the user. Success or failure of the implementation of gate depends on the degree threshold configured. If the threshold is set to smaller value there are greater changes of false positive (identifying some other users to be that person) and larger the threshold it is quite possible that same person could fail

Fig. 1: Enrolment, verification and identification (Maltoni, et al., 2009)

Page 24: CSIC 2014( April )

CSI Communications | April 2014 | 24 www.csi-india.org

value there are greater changes of false positive (identifying some other users to be that person) and larger the threshold it is quite possible that same person could fail authentication dues to variance in the gait as discussed in section 5 above. Success of the system is measure as false acceptance rate (FAR) and false rejection rate (FRR) which is false acceptance and rejection against total number of authentication (Søndrol, 2005).

Critical Evaluation As seen in section 4 above, research shows that gait can be used for identification and authentication for security purpose. Literature review revealed some use of Machine Vision Based and Floor Sensor Based being effectively used in the field of forensic and investigation crimes such as murders and robbery. Wearable Sensor Based Gait Recognition is most suitable for implementation of authentication in the smart phone available today. It can be argued after seeing the limitation and the false positive rate, it is not completely ready to be used. Some literature review revealed that it should be in combination with other bio other bio-metric or other traditional authentication methods like pin or password.

There are other factors to authentication and security implementation such as feasibility, although in theory passive biometric seems feasible. Putting it into use is something which only time will decide. Another factor is cost; the existing pin based authentication is economical and does the job pretty well. It can be argued that mobile companies or researchers investing time and money to invent which may not be required. This report focused only on gait as an alternate and has ignored other options such as fingerprint, voice or ear size. Study has showed other biometric such as fingerprint and voice recognition to be more efficient, accurate and mature compared to gait (Wang & Liu, 2011).

Further search on the google play (formerly known as android market) and iPhone App store, revealed there already exist apps for iris scanner, fingerprint and face recognition, example eyeD® Biometric Password Manager by Winkpass Creations, Inc for iphone (Apple Inc 1, 2011) and other apps for voice based password, face recognition

and fingerprint recognition. Although while exploring some of the apps revealed they were fake apps which are used to play jokes and impress friend example "Biometric Fingerprint Access" By "Fuzzy Squirrel Software, LLC" (Apple Inc 1, 2011), same is true for Google play (earlier known as android market). But no apps were found for gait analysis. It can be argued that there is more popularity among the users for other biometric systems compared to gait which might have lead to release of so many apps and even fake paid apps.

As discussed in the introduction smart phone are capable of do more than just making calls, but we did not discuss the fun part of it such as games, music, camera live video records which are memory and processor intensive, this study have ignored this fact how it would impact the performance of the smart phone, although the smart phone available today are getting more faster and reliable in terms of memory and processor.

The other aspect is the battery life of the phone, since gait is a passive biometric, how would it impact the battery life of the phone. Further study is recommended to understand the technical feasibility of the same (Bloom, et al., 2004).

ConclusionThis report started by evaluating gait as an alternate option for mobile phone security. Literatures say that gait is a reliable and can be effectively used for security and surveillance. Every individual has unique gait, which cannot be copied or imitated.

Report highlights that gait can be easily implemented in the smart phone available in the market, as they have the required hardware inbuilt (sensors). But after carefully examining the limitations of the gait, there is more research required in this field before it can be fully implement in practical, although to overcome the limitation it is recommended gait can be used in combination with other authentication methods biometric and traditional like pin or password. Search in the apps markets for biometric apps revealed that gait is of less interest among the app builder compared to other biometrics. Hence it can be concluded that gait as a technology is in a premature state and an extensive research work is required use this technology to secure and authenticate mobile phone.

References [1] Apple Inc 1, 2011. eyeD® Biometric

Password Manager by Winkpass Creations, Inc. [Online] Available at: http://itunes.apple.com/us/app/eyed-biometric-password-manager/id389295175?mt=8 [Accessed 14 May 2012].

[2] Apple Inc, 2011. Biometric Fingerprint Access By Fuzzy Squirrel Software, LLC. [Online] Available at: http://itunes. apple.com/us/app/biometric-finger print-access/id419601677?mt=8 [Accessed 14 May 2012].

[3] Asher, N B et al., 2011. On the needfor different security methods on mobile phones. New York, USA, Mobile HCI '11.

[4] Ayyappa, E, 1997. Normal Human Locomotion. Journal of Porsthetics and Orthetics, 9(1), p. 10–17.

[5] Bashir, K, Xiang, T & Gong, S, 2010. Gait recognition without subject cooperation. Journal Pattern Recognition Letters, 31 (13), pp. 2052-2060.

[6] BenAbdelkader, C, Cutler, R & Davis, L, 2002. Stride and Cadence as a Biometric in Automatic Person Identification and Verification. s.l., Microsoft Research.

[7] Birren, J E & Schaie, K W S, 2005. Handbook of the Psychology of Aging. 6th ed. s.l.:Academic Press.

[8] Bloom, L et al., 2004. Investigating the Relationship Between Battery Life and User Acceptance of Dynamic, Energy-Aware Interfaces on Handhelds. Mobile Human-Computer Interaction – MobileHCI 2004 , Volume 3160, pp. 43-79.

[9] Carmines, E G & Zeller, R A, 1979. Reliability and Validity Assessment (Quantitative Applications in the Social Sciences). London: Sage Publications Inc.

[9] Chan, C W & Rudins, A, 1994. Foot Biomechanics DuringWalking and Running. Mayo Clinic Proceedings, Volume 69, p. 448–61.

[10] Christopher, 2010. Smart Phones that Know Their Users by How They Walk. [Online] Available at: http://www.technologyreview.com/blog/mimssbits/25767/ [Accessed 01 May 2012].

[11] Derawi, M O, Nickel, C, Bours, P & Busch, C, 2010. Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition. Norway, The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt.

Continued on Page 27

Page 25: CSIC 2014( April )

CSI Communications | April 2014 | 25

Research Front

Resource Allocation Algorithm to Improve the Quality-of-Service in OFDMA System

R L Ujjwal*, Prof. C S Rai** and Prof. Nupur Prakash****Asstt. Professor, University School of Information and Communicaton Technology**University School of Information and Communicaton Technology***VC, Indira Gandhi Delhi Technological University for Women

IntroductionWireless mobile communications play a very important role in our life. It provides the communication services anywhere and at anytime. In order to improve quality of service, determined on the basis of acceptable data transfer rate, signal to noise ratio (SNR) and bit error rate (BER), it is imperative to provide high capacity downlink in cellular systems. It can be achieved by management of resources in orthogonal frequency division multiple access (OFDMA) systems. Recently, the OFDMA technique became popular which can provide broadband transmission over wireless channels for applications including wireless multimedia and future generation mobile communication systems. The OFDMA divides the entire transmission bandwidth into N orthogonal subchannels (It make possible to eliminate intersymbol interference that is a major problem in the wideband transmission over multipath fading channels). There are two types of allocation schemes. First one is static resource allocation, such as frequency division multiple access (FDMA) and time division multiple access (TDMA). These schemes are not optimal because they are fixed regardless of the current channel condition. Second one is dynamic resource allocation, such as OFDMA which allocates channels adaptively to the users based on their channels gain.

System ModelThe OFDMA is a system that assigns subcarriers to different users concurrently. It means, more than one users can access the air interface at the same time. The OFDMA transmitter is same as OFDM transmitter with some additions. In OFDMA a user uses all channels at a

time, while in OFDM the different users can used different channel at the same time. The basic structure of the OFDMA transmitter in IEEE 802.16e standard is shown in Fig. 1. The stream of information bits from the MAC layer are first fed into the data randomizer, MSB first. The data randomizer XORs the bits with bits produced by a shift register. The randomizer is applied only to information bits and is present in both the uplink and the down link. The purpose of randomization is to avoid long sequences of consecutive “1” or “0” in bits stream. A long run of “1” or “0” can lose synchronization at the receiver side. After data randomization, the scrambled (Randomize) bits go into the forward error correction (FEC) function, which uses an error-correction code to add redundancy bits for error correction. The interleaving process is performed on encoded data at the output of FEC. The purpose of interleaver is to protect the transmission against long sequences of consecutive errors, which are very difficult to correct. The interleaver operates in two phases that is frequency space and constellation space. In frequency space, the consecutive coded bits are reordered to make sure that these bits are later mapped to nonadjacent subcarriers for frequency diversity. In constellation space, the consecutive coded bits are reordered to make sure that these bits are later mapped fairly to more and less significant bits of the constellation. The purpose of repetition function is to increase reliability of the transmitted bits. The bits may be repeated by a repetition rate of 2, 4, and 6. After the repetition, the symbol mapper maps the bits to data symbols based on the constellation used. The pilot insertion function inserts pilot symbols.

The purpose of pilot symbol is channel estimate. After pilot symbol insertion, the high rate stream of data symbols goes to the serial-to-parallel converter that converts high rate serial stream of data symbols into low rate parallel substream, where the number of substream may be equal to number of subcarriers in OFDMA system. Then the data symbols go into the subcarrier mapper, which assigns the individual data symbols to the individual subcarriers. The subcarriers mapper is necessary in the OFDMA system because the different data symbols may have come from different users, and assigning data symbols to different subcarriers allows multiple users to access the air interface simultaneously.

Fig. 1: Block diagram of OFDMA transmitter

The output of subcarriers mapper goes to inverse fast Fourier transform (IFFT) where, the data symbols transform from the frequency domain to the time domain. Then, the transformed symbols along with cyclic prefix symbols go into parallel-to-serial converter, which arranges the transformed symbols in time domain serially. The output of parallel-to-serial converter is a block of K transformed symbols, and this block is called an OFDMA symbol. The digital-to-analog converter changes the time domain digital data to analog signal, then RF modulation is performed and the signal is up-converted to transmission frequency and finally transmitted over the air.

Wireless mobile communications play a very important role in our life. It provides the communication services anywhere and at anytime. In order to improve quality of service, determined on the basis of acceptable data transfer rate, signal to noise ratio (SNR) and bit error rate (BER), it is imperative to provide high capacity downlink in cellular systems. It can be achieved by management of resources in orthogonal frequency division multiple access (OFDMA) systems.

Page 26: CSIC 2014( April )

CSI Communications | April 2014 | 26 www.csi-india.org

Let us denote the numbers of subchannels by N and number of users by K. The resource allocation scheme provided to the OFDMA transmitter. We assume that all K users in the system share N subchannels with total transmit power constraint Ptotal and bandwidth B. The channel information is fixed in each time slot and only the broadband scenario is considered. At the base station transmitter, the bits for each of the different K users are allocated to the N subcarriers, and each subcarrier n (1 ≤ n ≤ N) of user k (1 ≤ k ≤ K) is assigned a power pk,n.

Resource Allocation Algorithm The quality-of-services can be improved through optimum resource allocation to users in OFDMA system. An optimal algorithm can allocate subcarriers and power to the users on the basis of the quality of service requirements and increases the capacity of system. The users are divided in two categories that is sensitive user (SU) category and general user (GU) category, differentiated on the basis on required data transfer rate, signal to noise ratio, and bit error rate. The users of SU category are more sensitive and require guaranteed QoS, application like audio and video. The users of GU category are less sensitive and require less QoS compare to the users of SU category, services like E-mail, SMS etc. In this resources allocation algorithm, the higher priority is given to the users of SU category in assigning sub-carrier but initially the each user gets a sub-carrier that makes algorithm fair and avoid starvation for users of GU category. In this algorithm, sub-carrier and power allocation performed sequentially that reduces the complexity of algorithm.

The resource allocation algorithm can be described as:1. Initialization - User k = 1, 2… K Where – K is total number users in a

system - A is a set of available sub-carriers and

A = 1, 2… N

Where - N is number of sub-carriers. - Estimate the number of sub-

carriers required by each user - The data rate Rk = 0 for all k and

a set of assigned sub-carriers to a user is empty (Ωk =φ) for all k

2. Allocate a sub-carrier to each user of both type of categories if the total number of sub-carriers K is less than N

- Find a channel n that has highest channel-to-noise ratio.

- Allocates channel n to the user k and sets become Ωk = Ωk ∪ n and A=A- n

- If user category is SU than Update the data rate Rk for SU category Else Update the data rate Rk for GU category

3. While (A≠φ or until fulfill requirement of users of SU category)

- Find a channel n that has highest channel-to-noise ratio.

- Allocates channel n to the user k and sets become Ωk=Ωk ∪ n and A=A- n

- Update the data rate Rk for SU category

4. After fulfill the requirement of users of SU category, if any sub-carriers are available then that sub-carriers are allocated to users of GU category

- Find a channel n that has highest channel-to-noise ratio.

- Allocates channel n to the user k and sets become Ωk=Ωk ∪ n and A=A- n - Update the data rate Rk for GU category

Results and AnalysisThe wireless channel is modeled as a frequency-selective multipath channel. The total bandwidth is 5 MHz and it is divided in 32 subcarriers. The total power available at base station is 2W. The number of user for the system varies from 2 to 16 in increments of 2. In Fig. 2, simulation result is showing that the new efficient algorithm increases the OFDMA system capacity and bandwidth utilization that is all time high compare to existing algorithm developed by Rhee and Cioff. Also the algorithm is more optimal and fair where a set of proportional fairness

constraints is imposed and allocates best subcarrier to the user that improves the performance of the system.

Fig. 2: System capacity

Conclusion The results indicate that optimum allocation of resources under OFDMA system could be achieved through the proposed algorithm. The system is sensitive to requirements of different categories of users i.e. general users and sensitive users and is capable of according priority to sensitive users while ensuring that general users are not ignored. It demonstrates that the system capacity can be enhanced without compromising the fairness of allocation between different user categories.

References[1] J Joung, C K Ho, P H Tan and S Sun,

"Energy Minimization in OFDMA Downlink Systems: A Sequential Linear Assignment Algorothm for Resource Allocation," IEEE Wireless Communications Letters, vol. 1, no. 4, 2012.

[2] K W Choi, W S Jeon and D G Jeong, "Resouce Allocation in OFDMA Wireless Communications Systems supporting Multimedia Services," IEEE/ACM Transations on Networking, vol. 17, no. 3, June 2009.

[3] Z Mao and X Wang, "Effiecient Optimal and Suboptimal Radio Resource Allocation in OFDMS System," IEEE Transactions on Wireless Communications, vol. 7, no. 2, 2008.

[4] T S Rappaport, A Annamalai, R M Beuhrer and W H Tranter, "Wireless Communications: Past Events and a Future Perspective," IEEE Communication Magezine., vol. 40, pp. 148-161, May 2002.

The system is sensitive to requirements of different categories of users i.e. general users and sensitive users and is capable of according priority to sensitive users while ensuring that general users are not ignored. It demonstrates that the system capacity can be enhanced without compromising the fairness of allocation between different user categories.

Page 27: CSIC 2014( April )

CSI Communications | April 2014 | 27

Abo

ut th

e A

utho

rs

R L Ujjwal is working as Asstt. Professor in University School of Information and Communicaton Technology since 1st September 2006. He obtained his B.E. (Computer Science and Engineering) from M.B.M. Engineering College, JNV University Jodhpur in 1999 and M.E. (Computer Technology and Application) from Delhi College of Engineering, University of Delhi. His major areas of interests include: Wireless Communications, Computer Network.

Prof. C S Rai is working in University School of Information and Communicaton Technology. He obtained his M.E. degree in Computer Engineering from SGS Institute of Technology & Science, Indore. He completed Ph.D. in area of Neural Network from Guru Gobind Singh Indraprastha University in 2003. His teaching and research interests include: Artificial Neural Systems, Computer Networks, Signal Processing

Prof. Nupur Prakash is working as a VC, Indira Gandhi Delhi Technological University for Women. She received her B.E. (Electronics & Communication Engineering) and M.E. (Computer Science & Technology) degree from University of Roorkee (now I.I.T. Roorkee) in 1981 and 1986 respectively. She completed her Ph.D. (Computer Engineering & Technology) from Punjab University, Chandigarh in 1998 in the area of Natural language Processing using Artificial Neural Networks.

[12] Gafurov, D, 2008. Performance and Security Analysis of Gait-based User Authentication, Oslo: Ph.D. dissertation, Faculty of Mathematics and Natural Sciences, University of Oslo.

[13] Geng, X et al., 2010. Context-awarefusion:Acasestudy on fusion ofgaitand faceforhuman identification in video. Pattern Recognition , 43(10), pp. 3660-3673.

[14] Han, J & Bhanu, B, 2006. Individual recognition using gait energy image. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(2), p. 316–322.

[15] Jenkins, J & Ellis, C, 2007. Using ground reaction forces from gait analysis: Body mass as aweak biometric. Pervasive, p. 251–267.

[16] Kale, A A, 2004. Algorithms for gait-based human identification from a monocular video sequence, MD, USA: Ph.D. dissertation, College Park.

[17] Lee, L & Grimson, E, 2002. Gait analysis for recognition and classification. Cambridge, MA, IEEE, p. 155–161.

[18] Maltoni, D, Maio, D, Jain, A K & Prabhakar, S, 2009. Handbook of Fingerprint Recognition. 2nd ed. London: Springer Verlag.

[19] Mäntyjärvi, J et al., 2005. Identifying users of portable devices from gait pattern with accelerometers. Oulu, Finland, IEEE.

[18] Marks, G E, 2010. Manual of Artificial Limbs. New York: BiblioBazaar, LLC.

[19] Mjaaland, B B, Bours, P A H & Gligoroski, D, 2011. Walk the walk: attacking gait biometrics by imitation. Berlin, Heidelberg, Springer-Verlag.

[20] Nakajima, K, Mizukami, Y, Tanaka, K & Tamura, T, 2000. Footprint-based personal recognition. IEEE Transactions on Biomedical Engineeing, 47(11), pp. 1534-1537.

[21] Nixon, M S et al., 1999. Automatic Gait Recognition. Biometrics – Personal

Identification in Networked Society, p. 231–250.

[22] Søndrol, T, 2005. Using the Human Gait for Authentication, Gjøvik, Norway: MSc Thesis, Gjøvik University College, NISlab.

[23] Tanawongsuwan, R & Bobick, A, 2002. Performance analysis of time-distance gait parameters under different speeds. Guildford, UK, ACM, pp. 715-724 .

[24] Tanviruzzaman, M, Ahamed, S I, Hasan, C S & O’brien, C, 2009. ePet: When Cellular Phone Learns to Recognize Its Owner. ACM, pp. 13-17.

[25] Vaughan, C L, Davis, B L & O'Connor, J C, 1999. Dynamics of Human Gait. 2nd ed. Cape Town: Kiboho Publishers.

[26] Wang, S & Liu, J, 2011. Biometrics on mobile phone, Recent Application in Biometrics. Beijing, China: InTech.

n

Abo

ut th

e A

utho

r Kamal Sharma is currently working as Technical Consultant with Mcafee India (An Intel Company). He has over 15 years of rich IT Experience IT Infrastracture and IT Security Domain. He hold Masters degree in computing from University of Central Lancashire, UK. During the work tenure has working for organizations like IBM, Symantec, Trend Micro and Symantec. His areas of specialization are Comptuer Networks and Security and has been subject matter expert for various security software’s like DLP (Data Loss Prevention), Cloud / Virtulization Security and Encryption.

Continued from Page 24

[5] Z Shen, J G Andrews and B L Evans, "Optimal Power Allocation in Multiuser OFDM Systems," in IEEE Global Communications Conference, December 2003.

[6] C Y Wong, R S Cheng, K B Lataief and R D Murch, "Multiuser OFDM System with Adaptive Subcarrier, Bit, and Power Allocation," IEEE Journal on

selected Areas in Communications, vol. 17, Oct 1999.

[7] W Rhee and J M Cioff, "Increase in Capacity of Multiuser OFDM System using Dynamic Subcannel Allocation," in IEEE vehic. Tech. Conf., Tokyo, May2000.

[8] G Zhang, "Subcarrier and Bit Allocation for Realtime Services in

Multiuser OFDMA Systems," in IEEE International Conference, Jun. 2004.

[9] H Yin and H Liu, "An Efficient Multiuser Loading Algorithm for OFDM-based Broadband Wireless Systems," in IEEE Global Telecommunications Conference, 2000.

n

Page 28: CSIC 2014( April )

CSI Communications | April 2014 | 28 www.csi-india.org

The term ‘Cellular Automata’ represents a rather broad class of computational systems. There are a number of common features, but the only universal property is that they are made up of a number of discrete elements called cells. Each cell encapsulates some portion of the state of the system. Typically, the cell population is homogeneous, each one encapsulating an equal portion of the state, and arranged spatially in a regular fashion to form an n-dimensional lattice. A Cellular Automata has the following features:

1. It consists of a number of indistinguishable cells (often several thousand or even millions) arranged in a regular lattice. The cells can be placed in a long line (a one-dimensional CA), in a rectangular array or even occasionally in a three-dimensional cube. In social simulations, cells may represent individuals or collective actors such as countries.

2. Each cell can be in one of a small number of stages – for example, ‘on’ or ‘off’, or ‘alive’ or ‘dead’. We shall encounter examples in which the stages represent attitudes (such as supporting one of several political parties), individual characteristics (such as racial origin) or actions (such as cooperating or not cooperating with others).

3. Time advances through the simulation in stepladder. At each time step, the stage of each cell may change.

4. The stage of a cell after any time step is determined by a set of rules which specify how that stage depends on the previous stage of that cell and the stages of the cell’s immediate neighbours. The same rules are used to update the stage of every cell in the lattice. The model is therefore consistent with respect to the rules.

5. Because the rules only make reference to the stages of other cells in a cell’s vicinity, cellular automata are best used to model situations where the interactions are local.

For example, if gossip spreads by word of mouth and individuals only talk to their immediate neighbours, the interaction is local and can be modelled with a CA.

To summarize, cellular automata model a world in which space is represented as a uniform lattice, time advances by steps, and the ‘laws’ of the world are represented by a uniform set of rules which compute each cell’s stage from its own previous stage and those of its close neighbours.

Neighbourhood ClassificationIn classic cellular automata theory there are three types of neighborhoods. They

are different in shape and size. Other configurations have been proposed but were not accepted.

Types of Cellular AutomataLinear CA–Based on XOR logic– Total 7 rules (60, 90, 102, 150, 170, 204, 240)

–Can be expressed through matrix (T),- characteristic polynomial–Next state of the CA cell P(t+1) = T. P(t)

60 102 150 204

1 0 0 00 1 1 00 1 1 10 0 0 1

T=

Additive CA–Based on XOR and XNOR logic– Total 14 rules (linear rules + 195,165,153,105,85,51,15)

– Can be expressed through matrix, inversion vector, and characteristic polynomial

– The next state of the CA cell P(t+1) = T. P(t) +F60 153 105 204 0 1 1 0F=

Some rules out of 256 are as follows:-

XOR Logic XNOR Logic

Rule 60 : qi(t+1) = qi-1(t) ⊕ qi(t)

Rule 195 : qi(t+1) = qi-1(t) ⊕ qi(t)

Rule 90 : qi(t+1) = qi-1(t) ⊕ qi+1(t)

Rule 165 : qi(t+1) = qi-1(t) ⊕ qi+1(t)

Rule 102 : qi(t+1) = qi(t) ⊕ qi+1(t)

Rule 153 : qi(t+1) = qi(t) ⊕ qi+1(t)

Rule 150 : qi(t+1) = qi-1 (t) ⊕ qi(t) ⊕ qi-1(t)

Rule 105 : qi(t+1) = qi-1(t) ⊕ qi(t) ⊕ qi-1(t)

Rule 170 : qi(t+1) = qi-1(t)

Rule 85 : qi(t+1) = qi-1(t)

Rule 204 : qi(t+1) = qi (t)

Rule 51 : qi(t+1) = qi (t)

Rule 240 : qi(t+1) = qi+1(t)

Rule 15 : qi(t+1) = qi+1(t)

CA Technology for Target Applications• Error Correcting Codes• Pattern Recognition• Modelling of Physical Systems• Cellular Mobile Network• Classification• Data Compression• Cryptosystem• Authentication• VLSI Circuit Testing

ConclusionCellular Automata have been around since 1950. Geography was hesitant to adopt CA as an urban modeling technique (it didn’t happen before the mid-1980s). Since then, many extensions of CA have been proposed, some effective, others not. Nowadays CA is a valuable tool for spatially distributed modeling with many applications (urban growth, wildfire spread and transportation).

References[1] J Von Neumann, “The Theory of Self-

Reproducing Automata”, University of Illinois Press, Urbana, Ill, 1966.

[2] A Llachinski, “Cellular Automata: A Discrete Universe”, World Scientific Publishing, Singapore, September 2001.

[3] S Wolfram, “A New Kind of Science”, Champaign, IL: Wolfram Media, 2002.

n

Cellular Automata

Dr. Rupali BhardwajAssistant Professor, Thapar University, PatialaArticle

Neighborhood state 111 110 101 100 011 010 001 000Next State 0 1 0 1 1 0 1 0 (Rule 90)Next State 1 0 0 1 0 1 1 0 (Rule 150)

Dr. Rupali Bhardwaj, born on July 24, 1976 at Dhampur, (UP). She had received post graduate degree (MCA) in 1999, from Gurukul Kangri University and doctorate degree from Bansthali Vidyapeeth, Rajasthan in 2011. She is working as Assistant Professor at Thapar University in SMCA dept. She has published over 15 research papers in International and National Journals of repute. She is life time member of CSI.

Abo

ut th

e A

utho

r

Page 29: CSIC 2014( April )

CSI Communications | April 2014 | 29

Practitioner Workbench

Wallace Jacob Sr. Asst. Prof. at Tolani Maritime Institute

Programming.Tips () »

Fun with 'C' Programs I. Is it possible to type, compile and execute a 'C' program without using the opening and closing curly braces? Well, the answer is: It is possible using the concepts of digraphs and trigraphs. Theoretically, trigraphs refers to three characters to represent a single character. The trigraph ??< represents the '' i.e. (open curly brace) and the trigraph ??> represents the closing curly brace. The program below illustrates the usage of trigraphs in a typical 'C' program.

Program listing one

#include<stdio.h>

main()??<

printf("Using trigraphs");

??>

In order to compile the program, the following instruction needs to be typed:

gcc <program-name.c> -trigraphs

On executing the program : ./a.out, the following output might appear:Using trigraphs

[Note: The trigraph ??= is for the # symbol, similarly ??/ is used for the \ symbol.

An alternative to using the '' and '' is the use of digraphs <% and %> respectively. The code in program listing two illustrates the use of digraphs:

Program listing two

#include<stdio.h>

main()<%

printf("Using digraphs");

%>

In order to compile the program, the following instruction needs to be typed:

gcc <program-name.c>

On executing the program : ./a.out, the following output might appear:Using digraphs

The trigraphs ??< and ??> are replaced by their single character equivalents by the 'C' preprocessor before any other processing, while digraphs are handled during tokenization.]

II. Is there any method of converting the terminal driver from line-at-a-time mode to character-at-a-time mode?line-at-a-time mode implies that the user

has to press the <ENTER> key to read the input from the terminal, character-at-a-time mode implies that as soon as the user types in a character it will be read from the terminal. There are several methods of converting the terminal driver from line-at-a-time mode to character-at-a-time mode. One of the methods of converting from line-at-a-time mode to character-at-a-time mode is illustrated below:

Program listing three

#include<stdio.h>

main() char ch;

system("stty raw"); /*for changing the terminal driver to character-at-a-time mode */

printf("\nEnter a printable character: "); ch=getchar();

printf("\n\nch = %c", ch);

system("stty cooked"); /*for changing the terminal driver to line-at-a-time mode */

return 0;

n

Wallace Jacob is a Senior Assistant Professor at Tolani Maritime Institute, Induri, Talegaon-Chakan Road, Talegaon Dabhade, Pune, Maharashtra. He has contributed articles to CSI Communications especially in the Programming.Tips section under Practitioner Workbench.

Abo

ut th

e A

utho

r

Kind Attention: Prospective Contributors of CSI Communications -

Please note that cover themes of future issues of CSI Communications are planned as follows -

• May2014-GraphTheory• June2014-SecurityinSoftwareDevelopment• July2014-BusinessAnalytics• August2014-SoftwareEngineering• September2014-ITHistory

Articles and contributions may be submitted in the categories such as: Cover Story, Research Front, Technical Trends and Article.

Please send your contributions before 20th April for consideration in May 2014 issue.

For detailed instructions regarding submission of articles, please refer to CSI Communications March 2014 issue, where Call for Contributions is published on page 37.

[Issued on behalf of Editors of CSI Communications]

Page 30: CSIC 2014( April )

CSI Communications | April 2014 | 30 www.csi-india.org

Programming.Learn("R") »

Packages in RIn this issue, let us discuss about the packages in R. Packages help us to organize functions, data, code etc. in a well defined format. Package is a collection of related set of functions, data files, help files etc. provided for addressing a particular problem. They are intended for various purposes such as statistical analysis, graphics display, industrial applications. R provides a standard set of packages which are available in any R installation. Other packages are available from public package repositories, which have to be downloaded and installed. Collection of these packages are stored in the R libraries. To use a package, it should be loaded into R environment. Packages can be operated either by GUI (Fig. 1) or through commands.

Fig. 1 ‘Packages’ menu in R GUI

Listing PackagesTo list out the packages available in R, we can use the command library ( ). This will list out all the set of available packages in a new window as given in Fig. 2. The list of all packages installed in the system can be obtained by the command installed. packages ( ).

Certain packages are loaded on startup by default. This can be listed by using the command getOption ("defaultPackages").

Example:> getOption ("defaultPackages")

[1] "datasets" "utils" "grDevices" "graphics" "stats" "methods"

Loading Packages For using the remaining packages that are not loaded by default, we have to load them using commands or by using GUI. For loading a particular package the command library ( ) is used, with the package name as argument.

In R GUI, we can load a package using the Load Package option in the Packages menu.

Finding and installing Packages inside RR provides several repositories for browsing packages. The major repositories are CRAN and Bioconductor. CRAN is

hosted by the R foundation and Bioconductor is an open source project for building tools to analyze genomic data. By default, R fetch packages from CRAN. In the R interface, we can choose repository from the Select repositories option.

Packages can be installed using R GUI and also through the console. Packages are installed automatically into the R library.

Using R console: We can download the package using an internet connection and install packages through the console. For installing packages through the console use the command install. packages () with the package name as the argument. The repository from where the packages have to be downloaded is given using repos parameter.

Example:

install.packages('RMySQL', repos='http://cran.us.r-project.org')

We can also remove the installed packages using the remove. packages( ) command.

Using R GUI : In R GUI, from the Packages menu, select Install

package(s). Then R will list out all available mirrors. We have to choose the mirror which is geographically close. Then select the package we want to install and click OK. There is likewise an option in the menu for installing packages from the zip file that we have already downloaded. This can be done by using the option Install package(s) from local zip files in the Packages menu.

n

Practitioner Workbench

Umesh P and Silpa BhaskaranDepartment of Computational Biology and Bioinformatics, University of Kerala

Fig. 2 Using library () command

"By connecting a device to the Internet, it is transformed from a stand-alone unit—which attracts a one-off payment—into a service that generates recurring income. Value in the IoT lies not in the devices, but in selling new services off the back of them." - Wall Street Journal

Page 31: CSIC 2014( April )

CSI Communications | April 2014 | 31

Abstract: With each passing day, the number of gadgets that are connecting to the Internet is surpassing the number of people connecting to the Internet. This technology trend is pursued actively by the automotive industry, which is working on developing a ‘Connected Car’. In this article, we present a brief on how the automotive industry is on course to a disruptive transformation with developments around smarter vehicles and related infrastructure. While technologies mature, we believe the world will witness an intermediate wave, enabled by a healthy pairing of cars with smartphones.

Introduction After the global proliferation and rapid consumerization of smartphones, the next disruptive transformation predicted is the concept of ‘Internet of Things’. From networked computers, to connected people, we are now moving towards connected ‘things’. Various sensors embedded in personal devices, household & industrial appliances, consumer and enterprise equipment, including clothing and vehicles are turning items and things of daily use into smart devices. With pervasive connectivity mechanisms, these devices can interact with each other with little or no human intervention, thereby conjuring a humongous network – the Internet of Things! The ability to sense and send data over remote locations to enable detection of significant events and take relevant actions sooner than later, is the primary tenet behind the Internet of Things (IoT).

IoT in Automotive Space There have been exciting recent developments around IoT in the

automotive industry. Automakers, telecommunication service providers and leading technology companies are coming together to build the Connected Car.

The Apple versus Google battle has transcended the smartphone boundaries to smart cars. The year of 2014 started with Google announcing the formation of an Open Automotive Alliance with top car manufacturers (GM, Honda, Audi, Hyundai) and chipmaker NVIDIA, to bring Android OS into car dashboards. Apple soon followed with the release of CarPlay in early March with Volvo, Ferrari, Mercedes-Benz and later with other automakers such as BMW, Ford, Jaguar, Honda, Nissan, etc. Prior to this, QNX (now owned by BlackBerry) has been commonly providing an enhanced, embedded platform with connectivity for infotainment in high-end automobiles. These big players in mobile platforms are setting their eye on creating a common platform to allow a connected experience across the smartphone and the vehicles.

Closer home, Mahindra Reva’s e2o is the first and only Indian car with ‘anywhere, anytime’ connectivity with the customers. Together with Vodafone as the connectivity solution provider, it offers telematics features for convenience and safety.

Telecom Service Providers (TSPs) are actively contributing in this space with dedicated Machine-to-Machine communication services through embedded SIM chips. Vodafone is working with BMW and Volkswagen to bring connectivity to their vehicles. AT&T provides a modular platform – Drive with 4G LTE network connectivity for automakers to offer customized features such as diagnostics, voice recognition, entertainment and automotive app store,

for an enhanced in-vehicle experience for users. This will also enable the car to act as a Wi-Fi hub, wherein all passengers connect to a single access point for an enhanced and immersive experience of being connected on-the-go.

Infotainment Infotainment refers to a system that brings information functions (i.e., navigation, location-based services, rear seat web browsing, social networking, etc.) into the vehicle’s entertainment system. In the past, high-end car manufacturers provided Infotainment systems with very limited functionality and connectivity and users had no choice but to depend on the apps provided by the automaker. The approach taken by Apple to bring iOS to the car will extend the iPhone to the vehicle. CarPlay integrates the iPhone apps with the car’s dashboard system once the latter is plugged in via the USB. So, the user can use the phone and messaging functions, play music from iTunes, watch videos and run navigation apps on the in-dash display with a touch screen interface. Apple’s voice-companion - Siri will also allow actions through vocal commands with minimal distraction while driving. Similarly, the Google Projected Mode is tipped to bring Android to the dashboard and offer the calls, messaging, navigation and multimedia functions to the vehicle. Coming to the main advantage, this would also bring the entire apps ecosystem to the dashboard and present endless possibilities for an in-car experience - read out email and calendar reminders, order a pizza on the way to the restaurant, switch on the heater as you near your home – the list could be endless.

Vehicle Communications As more and more connected cars emerge and in-vehicle embedded connectivity becomes common, a whole new paradigm of vehicle communications is set to unfold.

Madhusudhan Reddy Nukala*, Shreyas Bhargave** and Bipin Patwardhan****Principal Architect, iGATE**Technology Consultant, iGATE***Sr. Technical Architect, iGATE

CIO Perspective

Managing Technology>>

Transforming the Automotive Industry with Connected Cars – An Internet of Things Perspective

There have been exciting recent developments around IoT in the automotive industry. Automakers, telecommunication service providers and leading technology companies are coming together to build the Connected Car.

Page 32: CSIC 2014( April )

CSI Communications | April 2014 | 32 www.csi-india.org

Vehicle-to-Vehicle (V2V) communication, i.e. wireless exchange of the position, speed and location data between near-by vehicles can help to sense impending threat and offer the opportunity to improve the safety of commuters significantly. Each vehicle will continuously broadcast an ‘I Am Here’ message along with the speed and position from its computer.

Vehicle-to-Infrastructure (V2X) communication is the wireless exchange of information between vehicles and roadside infrastructure. The vehicles in transit will communicate with the roads, digital signage, traffic lights, safety and control systems. This can avoid crashes and traffic congestion through intelligent safety applications. As a result, it will enable recognizing high risk situations in advance and help take mitigation measures in a timely manner by issuing alerts and safety advisories. Drivers can also be made aware of various other conditions such as roadwork, diversion and adverse weather conditions.

These mechanisms together will not only facilitate in reducing the number of accidents and casualties but also in tracking, tracing and monitoring vehicles on the move. Even in the event of emergency, vehicles would be able to quickly intimate details to roadside assistance, emergency services, insurance providers as well as family members. In effect, the capability of V2V and V2X communications will play a major role in securing the safety of man and vehicle alike.

Vehicles and Smartphones – A Potent Combination As the integration with smartphones and vehicles gets deeper, the information exchange will be two-way – Smartphone to Vehicle and vice versa. Using the On-Board Diagnostics (OBD/OBD-II) data, information regarding engine and other crucial vehicle parameters can be displayed on the driver’s smartphones and same can be sent to service provider for analysis. Alerts related to the car and performing actions on certain vehicle parts will become seamless.

Actions • Lock/Un-lock vehicle doors• Roll windows up/down• AC temperature +/-

Alerts/Notifications• Open doors• Lights ON• Hand brake ON

Thus, leveraging the smartphones to the fullest without depending on vehicles having connectivity embedded within can potentially bring out smart cars sooner. At iGATE, we have developed a few solution prototypes around the driver monitoring, crash detection and vehicle diagnostics. These applications demonstrate the profiling of a driver for a trip based on the occurrences of pre-defined significant events, detecting a crash and triggering alerts to pre-configured contact numbers as well as on-device analytics with complex event processing to provide continuous feedback to the driver. The concept applications have been developed using on-board sensors and suitable micro-controllers.

Smartphone sensors for driving insights Commercial smartphones commonly have sensors such as Accelerometer, Gyroscope or Orientation sensor and GPS. By docking the smartphone to the vehicle, data from these sensors can be used to detect driving patterns such as sharp turns, sudden acceleration, hard braking, drifting and speeding. This can be used to profile the driver as safe or aggressive, to rate and compare different drivers and share such data with insurance providers for customized premiums. Pay-As-You-Drive (PAYD) and Pay-How-You-Drive (PHYD) are the upcoming offerings from auto insurance companies that reward safe drivers and penalize rash ones with differential premiums.

Smartphones paired with vehicle sensors for emergency alerts In case of an accident, paring on-board sensors with passengers’ smartphone

enables a mobile app to intimate emergency services with vital information about the location and impact of the crash. The app can also trigger SOS alerts to near and dear ones to inform about the incident. It can also be programed to notify life-saving information like blood group and other health records of the passengers to enable paramedics to respond accordingly.

On-Board Diagnostics for on-device analytics The On-Board Diagnostics (OBD/OBD-II) port is commonly used in automobile service and maintenance. While much of the information from this such as faults, vehicle and engine speed, engine temperature, fluid levels, gear shifts, battery status, etc. is accessed regularly at vehicle repair shops, till now it was largely used for post-facto analysis; i.e. only when some problem arises. However, with smartphones pairing with vehicles, this information can be readily made available to the vehicle owners, giving them a better picture of the car performance. Monitoring these parameters actively and with some level of on-device analytics, drivers can get proactive service alerts on their smartphones and potential faults can be identified for early diagnosis and care.

For predictive analytics to be effective, the vehicular data from a large number of vehicles needs to be aggregated for detailed study and analysis. While that can help to detect and derive patterns, a subset of the rules can be made available for users through smartphone apps.

Conclusion We are used to being connected as home, at work and at many other places. Experiencing the same level of connectivity when on the road in a seamless manner will be a natural extension of our digital lives. As cars get smarter and pair up with the other cars, smartphones and things, suitable analytical processing can be applied to various operational parameters along with the near-by happenings, allowing automobile drivers as well as road safety authorities to get better visibility about the performance of the vehicle as well as the ambient situation, allowing for timely actions. As our cars get on to the Internet bandwagon, a much smarter, interconnected and well-informed world of enhanced safety, security and convenience awaits us. n

Continued on Page 35

As cars get smarter and pair up with the other cars, smartphones and things, suitable analytical processing can be applied to various operational parameters along with the near-by happenings, allowing automobile drivers as well as road safety authorities to get better visibility about the performance of the vehicle as well as the ambient situation, allowing for timely actions.

Page 33: CSIC 2014( April )

CSI Communications | April 2014 | 33

Information Security »

Security Features in Contemporary Browsers and Tips for Safe Browsing

Security Corner Krishna Chaitanya Telikicherla*, Harigopal K B Ponnapalli** and Dr. Ashutosh Saxena****Research Associate, Security and Privacy Research Lab, Infosys**Principal Research Analyst, Infosys, India***Principal Research Scientist, Infosys, India

Abstract: This article is the tenth in the series of articles, focusing on security of the web platform. In our previous articles, we have explained about the security policies implemented by browsers, some of the web application vulnerabilities and their mitigation techniques. In the last article, we have shifted our focus from developers to end users, explaining some of the important security features provided by modern browsers. In this article, we continue with the same theme and explain few more security and privacy features provided by modern browsers and also share a few tips for having a safe browsing experience.

IntroductionWith the growth of e-commerce, social networks and several other web based transaction systems, the amount of sensitive information which an average web user stores on the web is increasing rapidly. Attackers constantly find ways of stealing sensitive data of end users using various techniques, of which social engineering tricks are some of the most prominent ones. Modern browsers have several features which prevent malicious attempts of attackers such as opening popups, spreading malware etc. In the last article, we have explained about phishing and malware filters and SSL/TLS features which are built into modern browsers. In this article, we will explain about private browsing mode, popup blockers, domain highlighting features provided by browsers and a few generic tips for safe browsing.

Security and Privacy Features Provided by BrowsersAs mentioned in the last article, browsers come up with several inbuilt security and privacy features which protect users from various threats. Some of them are explained below:

Private browsing modeWeb browsers cache information such as cookies, browsing history, images, auto-fill form data etc., which can be retrieved at a later point of time. The cached data prevents unnecessary roundtrips to servers and often enhances user experience. However, this data can be misused by people with malicious intent, especially in the cases of shared machines (e.g., public kiosks). Though browsers provide a way to delete cookies, clear history, cache etc. through various browser settings, an average web user will not be familiar with these options. Therefore, users leaving behind

traces of their browsing history, which compromises their privacy. To mitigate this privacy problem, modern browsers came up with a private browsing mode, which is known with different names in different browsers (e.g., “Incognito” mode in Chrome, “InPrivate Browsing” in Internet Explorer and “Private Browsing” in Firefox). In a private browsing mode, data entered in forms, browsing history, new cookies etc. will not be available to future browsing sessions once the private mode window is closed. Also, browser extensions will be disabled in this mode by default, thereby preventing extensions from stealing user’s data in a webpage. So on a shared machine at an Internet kiosk, a user will not be able to find out what sites the previous user visited, if private mode is used. It should be noted that the privacy provided by this mode is purely on the client side. Any intermittent proxy server can maintain a log of websites visited by a user.

Popup blockersPopups are windows that open automatically, without the intervention or permission of end users. Advertisers use popups to promote their business by attracting the attention of users. Several websites which accept online payments open their banking partner’s website via popups. Though popups are useful for several genuine purposes, they are also the cause of several security problems. Attackers use popups as a mechanism to conduct social engineering attacks and spread malware. To prevent users from falling prey to popup-based attacks, browser vendors have introduced inbuilt popup blockers into their browsers, which block all popups by default. Users are prompted with a message informing that popups are blocked on the site they are visiting (see Fig. 1). They can

add exceptions if they feel that popups on certain sites are required for certain important interactions (e.g., online banking scenario).

Domain highlightingPhishing is a technique commonly used by attackers to trick end users and steal sensitive information of users. In a typical phishing attack, an attacker creates a fake webpage which mimics a genuine website and spreads it to users. If an unsuspecting user visits the page and submits sensitive data, the attacker will gain access to it. To strengthen the attack, attackers normally use sub domains which are deceptive e.g., http://www.icicibank----------.evil.com. At a quick glance, it appears that the site being visited belongs to ICICI bank, but it is only a subdomain which is cleverly crafted by the attacker. To prevent users from falling prey to such tricks, modern browsers highlight the domain name of the site and grey out the rest of the URL in the address bar. Fig. 1 shows that the domain “popuptest.com” is clearly highlighted and distinguished from rest of the URL by all three browsers (IE, Firefox and Chrome). This important visual clue helps web users to quickly identify the domain they are visiting.

Few Tips for Safe BrowsingPrivate browsing, popup blocking, domain highlighting are some of the features which are directly provided by browser vendors. While leveraging these features, users should also follow certain practices to ensure a safe browsing experience. Some of them are listed below.

Sensitive Data ManagementWe have seen that private mode helps in deleting all traces of a user’s browsing session. However, in cases where users browse with older versions of browsers which do not support private mode (e.g., in Internet kiosks), users should manually

Page 34: CSIC 2014( April )

CSI Communications | April 2014 | 34 www.csi-india.org

delete the traces. While most browsers provide features to auto fill forms, remember passwords, recover from crash, etc., they are primarily meant for users who use a secure personal machine. While it is not advisable to do sensitive operations at public kiosks, a safe browsing practice should include deleting sensitive data traces like cookies, history before closing the browser. A browser with private mode is a better alternative since it does not leave any traces after a browsing session is concluded.

Auto-UpdateSecurity is a continuous process and is not a one time job. Attackers keep innovating new ways of exploiting browsers, vendors come up with patches to fix them. It is very important for end users to regularly update their browser to a latest version that in all probability offers better security. However, uses rarely update their browsers, which challenges browser vendors to provide a safe browsing experience. Contemporary browser vendors provide an option to auto-update browsers to the latest versions in the background without requiring much interaction from users. Auto-update feature relieves the end user from requiring to download and apply latest patches. If users want to manually verify if a latest version is available, they can visit the “About” section of their browser settings

page. The auto-update feature is turned on by default and users can opt to turn it off (not recommended though).

Installing browser extensionsUsers should be extremely watchful before downloading free browser extensions and add-ons that claim to add several interesting features (e.g., extension which pose as video codecs). They might be potential malware. Browser extensions and add-ons become

a part of the running browser application and will have elevated access to otherwise sensitive inaccessible data. Hence, it is very trivial for a rogue extension to silently export a user’s sensitive data to a spammer. Users are suggested to carefully evaluate the reputation of browser extensions and the permissions they seek, before installing them.

Logging out of a websiteUsers often think that closing the browser directly without logging out is a more secure option. Contemporary browsers have an option to reopen a user’s last browsing session. Depending on the site’s design, this may allow an attacker to automatically login as a user, to a user’s previously visited site. Hence, it is very important that users properly logout of websites before they quit the browser.

Saving bookmarksUsers bookmark interesting websites to refer them at a later point of time. While it is a good provision, if the URL contains any sensitive data like username, password, session Id, they will also be saved in the bookmark. An attacker who has access to that machine can view this sensitive data easily. While bookmarking an interesting site, it is good to watch the URL in address bar and not to bookmark it if it contains any sensitive data.

Using the “Remember Me” featureMost of the popular websites offer a “Remember Me” feature that allows users

Fig. 1: Popup blockers in IE10 and latest versions of Firefox, Chrome blocking popups automatically

Fig. 2: Internet Explorer (IE10) showing an option to reopen the last browsing session

Page 35: CSIC 2014( April )

CSI Communications | April 2014 | 35

to login into websites for the next time without entering credentials. Most of such features assume the user to use a secure personal machine. From a developer’s perspective, implementing this feature requires storing the credentials or a reference to them in a secure manner on the user machine itself. This leaves the user’s account open for attackers. It is very difficult to get such implementations correct and many attacks were reported which exploit this feature. It is always safe to re-enter the password every time a user logs into a web site, rather using the “Remember Me” feature.

ConclusionIn this article, we have explained some of the security and privacy features provided

by modern web browsers. We have also explained a few safety guidelines, using which users can have a safer browsing experience. The web is moving very fast with the introduction of several new specifications under the HTML5 umbrella. Newer browser architectures and security models are fast evolving. Though users of web browsers are not expected to keep track of these technical changes, they are expected to update to the latest versions of browsers to have a safe browsing experience. Disclaimer: All names of the websites, services and applications mentioned in this article are intended for informative purposes only with no malicious and /or promotional intents. Readers may

check with vendors, product and service providers for the latest updates. All trademarks, copyrights are owned by their respective owners.

References[1] PopupTest.com – A website to test

popup blocking software.[2] Incognito mode in Chrome: https://

s u p p o r t . go o g l e .co m /c h ro m e /answer/95464?hl=en

[3] Domain highlighting in IE8: h t t p : // b l o g s . m s d n .co m / b/i e /archive/2008/03/11/address-bar-improvements-in-internet-explorer-8-beta-1.aspx

n

Abo

ut th

e A

utho

rs

Krishna Chaitanya Telikicherla is a Research Associate with Security and Privacy Research Lab, Infosys Labs. His research focus is primarily on web security, specifically analyzing browser security policies, web attacks, defenses and formal verification of web specifications. He is a regular blogger and speaker at several developer and security meets in India. For his contributions to technical communities, Microsoft has presented him the prestigious “Most Valuable Professional (MVP)” award for 4 consecutive years (2010-2013). He can be contacted at [email protected]

Harigopal K B Ponnapalli is a Principal Research Analyst at Infosys, India. His research interests include web application security assurance, strong authentication and PKI. Ponnapalli received his M.Tech from the Indian Institute of Technology, Kharagpur, India. He has 15+ years of experience in application security. He authored multiple papers and coauthored a book titled "Distributed Systems Security: Issues, Processes and Solutions" (Wiley, 2009). He also filed a few patents to his credit. You can contact him at [email protected]

Ashutosh Saxena is a Principal Research Scientist at Infosys, India. His main research interest is Information Security. Dr. Saxena received his Ph.D in computer science and has more than 80 international publications and SEVEN granted patents. He’s a life member of CSI and senior member of IEEE. Contact him at [email protected].

Abo

ut th

e A

utho

rs

Madhusudhan Reddy Nukala (Principal Architect, iGATE): Madhusudhan has 14+ years of experience and is currently leading the IoT initiative in iGATE’s Research & Innovation Group. In addition to IoT, he has strong exposure to Enterprise Mobility, J2EE and EAI tools. He is active in providing technology consulting services and has been involved in defining and identifying technology standards and frameworks in the Enterprise Mobility and J2EE for top Fortune 500 companies. At iGATE’s Research & Innovation Group, he is involved in building hands-on experience on emerging technologies through the creation of prototype applications, proof-of-concepts, thought papers etc. Shreyas Bhargave (Technology Consultant, iGATE): With over 14 years of experience in IT industry, Shreyas is a technical architect and technology evangelist at the Technology Centre of Excellence in iGATE’s Research and Innovation group. His current focus is on exploring emerging technologies such as IoT, Wearables, Augmented Reality, Speech Recognition, Gamification, etc. and their adoption in businesses and software service companies. Prior to this, he had been active in the Enterprise Mobility and technology consulting. He holds a Bachelor of Engineering degree from Mumbai University and is pursuing Master of Science from BITS Pilani.

Bipin Patwardhan (Sr. Technical Architect, iGATE): Bipin has over 15 years of experience in the IT industry. At iGATE, he is part of the Future and Emerging Technologies group. The group explores new and emerging technologies including wearable computing, analytics and augmented reality, to name a few. Technology exploration is supported by the development of concept solutions to demonstrate suitability across various domains.

Continued from Page 32

Page 36: CSIC 2014( April )

CSI Communications | April 2014 | 36 www.csi-india.org

Information Security »

Security Aspects in Internet of Things Domain

Security Corner Tapalina Bhattasali*, Dr. Rituparna Chaki** and Dr. Nabendu Chaki****Ph.D Scholar, Department of CSE, University of Calcutta**Associate Professor, AKCSIT, University of Calcutta***Associate Professor, Department of CSE, University of Calcutta

Advances in wireless technology permit real-time acquisition, transmission and processing of huge amount of critical data. It has been seen that number of devices connected to Internet exceeds number of human beings around the world. According to Libelium report, number of devices connected to Internet will reach to more than 50 billion around the year 2020. There will be urgent requirement of huge data around bronto-byte (280 KB) in near future, which enhances demand for M2M communication. To connect to Internet, each device must have unique identity such as IP address. IPv4 protocol is not capable to handle huge number of devices, due to its limited address space (232). Beside this, IPv4 address space has been exhausted in February 2010. For this reason, IPv6 steps in. IPv6 address space of 2128 (approximately 340 undecillion or 3.4×1038) is equivalent to assigning 100 address to each atom on the surface of the world! Internet of Things (IoT) has its roots in these. It is an emerging concept which has the potential to make life more comfortable, with the vision of reducing human intervention. “IoT” term was introduced by Kevin Ashton of MIT Auto-ID Centre in 1999. The term “Internet of Things” composed of two words and concepts namely, “Internet” and “Thing”, where “Internet” can be defined as world-wide network of interconnected computer networks, based on a standard communication protocol TCP/IP protocol, while “Thing” is an object having independent existence, but not precisely identifiable. Therefore, “Internet of Things” means a world-wide network of uniquely addressable, interconnected objects, communicating with each other over hybrid network to built Internet like structure based on standard. Pervasive environment provides better service by hiding underlying technologies to adapt IoT. IoT incorporates concepts from pervasive, ubiquitous, and ambient computing. IoT device can be a sensor node, a light bulb, a microwave oven, a smart phone, a tablet, a PC or a laptop, a powerful server or a cloud. According to NIC, Internet nodes may reside in everyday things such as food packages,

furniture, paper documents and many more by the year 2025.

Fig. 1: Internet of Things

It creates heterogeneous environment by integrating Internet oriented features (middleware), things oriented features (sensors), semantic oriented features (knowledge). “5A” that is based on “Any” paradigm such as Anything, Anyone, Anywhere, Anyhow, Anytime can be easily implemented by using the concept of IoT. It is a major step towards the evolution of next generation network. According to ITU Internet Reports 2005, four dimensions of IoT have been presented in Fig. 2.

In order to make critical decisions and provide quick response to the users, IoT based applications involve real time decision making, which in turn needs

to support high volume network traffic being driven by an alarming number of heterogeneous devices. Major benefits of cloud-based intelligent IoT framework implementation can be summarized as follows.• No requirement of huge disk storage,

memory and resources during execution of any application.

• Used by different users from different locations using different devices at the same time.

• Support heterogeneous platforms and operating systems.

• Different versions of the application can be applied without upgrading user’s machine or software.

Technical Aspects of Internet of ThingsTechnology is a decisive factor for enabling the realization of the IoT concept. Following issues are going to build up IoT. According to Cisco, there is a difference between Internet of Things and Internet of Everything (IoE); where IoT is made up of billions of connected objects and IoE is the smart network that are required to support all the data generated and transmitted by these objects. IoT focuses mainly on objects or things, whereas IoE brings together people, process, data and things to make network connection more relevant and valuable.

Fig. 2: Four dimensions of IoT

Page 37: CSIC 2014( April )

CSI Communications | April 2014 | 37

Four dimensions of IoT are- Process (delivering right information to right place at right time); People (connecting people in valuable ways); Data (convert data into intelligence for better decision making); Things (Internet of Things). IoE is the integration of Machine to Machine (M2M), Machine to People (M2P), People to People (P2P) communications. Example includes SCADA (Supervisory Control and Data Acquisition), smart grid, smart building, (M2M); remote patient monitoring, smart parking (M2P); e-commerce site (P2P). Internet of Things includes M2M communication, Intranet of Things, Web of Things, Cloud of Things. M2M communication refers to the technologies that allow both wireless and wired systems to communicate with other devices. Intranet of Things refers to the network, where all the devices should be within local area network, hidden behind a firewall and locally controlled without supporting interoperability. Web of Things is an evolution of Internet of Things where everyday objects are connected by fully integrating them to the Web. It is about reusing the Web standard (such as URI, HTTP, etc.) to access the functionality of the smart objects. Auto-ID Lab recently used the term “Cloud of Things” (CoT) to connect physical objects to the cloud.

Unique addressing schemes for objects, their representation, and storage of the exchanged information and interoperability are surely going to be main challenges. It is very likely that IPv6, namely the IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN), is going to be the main candidate for interconnecting intelligent things since it has a potential of leveraging the two basic concepts which brought success to the conventional Internet, namely packet switching and the "end-to end" principle. The adaptation between full IPv6 and the specific 6LowPAN format can be performed by 6LowPAN routers, which are situated at the edge of 6LowPAN islands delimiting the constrained IoT environment from the conventional Internet. This greatly facilitates interoperability, optimization and security

management of end devices. It enables the use of IPv6 in low-power, low-bandwidth wireless networks with constrained processing capabilities. The focus must be on lightweight communications, since end devices are extremely resource-constrained in terms of computing, energy, and memory. Interconnection of such resource-constrained devices develops the front-end of an IoT system as opposed to the back-end supporting background processes like heavy computation, global interconnection via Internet etc. Most of the wireless communications between end devices in the IoT environments take place over unreliable channels. High level of interference could occur from other radio devices situated in close proximity to IoT. In this context, wireless personal area networks (WPAN) may be of interest as they consider low- power communication for resource-constrained devices. For instance, IEEE 802.15.4 standard introduces a radio technology for low-power, low-data-rate applications. It has become a basis for a number of low-power radio stacks, such as ZigBee, 6LoWPAN, due to its wide adoption and ubiquity. When it comes to widespread

adoption and interoperability, a family of 802.11 standards can be considered. Although it is feasible for personal computers, smart phones and other handheld devices, but relatively high power consumption has prevented it from adoption into the world of embedded communication. It has been claimed that the low-power versions of this popular standard have emerged recently thus paving the way for its integration into the environment of resource-constrained devices. Another wireless technology which can be seen as the enabler of IoT is bluetooth, particularly bluetooth low energy. Most of the emerging mobile phones are going to be equipped with low-energy bluetooth technology very soon, which is likely to provide for a sufficient basis to make it truly ubiquitous.

Security Issues Increase in number of devices and amount of data to support “Any” paradigm, raise security concern. One of the major challenges that must be overcome in order to push Internet of Things into the real world is security. IoT is forecast to become a major security risk in 2014 as more products are connected to Internet, according to predictions report by the Information Security Forum (ISF). The security threats are potentially devastating, so organisations must ensure that technology for both consumers and

Fig. 3: Cloud based intelligent IoT framework

IoT is forecast to become a major security risk in 2014 as more products are connected to Internet, according to predictions report by the Information Security Forum (ISF).

Page 38: CSIC 2014( April )

CSI Communications | April 2014 | 38 www.csi-india.org

companies adhere to high standards of safety and security. From the year 2014 onwards, attacks will continue to become more innovative and sophisticated. Therefore efficient security solutions must be prepared to tolerate unknown, unexpected, high impact security events. Security loopholes can occur at multiple places in an IoT environment. Following are the main issues which can determine security vulnerabilities that may arise in this type of environment. • Heterogeneous environment

and mobility of objects result in inconsistent interpretation of collected data. They have great influence over the protocol and network security service.

• Large volume of data transmission gives rise to scarcity of bandwidth which results in denial of service.

• It is open to several unique vulnerabilities because of its distributed and ad-hoc nature.

• Burden of traditional security features may be too large for limited resource objects.

• Tracking of interacting objects may become difficult in shared, unreliable wireless medium.

• Data shared with unknown objects, stored in third party domain, where probability of data security decreases.

• Smart applications such as smart healthcare, smart home, smart transport, and smart city may need to deal with user’s personal data that may lead to serious threats to privacy of the users.It poses enormous security and

privacy risks. Data confidentiality is considered to be the most important issue in this type of framework. This is required to protect the data from disclosure, and should not leak vital information to external or neighboring networks. Keeping the data confidential does not protect it from external modifications. An adversary can alter the data by adding some fragments or by manipulating the data within a packet. This packet can later be forwarded towards destination. Lack of

data integrity mechanism is sometimes very dangerous. Data loss can also occur due to improper communication environment. Apart from modifying the data packets, the adversary can also change a packet stream by integrating fabricated packets. The system should be capable to verify the original source of data. Adversary may sometimes capture data in transit and replay them later to create confusion. Most applications require accurate estimation of source of the event. Lack of smart tracking mechanisms allow an attacker to send incorrect reports about the location. Adversary may target availability of critical data by capturing or disabling a particular node, which may sometimes result in serious damage. Secure management of key distribution is another challenging task.

Major attacks on IoT Devices could be summarized as follows. • Physical Attacks - example: micro

probing. • Network Attacks – example: denial of

Service attack, routing attack. • Software Attacks- example: virus,

worm, logic bomb. • Environmental Attacks. • Side Channel Attacks – example:

timing analysis, power analysis. • Cryptanalysis Attacks-example:

cipher text only attack, man-in-the-middle attack.In completely automated

mechanisms, there is usually no prior knowledge about each other and cannot always be able to identify intruder. During transmission between smart objects in a network, it may be susceptible to eavesdropping, either for insufficient protection of communication medium or for use of compromised session key. Routing information in IoT can be spoofed, altered, or replayed. Other known relevant routing attacks include Sinkhole attack or Blackhole attack, Selective forwarding, Wormhole attack, Sybil attack.

There are several existing threats in IP-enabled environment. Security in IPv6 is almost same as IPv4 security in many ways. However, there basic differences between

the two have led to some new security vulnerabilities. In the transition period, coexistence of IPv4 and IPv6 especially creates problem regarding security. Major threats related to IP enabled domain (IPv6 / IPv4/ 6LoWPAN) are Protocol transition attack, Reconnaissance attack, Fragmentation attack, ICMPv6 misuse attack, Routing header misuse attack. 6LoWPAN threats include both IPv6 and WSN specific threats.

Threats related to sensor-cloud environment include SPAM over Internet Telephony (SPIT), Denial of Service (DoS), Service theft.

It is almost impossible to isolate the components of the IoT network physically from the possible attackers and restrict physical access to them. This in turn endangers the integrity and confidentiality of information stored on end devices and may cause availability violation.

A wireless nature of communication greatly facilitates eavesdropping and a number of other attacks on wireless interface, such as Jamming, DoS, Relay attack etc.

Bluetooth communication mainly faces threats like Bluejacking, OBEX Push, Bluesnarfing, HeloMoto, Bluebugging, DoS attacks.

Constrained computational and energy resources do not allow for utilization of complex security mechanisms, which can ensure confidentiality and integrity of data residing in end devices and transmitted over an inherently insecure wireless channel.

Communication with smart objects in resource-constrained environments must necessarily take into account the limitations, especially in scenarios where security is a crucial aspect and conventional cryptographic primitives are inadequate. Major threats include Privacy threat, Firmware Replacement Attack, Cloning of smart objects by untrusted manufacturer.

Cloud computing is an on-demand self-service model, where resources are shared and pooled to serve multiple customers using a multi-tenant model. In cloud environment main concern is lack of trust. In this, single physical medium is shared among multiple virtual machines (VM). Therefore integrity and availability are two major requirements in this scenario. Most of the threats are

Major threats related to IP enabled domain (IPv6 / IPv4/ 6LoWPAN) are Protocol transition attack, Reconnaissance attack, Fragmentation attack, ICMPv6 misuse attack, Routing header misuse attack. 6LoWPAN threats include both IPv6 and WSN specific threats.

Page 39: CSIC 2014( April )

CSI Communications | April 2014 | 39

caused due to poor management and access control of VM. Session hijacking/overriding, Virtual machine escape, SQL injection attack, Cross-site scripting attack are the major threats. Multi-tenancy in cloud can expose customers’ VM that may lead to information leakage. As customer does not have direct access to physical storage of data, there is a possibility that unauthorized copy of data is misused later for malicious purpose. There is no assurance that data will be physically deleted from all places of third party environment when data are no longer required. Protection of stored sensitive data is dependent on security controls provided by service provider. Trust, security and privacy issues are major roadblocks in cloud computing adoption. Cloud characteristics bring in a set of risks and enhanced security controls are required to mitigate those risks.

Therefore, intelligent framework should be considered in such a way so that it can analyze the above mentioned issues and to adapt dynamic mechanism.

Security Requirements • Accurate implementation

of confidentiality, integrity, authentication, non-repudiation, access control.

• Privacy preserving technology.

• Decentralized trust model for objects within network.

• Dual stack security model at 6LoWPAN router/gateway.

• Use of lightweight cryptography requires minimum amount of essential resources of target objects.

• Maximum security can be achieved by designing effective IDS. In heterogeneous domain it acts as second line of defence. Design of effective IDS capable to work on heterogeneous environment of IoT (IPv4-IPv6-6LoWPAN enabled IDS).

• Proper integration of all security features of heterogeneous domains.

ConclusionResearchers have been working for quite some time in designing ubiquitous framework for smart applications. Different projects impose security in different ways. Even though, most projects succeeded in implementing their proposed security frameworks, it is not easy to provide a fully-secured IoT system in heterogeneous domain that can combine all security components in a single solution. There is no single security framework that could claim full protection for cloud based IoT environment. As IoT covers different type of domains, security for individual

domain may exist, but no integrated security framework has been considered. Two most sensitive security concerns are transmission and storage of critical data. Therefore, main focus should be given to two of these major security requirements to make the system more efficient. One technique is to develop low overhead cryptography for securing data transmission and other is to build secure trust model to store data in third party environment. Without proper security framework, intelligence in IoT may lead to major catastrophe. There is no suitable standard defined till date. So more research works are needed on security for Internet of Things.

References[1] ITU Internet Reports 2005: The Internet of

Things, Executive Summary, http://www.itu.int/wsis/tunis/newsroom/stats/The-Internet-of-Things-2005.pdf.

[2] Libelium Unveils the Top 50 Internet of Things Applications, http://www.i t w i re .co m /o p i n i o n - a n d - a n a l ys i s /beerfiles/54432-libelium-unveils-the-top-50-internet-of-things-applications.

[3] Internet of Things in 2020: A roadmap for the future, Workshop report by EPoSS (EuropeanTechnology Platform on Smart Systems Integration), http://www.iot-visitthefuture.eu/fileadmin/ documents/ researchforeurope270808_IoT_in_2020_ Workshop_Report_V1_1.pdf.

[4] T Bhattasali, R Chaki, and N Chaki, “Study of Security Issues in Pervasive Environment of Next Generation Internet of Things”, In Proceedings of CISIM 2013, 2013, Springer, LNCS.

[5] T Bhattasali, R Chaki, and N Chaki, “Secure and Trusted Cloud of Things”, INDICON 2013,IEEE Xplore. n

Abo

ut th

e A

utho

rs

Tapalina Bhattasali is at present doing her PhD in Computer Science & Engineering from University of Calcutta. She has a few years of working experience in academic field. She has number of international publications to her credit. She is a member of various professional organizations like CSI, ACM. Her primary research area includes Security in wireless domain, Internet of Things and Cloud Computing. She can be reached at [email protected].

Dr. Rituparna Chaki is an Associate Professor in AKCSIT, University of Calcutta. Her primary areas of research are Wireless Mobile Ad-hoc Networks and Wireless Sensor Networks. She has also served as a Systems Manager for Joint Plant Committee, Government of India for several years before she switched to Academia. Dr. Chaki has number of international publications to her credit. Dr. Chaki has also served in the committees of several international conferences.

Dr. Nabendu Chaki is an Associate Professor in the Department Computer Science & Engineering, University of Calcutta. Besides editing several volumes in Springer proceedings, he has authored several text books and several refereed research papers in reputed Journals and International conferences. His areas of research interests include distributed systems and software engineering. Besides being in the editorial board for several International Journals, he has also served as program chair of several international conferences.

Different projects impose security in different ways. Even though, most projects succeeded in implementing their proposed security frameworks, it is not easy to provide a fully-secured IoT system in heterogeneous domain that can combine all security components in a single solution. There is no single security framework that could claim full protection for cloud based IoT environment.

Page 40: CSIC 2014( April )

CSI Communications | April 2014 | 40 www.csi-india.org

Solution to March 2014 crossword

Brain Teaser Dr. Debasish JanaEditor, CSI Communications

Crossword »Test your Knowledge on Internet of Things (IoT)Solution to the crossword with name of first all correct solution provider(s) will appear in the next issue. Send your answers to CSI Communications at email address [email protected] with subject: Crossword Solution - CSIC April 2014

CLUESACROSS1. A system that can enable machines to respond to human requests based on

meaning (8, 3)7. The first publicly used version of the Internet Protocol (4)8. Global network connecting any smart object (8, 2, 6)10. Portable data terminal (3)11. Wireless non-contact use of RF electromagnetic fields to transfer data (4)12. The person who envisioned Device to Device communication (4, 3)14. Proximity based standards for devices to establish radio communication (3)16. A universal unique electronic identifier used to identity for every physical

object (3)18. A device that senses measurable information and then reacts to it (6)21. Data about data (8)22. A forwarding element that enables various local networks to be connected (7)24. Properties of an entity that makes it definable and recognizable (8)25. Intel system on chip (SoC) platform designed for smartphones and tablets (4)26. The transmission of a packet to multiple destinations in a single send

operation (12)28. Internet Engineering Task Force (4)29. An on-line database service allowing developers to connect sensor-derived

data (6)

DOWN2. Media access control (3)3. A wireless technology standard for exchanging data over short distances (9)4. A method of communications between two electronic devices over the

World Wide Web (3, 7)5. Authentication information required to connect to a resource (10)6. An optical machine-readable representation of data (7)7. Named set of operations that characterizes the behavior of an entity (9)8. Ability of making systems and organizations to inter operate (16)9. Extensible Markup Language (3)13. A componentized version of the Windows XP Professional edition (3)15. Standardized connection of computer peripherals (3)17. A platform to connect the ideas, people and companies creating the Internet

of Things (10)18. Service oriented architecture (3)19. Framework for resource description (3)20. A communications protocol for message-oriented middleware based on

XML (4)23. Language for describing web ontology (3)27. The communications protocol that promises to connect every device on the

Internet (4)

Did you hear about Internet of Things?

Although IoT research and availability are not in full scale, back in July 2009, Kevin Ashton commented in "That 'Internet of Things' Thing" published in RFID Journal, “...We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so.”

We are overwhelmed by the responses and solutions received from our enthusiastic readers

Congratulations toDr. Madhu S Nair (Dept. of Computer Science, University of Kerala,

Kariavattom, Thiruvananthapuram, Kerala)

for ALL correct answers to March 2014 month’s crossword.

1T H E S

2A U R U S

3B Z

4U

O5

C H I T R A N K A N6

B L A I7G

8P H O N E M E G

9I S C I I

A A10

I11

T R A N S O S

S G12

I D D T

A R13

I N D L I N U X E14

P

I I S L15G

16Q H

N17

S C18

L T U O

D W19

T R A N S L I T E R A T I O N20

P I N A A K I X M L E

A M21

P H22O N E I I L T

23M

24I A S T B C L P I

A N S25

K O L A C

D A26

K A R T I K A N O D SH T R L C

Y H U I27

S A R O V A R28

B A R A H A I M E N

M N G29

F O N T A

1 2 3

4

5 6 7

8

9 10 11

12 13 14

15 16 17

18 19

20

21 22

23 24

25

26 27

28

29

Page 41: CSIC 2014( April )

CSI Communications | April 2014 | 41

Ask an Expert Dr. Debasish JanaEditor, CSI Communications

Your Question, Our Answer"Try not to become a man of success. Rather become a man of value.”

~ Albert Einstein

On Android: x and y coordinates of GestureOverlayView

From: Rashmi Trivedi

Hello Sir / MadamI have a class which extends Fragments. I have a GestureOverlayView, set as KeyStrokeType = MULTIPLE, in the fragment xml. I want to extract the coordinate values of the stroke as and when i write on the GestureOverlay.

I am new to Android and Java programming. Please help.Thank you.

A In Android development framework, the Fragment class helps to create applications that could span the available width of the device and supports layouts that span multiple panes (suitable for tablets) or could be confined to single pane (mobile handset) as well. On mobile handsets, you require separate Activity that could host a Fragment and to accommodate space, you switch between Activities.

Using GestureOverlayView, drawing free hand becomes convenient. A transparent overlay for gesture input can be placed on top of other widgets and may contain other widgets.

Presume that you extend Fragment and have GestureOverlayView, so your class should like the following:public class MyFragment extends Fragment implements OnGesturePerformedListener . . .

Using GestureOverlayView, you need to call the method addOnGesturePerformedListener to add the listener and must implement the interface OnGesturePerformedListener. That’s why, you need to use implements OnGesturePerformedListener. Thereafter, whenever a gesture is detected, the method onGesturePerformedListener gets called.

If you have a method onTouchEvent, then within that method, you get a MotionEvent as argument to the listener. From that argument, say, called as touchevt, you may query the x and y co-ordinates by calling getX() and get(Y) respectively for the event. For example,public boolean onTouchEvent(MotionEvent touchevt) float x = touchevt.getX(); float y = touchevt.getY(); . . . .

Another sample program segment that extends an Activity and implements OnGesturePerformedListener is given below.

public class GestureSample extends Activity implements OnGesturePerformedListener private GstrLrary gstrL; @Override public void onCreate (Bundle savedInst) super.onCreate(savedInst); GestureOverlayView gstrOvrlyVw = new GestureOverlayView(this); View infl = getLayoutInflater().inflate (R.layout.main, null); gstrOvrlyVw.addView(infl); gstrOvrlyVw.addOnGesturePerformedListener(this);gstrL = GstrLraries.fromRawResource(this, R.raw.gestures); if (!gstrL.load()) finish(); setContentView(gstrOvrlyVw);@Overridepublic void onGesturePerformed(GestureOverlayView overlay, Gesture gesture) ArrayList<Prediction> predictions = gstrL.recognize(gesture); for (Prediction prediction : predictions) if (prediction.score > 1.0) Toast.makeText(this, prediction.name, Toast.LENGTH_SHORT).show();

In Android, Toast is a notification message that pops up, stays displayed for a certain amount of time, and automatically fades in and out. This is used mostly for debugging purpose.

Also, the following code fragment shows use of OnGestureStarted that gets called when a manipulation starts. From the MotionEvent argument, we may get the values of x and y coordinates as shown below:public void onGestureStarted (GestureOverlayView ovrl, MotionEvent evt) if (mGestureType == MULTIPLE_STROKE) ovrl.cancelFadingOut(); float mX = evt.getX();float mY = evt.getY();. . . .

For more info on GestureOverlayView, you may refer: http://developer.android.com/reference/android/gesture/GestureOverlayView.html n

Do you have something to ask? Send your questions to CSI Communications with subject line ‘Ask an Expert’ at email address [email protected]

Page 42: CSIC 2014( April )

CSI Communications | April 2014 | 42 www.csi-india.org

CSI Reports

From CSI SIGs / Divisions / Regions and Other News »Please check detailed reports and news at: http://www.csi-india.org/web/guest/csic-reports

SPEAKER(S) TOPIC AND GISTDIVISION IV COMMUNICATIONS

Dr. A Basu, Dr. AK Nayak, Dr. Suvendu Rup, Dr. Anjali Mohapatra, Dr. Debasish Jana, and Dr. Rachita Mishra

Guests on stage

21-22 February 2014: National Seminar on “Recent Advancement in Information Technology (NSRAIT – 2014)”Dr. Basu talked on Cloud Computing & Big Data and emergence of Cloud as information technology designed for availability of computing resources to users “on demand”. Dr. Nayak talked on Emerging Trends in ICT for National Development. Dr. Rup highlighted Recent Advances in Intra-Key-Frame Coding and Side Information Generation Schemes in Distributed Video Coding. Dr. Mohapatra spoke on bio-informatics & described Motif Search in DNA Sequences using Generalized Suffix Tree. Dr. Jana spoke on Novel ECDLP-based Blind Signature scheme based on Elliptic Curve Discrete Logarithm Problem. Dr. Rachita focused on General-Purpose computing on Graphics Processing Units (GPGPU), which is utilization of graphics processing unit (GPU) as multiple processors, to perform computation in applications traditionally handled by CPU.

Dr. Prasad spoke on Model Based Testing of Object-Oriented Programs. Dr. Pattnaik spoke about computational intelligence. Dr. Samal focused on real time operating system& spoke about key characteristic of RTOS, level of its consistency concerning time it takes to accept and complete application task. Dr. Pattnaik delivered session on Cloud Computing, its application area and implementation. Dr. Das talked on Delay-Tolerant Network. He described how applications are expected to tolerate much longer delays using DTN.

DIVISION I & IV & REGION-1 IN COLLABORATION WITH IEEE UP SECTION AND CSI MATHURA CHAPTER

Sanjeev Nikore, Prof. Rajeev Tripathi, Prof. Krishna Kant, Prof. Nishchal Verma and Prof. Ekram Khan

Inaugural Session

1-2 March 2014: International Conference on “Information Systems and Computer Networks: ISCON-2014”Prof. Kant introduced Conference theme. Mr. Nikore addressed topic of employee relationship management which focused on set up of do-it-yourself knowledge exploration. Prof. Tripathi focused on Adaptive Modulation and Coding Schemes as promising technique to support demands for high data rates and wideband proposed for 4G mobile communication. Prof. Verma delivered key note speech on Intelligent Informatics. This deals with interdisciplinary research on artificial intelligence, cognitive science, knowledge engineering, information technology and engineering management. Prof. Khan spoke on designing wireless video communication system which is a challenging task due to high error rates of wireless channels, limited and dynamically varying bandwidth availability and low energy and complexity requirements of portable multimedia devices.

DIVISION-II (SOFTWARE), CSI ALLAHABAD CHAPTER, IEEE CSI COUNCIL AND IFIP-TC9 ICT & SOCIETY

Prof. GC Nandi, Prof. Greg Adamson, Prof. MGPL Narayana, Supriya Kummamuru, Prof. OP Vyas, Prof. Anupam Agarwal, Prof. MM Gore and Prof. TV Gopal

L-R: Prof JN Tripathi; DK Dwivedi; Prof. KK Bhutani, Prof. GC Nandi; Prof. TV Gopal; and Prof. Greg Adamson (on the screen through SKYPE)

9 March 2014: Seminar on “Norbert Weiner, Cybernetics, Humanity & Technology”Prof. Nandi inaugurated Seminar and emphasized that researchers must focus on issues relating to Social Cybernetics. Prof. Adamson gave enlightening talk through SKYPE about the Norbert Weiner & his wide ranging contributions to Science of Automation. Prof. Narayana gave presentations on Cybernetic approach for Business Solution Design. Ms. Kummamuru gave presentation on Evolution of Cybernetic Model: Outcome of TCS consulting practice through SKYPE. Prof. Vyas explained Mobile Software Engineering-Opportunities and Challenges. Prof. Agarwal spoke on Human Computer Interaction. Prof. Gore talked about Ethics & Cybernetics. Prof. TV Gopal gave presentation about what impacts Progress of Cybernetics.

Page 43: CSIC 2014( April )

CSI Communications | April 2014 | 43

CSI NATIONAL YOUNG IT PROFESSIONAL AWARDS

Prof Bipin Mehta, Prof. RP Soni, Mr. Naishadh Diwanji, Dr. Nityesh Bhatt, Mr. Vijay Shah and Dr. Harshal Arolkar

YITP-2013-National Round Participants-Jury and Chapter OB

6 March 2014: CSI National YITP Finals and Award CeremonyAfter short listing nominations, 35 teams comprising of professionals from IT companies, technical institutes, entrepreneurs and researchers participated at Regional Level. Evaluation process had 2-tier selection to select Winner, Runner-up & Special Mention. Regional round was conducted at Allahabad, Kolkata, Ahmedabad, Bhubneswar, Aurangabad and Thiruchirappally Chapter. Most outstanding technology project of any kind, completed during the year 2012-13 where project duration could be of 2-3 years from the start date, were judged. The selection committee considered factors like criticality of IT usage, improvement of customer service, innovation, quality of management and impact on organization and society to judge each project. Winners were Centre for Development of Advance Computing, Kolkata Team Amritasu Das, Ravi Sankar and Surya Kant. Project was Handheld Electronic Nose - An Embedded Application for quality assessment of tea.

DIVISION III & IV AND CSI INDORE CHAPTER IN ASSOCIATION WITH IEEE AND SRI AUROBINDO INSTITUTE OF TECHNOLOGY, INDORE

Prof. Aynur Unal, Anadi Upadhyay, Prof. P Trimurthi, Dr. AK Nayak, Anurag Mandloi, Kinshuk Trivedi, Dr. Sudhakar Bharti, Dr. CK Jain, Dr. Aaquil Bunglowala and Dr. Durgesh Kumar Mishra

Guests and dignitaries on stage

8-9 March 2014: International Conference on “IT in Business, Industries and Government”Prof. Unal said that Technology has brought revolution in Medical Sciences. She shared her Research work on Big Data in field of Medical Sciences. Mr. Upadhyay discussed issues related to Big Data & Analytics. He also discussed details related to Data mining, Data analysis and Online Recommendation Angle. Prof. Trimurthi said that Data Analytics prevailed even in ancient times. The need is to have Data and analyze it correctly. Data & Research will always help for better future. With examples he said – Data & proper analytical system gives momentum and right direction to your career. Mr Mandloi was connected via Online Lecture from USA. He informed that his company Early Warning Services provides Online Data Security for 5 reputed multi-national banks. They identity defaulters of these banks. They also provide the online data security via social security numbers. 32 subject experts (National & International) shared their experience in this event.

CSI NATIONAL HEADQUARTERS, TARAMANI, CHENNAI

CSI Staff members

Organizers and participants of the CSIDay Celebrations

6 March 2014: CSI Day CelebrationsTo commemorate the beginning of CSI Golden Jubilee Celebrations, CSI Flag was hoisted by Mr. Rajan T Joseph, Director (Education). All staff members Mr. S Ramasamy, Mr. Y Kathiresan, Mr. Gnanasekaran, Mr. Natarajan, Mr. Mythreyan, Ms. Miraclin, Ms. Manjusha, Ms. Srividya and Ms. Chithra took pledge to serve for the CSI Community with vigour. Director of Education remembered CSI stalwarts during his speech after hoisting the flag. The meeting came to an end after cutting a cake.

CSI BEST PHD THESIS AWARD –2013 CHENNAI

S Ramanathan, Sanjay Mohapatra, Dr. B Poorna, Rajan T Joseph, S Ramasamy and Prof. P Kumar

Ph.D award winners with CSI OBs

22 March 2014: PhD Thesis Award Presenting Ceremony The Best PhD Thesis Awards for the year 2013 were presented at a ceremony. The Awards, Certificates and Cash Prize were distributed by Mr S Ramanathan, Hon. Secretary & Chief Guest, Mr Sanjay Mohapatra and Dr B Poorna. The event was held concurrently with the valedictory function of “National Conference on Recent Advances in Computing and Communications” organized by CSI Chennai Chapter and the CSI SB Shri Shankarlal Sundarbai Shasun Jain College for Women, Chennai. The Awards were presented to Dr. P N Jebarani Sargunar, Dr. S Malathi and to Dr. R Shreelekshmi respectively.

CSI-EDUCATION DIRECTORATE, MIT PUNE

Mr. Shekhar Sahasrabudhe, RVP-VI

Mr. Sahasrabudhe presenting trophy to winners

22 March 2014: National Student Project Contest and ExpoObjective was to encourage students from CSI student branches to design innovative projects, improve their skill set and become market ready. The contest aimed at involving young students all over India in the quest of innovation in IT and provided them an opportunity to demonstrate their projects with strong social relevance. The Contest was open to students across India, who formed teams of 2 within their respective colleges and participated in rounds at various levels. The Contest aimed to identify students who can develop solutions for real time problems and scenarios with a focus on societal benefit. This competition was held at various regional centres and Finals was conducted at MIT, Pune .

Page 44: CSIC 2014( April )

CSI Communications | April 2014 | 44 www.csi-india.org

CSI News

From CSI Chapters »Please check detailed news at: http://www.csi-india.org/web/guest/csic-chapters-sbs-news

SPEAKER(S) TOPIC AND GIST

GHAzIABAD (REGION I)Mr. R K Vyas, Dr. Laxman Prasad, Prof. Y K Mittal, Ms. Kavita Saxena, Mr. Saurabh Agrawal and Mr. Anilji Garg

22 February 2014: Regional Finals of “4th CSI Discover Thinking School Quiz Contest”

Six teams who came after winning chapter rounds represented Haryana, Delhi and Uttar Pradesh. After enthralling five rounds of quizzing, teams from DPS Indirapuram and DPS Sonepat were in tie for First position. After nail biting tie breaker, team from DPS Indirapuram consisting of Shivam Bhatia and Sidharth Bhat emerged as Winners. Team from DPS Sonepat consisting of Pavitra Mohan Singh and Neena Gulati was the Runners Up. Winning team will represent Region I in National Finals.

ç Final winners of QUIZ with Guests

AHMEDABAD (REGION III)Mr. S Mahalingam, Former CFO & Executive Director, TCS and Fellow & Past President

20 February 2014: Public Lecture “Making of a vibrant society- some ideas”

Mr. Mahalingam shared his expertise, ideas and thoughts on making of a Vibrant Society and suggested to implement innovative and creative work for larger interest of society. More than 50 participants attended this public lecture including Fellow, Patron, Senior Members of CSI and Faculty Members.

ç Mr. S Mahalingam delivering his lecture

COIMBATORE (REGION VII)Mr. A Bharani Dharan, Dr. R Joseph Xavier, Dr. K Sanakara Narayanan and Dr. R Udaya Chandran

31 January - 1 February 2014: Two days workshop on “Hadoop Eco-System A Practitioner Approach”

Mr. Dharan spoke about benefits of Hadoop. Second issue of SRIT CSI MESSENGER magazine was released. First session involved explanation of cloud working architecture and benefits of virtual installation. Participants were provided hands on working of opennebulla. Second session involved single node configuration of Hadoop open source and were provided with another software ONE to be installed using VirtualBox. Later participants were provided with training on ONE with new configurations for multi node configuration. ç Dignitaries on dais for inauguration L-R: S Pravinthraja, Dr. R Udaychandran,

Dr. R Joseph Xavier and A Bharanidharan

Mr. Rajesh Kumar, Founder & Managing Director, Aaum Research and Analytics Private Limited

14 February 2014: Lecture on “Analytics for Business success and Excellence”

Mr. Kumar spoke and motivated participants who are already in business and or about to start business and enlighten them about stepping in to world of business. He suggested an analytical approach at its very simplicity thereby helping listeners to accept the ideas presented and interacted with them during the session.

ç Faculty member and participants during lecture

Page 45: CSIC 2014( April )

CSI Communications | April 2014 | 45

SPEAKER(S) TOPIC AND GIST

COIMBATORE (REGION VII)Chief guest Dr. S Gunasekaran, Dr. Vasantha Sudhanandhen and Principal Dr. S Shanmugasundaram

15 February 2014: Workshop on “Cloud Computing Tool”

Dr. Gunasekaran spoke about the benefits of Cloud Computing Tool. The first session involved explanation of cloud working architecture and benefits of Cloud Computing Tool. Participants were provided hands on working of Cloud Sim Tool which involved the configuration of cloud analyst & Reporting tool.

ç Felicitation by Principal Dr. S Shanmugasundaram

VELLORE (REGION VII)P Srinivasa Rao, Dr. G Viswanathan, Summet Verma, Sankar Viswanathan, GV Selvam, Prof. V Raj and Prof. S Narayanan

21-22 November 2013: International Conference on “Computing, Cybernetics and Intelligent Information System, CCIIS2013”

About 250 delegates attended the conference. Major topics for technical paper presentations and deliberation included: Next-generation Computing and Communications Systems, Human Computer Interactions, Information Modeling, Tools and Applications. Four pre-conference workshops on Cloud Computing, Windows 8 Applications Development, Business Intelligence and Design Thinking were also organized with support and resource persons with support from VMWare, Microsoft, Accenture and SAP Lab respectively.

ç Inaugural session

From Student Branches » http://www.csi-india.org/web/guest/csic-chapters-sbs-news

SPEAKER(S) TOPIC AND GISTAES INSTITUTE OF COMPUTER STUDIES (AESICS), AHMEDABAD (REGION-III)Dr. Sudipto Das and Dr. Pamela Bhattacharya 21 December 2013: Expert talk on “New Research Trends in Management

of Data”

The expert talk provided new ideas and directions for research and innovative projects in database management related areas.

ç Dr. Sudipto Das during the talk

B.N.M. INSTITUTE OF TECHNOLOGY, BANGALORE (REGION-V)Mr. Suman Kumar from Inforce Computing 15 February 2014: Workshop on “Android”

Mr. Suman began with an introduction to Android Programming and covered architecture of Android and provided some examples. Students also had a hands-on session.

ç Mr. Suman Kumar conducting the session

Page 46: CSIC 2014( April )

CSI Communications | April 2014 | 46 www.csi-india.org

SPEAKER(S) TOPIC AND GISTEAST POINT COLLEGE OF ENGINEERING AND TECHNOLOGY, BANGALORE (REGION-V)Mr. Pramod Gowda, Dr. Subhash Kulkarni, Mr. Anjinappa, Dr. Satish B M and Dr. Prakash S

10-12 December 2013: Students Internet World 2013

Around 1500 students from different Govt. and Private High Schools of Bangalore Rural District, Karnataka participated. Students Internet World is being organized since last 5 years to give exposure about internet to Govt. and Private High Schools students. The event was sponsored by Govt. of Karnataka, Pearson and Intel. ç Dr. Prakash S, Anjinappa, Dr. BM Satish, Pramod Gowda and

Dr. BM Girish on the dais

NALLA MALLA REDDY ENGINEERING COLLEGE, HYDERABAD (REGION-V)KC Arun, M Akhila, S Lakshmi Sahiti, P Sowmya and V Maithri

9 October 2013: Workshop on “Networking Fundamentals”

Resource persons delivered knowledge about the importance and overview of networking fundamentals and demonstrated how to build Ethernet LAN using Cross over and Patch Cable. This workshop was coordinated by Mr. Avinash, T Mahendar, N Abhinay, Md. Nisar Ahmed and G Kalyan Kumar.ç (From left) G Kalyan Kumar, Md Nisar, N Abhinay, T Mahendar, K C Arun,

V Maithri, S Lakshmi Sahiti, P Sowmya and M Akhila

SRKR ENGINEERING COLLEGE, BHIMAVARAM, ANDHRA PRADESH (REGION-V)Dr. G P Saradhi Varma, S V Ranga Raju, Prof. P Srinivas Rao, G Murali Ranga Raju, and Dr. D Ranga Raju

8-9 March 2014: National level Technical Symposium on “Current Trends of Information Technology TECHFLEET’14”

The conference includes technical Paper Presentations, Idea and Project Presentations, Coding Contest, Technical Quiz & workshop on Mobile App Development. The purpose of the conference was to encourage students in learning current technical concepts and to improve presentation skills. The workshop provided exposure to various topics required for developing android applications. ç Dr. G P Saradhi Varma, S V Ranga Raju, Prof. P Srinivas Rao, G Murali Ranga Raju,

and Dr. D Ranga Raju during release of proceedings

G.H.RAISONI COLLEGE OF ENGINEERING, NAGPUR (REGION-VI)Mr. Pafulla Das, Dr. P R Bajaj, Dr. P B Nagarnaik, Dr. A Y Deshmukh, Dr. Jaju, Mrs. Thomas, Mrs. Shweta Tayade, Mr. Gopal Sakarkar and MCA dept

22 January 2014: National Conference on “Recent Trends in Information Security’2014”

Technical paper presentation was organized at National conference and papers from all over India namely Gujarat, Pune, Nanded, Amravti, etc. which were based on either mini or major projects or research papers were presented in 3 sessions. Out of 41 papers received 39 were presented during the two days. Selected papers will be published in International Journal of Computer Journal, New York, USA.

ç Inauguration of Conference Proceeding

MARATHWADA INSTITUTE OF TECHNOLOGY, AURANGABAD (REGION-VI)Mr. Arun Kadekodi, Mr. Satish Sangameswaran, Mr. Bharat Kumar Dasa and Mr. Mayur Wakde Tendulkar

28 February 2014: Conference on “Recent Trends in IT”

Mr. Kadekodi spoke on Project-x: A student-centric social network. Mr. Sangameswaran talked on Microsoft MEC: Massively Empowered Classrooms: A “blended” model to engage with students, teachers, and institution simultaneously. Mr. Dasa spoke about Big Data: Big Data Introduction, Definition and Importance, NOSQL – A brief introduction, Distributed Computing – Importance, Hadoop – Overview. Mr Tendulkar spoke on Windows 8 Phone App Development: Modern Smartphone Development, Getting started with WP8 app development and Using the Windows Phone developer tools.

ç Speaker during lecture

Page 47: CSIC 2014( April )

CSI Communications | April 2014 | 47

SPEAKER(S) TOPIC AND GISTPROF. RAM MEGHE INSTITUTE OF TECHNOLOGY & RESEARCH, BADNERA (REGION-VI)Dr. DT Ingole, Dr. GR Bamnote, Dr. CA Dhote, Dr. A S Alvi, Prof. MA Pund and Kunal Singh

21-22 February 2014: Workshop on “PYTHON language”

Workshop was inaugurated by Hon’ble Principal Dr. DT Ingole. Kunal Singh, Research Engineer, SparkLab Engineering Systems Pvt. Ltd. gave detailed training to students on PYTHON with basics and programming concepts. 85 participants from different colleges participated in the workshop.

ç Hon’ble Principal Dr. D T Ingole at Inauguration Speech

ADHIYAMAAN COLLEGE OF ENGINEERING, HOSUR (REGION-VII)Mr. Saravanan 12 February 2014: Industrial Visit to C-DAC Knowledge Park, Bangalore

One day Industrial Visit to C-DAC Knowledge Park, Bangalore was arranged for student members. In C-DAC, they attended a Seminar on “Information Security” given by Mr. Saravanan, Administrative Officer, C-DAC. Students also visited data management centres and Super Computer.

ç CSI Members of College Industrial Visit to C-DAC Knowledge Park, Bangalore

AMAL JYOTHI COLLEGE, KANJIRAPPALLY (REGION-VII)Mr. Manu Zacharia, Creator & Chief Architect of Matriux and Information Security evangelist, Microsoft MVP & Information Security evangelist

18-19 March 2014: Workshop on “Ethical Hacking & Cyber Security”

Vulnerability Assessment and Penetration Testing (VAPT) is an integral part of every critical network. Organizations are required to carry out frequent and period assessment of their networks to ascertain the security posture of their information systems. Course aimed at providing required technical skillsets to carry out penetration testing and document detailed findings.

ç Mr. Manu Zacharia interacting with students

DR.SIVANTHI ADITANAR COLLEGE OF ENGINEERING, TIRUCHENDUR (REGION-VII)Mr. E Arun, BeMITSS, Tirunelveli 4 January 2014: One-day Workshop on “Dot Net”

Mr. E Arun gave effective hands-on-training in dot net. He focused on the building blocks of C#.NET, VB .NET, database connectivity, User Interface and applications.

ç Mr. E Arun, speaker at the event

EASWARI ENGINEERING COLLEGE, CHENNAI (REGION-VII)Chief guest Mr. V Srinivasan and Dr. M Sekar, Principal 17 February 2014: Technical Contest “MINDBEND”

Dr. Sekar spoke on advancement of computer technology and shared his experience about working on a project during his college days. Mr. Srinivasan explained important qualities and competencies, students should have when they attend their placements. MINDBEND had two events “Inquizitive”(Technical Quiz) and “Google It”, and each event had two rounds. Winners were awarded with cash prizes and certificates.

ç L-R: Dr. D Sivakumar, V Srinivasan, Dr. M Sekar, Prof. S Kayalvizhi, and Mrs. T M Navamani

Page 48: CSIC 2014( April )

CSI Communications | April 2014 | 48 www.csi-india.org

SPEAKER(S) TOPIC AND GISTEINSTEIN COLLEGE OF ENGINEERING, TIRUNELVELI (REGION-VII)Mr. M Murali, Mrs. Beena baskaran & Mr. Khasim mohammed

14-15 February 2014: National level Workshop on “Advanced Cloud Computing on Research Project”

Mr. Murali & his team explained the application development of cloud computing with various services. He also spoke about visual studio code development in social network clouds. Various research aspects related to cloud computing environment were also explored.

ç L to R: Prof. M Gomathynayagam, Dr. K Ramar, Prof. Ezhilvanan, Mr. Murali, Dr. R Velayutham, Mr. Khasim mohammed, and Mrs. Beena baskaran

ER.PERUMAL MANIMEKALAI COLLEGE OF ENGINEERING- HOSUR, TAMILNADU (REGION-VII)Dr. S Appan 3 February 2014: One-day Seminar on “Emerging Trends and opportunities

in Cloud Computing”

Dr. Appan gave inspiring speech on cloud computing and utility computing. He also motivated students to enroll in certification courses like oracle, Cisco, PMI.

ç Dr. Appan addressing students

JEPPIAAR INSTITUTE OF TECHNOLOGY, CHENNAI (REGION-VII)Mr. Roy Arnold and Ms. Kalpana Balaraman 28 February 2014: National Level Technical Symposium “Techisetz’14”

Mr. Arnold and Ms. Balaraman from Infosys, ETA, gave a lot of useful inputs to students for their better future and released Techisetz magazine which contains technical articles from JIT students. More than 300 Students from various Engineering colleges enthusiastically participated and won cash prizes in 9 events.

ç L-R : Ms. Kalpana Balaraman, Mr. Roy Arnold and Dr. N Marie Wilson releasing the Techisetz’14 magazine

MALABAR COLLEGE OF ENGINEERING AND TECHNOLOGY, KERALA (REGION-VII)Dr. S Babusundar, Dr. R Vijaya Kumar, Dr. K A Navas, Dr. B Kannan, Dr. A Sreekumar and Mr. Diljith

6-7 March 2014: National Conference “NCRACEE-2014” and work shop on “Information Security”

Objective was to provide interdisciplinary forum to bring together engineers, academicians, scientists, industry researchers and research scholars on common platform to present, discuss and share their experience and research innovations. Several tutorial sessions were organized where experts discussed current trends in information technology and digital communication. The workshop provided hands on training on information security and hacking and it was informative. The technical fest was enriched with many events like IT Quiz, Code Debugging, Web Designing etc.

ç Inauguration Ceremony

OXFORD ENGINEERING COLLEGE, TRICHY (REGION-VII)Mr. B Santhosh, Dr. G Kumaravelan, Ms. R Sumathi, Ms. N Shanmugapriya and Mr. P Sudhakaran

21 February 2014: One Day National Level Seminar on “Data Warehousing and Data Mining”

Mr. B Santhosh delivered lecture on “Introduction to Data Warehousing and Data Mining”. Dr. G Kumaravelan delivered lecture on “Business Analysis, Association Rule Mining and Classification”. Ms. R Sumathi delivered the lecture on “Clustering and Data mining Applications & Tools”.

ç L-R: Mrs. N Shanmugapriya, B Santhosh, P Sudhakaran, and Mr. C Selvakumar

Page 49: CSIC 2014( April )

CSI Communications | April 2014 | 49

Please send your student branch news to Education Director at [email protected]. News sent to any other email id will not be considered. Low-resolution photos and news without gist will not be published. Please send only 1 photo per event, not more.

SPEAKER(S) TOPIC AND GISTVELAMMAL ENGINEERING COLLEGE, CHENNAI (REGION-VII)Dr. V Masilamani 17 March 2014: Guest Lecture on “NP-hard and NP-Complete problems”

Participants were given introduction about NP-hard problems. NP hard problems are of three types viz, decision problems, search problems or optimization problems. Moreover decision problem Pi is said to be NP-complete if it is NP-hard and it is also in the class NP itself. NP-hard problems are often tackled with rule-based languages, in the areas of Data mining, Selection, Diagnosis; Process monitoring, Control and Scheduling.

ç Dr. Masilamani, Professor, IIITDM, distributing certificates to the winners

Following new Student Branches Were Opened as Detailed Below –

REGION III Institute of Technology & Management Universe (ITMU), Vadodara

The inaugural ceremony of CSI Student Branch in Institute of Technology & Management Universe Vadodara was held on 10th September 2013. Dr. DB Choksi, Prof. Bhuvan Parikh & Mr. Pravin Jain were invited as guests of honor. Dr. K Baba Pai, Director ITMU welcomed all dignitaries & Dr. SK Vij gave introduction of all guests. It was followed by a Guest Lecture by Dr. D.B. Choksi on “Distributed Computing”.

CSI Membership = 360° Knowledge

Your membership in CSI provides instant access to key career / business building resources - Knowledge, Networking, Opportunities.

CSI provides you with 360° coverage for your Technology goals

Learn more at www.csi-india.org

WE INVITE YOU TO JOINComputer Society of India

India's largest technical professional associationJoin us

andbecome a member

I am interested in the work of CSI . Please send me information on how to become an individual/institutional* memberName ______________________________________ Position held_______________________ Address______________________________________________________________________ ______________________________________________________________________City ____________Postal Code _____________Telephone: _______________ Mobile:_______________ Fax:_______________ Email:_______________________ *[Delete whichever is not applicable]

Interested in joining CSI? Please send your details in the above format on the following email address. [email protected]

Page 50: CSIC 2014( April )

CSI Communications | April 2014 | 50 www.csi-india.org

EXECUTIVE COMMITTEE

REGIONAL VICE PRESIDENTS

CSI Executive Committee 2013-2014/2015

Immd Past President (2014-15)Prof. S. V Raghavan

324 A, Maulana Azad Road,Vigyan Bhavan Annexe,New Delhi : 110011Phone : (O) 011 23022115,(F) 011 23022116email : [email protected]

President (2014-15)Mr. H R MohanAssociate Vice President (Systems)The Hindu, 859 Anna Salai, Chennai - 600002Phone : 044-28576411, (O) : 044-22313738(R) (M) : 98414 32179email : [email protected]

Region-III (2013-15)Prof. R P Soni

(O) Campus Director (Computer Education)GLS Institute of Computer TechnologyOpp Law Garden, Ellisbridge, Ahmedabad 380006R)61/343, Saraswatinagar, Ambawadi, Ahmedabad 380015Phone : (R) 079-26746902(M) : 093761 80747email : [email protected]

Region-IV (2014-16)Mr. Hari Shankar Mishra

Command Care, Opp.Loreto Convent School,A.G. Office Road,Doranda, Ranchi – 834002, JharkhandPhone : 0651-2411318 (R)Mobile : 9431361450Email : [email protected]

Region-I (2013-15)Mr. R K Vyas

70, Sanskant Nagar Society,Plot No.3, Sector-14, Rohini,New Delhi: 110085Phone: 011-27866259(M) 91-9810592760email: [email protected]

Region-II (2014-16)Mr Devaprasanna Sinha

73B Ekdalia Road,Kolkata - 700 019Phone : (033)24408849Mobile : 91 9830129551Email : [email protected]

Hon. Treasurer (2013-15)Mr. Ranga Rajagopal

Acenet Technologies India P. Ltd. 1084/4 Trichy Road, Sungam, Coimbatore 641 018(M) : 09442631004email : [email protected]

Vice President (2014-15)Prof. Bipin V. Mehta

Director, School of Computer Studies,Ahmedabad University,AG Teachers College Campus,Navrangpura,Ahmedabad - 3800009Email : [email protected] : (079)-2656-8750

Hon. Secretary (2014-16)Mr. Sanjay Mohapatra

Duplex 26, Plot 1565 (p),Sector-VI, CDA,Cuttack-14, Orissa.(M) : 91-9861010656email: [email protected]

Page 51: CSIC 2014( April )

REGIONAL VICE PRESIDENTS

DIVISION CHAIRPERSONS

Region-V (2013-15)

Mr. Raju L kanchibhotlaAashirvad, 42/260/1/2, Shramik nagar,Moulali Hyderabad-500046, India(M) : 91 9000555202, 94 40 32914192email : [email protected]

Region-VII (2013-14)S P Soman Chief Executive Officer,Skiltek Computers (Pvt.) Ltd.,P. B. No. 4234, Kochi – 682 017, KeralaPhone : (0484) 2349494/233923391 (484) 2402527 / 2347473(M) : 098460 65365/98460 65765email : [email protected]

Region-VI (2014-16)

Dr. Shirish S. SaneDattaprasad, Plot No. 19,Kulkarni Colony,Sadhu Waswani Road, Nashik 422 002Phone : 0253-2313607(R)Mobile : 09890014942Email : [email protected]

Division-I: (2013-15)Prof. M N Hoda

Director, BVICAM, A-4, Paschim Vihar,Rohtak Road, New Delhi – 110063.Phone: 011- 25275055 (M) : 09212022066email : [email protected]

Division-II (2014-16)Dr. R Nadarajan

Professor and Head,Department of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore - 641 004Phone : (O) 2572177Mobile : 9952427229Email : [email protected]

Division-III: (2013-15)Dr. A K Nayak

Director, Indian Institute of Business ManagementBudhMarg, Patna-800 001Phone : 0612 3269704/5(0), 0612 2538809(R)Mobile : 09431018581email : [email protected]

Division-IV (2014-16)Dr. Durgesh Kumar Mishra

H-123-B, Vigyan Nagar,Annapurna Road, IndoreMobile : 9826047547Email : [email protected]

Division-V: (2013-15) Dr. Anirban Basu

Flat #309, Ansal Forte, 16/2A RupenaAgrahara, Hosur Road, Bangalore 560068Phone : 080 25731706(M) : 09448121434email : [email protected]

Page 52: CSIC 2014( April )

CSI Calendar 2014

Prof. Bipin V MehtaVice President, CSI & Chairman, Conf. CommitteeEmail: [email protected]

Date Event Details & Organizers Contact Information

April 2014 events

8-9 Apr 2014 TITCON-2014: First International Conference on Trends in Technology for ConvergenceAt Salem. Organised by the CSI SB of AVS Engineering College, Salem http://www.avsenggcollege.ac.in/titcon/

Dr. H Abdul [email protected]

10 Apr 2014 NCRTIT-14: 3rd National Conference on Recent Trends in Information TechnologyAt Chennai. Organised by Dept. of IT, B.S. Abdur Rahman University in association with CSI Chennai& IEEE CS Madras  http://ncrtit2014.weebly.com/

Dr. Latha [email protected]

11-13 Apr 2014 TAMC-2014: 11th Annual Conference on Theory and Applications of Models of Computation At Chennai, Organised by CSI Div II & Anna University http://www.annauniv.edu/tamc2014/

Dr. T V [email protected]

19 Apr 2014 SACTA-2014: 9th National Conference on "Smarter Approaches in Computing Technologies & Applications. At Ghaziabad. Organised by Institute of Technology & Science with CSI Div 1 and Region 1. http://www.its.edu.in/IT/Conference/SACTA-2014.html

Dr. Rabins [email protected]

24-25 Apr 2014 AOSMT-2014: 2nd National Seminar and Workshop on Advances in Open Source Mobile TechnologiesAt Ahmedabad. Organized by SIG-WNs, CSI Ahmedabad Chapterhttp://www.sabareducation.org/conference/aosmt/

Dr. Dharm [email protected]. Nilesh [email protected] [email protected]

May 2014 events

8-9 May 2014 ICASG 2014: International Conference on Architecture Software systems and Green computing 2014At Chennai. Organised by Dept. of CSE & IT, Aarupadai Veedu Inst. of Technology in association with CSI Chennai & IEEE CS Madrashttp://www.avit.ac.in/icasg2014.php

Mr. M [email protected]

17 May 2014 WTISD 2014:Broadband for Sustainable DevelopmentAt Udaipur. Organised by SIG-WNs- CSI and IEI ULC

Dr. Dharm [email protected]

31 May-7 Jun 2014 ICSE 2014: 36th International Conference on Software EngineeringAt Hyderabad. Organised by CSI SIGSEhttp://2014.icse-conferences.org/

Sharon [email protected]

June 2014 events

2–4 Jun 2014 IFIP Networking 2014 ConferenceAt Trondheim, Norway, http://networking2014.item.ntnu.no/

Prof. S V [email protected]

July 2014 events

4-5 Jul 2014 ICIS-14: International Conference on Information ScienceAt Cochin. Organized by the Dept. of CSE, College of Engineering Cherthala in association with CSI Cochin Chapter & Div III, IV & V and sponsored by Technical Education Quality Improvement Programme (TEQIP II). http://www.iciscec.in/

Ms. Sony [email protected]

August 2014 events

8–9 Aug 2014 ICICSE: II International Conference on Innovations in Computer Science and EngineeringAt Hyderabad. Organized by Guru Nanak Institutions, Ibrahimpatnam, Hyderabad in association with CSI Div IV

Dr. H S [email protected]. D D [email protected]

20 Aug 2014 Workshop on "Ethernet LAN Construction using Crossover and Patch Cable"At Hyderabad. Organized by CSI SB and Dept. of IT, Nalla Malla Reddy Engineering College, Hyderabad

Mr. K C [email protected]

December 2014 events

19-21 Dec 2014 EAIT-2014: Fourth International Conference on Emerging Applications of Information Technology At Kolkta. Organized by CSI Kolkata Chapter at Indian Statistical Institute, Kolkatahttps://sites.google.com/site/csieait/ For paper ssubmission visit https://cmt.research.microsoft.com/EAIT2014

Prof. Aditya BagchiDr. Debasish JanaProf. Pinakpani PalProf. R T Goswami, [email protected]

Registered with Registrar of News Papers for India - RNI 31668/78 If undelivered return to : Regd. No. MH/MR/N/222/MBI/12-14 Samruddhi Venture Park, Unit No.3, Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I 4th floor, MIDC, Andheri (E). Mumbai-400 093 Date of Publication: 10 & 11 every month