50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor...
Transcript of 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor...
CSI Communications | April 2014 | 1ww
w.c
si-i
nd
ia.o
rg
ISS
N 0
97
0-6
47
X |
Vo
lum
e N
o. 3
8 |
Iss
ue
No
. 1 |
Ap
ril
20
14`
50
/-
Cover StoryThe Internet of Things: Technologies, Communications and Computing 7
Technical TrendsHuman Gait- Using Biometric for Mobile Phone Security 22CIO PerspectiveTransforming the Automotive Industry with Connected Cars 31
Technical TrendsBuilding Intelligent Internet of Things Applications using Microsoft StreamInsight 13
ySecurity CornerSecurity Aspects in Internet of Things Domain 36
Happenings@ICT H R Mohan
President, CSI, AVP (Systems), The Hindu, ChennaiEmail: [email protected]
ICT News Briefs in March 2014The following are the ICT news and headlines
of interest in March 2014. They have been
compiled from various news & Internet sources
including the dailies – The Hindu, Business Line,
and Economic Times.
Voices & Views • Indian Healthcare industry to spend
$1.08 billion on IT products and services
in 2014 – Gartner.
• The engineering services outsourcing
currently stands at about $10 billion will
further expand with increased adoption of
3D printing – CEO, Mindtree.
• The global 3D printing industry to reach
$10.8 billion from the current $2 billion by
2012. – Wohlers Associates
• National Skill Development Corporation
has provided skills training to 13,49,742
people in its fi rst three years of operations.
It has also created a capacity to train
7.5 crore people over the next 10 years –
S Ramadorai, Chairman, NSDC.
• Telcos are natural partners for Facebook’s
initiative of internet.org, a global
partnership with the goal of making
Internet access available to the next
5 billion people – Director, Facebook
• India’s e-commerce to go up from
$1 billion to $76 billion by 2020. In 2013
alone, online shopping has increased
by 88%
• The media and entertainment industry
grew by around 12% in 2013 – FICCI-
KPMG report.
• ‘We don’t really see a slowdown in the IT
market’. ‘Internet of Things’ is the next big
thing to happen – Founder & Chairman,
Persistent Systems.
• ‘Our technology can pack more in same
spectrum’ – Ashish Chowdhary, EVP/
President, Nokia Solutions and Networks.
• MOOCs are surely the way forward for
India which faces the shortage of good
faculty. They are the great democratiser.
Anyone can register and take courses, as
there is no application process, and no
costs – Anant Agarwal, President, edX.
• Hardware sector is a ‘victim’ industry.
It has become far weaker than it was in
1970s, at least in relation to the global
industry – R Chandrashekhar, President,
Nasscom.
• There are four types of applications that
defi ne a connected vehicle - infotainment/
media, advanced telematics, vehicle-to-X
communications and autonomous driving
capabilities – Forrester research on
connected cars.
• Indian companies represent 3% of the
global IT and BPO outsourcing market.
• Intel forecasts that 40 million tablets
would be sold worldwide next year.
• The topline of many IT companies will grow in the 15-18% range in 2014 – higher than Nasscom’s 13-15% growth projections – Analysts.
• With a stagnant $32-billion domestic
market contribution, the size of the IT-
BPO industry would grow to $118 billion in
2013-14 from $108 billion in 2013. Social,
mobility, cloud chip in 5-10% of IT fi rms’
income – Nasscom. • Indian IT laws ‘ill-suited’ for social
media. Reforms could see Net platforms
contributing Rs. 2.5 lakh cr to economy by
2015 – GNI Report.
• Mobile data use zooms 87% riding the 3G
wave. Data usage has gone up from about
26 petabytes (PB) a month in 2012 to
50 petabytes in 2013 – MBit Index study. • Out sourcing destinations: India is the
clear global leader by revenue, while
China is the most serious challenger
by scale – a study of nine Asia-Pacifi c (APAC) countries.
• Digital marketing is the new frontier for IT
sector – Nasscom.
Govt, Policy, Telecom, Compliance • DOT panel wants penalties for violation
by telcos as per gravity of the off ence with a fi ne of Rs. 1 lakh for a warning, Rs. 1 crore for a minor breach, Rs. 5 crore for moderate, Rs. 20 crore for major and Rs. 50 crore for severe off ences.
• Mobile phone production sees drastic decline due to Govt. regulations and taxation rules.
• BSNL has the largest fi xed-line infrastructure in the country, with a network of over 600,000 route kilometres of optical fi bre cable. It’s optical fi bre network may be hived off into a new unit.
• Chinese state fi rms ‘not blocking’ Indian IT companies – Vice-Minister for Industry and Information Technology.
• India ready to join the 4G club; voice-over-LTE is Achilles Heel.
• By 2017, India to have 67 million LTE (4G) subscribers – Broadcom.
• Competition panel clears Lenovo’s acquisition of IBM server business.
• M-Pesa, an alternative to credit/debit card – Vodafone.
• Walden’s semiconductor fund plan hits a roadblock, with the Planning Commission yet to approve the project.
IT Manpower, Staffi ng & Top Moves • IT companies planning to hire people from
the IIIT-Hyderabad will have to pay a fee of 8% (of the annual package a candidate gets) will get a chance to pick the best.
• A non-engineering science graduate can
aspire for a monthly stipend of Rs. 11,500
during the fi rst year of service in Wipro
and an MS degree at the end of the fourth
year under the company’s ‘earn while you
learn’ programme.
• Nandan Nilekani, the former head of UIDAI
to contest in the Lok Sabha elections 2014
from Bangalore South constituency.
• Vodafone to off er 9% average salary hike
this year.
• Nasdaq-listed Syntel has about 80% of
its global workforce of 23,652 (as of Dec
2013) employed across its 12 development
centres in India.
• Nokia hints at job cuts in Chennai unit.
Company News: Tie-ups, Joint Ventures, New Initiatives • Karbonn mobiles is developing a
smartphone that can accommodate both
Android and Windows operating systems.
• LG India bets big on mobile, fl at panel
TVs to drive growth. Plans to invest
Rs. 800 crore this year on R&D,
production and marketing.
• At $19 billion, Facebook valued each of
WhatsApp’s current 450 million users at
roughly $400.
• Mobile video ad fi rm Vdopia eyes overseas
expansion. Almost 7 out of 10 Internet
users in India watch online videos.
• Australian National University has even
created the fi rst ever Hindi MOOC, a 10-
week course, called ‘Engaging India’ which
will start on April 29.
• Veeble Softtech, developes a new app
– LocoMapia (LM) – a real time location
sharing mobile app that works even
without GPS.
• TNQ Books introduces browser-based
proofi ng technology replacing the
traditional PDF-based proofi ng.
• India Post which has 1,39,086 post offi ces
in its network is open to e-commerce
prospects.
• Mobiado, luxury mobile brand, set to
enter India with handsets priced between
Rs. 2.6 lakh and Rs. 20 lakh.
• IIT Bombay students working on a data
analysis app for AAP.
• Microsoft woos small enterprises with
Azure cloud platform. Announces its
hardware trade-in scheme.
• Airtel’s Rs. 200-cr venture capital fund
fi nds no takers.
• SAP Labs India opens its projects to
employees as crowdsourcing model
across its R&D centres who can work on
them depending on their level of interests.
n
CSI Communications | April 2014 | 3
ContentsVolume No. 38 • Issue No. 1 • April 2014
CSI Communications
Please note:
CSI Communications is published by Computer
Society of India, a non-profi t organization.
Views and opinions expressed in the CSI
Communications are those of individual authors,
contributors and advertisers and they may
diff er from policies and offi cial statements of
CSI. These should not be construed as legal or
professional advice. The CSI, the publisher, the
editors and the contributors are not responsible
for any decisions taken by readers on the basis of
these views and opinions.
Although every care is being taken to ensure
genuineness of the writings in this publication,
CSI Communications does not attest to the
originality of the respective authors’ content.
© 2012 CSI. All rights reserved.
Instructors are permitted to photocopy isolated
articles for non-commercial classroom use
without fee. For any other copying, reprint or
republication, permission must be obtained
in writing from the Society. Copying for other
than personal use or internal reference, or of
articles or columns not owned by the Society
without explicit permission of the Society or the
copyright owner is strictly prohibited.
Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093.
Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Printed at GP Off set Pvt. Ltd., Mumbai 400 059.
Editorial Board
Chief EditorDr. R M Sonar
EditorsDr. Debasish Jana
Dr. Achuthsankar Nair
Resident EditorMrs. Jayshree Dhere
Published byExecutive Secretary
Mr. Suchit Gogwekar
For Computer Society of India
Design, Print and Dispatch byCyberMedia Services Limited
PLUSBrain TeaserDr. Debasish Jana
40
Ask an ExpertDr. Debasish Jana
41
CSI Reports 42
CSI News 44
Cover Story
7 The Internet of Things: Technologies,
Communications and Computing
Tadrash Shah and Chintan M Bhatt
10 Origin and Applications of
Internet of Things
Dr. Murugavalli Subramaniam and B Ganesh
11 Internet of Things: A Birds Eye View
Mr. Sarwesh P, Dr. N S V Shet and Dr. K Chandrasekaran
Technical Trends
13 Building Intelligent Internet of
Things Applications using
Microsoft StreamInsight
Ramakrishnan Iyer and Radharaman Mishra
16 Indoor Positioning System (IPS)
using Beacons
Venkatesh Babu and Ashok Yalamanchili
19 The Need to use ‘Near-Source’ Processing
in Internet-of-Things Solutions
Bipin Patwardhan
22 Human Gait- Using Biometric for
Mobile Phone Security
Kamal Sharma
Research Front
25 Resource Allocation Algorithm to Improve
the Quality-of-Service in OFDMA System
R L Ujjwal, Prof. C S Rai and Prof. Nupur Prakash
Article
28 Cellular Automata Dr. Rupali Bhardwaj
Practitioner Workbench
29 Programming.Tips() » Fun with ‘C’ Programs
Wallace Jacob
30 Programming.Learn(“R”) » Packages in R
Umesh P and Silpa Bhaskaran
CIO Perspective
3 1 Transforming the Automotive
Industry with Connected Cars
Madhusudhan Reddy Nukala, Shreyas Bhargave and Bipin Patwardhan
Security Corner
33 Information Security »
Security Features in Contemporary
Browsers and Tips for Safe Browsing
Krishna Chaitanya Telikicherla, Harigopal K B Ponnapalli and Dr. Ashutosh Saxena
36 Information Security »
Security Aspects in Internet of
Things Domain
Tapalina Bhattasali, Dr. Rituparna Chaki and Dr. Nabendu Chaki
CSI Communications | April 2014 | 4 www.csi-india.org
Important Contact Details »For queries, correspondence regarding Membership, contact [email protected]
Know Your CSI
Executive Committee (2013-14/15) »President Vice-President Hon. SecretaryMr. H R Mohan Prof. Bipin V Mehta Mr. Sanjay [email protected] [email protected] [email protected]
Hon. Treasurer Immd. Past PresidentMr. Ranga Rajagopal Prof. S V [email protected] [email protected]
Nomination Committee (2014-2015)
Prof. P. Kalyanaraman Mr. Sanjeev Kumar Mr. Subimal Kundu
Regional Vice-PresidentsRegion - I Region - II Region - III Region - IVMr. R K Vyas Mr. Devaprasanna Sinha Prof. R P Soni Mr. Hari Shankar Mishra Delhi, Punjab, Haryana, Himachal Assam, Bihar, West Bengal, Gujarat, Madhya Pradesh, Jharkhand, Chattisgarh,
Pradesh, Jammu & Kashmir, North Eastern States Rajasthan and other areas Orissa and other areas in
Uttar Pradesh, Uttaranchal and and other areas in in Western India Central & South
other areas in Northern India. East & North East India [email protected] Eastern India
[email protected] [email protected] [email protected]
Region - V Region - VI Region - VII Mr. Raju L kanchibhotla Dr. Shirish S Sane Mr. S P Soman Karnataka and Andhra Pradesh Maharashtra and Goa Tamil Nadu, Pondicherry,
[email protected] [email protected] Andaman and Nicobar,
Kerala, Lakshadweep
Division ChairpersonsDivision-I : Hardware (2013-15) Division-II : Software (2014-16) Division-III : Applications (2013-15) Prof. M N Hoda Dr. R Nadarajan Dr. A K Nayak [email protected] [email protected] [email protected]
Division-IV : Communications Division-V : Education and Research (2014-16) (2013-15)
Dr. Durgesh Kumar Mishra Dr. Anirban Basu [email protected] [email protected]
Important links on CSI website »About CSI http://www.csi-india.org/about-csiStructure and Orgnisation http://www.csi-india.org/web/guest/structureandorganisationExecutive Committee http://www.csi-india.org/executive-committeeNomination Committee http://www.csi-india.org/web/guest/nominations-committeeStatutory Committees http://www.csi-india.org/web/guest/statutory-committeesWho's Who http://www.csi-india.org/web/guest/who-s-whoCSI Fellows http://www.csi-india.org/web/guest/csi-fellowsNational, Regional & State http://www.csi-india.org/web/guest/104Student Coordinators Collaborations http://www.csi-india.org/web/guest/collaborationsDistinguished Speakers http://www.csi-india.org/distinguished-speakersDivisions http://www.csi-india.org/web/guest/divisionsRegions http://www.csi-india.org/web/guest/regions1Chapters http://www.csi-india.org/web/guest/chaptersPolicy Guidelines http://www.csi-india.org/web/guest/policy-guidelinesStudent Branches http://www.csi-india.org/web/guest/student-branchesMembership Services http://www.csi-india.org/web/guest/membership-serviceUpcoming Events http://www.csi-india.org/web/guest/upcoming-eventsPublications http://www.csi-india.org/web/guest/publicationsStudent's Corner http://www.csi-india.org/web/education-directorate/student-s-cornerCSI Awards http://www.csi-india.org/web/guest/csi-awardsCSI Certifi cation http://www.csi-india.org/web/guest/csi-certifi cationUpcoming Webinars http://www.csi-india.org/web/guest/upcoming-webinarsAbout Membership http://www.csi-india.org/web/guest/about-membershipWhy Join CSI http://www.csi-india.org/why-join-csiMembership Benefi ts http://www.csi-india.org/membership-benefi tsBABA Scheme http://www.csi-india.org/membership-schemes-baba-schemeSpecial Interest Groups http://www.csi-india.org/special-interest-groups
Membership Subscription Fees http://www.csi-india.org/fee-structureMembership and Grades http://www.csi-india.org/web/guest/174Institutional Membership http://www.csi-india.org /web/guest/institiutional-
membershipBecome a member http://www.csi-india.org/web/guest/become-a-memberUpgrading and Renewing Membership http://www.csi-india.org/web/guest/183Download Forms http://www.csi-india.org/web/guest/downloadformsMembership Eligibility http://www.csi-india.org/web/guest/membership-eligibilityCode of Ethics http://www.csi-india.org/web/guest/code-of-ethicsFrom the President Desk http://www.csi-india.org/web/guest/president-s-deskCSI Communications (PDF Version) http://www.csi-india.org/web/guest/csi-communicationsCSI Communications (HTML Version) http://www.csi-india.org/web/guest/csi-communications-
html-versionCSI Journal of Computing http://www.csi-india.org/web/guest/journalCSI eNewsletter http://www.csi-india.org/web/guest/enewsletterCSIC Chapters SBs News http://www.csi-india.org/csic-chapters-sbs-newsEducation Directorate http://www.csi-india.org/web/education-directorate/homeNational Students Coordinator http://www.csi- india .org /web/national-students-
coordinators/homeAwards and Honors http://www.csi-india.org/web/guest/251eGovernance Awards http://www.csi-india.org/web/guest/e-governanceawardsIT Excellence Awards http://www.csi-india.org/web/guest/csiitexcellenceawardsYITP Awards http://www.csi-india.org/web/guest/csiyitp-awardsCSI Service Awards http://www.csi-india.org/web/guest/csi-service-awardsAcademic Excellence Awards http://www.csi-india.org/web/guest/academic-excellence-
awardsContact us http://www.csi-india.org/web/guest/contact-us
CSI Communications | April 2014 | 5
At the outset, let me thank you all for providing me a great
opportunity to serve as the President of the Computer Society of
India at the time the society is in its Golden Jubilee period. For me,
it has been a long journey from being a student member during my
studies at IIT Madras way back in 1973. In fact, I literally grew with CSI
throughout my career in the fi eld of Information Technology.
While I have been in touch with you through various columns of
the CSI Communications over the last several years, from this month
onwards, I will be sharing my views and interacting with you through
this exclusive column – President’s Desk.
I had the rare opportunity of being directly mentored by a
number of past presidents of CSI, several of whom hail from Chennai.
These include Major General A. Balasubrahmanian, Prof. S. Sampath,
Prof. H. N. Mahabala, Prof. C.R. Muthukrishnan, Mr. S. Mahalingam
and the immediate past president Prof. S.V. Raghavan. My association
with CSI for a little over 40 years as a member and 30 years in
various capacities, with the Chennai chapter and at the national
level, had provided me with excellent volunteering and networking
opportunities. It also provided me with a chance to interact with
eminent academicians, industrialists, professionals, and government
offi cials across the country who had served in various roles and
nurtured the growth of CSI. Let me also state that I may be one of
the very few who had the opportunity to work with 13 out of 27 past
presidents of CSI directly and two more indirectly – a rare opportunity
to learn from their expertise and management style in creating
opportunities, mentoring & supporting young talents, strategizing
and handling tasks, organizing events, and building relations. All of
these had given me the strength and adequate confi dence to carry out
my responsibilities as your president this year. With the continued
support and guidance from them along with the volunteering spirit
and cooperation of my executive committee members, the chairs of
the CSI chapters, student branch councilors & coordinators across the
country, and the staff at the CSI HQ and CSI Education Directorate, I
hope to steer the CSI ship to new lands and ensure a safe & enjoyable
journey. I look forward to serving a heterogeneous group of members,
numbering over one lakh in this Golden Jubilee period.
As you are aware, the role of CSI and its mode to serve its
members have changed signifi cantly over the years and so have the
expectations of the members. The majority of our current members
is from academia and constitutes a young student community who
would require mentoring, guidance, support, and skill development
during their academic period and, opportunities for their entry into job
market and in establishing their entrepreneurship ventures. A small
proportion of professional members look forward to inputs and updates
in the fast developing world of Information and Communication
Technologies to sustain, excel and grow in their current position.
Another segment of our members who have superannuated from
their service should be engaged productively. This means, CSI has to
adopt diversifi ed strategies to achieve these varying expectations. I
seek valuable inputs and suggestions from all of you in this regard.
Our strength has been in organizing technical meetings,
seminars, workshops, conferences, conventions in all areas of ICT and
creating awareness, updating on the emerging trends and opening
research opportunities. However, the advent of the Internet and its
vast information sharing capabilities propel us to go beyond. The
consumerisation of IT and penetration of mobile technology have
changed the way businesses are started, run, managed and expanded.
We need to focus our attention in these aspects and give our members
a share in the global opportunity.
CSI has several MOUs and established associations with
organisations such as CDAC, SETS, ISACA, PMI, Media Lab Asia,
international societies such as IFIP, IEEE & IEEE CS, SEARCC, BCS,
SCS and national associations such as NASSCOM, MAIT, CII, FICCI
and government agencies such as DEITY, STPIs, State IT Depts.
DST, DOT, AICTE, UGC to name a few. We need to fully utilize these
collaborations so our members receive utmost benefi ts.
As the chair of Conference Committee during 2013-14,
I am happy to inform that the year has been eventful. A list of
activities held by the CSI is being complied and presented at
http://goo.gl/EnUqXE. A signifi cant milestone is the commissioning
of the student portal at http://studentportal.csidiscoverthinking.com/,
which we expect to grow and be used by a large section of our
members. The month of March 2014 has been extremely busy
with a number of activities including several conferences, student
conventions, programming contest, Alan Turing quiz contest, YITP
awards etc. The RVPs, division chairs, national student coordinator
supported by a team of state student coordinators, and awards
committee all deserve a sincere appreciation.
I would like to place on record the excellent work done by the
outgoing team led by Prof. S.V. Raghavan for providing us the directions
to move forward.
I welcome my new executive committee members. Mr. Bipin
Mehta and Mr. Sanjay Mohapatra are joining as Vice President and
Hon. Secretary respectively. Mr. Ranga Rajagopal continues as the
Treasurer, working hard to balance the accounts and sensitizing the
chapters with the compliance aspects in the context of Govt. rules and
regulations. Mr. S. Ramanathan, steps out as the Hon. Secretary after
steering the administration of CSI for two years. Prof. S.V. Raghavan
will be with us as the immediate past president and chair the awards
and academic committees.
There are several new initiatives being planned during this
Golden Jubilee period. The new executive committee in its fi rst
meeting will deliberate, brainstorm, and determine an action plan
and share it with you to seek your support in executing them. In this
process, we would like to have your involvement in a proactive way
right from the planning stage to execution of plans as volunteers. Let
us work together collaboratively for the growth of CSI and its mission
to be of service to the masses.
With regards
H R MohanPresidentComputer Society of India
President’s Message H R Mohan
From : President’s Desk:: [email protected] : President's MessageDate : 1st April, 2014
Dear Members
CSI Communications | April 2014 | 6 www.csi-india.org
EditorialRajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree Dhere
Editors
Most of us can not imagine our world without the Internet. The Internet
is becoming more and more accessible, ubiquitous and cost-eff ective
to communicate without worrying about geographic boundaries and
underlying technologies. Billions of people are connected through
the Internet. Physically they can be at any place on earth and still
remain connected virtually. However, such interactions are no more
limited amongst only human beings. Sensors and embedded systems
are making living and non-living objects (anything in fact!) express,
talk, think, react, interact and communicate amongst themselves.
Although it sounds like science fi ction, it is already happening now.
People can monitor growth of their plants/crops sitting anywhere in
the world. One thing is talking to another – e.g. a water tank telling
water pump when to stop and start pumping water based on sensors
that monitor water level and communicate the same to sensors which
operate the water pump. Billions of such objects can talk to each other
over the internet the way human beings do and that is what makes the
Internet of things. We bring this issue with cover theme as ‘Internet
of Things (IoT)’ to let you all know about happenings, technologies,
applications, current trends and issues around IoT. Since such a topic
is more applied in nature, we received good response from industry.
We start our cover story with The Internet of Things: Technologies, Communications and Computing by Tadrash Shah, Master student,
State University of New York and and Chintan M Bhatt, Asst. Professor,
CE Dept., Chandubhai S. Patel Institute of Technology. They mention
about 6 As of IoT: Anything, Anytime, Anyone, Any place, Any services
and Any network. The article covers genesis, historical evidence,
current trend and concerns. The second article is on Origin and Applications of Internet of Things by Dr. Murugavalli Subramaniam
and B Ganesh, CSE, Panimalar Engineering College, Chennai. They
write about industry and social applications and suggest applications
in various domains such as: medical, public distribution system, traffi c
regularization and for physically challenged persons. The third article
takes a Birds Eye View on IoT, it is by Mr. Sarwesh P, Dr. N S V Shet
and Dr. K Chandrasekaran of NITK, Surathkal, Karnataka, introducing
the readers to the notion, evolution, working processes, challenges
and applications of IoT.
In Technical Trend section, we have four articles. The fi rst three
are from iGATE professionals. First one titled: Building Intelligent Internet of Things Applications using Microsoft StreamInsight by
Ramakrishnan Iyer and Radharaman Mishra of Research & Innovation
Tech CoE Group of iGate Global Solutions. They illustrate iGATE’s
iStreamAnalytics Solution based on StreamInsight. The second article
is by Venkatesh Babu and Ashok Yalamanchili, Technology CoEs in
R&I group on Indoor Positioning System (IPS) using Beacons. The
third one is written by Bipin Patwardhan of Research & Innovation,
iGATE on the Need to use 'Near-Source' processing in IoT Solutions.
The last interesting article in the section is by Kamal Sharma titled:
Human Gait- Using Biometric for Mobile Phone Security, covering
how gait (pattern of limb movements while using devices!) can be
eff ectively used for security as every individual has unique gait, which
cannot be copied or imitated.
In research front section, we have one article by R L Ujjwal, Prof. C S Rai,
University School of Information and Communicaton Technologyand
Prof. Nupur Prakash, VC, Indira Gandhi Delhi Technological University
for Women titled: Resource Allocation Algorithm to Improve the Quality-of-Service in OFDMA System. They propose an algorithm and
results of the algorithm indicate that optimum allocation of resources
under OFDMA (Orthogonal Frequency Division Multiple in Access)
system could be achieved to improve quality of service (which includes
parameters like data transfer rate, signal to noise ratio and bit error
rate). In Article section, we have an article by Dr. Rupali Bhardwaj,
Assistant Professor, Thapar University, Patiala on Cellular Automata.
In our section named Practitioner Workbench we have articles
from our regular contributors. Article in Programming.Tips() is by
Wallace Jacob, Sr. Asst. Prof. at Tolani Maritime Institute covering
Fun with C Programs and under Programming.Learn(“R”) we have
continued series on “R” by Umesh P and Silpa Bhaskaran Department
of Computational Biology and Bioinformatics, University of Kerala
writing on Packages in R.
In CIO section, under Managing Technology we have industry experts:
Madhusudhan Reddy Nukala, Shreyas Bhargave and Bipin Patwardhan
of iGATE talking about Transforming the Automotive Industry with Connected Cars–An Internet of Things Perspective.
In Security Corner column’s Information Security section we are
concluding the series of web application security articles with an
article on Security Features in Comtemporary Browsers, which also
provides Tips for Safe Browsing. This is the tenth article by Krishna
Chaitanya Telikicherla, Harigopal K B Ponnapalli and Dr. Ashutosh
Saxena of Infosys and the series ends with this article. Next article
under Information Security is about Security Aspects of IoT Domain
by Tapalina Bhattasali, Dr. Rituparna Chaki and Dr. Nabendu Chaki
of University of Calcutta covering technical aspects, security issues
and requirements.
In other regular sections, we have Dr. Debasish Jana’s (Editor, CSI
Communications) crossword to test readers’ knowledge on IoT and
he is answering the readers’ questions in Ask an Expert section. Mr. H
R Mohan, President, CSI, AVP (Systems), The Hindu, Chennai brings
the readers Happenings@ICT in March 14.
As usual there are features such as CSI Reports and CSI News.
Please note that we welcome your feedback and suggestions at
With warm regards,
Rajendra M Sonar, Achuthsankar S Nair,
Debasish Jana and Jayshree Dhere
Editors
Dear Fellow CSI Members,
Sensors and embedded systems are making living and non-living objects (anything in fact!) express, talk, think, react, interact and communicate amongst themselves. Although it sounds like science fi ction, it is already happening now. People can monitor growth of their plants/crops sitting anywhere in the world. One thing is talking to another – e.g. a water tank telling water pump when to stop and start pumping water based on sensors that monitor water level and communicate the same to sensors which operate the water pump.
CSI Communications | April 2014 | 7
At a very generic level of understanding
we can say that Internet of Things (IoT)
is a global network infrastructure where
in the physical and virtual objects are
all made equipped with data capture
and communication capabilities so that
they can use the ubiquitous internet
to transmit data and other controlling
purposes. This defi nition may seem rather
dubious at the fi rst read. The inferences
and the implications of the defi nition will
be clearer as we move forward with the
content of this article.
The time to dream is over and now
is the time to get up and set to work
towards realization of what was dreamt
decades back. The physical objects of the
world will be seamlessly integrated into
information network. The integration may
be various purposes like – data capture,
monitoring and controlling among many
others. Wireless links must spread beyond
smart phones, PCs and Tablets.
Since the existence, the planet
itself – be it nature, humans or physical
objects, has been generating enormous
amount of data and we have just lost it.
We have not been able to hear or capture
the data, but now IoT seems to fulfi ll its
promise. Also, with the parallel growth
of the cloud technologies, the data can
be accessed, manipulated and controlled
from anywhere. To put this simply = “IoT
is a scenario in which objects, animals or
people are provided with unique identifi ers
and the ability to automatically transfer
the data over a network without requiring
human-to-human or human-to-computer
interaction[2].”
Hence, we can say the IoT to be the
convergence of following technologies –
1. Wireless and Bluetooth – QoS,
latency and security
2. Microsystems, Sensors and Actuators &
miniaturization of the same.
3. Cloud technologies – security,
privacy,
4. Networks – Ipv6, lower latencies,
security
6 A connectivity is there in IoT:
Anything, Anytime, Anyone, Any place,
Any services, Any network
Genesis To map these physical devices to the
information network, they must be made
uniquely identifi able by some way. In
today’s scenario the network devices in
the internet of the intranet are addressable
by the IP (IPv4 and IPv6) or the URI. But in
the view of Semantic Web, there are more
technologies evolving which could be
used, infect a few of them are already put
to test, like RFID. RFID tagging has been
demonstrated in various parts of the world
successfully.
Internet of Things Consortium[4] mentions
4 principles for IoT –
1. Value –Make consumers live more
effi cient, safer and seamless.
2. Data – help consumers understand
the benefi ts and value of their data.
3. Security – build consumer confi dence
around IoT experiences
4. Design–delight consumers with
intuitive design and usability.
Cisco puts it the best way – calling it
“Internet of Everything”.
Historical Evidence The systems got the name IoT lately,
but they have been in existence since
quite long. In 1980 at Carnegie Mellon
University there was this Internet
Appliance Coke machine such that
programmers can connect to the
machine and determine whether or
not there would be a cold drink in the
machine to vend or not and whether they
should make a trip down to machine.
Post that, actual roots of IoT can be
traced back to the MIT from the work
of Auto-Center. In 1999, this group was
working in domain of networked RFID and
other sensing technologies. Together with
seven other research universities from
4 diff erent continents were chosen to
design architecture for IoT.
There are various IoT Software
Development Kit that are available, few
of them under open source, to be used
for programming of the devices. One of
them can be found at http://developer.
peoplepowerco.com. Giants like Intel
and ARM are too in the market with
IoT development kits namely Galileo
Development Kit (http://www.intel.com/
content/www/us/en/do-it-yourself/
galileo-maker-quark-board.html) for IoT
and MBed (http://mbed.org/).
Trend In today’s scenario, where IT companies
want to stay, rather need to stay,
competitive by adopting new and
innovative technologies – not just using
them but also developing them – IoT opens
up a whole new world of possibilities.
Wall Street Journal puts it the best
– “…a long-awaited trend that is causing a
surge of optimism in the tech sector…”
Business Insider (BI) stated in the
latest March 14, 2014 report the numbers
forecast for IoT, “1.9 billion devices today,
and 9 billion by 2018, according to BII
(Business Insider Intelligence) estimates,
roughly equal to the number of smart
phones, smart TVs, tablets, wearable
computers and PC combined[1]”. Now
that is huge! This makes to believe the
forecast myth that potentially every
tangible item, animate and inanimate,
shall be connected to the internet in near
future. This has been penetrating the
consumer and business lives.
Thomas Lee, a Stanford university
professor of Electrical Engineering and co-
founder of Ayla Networks Inc. says that
“The value of the devices will be secondary
to the services they enable”. Which seems
so true and bears the promise of IoT as a
coming era of change?
So far, the smart-home products
(a few them listed in the applications
section of this article) seem mainly to be
attracting technology enthusiasts.
Yet another point to be noted is
that, due to the smart phone proliferation
across of segments of society, the IoT
can be realized deep and wide. Hopefully,
the market will be fl ooded with so many
products, few of which extensively
customizable, that users can pick the one
that suit their needs the best.
Applications 1. Fish aquarium is made to be
connected to Raspberry Pi which is
The Internet of Things: Technologies, Communications and Computing
Cover Story
Tadrash Shah* and Chintan M Bhatt***Master student, State University of New York**Asst. Professor, CE dept., Chandubhai S. Patel Institute of Technology, CHARUSAT
CSI Communications | April 2014 | 8 www.csi-india.org
further connected to a temperature
sensor and actuator. With the help of
Pi, the thermometer delivers the real-
time temperature to any computer
which queries for it on local network.
This temperature can be controlled
from this computer.
2. Smart Dust –a device made up of tiny
sensors that are capable of wireless
communication and RFID which can
be deployed over a region to record
data for metrological, geophysical
and planetary research. The dust
in fi elds can be used to monitor the
crops, dust In factories can monitor
the output of machines, and dust in
human body to monitor the entire
state of well being.
3. Much awaited and market fl ooded
with a couple of wonderful products
is the Home Automation. The fantasy
becomes the reality. ONIDA launched
an air-conditioner with a remote that
accepts the SMS sent to it and turns
on the AC at the desired temperature
so that by the time you are home, the
home is all cozy for you. There are
video surveillance products which
can be installed in your house and
you can monitor your house, in real-
time as well as recorded data on
cloud, when you are on a tour. These
systems can also intimate you any
suspicious activities by email or SMS
or a call.
4. Another concept -Smart Garden.
Each plant in your garden can be
equipped with a RFID tag so that
remotely you can decide whether
you need to water them more,
fertilize them or transfer them to a
sunnier spot.
Figure: Smart Garden [5]
5. Companies like Silver Spring
Networks sell the wireless meters to
manage the energy usage.
6. GE uses the data generated by the
sensors to monitor the health of Jet
engines and gas turbines.
7. Another example of smart cards can
be – where insurance companies
can respond to sensors and wireless
connections on the cars to charge
drivers by the mile and speed they
drive instead of where they live.
8. The following fi gure shows a clip-on
wireless and Bluetooth clip-on device
on dog’s collar that tracks the dog
activity levels on your Smartphone
(Price $129.95).
Figure: Whistle Dog Collar [7]
Figure: Insider Intelligence[1]
Figure: The Internet of Things - How the Next Evolu on of the Internet (CISCO)[3]
CSI Communications | April 2014 | 9
9. A wearable baby monitor that sends
the data about baby’s vital signs to
the users’ smart phones. (Developed
by : Sproutling)
Figure: Wearable baby monitor[8]
10. Apple Smart Body Analyzer–An
another mind-boggling Apple
product that is lesser known, which
measures the air quality in your
room, your heart-rate, weight and
other body compositions which
are then uploaded to the cloud or
Bluetooth over all your Apple devices.
The HealthMate App uses this data
to coach you about changing your
lifestyle, setting weight goals, and
other weekly achievable targets.
11. Washing machines turning on only
when the energy demand on the grid
is minimum as controlled from your
smart phone.
12. A car will automatically call an
emergency service sending its
location and other important data
after an accident. Hence, apart from
being saved by the SRS airbags the
emergency help is also called for you
after an accident.
13. Animals and birds can be tagged with
RFID and their migration, behavior
patterns and other data can be
captured and analyzed for a better
study. This has been found successful
and implemented successfully. A
couple of these technologies are
mature and well standardized in
some domains.
14. BigBelly is a solar-powered trash
receptacle and trash compactor that
alerts sanitation crews when it is full.
Having listed a dozen of applications of
IoT, few of which at conceptual level and
others already in the market. World’s top
10 innovative companies in IoT and their
products can be read about at http://goo.
gl/zs6WND. Also http://iotlist.co/ lists
all the mind-boggling IoT products if you
wish to discover more. Yet another list is
at http://goo.gl/838dsg.
Concerns Data privacy, data integrity and data
sovereignty - A common consensus needs
to be reached where-in how and who
should exploit the data that has been
captured by these IoT devices.
Another concern at the hardware level
is that various manufacturers may design
and produce several diff erent devices.
The consensus needs to be reached here
too for defi ning the conventions that tell
these manufactures what to do and how
to work together. Apple has been so far
successful in allowing wonderful and
seamless communication across various
other and heterogeneous Apple devices,
but we need to break those bounds and
make a reference model that is platform
independent and also cross-proprietary
enabled.
There is this term in US called that we
bumped into – “Big Brother”. These terms
is referred to the Federal Government
that uses your data from myriad sources
for your monitoring. Example, thermal
imaging of private homes for marijuana
lamps, phone and internet data from
private companies to ensure no individual
is breaking law, and much more. Any
human in USA is under constant
surveillance of Federal government. This
surveillance is termed as “Big Brother”.
They say that Big Brother is getting bigger
these days with IoT. Any car equipped as a
smart-car monitors all your where-about,
web surveillance is getting thicker in name
of public safety and much more. This is an
important concern when a person is losing
his privacy at all nodes, and may not like
that. Hence, IoT data sovereignty is a
major concern these days.
Listing many other concerns in brief –
1. Architecture – no unanimous
consensus has been reached upon
regarding the architecture of IoT.
2. The IoT devices needs to be
connected to the power supply and
internet all the time, round the clock,
hence the energy effi ciency of the
sensing is also a primary concern.
3. Apart from data privacy the network
security should be considered –
someone can disable the network
availability, push erroneous data,
breaking in to the network, etc.
Depending on the application either
or all of these can be hazardous and
even life-threatening.
4. Mentioned that heterogeneous
networks and devices will be put to
use the QoS needs to fi ne-tune for
current protocols or may be new
protocols need be devised.
5. Extracting useful information from
the sensor data is also a challenge.
At the hardware level the sensors are
all aff ected by spatial and temporal
data and hence the data may create
noise. Having said that perhaps next generation of data mining algorithms
need to be used.
P.S.: The issue of Telemedicine rose
in the December 2013 issue of CSI
Communications written by Tadrash Shah
Figure: IoT-enabled home with connected devices and appliances working invisibly for consumer[6]
CSI Communications | April 2014 | 10 www.csi-india.org
and Prof. Chintan Bhatt also points back
to IoT where patients can be monitored
remotely through halter that can transfer
the data to the hospital. In this setup
patient is granted greater freedom and
independence in monitoring their health
and simultaneously frees up the hospital or
equipment for treating other emergencies.
References[1] http://www.businessinsider.com/
growth-in-the-internet-of-things-
market-2-2014-2
[2] http ://what is .techtarget .com/
defi nition/Internet-of-Things
[3] h t t p s : //w w w. c i s c o . c o m /we b /
a b o u t /a c 7 9/d o c s /i n n ov/ I o T _
IBSG_0411FINAL.pdf
[4] http://iofthings.org/
[5] http://readwrite.com/2013/11/04/
g a r d e n i n g - c o n n e c t e d - h o m e #
awesm=~oyWPdTWxhOVfRo
[6] http://www.ti.com/lit/ml/swrb028/
swrb028.pdf
[7] http://gigaom.com/2013/06/05/
quant i fy ing-your-pup-whist le-
wants-to-create-the-worlds-largest-
database-on-dog-behavior/
[8] http://www.medgadget.com/2013
/09/sproutlings-wearable-baby-
monitor.html n
Abo
ut th
e A
utho
rs
Tadrash Shah obtained his bachelor’s degree, B.E. in Computer Engineering from Gujarat Technological University and currently
pursuing Master’s Degree at State University of New York - Stony Brook. He stood fi rst in his college in Degree Engineering. He has
published two research papers and a book in his undergraduate level. He is interested in the research in the subjects like Algorithms,
High-performance computing and Databases. He has worked and undertook projects at IIT-Gandhinagar, IIT-Bombay and IIM
Ahmedabad.
Prof. Chintan M Bhatt received B.E. and M. Tech. Degrees from Gujarat University (CITC (now CSPIT)) and Dharmsinh Desai
University in Computer Engineering. He is a member of CSI, AIRCC (Academy & Industry Research Collaboration Center) and IAENG
(International Association of Engineers). His areas of interest include Data Mining, Web Mining, Networking, Security and Software
engineering. He has more than 3 years of teaching and research experience.
CSI Communications | April 2014 | 11
IntroductionInternet of things refers to identifying a
physical Object through internet. Any
object even a human being, animal or
anything else can be connected in Internet
so that they can be accessible from
anywhere in the world through internet.
In early days, communication was
diffi cult among people. Communication
between neighboring cities, towns or
villages used to take several days/hours.
It depended only on human messengers/
birds that used to carry the message and
deliver it to appropriate destination. This
was the early postal/communication
system. Later invention of motor vehicles
eased the message delivery process.
Invention of telegram and telephone
made possible quick communication
among the various persons and entities
near and far away.
After invention of computers and
network, information started getting
exchanged through the computers.
Initially, they used some sort of cables to
provide information sharing among the
computer systems. But such connection
had some limitations; it only connected
systems in nearby locations. For
connecting systems in remote locations
cables need to be laid for a long distance,
which is very expensive.
To overcome this limitation,
telephone lines were used for connecting
the computers with the help of
modem. This is how internet evolved;
it led to a huge revolution in the globe,
communication was made easy and
information sharing between the systems
was no longer complex.
Earlier the internet was used for
information sharing, sending mails,
download and upload of fi les. But now it
is being used for many applications and
in many fi elds which were unimaginable a
decade ago.
Industry and Social ApplicationIn a boiler industry its temperature
and pressure should be kept under the
control, if it exceeds certain value the
boiler blows up. So the temperature
and pressure needs to be monitored
regularly. Human being going near the
boilers having heavy temperature around
1000° C or more is not possible. Here
comes the help of internet.
In a forest, the major problem is
forest fi re which burns the trees and
animals. Deforestation brings imbalance
in the eco system, and eff ects climate
change. The solution to this is to detect
early so that it can be prevented or
controlled. But how the forest fi re can be
identifi ed in early stage?
In the above two scenarios remote
sensors can be used which can be connected
to the network, and information about the
environment like temperature, pressure
etc. can be received for further analysis and
action. The smoke detecting sensors can
be deployed in forest so that they can send
the information about the fi re quickly to the
control station in order to control the fi re in
early stage to save the forest.
Wireless Sensor Networks, are the
best examples of how non-computers
can be interconnected. These wireless
sensors are used in many fi elds, in Forest
to monitor and send alarm regarding
the Forest fi re, in Military fi eld it will be
deployed in multiple remote locations
so that information can be exchanged
among them.
Radio-Frequency Identifi cation
(RFID) is a wireless device used to identify
any device or a person. It is mostly used to
authenticate a person, to track the device
progress in assembly line. For avoiding
traffi c at toll gates RFID can be used. In a
car, bus or lorry, RFID tag can be fi xed in
the front Glass, so that the vehicles need
not stop there. In India most of the toll
gates use RFID tags to identify the public
vehicles in order to minimize the traffi c
jam in toll gates.
Both Wireless sensors and RFID are
used to track or observe the status of a
vehicle, person, location etc.
Suggested ApplicationsFor MedicalThere exist wearable sensors which can
be used to identify or track person’s or
an object’s movements. Such sensors
can also be used to get the information
regarding patient’s body temperature,
pulse rate, sugar and blood pressure levels
etc. In a hospital it can be used to observe
the patient, and such information can be
recorded automatically in a system and
if anything goes wrong send alarm to the
doctor or a patient by means of SMS or to
a dedicated application in a mobile.
For Public Distribution System (PDS)In India one of the major problems is
civil supply traffi cking. Goods supplied to
one particular area can be taken away by
strangers. This aff ects the needy people
and it’s a big headache for the government
to stop this kind of activity. To prevent this,
the GPS can be fi xed in each public goods
carrying vehicle, so that its movement
can be recorded and they can be tracked
completely from source to destination.
For Physically ImpairedThe sensors can be used for the blinds to
identify the objects ahead when they walk
on the road. Normally, they use a stick to
identify the objects in their way. Instead
sensors can be fi xed on the stick which
emit some ultrasonic sound and observe
back like the principle of SONAR. If the
refl ection is quicker we can calculate the
distance between object and blind person.
The distance can be intimated to the
blind through the headphone. Integrating
such sensors and navigators will help
them walk anywhere without anyone’s
assistance. Using the navigator they can
specify the destination, the navigator will
calculate the optimal route and tell the
route to them through the headphone.
For Traffi c RegularizationThe traffi c violators can be identifi ed using
the RFID enabled number plates. When a
person violates the traffi c automatically
the vehicle id can be obtained using the
RFID number plate if the RFID detectors
are placed in the junctions. For example,
the speed violators can be identifi ed easily
by keeping two RFID receivers about 100m
apart. If a vehicle crossed the fi rst detector
it will read the number of that vehicle and
Origin and Applications of Internet of Things
Cover Story
Dr. Murugavalli Subramaniam* and B Ganesh***Professor and Head, Department of CSE, Panimalar Engineering College, Chennai**Assistant Professor (Grade-I), CSE, Panimalar Engineeering College, Chennai
CSI Communications | April 2014 | 12 www.csi-india.org
when it crosses the second detector it
reads the number again and calculates
the speed using the time taken to cross
that 100m distance. If a vehicle crosses
100m distance in 5secs then its speed is
72kmph. If the speed limit of that location
is only 20kmph then it’s clear violation.
The intimation can be sent to the control
room so that the vehicle can be tracked in
some other detector.
The RFID, Wireless sensor and
GPS can together connect any object
in the world so that it is possible to do
information sharing, retrieval, monitoring
and taking necessary steps to control
them with less eff ort and in quick time.
n
Abo
ut th
e A
utho
rs
Dr. Murugavalli Subramaniam is Professor and Head, Department of CSE at Panimalar Engineering College, Chennai.
She has 18 years of teaching experience and 9 years of research experience. She completed her Doctoral Programme in
the area of Image Processing, Anna University. She is a member and Student Branch Coordinator of Computer Society
of India.
B Ganesh is Assistant Professor (Grade-I), CSE, at Panimalar Engineeering College, Chennai. He studied B.E. CSE in
VRS College of Engineering Villupuram and M.E. CSE in AVIT, Chennai. He is having 12 years of experience in Teaching
and Industry together.
CSI Communications | April 2014 | 13
Notion of Internet of Things Internet of things (IoT) is a fast growing,
user friendly technology which allows
everything to be connected together and
also allows eff ective communication
between the connected “things”. These
“things” can include any object ranging
from a small pen to a big car.
This technology has expanded to
such an extent that even living organisms
are considered as the part of Internet of
things. In IoT, intelligent devices such as
Passive RFID Tag [Los Alamos], Smart Dust
[Kristofer S. J. Pister, Joe Kahn, and Bernhard
Boser] etc., are connected together in a
large network with unique accessibility.
IoT exchanges data in a fraction of second
and also it consumes less power. It makes
the human life more comfortable and it
helps to build a smarter world.
Evolution of Internet of Things Before 1990’s communication happened
between computers which was called as
electronic data transfer. These computers
formed a network and it was further
classifi ed as Local area network (LAN),
Metropolitan area network (MAN) and
Wide area network (WAN). This WAN
was called as Internet where, several
computers around the world were able to
communicate each other. Subsequently
further improvements in networks
allowed external peripheral devices to be
connected to internet. In present we are
giving instruction to devices instead IoT
will make the devices to think and act
according to our needs.
[Kevin Ashton] the co-founder of
Auto-ID Center at the Massachusetts
Institute of Technology coined the term
IoT in 1999, after him [Ashton] discussed
about IoT in RFIDJournal.com in 2009.
The white paper of [Texas instruments]
says that till now, the world has deployed
about 5 billion “smart” connected things.
Predictions say that there will be 50
billion connected devices by 2020 and in
our lifetime we will experience life with a
trillion-node network. The current network
infrastructure is a barrier in realizing those
numbers. The industry will achieve the
reality of 50 billion connected devices only
by simplifying the way in which things are
connected. People are trying to optimize
the process of internet of things because
in future the trillion-node network may be
implemented.
In many places people have started
implementing the smart things/devices
in real-time applications such as RFID
tracking, smart dust implementation in
battle fi eld, smart health care system,
smart irrigation system for agriculture
and smart grid for power consumption
management, wildlife monitoring by
multimedia sensor networks and some
sensors implemented under the ground,
sea, forest and bank of rivers to prevent
the world from natural disasters like
tsunami, earthquake, forest fi re, fl ood etc .
Working Process of Internet of Things IoT handles all types of devices from a
simple device to an intelligent device.
These devices should have certain
basic capabilities namely sensing,
data capture, data storage, data
processing and it should also be uniquely
accessible. In IoT architecture, devices
can communicate with each other by
forming a network. This network is
similar to computer network but here
computers are replaced by things. In
IoT devices can communicate with each
other directly or through a gateway. It
manages resources, services and collects
the information for sending it according
to requirements of user. There are four
types of communications involved in IoT,
a) Device-to-device: In Fig.1 we can see
that in section 1 and section 2 there
are two ways connecting the devices,
Internet of Things: A Birds Eye View
Cover Story
Mr. Sarwesh P*, Dr. N S V Shet** and Dr. K Chandrasekaran****Research Scholar, E & C Department, NITK, Surathkal, Karnataka **Associate Professor, E & C Department, NITK, Surathkal, Karnataka ***Professor, CSE Department, NITK, Surathkal, Karnataka
Fig. 1: Working process of IoT
CSI Communications | April 2014 | 14 www.csi-india.org
either they can connect directly or they
can connect through the gate way. It is
clearly diff erentiated by two kinds of
dotted lines.
b) Device-to-user: The user can be in
section 1, section 3 or section 4 in
either of the cases he has to access
the data from the device only through
service management system section
4. Because all the data related controls
are handled by the section 4.
c) Device-to-server: The device to server
interaction involves all the four sections.
Hence the two domains
d) Server-to-applications: This process is
fully related to section 4 where the user
can access the data directly from the
server.
By seeing the Fig.1 we can clearly
understand the working process of
internet of things.
Challenges for Internet of Things • Connectivity and identifi cation: Proper
standards have to be developed for connectivity and there should be a unique identifi cation mechanism for accessing all kind of devices. For this IPv6 was proposed as one of the solution but there is no standard mechanism till now that can be used for identifi cation.
• Reliable and scalable Network: Here ubiquitous things are connected together and hence effi cient network with good reliability and scalability is required with a Quality of service protocol which would maintain the data fl ow.
• Power management: Power is one of the important parameters to be considered. Energy harvesting by smart devices should be implemented and IoT devices should be self sustainable.
• Security: Security is a very important aspect of IoT. The built-in security should be implemented in devices and protocols. Usually IoT uses wireless infrastructure for communication which is prone to several attacks. Thus proper security measures should be taken to protect the data being transferred.
• Multi device adoption: Thousands of new devices are working and hundreds of new devices will be implemented each and every day. For that, our network should be able to adopt all kinds of devices from lower end to higher end. For example, it should manage RFID
tag, temperature sensor, smart dust, multimedia sensor, server, router, bio sensor, smart chip, server, database system etc in a single track.
The above challenges are considered as
the important requirements for developing
IoT. The researchers are working through
it and they are trying to optimize the
diff erent parts of architecture.
Applications of Internet of Things Smart marketing: In supermarket this technology can
be used to provide the information
to the customers without any human
intervention. For example, A passive
RFID tag can be placed in a cocoa bean
package such that whenever a customer
comes near to the package it will intimate
the customer about the details of beans
automatically through a voice signal.
Smart Products: Using IoT products can be developed such
that they will instruct the user based on
the application. For example, a RFID tag
can be attached with a shirt to monitor the
body temperature of the user and instruct
him accordingly.
Smart eHealth care: In eHealth care system the doctor can
see the body condition of patient without
testing him physically, by using a smart
product called biochip which is inserted in
the patient’s body. It can measure the blood
pressure, cholesterol content, heartbeat,
body temperature, viral infection etc., and
it will report to his family doctor.
Smart Automation: We can implement intelligent multimedia
sensor in car, designed in such a way that
it will focus and analyze the retina of the
person who is driving the car and it will
instruct the driving person that to stop
the car. If the person still drives the car it
will park the car in a parking area of the
road automatically. This will prevent the
accidents.
Smart Pollution monitoring system: If some person is throwing plastics
in ground the multimedia sensor will
monitor and it will warn the person and it
will indicate the fi ne amount that has to
be paid by the person. So pollution will be
reduced and next time people won`t do
such kind of mistakes.
Smart grid Technology: In smart grid technology the excess of power which generated by means of
windmill, thermal power plant, solar power plant, etc., will be directed and distributed to places where energy is required. For example, if a wind mill is generating 1000 mega watts of power in place A and if the people require the power of only 700 mega watts. Remaining 300 mega watts can be sent to Place B otherwise it will be wasted. To save such resources a technology called smart grid technology is booming with the help of IoT.
Internet of Things in Future In ITU people are working on a Packet based
service related network which is called as
“Next Generation Network”. It handles
billions of things together. For example, it
is possible to get the current information
about animals in the amazon’s forest with
in a second, by sitting in our home. In future
devices will sense, speak, hear and at last it
might even start thinking.
Conclusion IoT is a recent technology which is booming and it has a good rate of acceptance among the people. Industries are spending a considerable amount of money and many researchers are working towards the improvement and development of IoT. The applications of IoT are many and so are the users. This technology can be considered as one of the most promising technologies of the 21st century. It is needless to say that the future wouldn’t exist without IoT. It would become as an integral part of the day-to-day human life. People would become extensively dependent on IoT, at least to satisfy their medical needs. The day is not far when each person would directly or indirectly be related to at least two or three IoT networks.
References [1] www.ti.com/iot-intro - Strategic marketing,
Texas Instruments, Sep-2013 [Jim Chase] [2] IERC - Internet of Things European Research
Cluster 3rd edition of the Cluster Book 2012 [Ian G Smith, Ovidiu Vermesan, Peter Friess, Anthony Furness, Martin Pitt]
[3] Internet of things the legal perspectives – 2010 [Rolf H. Weber, Romana Weber]
[4] The Internet of Things, ITU Internet reports, Nov-2005 [Lara srivastava, Comprising Phillippa Biggs, Tim Kelly, Youlia Lozanova, Lilia Perez Chavolla, Jaroslaw Ponder, Raushan Sagalbayeva, Svetlana Skvortsova and Christine sund]
[5] Rethinking the Internet of things-A scalable Approach to Connecting Everything, 2013 [Francis daCosta]
[6] ITU Workshop on the “Internet of Things -Trend and Challenges in Standardization” (Geneva, Switzerland, 18 February 2014)
[7] http://www.iot-a.eu/public [8] http://www.internet-of-things-research.eu
n
CSI Communications | April 2014 | 15
Key IT Challenges with Internet of Things ImplementationIoT based business applications have
some signature characteristics:
• Very high event data rates
• Huge volume of continuous data
• Need for continuous monitoring
• Minimal latency
• High level of complexity in fi nding
meaning in the data
• Immediate response in case of an
alert situation
A typical IoT application will be connected
to a huge number of devices that will
continuously provide it with the input data
in the form of events. Traditional relational
database centric application development
models may not be suffi cient for building
such applications and they can use
“Complex Event Processing (CEP)”
technology instead. The application
will need to capture the events, analyze
the data to come up with insights and
patterns. IoT applications by nature will
be not only complex but also critical,
because the insight provided by its output
will be often triggering some other event
of decision making. Due to these reasons
an enterprise will need to come up with
a robust, scalable and proven CEP and
analytics platform, which can leverage
this online data for providing advanced
CEP solution for various benefi ts such as
business insight, better decision making
and cost reduction etc.
IoT applications and traditional
applications (e.g., native or web based
applications) are signifi cantly diff erent
in many ways. Technological and
architectural implications of these
diff erences are profound. It will bring big
opportunities and even bigger challenges
such as:
• Processing large volumes of data
published at a high speed needs a
matching infrastructure
• Eff ective, meaningful and cost
eff ective mining and analysis of the
input events needs a robust analytics
platform
• Since the number of connected
devices might increase drastically,
the architecture need to be scalable
• Applications has to have integration
capabilities with diff erent types of
devices and systems
• Considering the high volume of data,
need to ensure the data quality
• High network bandwidth is required
to read all the raw data generated by
millions of connected devices
• No uniform standards for data
generated from devices which may
result in data silos and can prevent
widespread adoption
Building Intelligent Internet of Things Applications using Microsoft StreamInsight
Ramakrishnan Iyer* and Radharaman Mishra***Principal Architect, Research & Innovation Tech CoE Group of iGATE Global Solutions**Technical Architect, Research & Innovation Tech CoE Group of iGATE Global Solutions
Technical Trends
Abstract: The Internet of Things (IoT) is a web of objects with unique identifi ers that can communicate with each other with or without the aid of a computer or internet. The communication is enabled through the sensors installed into the participating devices. Several technologies like wireless technologies, micro-electromechanical systems (MEMS) and the Internet have contributed to the emergence of the IoT. Due to availability of low-cost sensor devices, market analysts estimate that there could be around 26 billion installed units by 2020 and the market size to be around 2.2 trillion by 2025. IoT has become one of the most talked about emerging technologies, given the potential to come up with various innovative products and services. Since it enables the devices to come alive and be interactive, the product companies and service providers will be using it for continuing with their services even after the product has been actually sold. IoT applications will be smarter than the applications we use currently in a way that they would be able to communicate with each other and enable decision-making giving them intelligence of their own. IoT has the potential for new opportunities across vertical markets such as insurance, consumer electronics, medical, transportation to develop use cases which can leverage this technology to reduce costs, improve customer satisfaction, and create new business models based on the analysis of the data collected. Microsoft StreamInsight is a powerful platform for developing and deploying highly scalable and low latency CEP applications. It is designed to provide event-driven processing solution to continuously arriving data without writing the data to disk for analysis and querying. With StreamInsight, IoT applications can provide better and faster CEP solutions to incoming data in near-real time, as the data gets acquired from the sources as compared to the analytics solutions based on the traditional database reports and dashboards. The primary intent of this paper is to provide enterprises an overview of Microsoft StreamInsight features and capabilities and iGate iStreamAnalytics platform that can be used to develop online complex event processing solutions for quick insights in various verticals.
A typical IoT application will be connected to a huge number of devices that will continuously provide it with the input data in the form of events. Traditional relational database centric application development models may not be suffi cient for building such applications and they can use “Complex Event Processing (CEP)” technology instead.
IoT applications and traditional applications (e.g., native or web based applications) are signifi cantly diff erent in many ways. Technological and architectural implications of these diff erences are profound.
CSI Communications | April 2014 | 16 www.csi-india.org
• There could be potential security
implications since the connected
devices can be vulnerable to hacking
and hence need a secure identity
management and authentication to
be implemented
• Defi ning the data retention, archival
and purging could be a challenging
task for the massive amount of data
that get generated from devices
Microsoft StreamInsight CapabilitiesMicrosoft StreamInsight provides a
powerful platform for implementing
robust and highly effi cient IoT applications
involving the complex events processing.
The technologies advancements in the
devices together with the capabilities of
StreamInsight will allow the possibility
of building intelligent applications where
StreamInsight will play a pivotal role
in transforming the raw data from the
input devices into intelligence for the
business. Some of the key capabilities,
StreamInsight off ers are:
• Ability to process multiple data
streams over the internet from
multiple, heterogeneous data sources
and apply business rules to generate
meaningful patterns, exceptions and
trends
• Adapter model to interoperate with
all kinds of data sources and facilitate
seamless integration with both the
incoming and outgoing event traffi c
• Declarative query language (LINQ) to
formulate queries, rules, and patterns
• Parallel processing and use of in
memory cache for delivering better
performance
• Event driven, continuous and
incremental processing for high
throughput, low latency
• Familiar Microsoft .Net based
development platform that allows
leveraging the existing skill sets
and infrastructure investments in
VisualStudio and .Net framework
• Reduced and optimized storage
requirements since the streams need
not be persisted for the processing
• Event Flow Debugger tool for
monitoring the running queries,
replaying the data processing, and
performing root-cause and event-
propagation analysis
iGATE iStreamAnalytics SolutioniGATE iStreamAnalytics is a Microsoft
StreamInsight based solution that is
designed to process events, received as
input data, from multiple sources in real
time. Key solution features are:
• Capability to receive input data
from multiple sources in multiple
Fig1: iStreamAnaly cs- High Level Architecture
CSI Communications | April 2014 | 17
formats and can be confi gurable to
be processed in StreamInsight engine
• Prebuilt and confi gurable simple
rules and alerts
• Capability to display the data fl ow
and alerts in near real time
• Services based integration with the
StreamInsight (for both the Event
generator and the Dashboard)
Following diagram shows the high level
architecture of the iStreamAnalytics
solution.
Event GeneratorThis application will act as a gateway for
the various input sources (e.g., device
sensors- speedometer of a vehicle,
device on a patient, smart meters etc.)
to read the data and transform them into
a confi gurable format to the service that
inputs to the StreamInsight engine.
CEP EngineCEP Engine will be responsible for
processing the events that has been
submitted by the devices/sensors (or
the Events Generator). It will be applying
the business rules over the streams and
generating the appropriate alerts. The
rules can be classifi ed into two types:
• Pre-built Rules: The parameter for
the rules will be confi gurable where
thresholds could be defi ned and
alerts could be triggered for data that
does not meet the threshold values.
An example could be if the speed
exceeds 100 miles per hour, trigger
an alert for over speeding.
• Custom Rules: These rules will be
specifi c to business scenarios and
will need to be developed for the
application.
Dashboard Dashboard application will be responsible
for showing the data and alerts generated by
the CEP. The dashboard has the capabilities
to plot the data in the chart format and
displaying alerts in near real time.
Applications Enabled due to
iStreamAnalytics SolutionAny business scenario where an event
generated is of importance, will need
to be monitored (often together with
some other events) and analyzed for
myriad purposes like generating alert,
decision making, triggering some
associated event and so on will benefi t
from the IoT applications. Financial
services, health care, insurance, utilities,
telecommunication, manufacturing and
web analytics are some of the business
domains that will need to implement CEP/
IoT applications.
Following is a list of some of the
specifi c examples of new potential IoT-
based applications that use sensor devices:
• Usage-based insurance: Using
sensors in vehicles, monitor the
driving behaviors using the data
generated from sensors, profi le driver
to provide calculate auto insurance
premium policies
• Healthcare sensing: Collect, monitor
and analyze data at real-time from
patients/consumers to provide a
better healthcare facilities
• Smart meters: Monitoring of various
utilities like electricity, gas and water
etc. and analyze data to trigger
alerts and provide analysis of the
usage, remotely control as well as
automation of utilities and prevent
any critical situations
• Real-time manufacturing
intelligence: Monitor real-time data
of manufacturing operations and
analyze the data to provide insightful
information for improving the entire
manufacturing processes
• Fleet management: By having sensor
devices on the vehicle fl eet, track and
monitor vehicles, optimize routing
operations, vehicle utilization and
improve the overall effi ciency of their
fl eets
• Fraud Detection: Monitor all fi nancial
& non-fi nancial transactions, do
analysis based on business rules and
detect any fraudulent or suspicious
activities being done
ConclusionThough IoT is still in its early stages,
IoT will need enterprises to gear up for
a highly connected world and come up
with new business models and processes
to have a better competitive edge in
the market. Also the sensor devices will
bring a new transformation in how to
detect any change in parameters, use
this information to trigger new events
to help save costs and better decision
making. New analytics tools like Microsoft
StreamInsight are emerging to provide
scalable high performance architecture to
process this massive amount of data.
iGATE is well-positioned with its new
iStreamAnalytics platform which is a real-
time business analytics solution to enable
rapid development of new IoT solutions
for fast-time-to-market in any verticals. It
will allow confi guring usage of any devices
data and providing device monitoring,
dashboards and analytics reports to
enable better decision making. n
Abo
ut th
e A
utho
rs
Ramakrishnan Iyer is a Principal Architect working in Research & Innovation Tech CoE Group of iGATE Global Solutions,
and is responsible for developing technology solutions. He has more than 20 years of experience in Information
Technology with strong expertise in Microsoft technologies, Application Portfolio Rationalization, applications
assessment, and Application Portfolio Modernization. He has extensive experience in architecting and designing large
business applications in various technologies.
Radharaman Mishra is a Technical Architect with the Research & Innovation Tech CoE Group of iGATE Global Solutions.
With over 14 years of experience in the IT services industry, he has worked on software application architecture and
design, development, architecture assessment and consulting. His expertise includes .Net, ASP.Net and Microsoft SQL
Server. He has been working with iGATE’s Fortune 500 customers on various Microsoft-specifi c enterprise application
architectures and design. He has also published papers of technical interests in various external and internal forums.
Though IoT is still in its early stages, IoT will need enterprises to gear up for a highly connected world and come up with new business models and processes to have a better competitive edge in the market.
CSI Communications | April 2014 | 18 www.csi-india.org
IntroductionWhat is IPS? An indoor positioning system (IPS) is a
network of devices used to wirelessly
locate objects or people inside a building.
Why IPS?Due to the signal attenuation caused by
construction materials, the satellite based
GPS signal loses signifi cant power indoors.
For this reason the receiver cannot get
coverage of 4 satellites which atleast is
needed to accurately get the location
coordinates.
The consumer devices will have a
maximum location accuracy of 10 mts
when the location is set by the GPS. This
accuracy is not acceptable with respect
to the use cases for indoor positioning
and navigation as a lot of things change
at indoor level, for eg. aisles are placed
adjacent to each other within a distance
of 1-2 metres in a retail store or there can
be multiple stores within a distance of
10 meters in a mall.
Also due to the nature of indoor
environment, GPS cannot provide
information about the fl oor and building
level at which user is located.
This brings up the need for a system
where a user/object has to be located
inside a building accurately and precisely
to make positioning and navigation inside
indoors as easy as outdoors.
Current ScenarioEven though there was a market pull for
this technology from a long time, it didn’t
come into mainstream due to limitations
of the software / hardware available with
consumers in general. Now that smart
phones are ubiquitous, the technology
is gaining momentum in terms of scale
and variety with the entry of innovative
companies.
Future MarketThe global indoor positioning market is
estimated to grow from $448.6 million
in 2013 to $2.60 billion in 2018. (Source:
www.marketsandmarkets.com)
Usage of IPSIndicative list of use cases and scenarios
where IPS can be used are given below
Consumer: • Transportation hubs like Airports,
Railway & Bus stations
• Indoor venus like university campus,
hospitals
• Commercial venus like shopping
malls, offi ces
Non Consumer: • Emergency services like fi re rescue,
police and medical
• Asset tracking & logistics for offi ces,
hospitals, industries and retail stores
• Industrial Automation
Indoor Positioning System (IPS) using Beacons
Venkatesh Babu* and Ashok Yalamanchili** *Sr. Principal Architect, Technology CoEs in R&I group @ iGATE**Technical Lead, Technology CoEs in R&I group @ iGATE
Technical Trends
Source: www.extremetech.com (h p://www.extremetech.com/extreme/126843-think-gps-is-cool-ips-will-blow-your-mind)
CSI Communications | April 2014 | 19
Enabling Technologies for IPS SolutionSome of the enabling technologies used
for an IPS solution are listed below
• Wi-Fi access points
• BLE Beacons
• Sensors (Accelerometer, Gyro,
Compass, etc.)
• Indoor Lights
• Magnetic Field
• Low Orbit Satellites
• Camera Technology
iGATE chose to experiment with BLE
Beacons and Wi-Fi access points. Sample
BLE beacons images are given below.
Source: Beacon’s images are from their respec ve vendor websites
iGATE’s Exploratory Activities iGATE has worked on the PoCs for
proximity using Estimote’s iBeacons,
positioning and navigation using indoo.rs
bluetooth beacons and its framework.
Proximity PoC: In this PoC, bluetooth
beacons are placed in the store at strategic
positions and confi gured with their major
and minor identifi ers. If the user with the
mobile app comes into the fi eld of the
beacons, then an off er that is confi gured
for that beacon will be pushed to the user.
Indoor positioning and Navigation PoC:This PoC will provide the user his current
location with an accuracy of 1 meter which
gives accurate results from an analytics
perspective. The user can also navigate
inside the store based on the products he
has in his shopping cart.
iGATE is building a omni channel
solution which will enable retailers to
push real time personalised promotions
and off ers to the customers, also identify
the customer behaviour across physical
stores. The off ers that are pushed are
based on the users past shopping history
across diff erent channels like web, mobile,
and physical store. In addition to this the
product also gives insights like how the
customer has moved inside the store,
dwell times at particular aisles.
Source: Internet, Enhanced by iGATE
CSI Communications | April 2014 | 20 www.csi-india.org
ChallengesThere were many challenges encountered
by iGATE while implementing an indoor
positioning system. Some of the these
challenges are mentioned below
Precision and Latency - The amount of
time for which the user can get his current
position with maximum accuracy varied
a lot from vendor to vendor. We got a
precision of 1-2 mts for 70% of the time
by using Bluetooth Low Energy (BLE)
beacons based IPS. When the Wi-Fi
Access Points were used for positioning,
we got a precision of 5-8 mts for 60%
of the time. Latency is the time taken by
the system to identify the users position
from the time the request to get location is
sent from the device to the server. Typical
latency of 5-6 seconds was observed to
get the position with good accuracy.
Signal accuracy & stability - The
signals emitted from either Wi-Fi AP’s
/ Bluetooth beacons are prone to be
absorbed by human bodies, walls, aisles
and other structural elements. This
creates interference to these signals and
it gets more complicated if people are
moving which creates more fl uctuations
ultimately leading to stability issues. One
of the main challenges for the IPS to work
consistently is to minimize the eff ect of
these interferences by fi lters implemented
by IPS providers.
Structural movements – Any change in
the position of a sensor or change in the
structure will need a recalibration of the
entire area of interest, so that accurate
results are provided by the IPS.
Power consumption - Although Bluetooth
LE consumes less power on a mobile
device compared to Bluetooth 2.0/3.0,
continuously fetching the position will
involve signifi cant battery consumption
as the location has to be fetched from the
server. Beacon vendors typically specify
a battery life of 1-2 years per beacon, but
during our solution implementation, we
found that batteries drained out in less
than 6 months.
Supporting multiple devices - Another
major challenge for these IPS solutions
is to have compatibility with multiple
platforms, device and Operating System
versions. As the current mobile market is
highly fragmented this becomes a major
challenge in selecting the IPS solution.
ConclusionIPS seems very promising which can be
leveraged in many scenarios / areas.
There are many vendors that are heavily
investing in this space. Some of the major
players that are having a considerable
impact in this space are
• Navizon (http://navizon.com/
indoors-solutions)
• Meridian apps (http://www.
meridianapps.com/)
• Aisle411 (http://aisle411.com/
solutions/publisher-solutions/)
• Indoors (http://indoo.rs/)
Even though there are many vendors out
there in this space, the technology is still
at a very nascent stage, accurate and easy-
to-setup solutions can make IPS realize its
full potential in many areas.
References[1] marketsandmarkets.com. (2013).
Indoor Positioning and Indoor Navigation (IPIN) Market [(Network-based Positioning; Independent Positioning; Hybrid Positioning); by Solutions (Maps and Navigation; Location based Analytics)]: Worldwide Market Forecasts and Analysis (2013 - 2018). Dallas: Markets and Markets.
[2] Naguib, D. A. (2011, 9 11). The Great Indoors: Challenges and Use Cases: Qualcomm.
[3] Indoors. (2013, 09 07). Indoors. Retrieved 12 26, 2013 from Accurate indoor localization: http://indoo.rs/features/
[4] Loctronix. (2011, 09 26). Consumer Applications for Indoor Positioning. Retrieved 26 12, 2013 from Loctronix: http://www.loctronix.com/news/Insider/I1-1-A2-ConsumerApps.html
[5] Indoor LBS. (2014, 01 16). Indoor Location & Mapping Services Report. Retrieved 01 24, 2014 from Indoor LBS: http://www.indoorlbs.com/p/market-
report.html n
Abo
ut th
e A
utho
rs
Venkatesh Babu is a Sr. Principal Architect working in the Technology CoEs in R&I group @ iGATE. He has more
than 20 years of experience in IT industry and is currently involved with R & D of emerging trends & technologies.
The R&I Technology CoE team works on PoCs, Solutions, and provides thought leadership for evangelization of new
trends / technologies for solving business problems of clients.
Ashok Yalamanchili is a Technical Lead with more than 7 years of experience in IT industry. At iGATE, he is currently
working in the Technology CoEs in R&I group working on emerging technologies and trends. The R&I Technology CoE
team works on creating POCs, Solutions, evaluating new technologies and helps in client engagements.
CSI Communications | April 2014 | 21
Introduction Most people are familiar with common
means of data processing – data generated
by a device is transmitted to a central
location where it is processed and used for
business reporting or for making business
decision. In recent time, this method of
data processing is facing a challenge not
only from the volume of data that is being
generated, but also from the fact that a
wide variety of sources are generating
data, adding to the complexity of data
processing. While it may be relatively easy
to address the problem of data variety by
using well-defi ned data formats, it seems
that the problem of data volume can only
be addressed by essentially using more
and more processing power – be it either
by using ever-larger processing systems
or by using clusters of distributed systems.
'Smart' Devices Though the landscape is changing, most
data being generated is by conventional
methods of business, like collecting
electricity consumption data at the end
of the month, mobile usage on a daily
basis, and so on. While 'smart devices'
like music enabled shoes and watches
are not a new phenomenon, recently
there has been an enormous interest in
applying 'smart' concepts not just for
consumer gadgets, but also to enterprise
applications and enterprise processes.
Hence, concepts like 'smart meters'
are being actively installed in homes to
monitor electricity consumption, 'smart
cars' are being developed to monitor
driver as well as car performance and use
that information for insurance off erings
and vehicle maintenance, to name a
few applications. Such 'smart' devices
when connected (mostly wirelessly) to
enterprise applications over the Internet,
constitute the area of 'Internet-of-Things',
IoT for short.
While many IoT solutions are still
in development phase, the number of
solutions is expected to grow. As per the
Gartner 2013 Hype Cycle, IoT is reaching
the peak of expectations and expected
to reach mainstream in the next 5 to
10 years, if not earlier. Thus, it is expected
that this interest will not only drive
creation of innovative and novel gadgets
and devices, but will also be the prime
drivers for applications to be developed
that consume such data and use it to
infl uence business decisions.
As per Gartner reports, the impact of
connected smart devices is expected to
add $1.9 trillion to the global economy. Not
only are conventional devices like servers,
storage equipment, network devices
expected to become 'smarter', but many
other devices like cardiac monitors, health
monitors, automobile and devices like
washing machines and air conditioners
are also expected to become 'smart'. This
is expected to drive around $3.8 trillion in
spending on information technology, to
monitor, manage and derive meaningful
inferences from data generated.
Challenges with Existing Architectures With tremendous growth in volume of
data, most enterprises are exploring and/
or working with Big Data technologies like
Hadoop, MongoDB, Cassandra and others
to manage data and extract business
benefi ts from it. Enterprises are using a
combination of tools and technologies to
handle volume, velocity and variety of data
(three Vs of data). While it is complex to
address data on these axes, what adds to
the complexity is that Big Data solutions
need to be integrated with existing Data
Warehouse + Business Intelligence +
reporting solutions. Traditionally, Business
Intelligence (BI) and Data Warehouse
(DW) solutions have addressed the
problem of data processing and reporting.
While these solutions have been very
successful and can address data volume
to a certain extent, their Achilles heel
has turned out to be data variety – as
these solutions depend on an underlying
RDBMS for data storage – where data can
be received in diff erent formats.
To manage increasing data volumes
and the increased urgency around
actionable information, Big Data Analytics
seems to be the most natural solution.
Big Data solutions try to address all three
Vs of data, by using a combination of
tools and technologies and by keeping
data in as near-native format as possible
(rather than retrofi tting it to a specifi c
structure). However, BI and DW based
solutions as well Big Data based solutions
most commonly persist the data before
processing it and hence put heavy
demands on the infrastructure in terms
of huge processing power as well as
extremely large storage capacity.
'Near-Source' Processing With smart devices expected to add
exponentially to the data volumes, an
already challenged area – processing the
data - will be stretched to its limits. Not
only will processing and storing these data
volumes pose diffi culties, but transmitting
such data and extracting 'on time' inferences
from them will also be a challenge.
To overcome some of these stated
problems of data processing, we would
like to suggest the concept or 'near-
source' processing. But, what is 'near-
source' processing? As we defi ne it, 'near-
source' processing is nothing but placing
computing technology as near to the
source as possible, and processing the data
as soon as possible, for immediate insights.
But, how diff erent is it from using
an intermediate computer system that
collects data and processes it before
The Need to use 'Near-Source' Processing in Internet-of-Things Solutions
Bipin Patwardhan Research & Innovation, iGATE, Mumbai, India
Technical Trends
Abstract: The 'Internet-of-Things' revolution is about making ordinary devices more 'intelligent' regarding their environment and more 'adaptive'
to user needs. As making devices 'intelligent and adaptive' means these devices monitoring their environment and reacting to it, it involves
collection of a lot of data, as well as processing it into insights. With the installed base of such devices expected to explode into multi-billions, the
amount of data that is expected to fl ow and be processed is going to be mind boggling.
Hence, we believe that Internet-of-Things solutions should consider some form of 'near-source' processing in order to provide more
immediate feedback to users and also to reduce the amount of data transferred from the device to the system/application where it is processed.
CSI Communications | April 2014 | 22 www.csi-india.org
sending it to a central server? While
the concept many not be very diff erent,
the way it diff ers, is its use of low-cost
computing elements to receive and
process the data. While earlier, one
would have needed to use a full-fl edged
desktop-class system for this purpose,
with the availability of low-cost computing
hardware like Aurdino, Raspberry Pi and
Intel Edison, 'near-source' processing
solutions will be easier to implement and
will also be cost eff ective. Additionally,
such low-cost hardware will serve the
stated purpose as in most cases, the
amount of data to be processed will not
be extremely large. The 'near-source'
processing unit will be expected to store
and process only a limited set of data,
the size of which can be defi ned as per
the business requirement. Extremely
complex processing tasks will continue to
be performed by data centers using BI and
DW or Big Data setups. In fact, in addition
to such low-cost, dedicated hardware
platforms, smartphones with suitable
applications can also be used to perform
the task of 'near-source' processing units.
Architecture The architecture for a 'near-source'
processing system is given in Fig. 1.
As depicted, raw data generated
by smart devices can be received by one
or more 'near-source' processing units.
Each unit can process the data to identify
events and/or alerts based on provided
rules, which in turn are made available to
the user. After processing the data, the
'near-source' processing units can send
either event data or the raw data to other
analytic systems, for detailed processing
and analysis.
While 'near-source' processing
solutions will not be expected to crunch
Terabytes and Petabytes of data, they
will be able to process a few Megabytes
of data within milliseconds and generate
immediate feedback for users. Such
immediate feedback in terms of
'actionable insights' can help businesses
benefi t from favorable conditions as
well as take preventive actions in case
of adverse conditions. Additionally, by
processing data near to the source, it
will be possible to generate 'higher-level'
events from the raw data and transmit
these to downstream systems for further
processing, reducing the need to transmit
all the raw data 'as-is' for processing.
It should be noted that 'near-source'
processing is by no means meant to
replace analytic systems, but can be used
to provide immediate, relevant feedback
to users and also help reduce the amount
of data transferred from the 'smart' device,
to the place where it is to be processed.
Benefi ts Some of the benefi ts of 'Near-Source'
processing can be
1. Immediate feedback by processing
data without delay.
2. Improved visibility for users, as they
will get feedback about how data is
being processed.
3. Reduced transmission costs –
transmitting only high-level events
and their related information instead
of raw, unprocessed data.
4. Reduced central infrastructure costs
– central processing centers will not
need to store and process the full
raw data set. Only specifi c event data
need be stored for analysis.
5. Privacy, Security, Compression – raw
data, as generated by 'smart' devices
will mostly not be encumbered
by privacy and security layers. For
sensitive data sets, 'near-source'
processing can be used to encrypt
the data before it is transmitted over
networks. To reduce the amount of
data transmitted, data compression
techniques can also be used.
Application Areas Some of the application areas for 'near-
source' processing can be 1. Connected automobiles –
Automobiles that are able to process inputs from their surroundings to take appropriate action.
2. Home medical care – Data collected from medical devices can be processed within the confi nes of the patient's home, before it is transmitted to the healthcare worker.
3. Traffi c Management – Traffi c patterns can be identifi ed from one or more traffi c signals, to build a comprehensive picture of local conditions, before transmitting events
of signifi cance to the central system.
Conclusion With the expected wide proliferation
of smart devices in coming years, the
amount of data generated and processed
is expected to go up dramatically. While
many enterprise data processing needs
can be addressed by using suitably
powerful Big Data deployments, in case of
'smart' devices, it is worthwhile to explore
avenues that will help reduce the amount
of data transmitted over the network and
also to extract insights 'on time'. Fig. 1: Architecture for 'Near-Source' Processing
CSI Communications | April 2014 | 23
For addressing the need of 'on time'
processing, we believe that enterprises
need to explore the avenue of 'near-
source' processing units. Such units can
monitor data generated by smart devices,
identify patterns, generate suitable 'events
of signifi cance' and only transmit relevant,
reduced data sets (along with event data)
back to the enterprises for additional
processing. For detailed analysis, 'near
source' processing units can store a copy
of the generated data for a suitable period
of time, making it available on demand.
Thus, 'near-source' processing units can
provide 'local' intelligence and provide 'on
time' analytics, helping design responsive
systems, thereby reducing the amount of
data transmitted over the network and
processed centrally. n
Abo
ut th
e A
utho
r
Bipin Patwardhan is a Technical Architect with more than 15 years of experience in the IT industry. At iGATE, he is
leading the High Performance Computing CoE. The CoE builds capabilities around technologies that help delivery
high performance for enterprise applications. Presently, the CoE covers areas like Parallel Programming, GPU
Programming, Grid Computing, Real-time Analysis and In-Memory Computing.
CSI Communications | April 2014 | 24 www.csi-india.org
Introduction Mobile phones has become important
part of our life, almost every individual
carries a mobile phone these days and
will be more critical part in years to come.
We use mobile phone more than just
talking; we use it for browsing internet,
booking ticket, hotel, online shopping
and the most important online banking.
Value of phone is more than the value of
the hardware; it has important personal
and fi nancial information like bank details.
Security of the phone plays important
role users today, OEM provide method
of authentication such as pin and pattern
lock (dots to connect). Study carried out
on 464 participants shows need for an
alternative security system for mobile
uses. Study shows that users do not lock
their phone due to various reason top
most being the ease of use as they have to
unlock the phone and users are afraid to
forget the password or pin which results
in wiping the data and setting phone to
factory default (Asher, et al., 2011).
Researchers are looking for an
alternative approach such as biometric
for authentication such as imagine
biometric, fi ngerprint, voice recognition
and gait of the owner. Biometric such as
fi ngerprint, face and voice recognition and
active biometric, that is it requires user
intervention, the pattern of human walk
also know humangait has a pattern which
can be used to lock the mobile devices,
also known as passive biometric since it
does not requires human intervention.
Human gait is a tried and test as
passive biometric, and very diffi cult to
copy a human gait. The report focuses
on human gait and various methods of
human gait (see 3). It also discusses
how it can be eff ectively used to secure
a mobile phone (see 4). Challenges and
its countermeasures (see 5) based on the
literature available.
What is Human Gait?In early 1900's Marks suggested that
walking patter can be divided into series
of phase (Marks, 2010). Human Gait
takes top-down approach. It starts
as impulse in human brain and end
with movement of the body in form of
walking, running or dancing. Loco motor
programming happens in surpraspinal
centre, which leads the idea in to pattern
of muscles activities required for walking
as suggested by Enoka (Vaughan, et al.,
1999). The human gait is divided into
gait cycles, which start from one foot and
ends with the same foot in the process of
walking (Marks, 2010; Ayyappa, 1997).
Gait cycle is further divided into three
main tasks.
• The fi rst task is a weight acceptance
period, in which body balances itself
on one foot and prepare itself to lift
another foot maintaining its balance
and absorbing shock.
• Next task is "single limb support
task", which is a mid state phase. In
this phase one foot is lift in air and
swing forward while balancing the
body weight on one foot.
• The last task is "limb advancement
phase", in this phase foot is rested
on the ground maintain the body
balance and preparing the other foot
for the gait cycle.
The above gait behaviour is study in detail
in clinical gait analysis, which does not
focus on identifying uniqueness of the
person (BenAbdelkader, et al., 2002),
studies in fi eld of medicine (Kale, 2004),
psychology (Birren & Schaie, 2005) and
biometrics (Gafurov, 2008; Mäntyjärvi, et
al., 2005), had provided various evidence
that human gait contains distinctive
pattern which is unique to every individual
and can be used as an authentication
mechanism.
Various Methods Used in Biometric GaitThere are three diff erent methods used in
biometric gait recognition: Machine Vision
Based, Floor Sensor Based and Wearable
Sensor Based Gait Recognition.
In machine vision based gait
approach, cameras are place strategically
to capture gait data. Captured image is
pixelated and converted into black and
white, and recognises the movement. It
can be eff ectively used for surveillance,
which out obstructing the users (Nixon, et
al., 1999; Han & Bhanu, 2006).
In the fl oor sensor approach[12],
[13], sensors mats are place on the fl oor
to collect gait data. Ground reaction
forces generated during normal walk
is used to generate the pattern and
uniqueness of the individual. It is
eff ectively used in building, museums to
restrict physical access to certain area
based on the walking pattern (Jenkins &
Ellis, 2007; Nakajima, et al., 2000).
Last approach is wearable sensor,,
name itself says that the sensors are
wear by the used and they are placed on
diff erent body parts such as leg, foot, thigh,
hip and wrist. Examples of the wearable
sensors are accelerometers (measuring
acceleration), gyro sensors (measuring
rotation and number of degrees per second
of rotation), force sensors (measuring the
force when walking) etc (Mäntyjärvi, et
al., 2005; Søndrol, 2005).
Gait analysis has been used as
one of the method in forensics analysis.
Gait analysis data captured from the
surveillance camera was used to fi nd the
murderer of Swedish Foreign Minister,
Anna Lindh[20]. Various incidents of
robbery has been used to identify the
robber for example a back robbery in
Aalsgarde Denmark [42] and Norwegian
NOKAS robbery[25, 24].
Performance and Eff ectiveness of Human GaitBiometric has been proved an eff ective
mean of security, but compared to other
biometric mechanism gait can be with
minimal or almost non user intervention
(Bashir, et al., 2010). For example, to
measure fi nger print, hand needs to be
place on the sensor and to measure face
or iris recognition, user has to pause their
work and wait at the scanner. Incase of gait
using any of the above 3 methods mention
above users do not need to wait or pause
their work it can be done smoothly.
Human Gait- Using Biometric for Mobile Phone Security
Kamal Sharma MSc Computing
Technical Trends
CSI Communications | April 2014 | 25
A study by Mjaaland, et al., (2011) was
carried out on 50 participants so see if the
gate can be copied or imptate, it produded
EER of 6.2 %, and has been proved that it
is impossible to imitate or copy the gate
(Mjaaland, et al., 2011). Results indicate
the result worsen then more training was
provided to participants.
Modern smart phones such as iPhone,
android and blackberry phone has built-
in piezoresistive MEMS accelerometers,
which can measure acceleration in three
axis (x,y,z) to measure gyration in three
dimensions of movement when users walks
with the phone either in pocket or in hand.
The iPhone's accelerometer and
A-GPS module has been used by
researchers in the study of gait analysis
using Fast DTW algorithm which is
a variant of Dynamic Time Warping
(DTW) algorithm called FastDTW
(Tanviruzzaman, et al., 2009).
Challenges and Countermeasures of Using Human GaitHuman gait is a passive biometric
technique, will keeps looking for the owner
of the phone. Like other bio-metric system
human gait is not stable and has false-
positive. Most of the research done of
gait focuses on walking normally (60 gait
cycles per minute), at normal speed (132
milliseconds) on the fl at surface (Chan &
Rudins, 1994). Study by Tanawongsuwan
and Bobick(2002), shows that by changing
walking pattern such as speed and surface
can result to a diff erent gait. This is one of
the biggest limitations in applying human
gait in practical implementation.
Change is clothing and footwear can
produce diff erent gait and fail in verifi cation
process. Some other example such as
accident or injury, emotional state (sad or
over excited) or even if the user is drunk
can result a diff erent gait. The best way
to countermeasure is to have a secondary
authentication in place which would be
pin or password (Derawi, et al., 2010). An
"Adaptive Component and Discriminant
Analysis" (ACDA) is designed by (Bashir,
et al., (2010) which seamlessly integrates
with subspace analysis for robust
recognition and more accurate result.
Study by Derawi, et al., (2010)
show error rate of 20.1% indicated
biometeric gate is not mature enough
as practical solution and requires some
enhancements. Derawi, et al., (2010)
suggets cycle extraction technique should
be enhanced to get more accurate result.
Geng, et al., (2010) suggest use
of multiple biometric to improve the
accuracy and effi cient. Study was carried
out using gait and face recognition and
resulted more reliable result, although it
can argued the challenges of implementing
the same in mobile phone and it's increase
cost. So more economical and practical
approach would be use of traditional pin
or password based authentication.
Gait (Biometric) AuthenticationAuthentication is means of securing
access, for example you need to have
username and password to access a
system. For more secure system tokens are
you which are two factor authentication,
you have (password) and you are(tokens).
And in biometric you have and you are
clubbed in one where you are the key or
password.
Authentication process can be
broken into three process illustrated in
Fig. 1 below enrolment, verifi cation and
identifi cation (Maltoni, et al., 2009).
The above fi gure shows process
related to fi ngerprint authentication but it
is also been applied to gait authentication
process. The process of registering or
enrolling the users gait data into database
is done in the enrolment process.
Verifi cation process is the process in
which users gait data is verifi ed against
the gait data of other user in the database.
And fi nally result of the records match
is returned in the identifi cation process.
Based on the result of the process user
is authenticated and decided if users
should be allowed or restrict the access
(BenAbdelkader, et al., 2002).
We have seen earlier that every walk
will not result in the same gait data, so that
system is designed to enter more than one
gait data per user, where users is advised
to walk at diff erent pace, and in the
process of identifi cation systems uses a
preset threshold value to identify the user.
Success or failure of the implementation
of gate depends on the degree threshold
confi gured. If the threshold is set to smaller
Fig. 1: Enrolment, verifi ca on and iden fi ca on (Maltoni, et al., 2009)
CSI Communications | April 2014 | 26 www.csi-india.org
value there are greater changes of false
positive (identifying some other users to
be that person) and larger the threshold it
is quite possible that same person could
fail authentication dues to variance in
the gait as discussed in section 5 above.
Success of the system is measure as false
acceptance rate (FAR) and false rejection
rate (FRR) which is false acceptance
and rejection against total number of
authentication (Søndrol, 2005).
Critical Evaluation As seen in section 4 above, research shows
that gait can be used for identifi cation
and authentication for security purpose.
Literature review revealed some use of
Machine Vision Based and Floor Sensor
Based being eff ectively used in the fi eld
of forensic and investigation crimes such
as murders and robbery. Wearable Sensor
Based Gait Recognition is most suitable
for implementation of authentication in
the smart phone available today. It can
be argued after seeing the limitation and
the false positive rate, it is not completely
ready to be used. Some literature review
revealed that it should be in combination
with other bio other bio-metric or other
traditional authentication methods like pin
or password.
There are other factors
to authentication and security
implementation such as feasibility,
although in theory passive biometric
seems feasible. Putting it into use is
something which only time will decide.
Another factor is cost; the existing pin
based authentication is economical and
does the job pretty well. It can be argued
that mobile companies or researchers
investing time and money to invent which
may not be required. This report focused
only on gait as an alternate and has
ignored other options such as fi ngerprint,
voice or ear size. Study has showed other
biometric such as fi ngerprint and voice
recognition to be more effi cient, accurate
and mature compared to gait (Wang &
Liu, 2011).
Further search on the google play
(formerly known as android market)
and iPhone App store, revealed there
already exist apps for iris scanner,
fi ngerprint and face recognition, example
eyeD® Biometric Password Manager
by Winkpass Creations, Inc for iphone
(Apple Inc 1, 2011) and other apps for
voice based password, face recognition
and fi ngerprint recognition. Although
while exploring some of the apps
revealed they were fake apps which are
used to play jokes and impress friend
example "Biometric Fingerprint Access"
By "Fuzzy Squirrel Software, LLC" (Apple
Inc 1, 2011), same is true for Google play
(earlier known as android market). But no
apps were found for gait analysis. It can
be argued that there is more popularity
among the users for other biometric
systems compared to gait which might
have lead to release of so many apps and
even fake paid apps.
As discussed in the introduction
smart phone are capable of do more
than just making calls, but we did not
discuss the fun part of it such as games,
music, camera live video records which
are memory and processor intensive, this
study have ignored this fact how it would
impact the performance of the smart
phone, although the smart phone available
today are getting more faster and reliable
in terms of memory and processor.
The other aspect is the battery life of
the phone, since gait is a passive biometric,
how would it impact the battery life of the
phone. Further study is recommended to
understand the technical feasibility of the
same (Bloom, et al., 2004).
ConclusionThis report started by evaluating gait as an
alternate option for mobile phone security.
Literatures say that gait is a reliable and
can be eff ectively used for security and
surveillance. Every individual has unique
gait, which cannot be copied or imitated.
Report highlights that gait can be
easily implemented in the smart phone
available in the market, as they have the
required hardware inbuilt (sensors). But
after carefully examining the limitations of
the gait, there is more research required in
this fi eld before it can be fully implement
in practical, although to overcome the
limitation it is recommended gait can
be used in combination with other
authentication methods biometric and
traditional like pin or password. Search
in the apps markets for biometric apps
revealed that gait is of less interest
among the app builder compared to other
biometrics. Hence it can be concluded
that gait as a technology is in a premature
state and an extensive research work is
required use this technology to secure and
authenticate mobile phone.
References [1] Apple Inc 1, 2011. eyeD® Biometric
Password Manager by Winkpass
Creations, Inc. [Online] Available at:
http://itunes.apple.com/us/app/
eyed-biometric-password-manager/
id389295175?mt=8 [Accessed 14 May
2012].
[2] Apple Inc, 2011. Biometric Fingerprint
Access By Fuzzy Squirrel Software, LLC.
[Online] Available at: http://itunes.
apple.com/us/app/biometric-finger
print-access/id419601677?mt=8
[Accessed 14 May 2012].
[3] Asher, N B et al., 2011. On the needfor
diff erent security methods on mobile
phones. New York, USA, Mobile
HCI '11.
[4] Ayyappa, E, 1997. Normal Human
Locomotion. Journal of Porsthetics and
Orthetics, 9(1), p. 10–17.
[5] Bashir, K, Xiang, T & Gong, S, 2010.
Gait recognition without subject
cooperation. Journal Pattern Recognition
Letters, 31 (13), pp. 2052-2060.
[6] BenAbdelkader, C, Cutler, R & Davis, L,
2002. Stride and Cadence as a Biometric
in Automatic Person Identifi cation and
Verifi cation. s.l., Microsoft Research.
[7] Birren, J E & Schaie, K W S, 2005.
Handbook of the Psychology of Aging. 6th
ed. s.l.:Academic Press.
[8] Bloom, L et al., 2004. Investigating the
Relationship Between Battery Life and
User Acceptance of Dynamic, Energy-
Aware Interfaces on Handhelds. Mobile
Human-Computer Interaction – MobileHCI
2004 , Volume 3160, pp. 43-79.
[9] Carmines, E G & Zeller, R A, 1979.
Reliability and Validity Assessment
(Quantitative Applications in the Social
Sciences). London: Sage Publications
Inc.
[9] Chan, C W & Rudins, A, 1994. Foot
Biomechanics DuringWalking and
Running. Mayo Clinic Proceedings,
Volume 69, p. 448–61.
[10] Christopher, 2010. Smart Phones
that Know Their Users by How They
Walk. [Online] Available at: http://
www.technologyreview.com/blog /
mimssbits/25767/ [Accessed 01 May
2012].
[11] Derawi, M O, Nickel, C, Bours, P &
Busch, C, 2010. Unobtrusive User-
Authentication on Mobile Phones using
Biometric Gait Recognition. Norway,
The Sixth International Conference
on Intelligent Information Hiding
and Multimedia Signal Processing,
Darmstadt.
CSI Communications | April 2014 | 27
[12] Gafurov, D, 2008. Performance and
Security Analysis of Gait-based User
Authentication, Oslo: Ph.D. dissertation,
Faculty of Mathematics and Natural
Sciences, University of Oslo.
[13] Geng, X et al., 2010. Context-
awarefusion:Acasestudy on fusion
ofgaitand faceforhuman identifi cation
in video. Pattern Recognition , 43(10),
pp. 3660-3673.
[14] Han, J & Bhanu, B, 2006. Individual
recognition using gait energy image.
IEEE Transactions on Pattern Analysis
and Machine Intelligence, 28(2),
p. 316–322.
[15] Jenkins, J & Ellis, C, 2007. Using ground
reaction forces from gait analysis: Body
mass as aweak biometric. Pervasive, p.
251–267.
[16] Kale, A A, 2004. Algorithms for gait-
based human identifi cation from a
monocular video sequence, MD, USA:
Ph.D. dissertation, College Park.
[17] Lee, L & Grimson, E, 2002. Gait analysis for
recognition and classifi cation. Cambridge,
MA, IEEE, p. 155–161.
[18] Maltoni, D, Maio, D, Jain, A K &
Prabhakar, S, 2009. Handbook of
Fingerprint Recognition. 2nd ed. London:
Springer Verlag.
[19] Mäntyjärvi, J et al., 2005. Identifying
users of portable devices from gait pattern
with accelerometers. Oulu, Finland, IEEE.
[18] Marks, G E, 2010. Manual of Artifi cial
Limbs. New York: BiblioBazaar, LLC.
[19] Mjaaland, B B, Bours, P A H &
Gligoroski, D, 2011. Walk the walk:
attacking gait biometrics by imitation.
Berlin, Heidelberg, Springer-Verlag.
[20] Nakajima, K, Mizukami, Y, Tanaka, K
& Tamura, T, 2000. Footprint-based
personal recognition. IEEE Transactions
on Biomedical Engineeing, 47(11), pp.
1534-1537.
[21] Nixon, M S et al., 1999. Automatic
Gait Recognition. Biometrics – Personal
Identifi cation in Networked Society,
p. 231–250.
[22] Søndrol, T, 2005. Using the Human
Gait for Authentication, Gjøvik, Norway:
MSc Thesis, Gjøvik University College,
NISlab.
[23] Tanawongsuwan, R & Bobick,
A, 2002. Performance analysis of
time-distance gait parameters under
diff erent speeds. Guildford, UK, ACM,
pp. 715-724 .
[24] Tanviruzzaman, M, Ahamed, S I, Hasan,
C S & O’brien, C, 2009. ePet: When
Cellular Phone Learns to Recognize Its
Owner. ACM, pp. 13-17.
[25] Vaughan, C L, Davis, B L & O'Connor, J
C, 1999. Dynamics of Human Gait. 2nd
ed. Cape Town: Kiboho Publishers.
[26] Wang, S & Liu, J, 2011. Biometrics on
mobile phone, Recent Application in
Biometrics. Beijing, China: InTech. n
Abo
ut th
e A
utho
r Kamal Sharma is currently working as Technical Consultant with Mcafee India (An Intel Company). He has over 15 years
of rich IT Experience IT Infrastracture and IT Security Domain. He hold Masters degree in computing from University
of Central Lancashire, UK. During the work tenure has working for organizations like IBM, Symantec, Trend Micro and
Symantec. His areas of specialization are Comptuer Networks and Security and has been subject matter expert for
various security software’s like DLP (Data Loss Prevention), Cloud / Virtulization Security and Encryption.
CSI Communications | April 2014 | 28 www.csi-india.org
ResearchFront
Resource Allocation Algorithm to Improve the Quality-of-Service in OFDMA System
R L Ujjwal*, Prof. C S Rai** and Prof. Nupur Prakash****Asstt. Professor, University School of Information and Communicaton Technology**University School of Information and Communicaton Technology***VC, Indira Gandhi Delhi Technological University for Women
IntroductionWireless mobile communications play a
very important role in our life. It provides
the communication services anywhere
and at anytime. In order to improve quality
of service, determined on the basis of
acceptable data transfer rate, signal to
noise ratio (SNR) and bit error rate (BER),
it is imperative to provide high capacity
downlink in cellular systems. It can be
achieved by management of resources
in orthogonal frequency division multiple
access (OFDMA) systems. Recently, the
OFDMA technique became popular which
can provide broadband transmission
over wireless channels for applications
including wireless multimedia and future
generation mobile communication
systems. The OFDMA divides the entire
transmission bandwidth into N orthogonal
subchannels (It make possible to eliminate
intersymbol interference that is a major
problem in the wideband transmission
over multipath fading channels). There
are two types of allocation schemes. First
one is static resource allocation, such
as frequency division multiple access
(FDMA) and time division multiple
access (TDMA). These schemes are not
optimal because they are fi xed regardless
of the current channel condition. Second
one is dynamic resource allocation, such
as OFDMA which allocates channels
adaptively to the users based on their
channels gain.
System ModelThe OFDMA is a system that assigns
subcarriers to diff erent users concurrently.
It means, more than one users can access
the air interface at the same time. The
OFDMA transmitter is same as OFDM
transmitter with some additions. In
OFDMA a user uses all channels at a
time, while in OFDM the diff erent users
can used diff erent channel at the same
time. The basic structure of the OFDMA
transmitter in IEEE 802.16e standard is
shown in Fig. 1. The stream of information
bits from the MAC layer are fi rst fed
into the data randomizer, MSB fi rst. The
data randomizer XORs the bits with bits
produced by a shift register. The randomizer
is applied only to information bits and is
present in both the uplink and the down
link. The purpose of randomization is to
avoid long sequences of consecutive “1” or
“0” in bits stream. A long run of “1” or “0”
can lose synchronization at the receiver
side. After data randomization, the
scrambled (Randomize) bits go into the
forward error correction (FEC) function,
which uses an error-correction code to
add redundancy bits for error correction.
The interleaving process is performed on
encoded data at the output of FEC. The
purpose of interleaver is to protect the
transmission against long sequences of
consecutive errors, which are very diffi cult
to correct. The interleaver operates in
two phases that is frequency space and
constellation space. In frequency space,
the consecutive coded bits are reordered
to make sure that these bits are later
mapped to nonadjacent subcarriers for
frequency diversity. In constellation space,
the consecutive coded bits are reordered
to make sure that these bits are later
mapped fairly to more and less signifi cant
bits of the constellation. The purpose of
repetition function is to increase reliability
of the transmitted bits. The bits may
be repeated by a repetition rate of 2, 4,
and 6. After the repetition, the symbol
mapper maps the bits to data symbols
based on the constellation used. The pilot
insertion function inserts pilot symbols.
The purpose of pilot symbol is channel
estimate. After pilot symbol insertion, the
high rate stream of data symbols goes
to the serial-to-parallel converter that
converts high rate serial stream of data
symbols into low rate parallel substream,
where the number of substream may be
equal to number of subcarriers in OFDMA
system. Then the data symbols go into
the subcarrier mapper, which assigns the
individual data symbols to the individual
subcarriers. The subcarriers mapper is
necessary in the OFDMA system because
the diff erent data symbols may have come
from diff erent users, and assigning data
symbols to diff erent subcarriers allows
multiple users to access the air interface
simultaneously.
Fig. 1: Block diagram of OFDMA transmi er
The output of subcarriers mapper
goes to inverse fast Fourier transform
(IFFT) where, the data symbols transform
from the frequency domain to the time
domain. Then, the transformed symbols
along with cyclic prefi x symbols go
into parallel-to-serial converter, which
arranges the transformed symbols in
time domain serially. The output of
parallel-to-serial converter is a block of
K transformed symbols, and this block is
called an OFDMA symbol. The digital-
to-analog converter changes the time
domain digital data to analog signal, then
RF modulation is performed and the signal
is up-converted to transmission frequency
and fi nally transmitted over the air.
Wireless mobile communications play a very important role in our life. It provides the communication services anywhere and at anytime. In order to improve quality of service, determined on the basis of acceptable data transfer rate, signal to noise ratio (SNR) and bit error rate (BER), it is imperative to provide high capacity downlink in cellular systems. It can be achieved by management of resources in orthogonal frequency division multiple access (OFDMA) systems.
CSI Communications | April 2014 | 29
Let us denote the numbers of
subchannels by N and number of users
by K. The resource allocation scheme
provided to the OFDMA transmitter. We
assume that all K users in the system share
N subchannels with total transmit power
constraint Ptotal
and bandwidth B. The
channel information is fi xed in each time
slot and only the broadband scenario is
considered. At the base station transmitter,
the bits for each of the diff erent K users are
allocated to the N subcarriers, and each
subcarrier n (1 ≤ n ≤ N) of user k (1 ≤ k ≤ K)
is assigned a power pk,n
.
Resource Allocation Algorithm The quality-of-services can be improved
through optimum resource allocation
to users in OFDMA system. An optimal
algorithm can allocate subcarriers and
power to the users on the basis of the
quality of service requirements and
increases the capacity of system. The
users are divided in two categories that is
sensitive user (SU) category and general
user (GU) category, diff erentiated on the
basis on required data transfer rate, signal
to noise ratio, and bit error rate. The users of
SU category are more sensitive and require
guaranteed QoS, application like audio and
video. The users of GU category are less
sensitive and require less QoS compare
to the users of SU category, services like
E-mail, SMS etc. In this resources allocation
algorithm, the higher priority is given to
the users of SU category in assigning sub-
carrier but initially the each user gets a
sub-carrier that makes algorithm fair and
avoid starvation for users of GU category.
In this algorithm, sub-carrier and power
allocation performed sequentially that
reduces the complexity of algorithm.
The resource allocation algorithm can be described as:
1. Initialization
- User k = 1, 2… K
{Where – K is total number users in a
system}
- A is a set of available sub-carriers and
A = {1, 2… N}
{Where - N is number of sub-carriers}.
- Estimate the number of sub-
carriers required by each user
- The data rate Rk = 0 for all k and
a set of assigned sub-carriers to a
user is empty (Ωk =φ) for all k
2. Allocate a sub-carrier to each user
of both type of categories if the total
number of sub-carriers K is less than N
- Find a channel n that has highest
channel-to-noise ratio.
- Allocates channel n to the user k
and sets become Ωk = Ω
k ∪ {n}
and A=A- {n}
- If user category is SU than
Update the data rate Rk for SU category
Else
Update the data rate Rk for GU category
3. While (A≠φ or until fulfi ll requirement
of users of SU category)
- Find a channel n that has highest
channel-to-noise ratio.
- Allocates channel n to the user k and
sets become Ωk=Ω
k ∪ {n} and A=A- {n}
- Update the data rate Rk for SU category
4. After fulfi ll the requirement of users
of SU category, if any sub-carriers are
available then that sub-carriers are
allocated to users of GU category
- Find a channel n that has highest
channel-to-noise ratio.
- Allocates channel n to the user k and
sets become Ωk=Ω
k ∪ {n} and A=A- {n}
- Update the data rate Rk for GU category
Results and AnalysisThe wireless channel is modeled as a
frequency-selective multipath channel.
The total bandwidth is 5 MHz and it
is divided in 32 subcarriers. The total
power available at base station is 2W.
The number of user for the system varies
from 2 to 16 in increments of 2. In Fig. 2,
simulation result is showing that the new
effi cient algorithm increases the OFDMA
system capacity and bandwidth utilization
that is all time high compare to existing
algorithm developed by Rhee and Cioff .
Also the algorithm is more optimal and
fair where a set of proportional fairness
constraints is imposed and allocates best
subcarrier to the user that improves the
performance of the system.
Fig. 2: System capacity
Conclusion The results indicate that optimum
allocation of resources under OFDMA
system could be achieved through the
proposed algorithm. The system is
sensitive to requirements of diff erent
categories of users i.e. general users and
sensitive users and is capable of according
priority to sensitive users while ensuring
that general users are not ignored. It
demonstrates that the system capacity
can be enhanced without compromising
the fairness of allocation between diff erent
user categories.
References[1] J Joung, C K Ho, P H Tan and S Sun,
"Energy Minimization in OFDMA
Downlink Systems: A Sequential
Linear Assignment Algorothm for
Resource Allocation," IEEE Wireless
Communications Letters, vol. 1, no. 4,
2012.
[2] K W Choi, W S Jeon and D G Jeong,
"Resouce Allocation in OFDMA
Wireless Communications Systems
supporting Multimedia Services,"
IEEE/ACM Transations on Networking,
vol. 17, no. 3, June 2009.
[3] Z Mao and X Wang, "Effi ecient
Optimal and Suboptimal Radio
Resource Allocation in OFDMS
System," IEEE Transactions on Wireless
Communications, vol. 7, no. 2, 2008.
[4] T S Rappaport, A Annamalai, R M
Beuhrer and W H Tranter, "Wireless
Communications: Past Events
and a Future Perspective," IEEE
Communication Magezine., vol. 40,
pp. 148-161, May 2002.
The system is sensitive to requirements of diff erent categories of users i.e. general users and sensitive users and is capable of according priority to sensitive users while ensuring that general users are not ignored. It demonstrates that the system capacity can be enhanced without compromising the fairness of allocation between diff erent user categories.
CSI Communications | April 2014 | 30 www.csi-india.org
Abo
ut th
e A
utho
rs
R L Ujjwal is working as Asstt. Professor in University School of Information and Communicaton Technology since
1st September 2006. He obtained his B.E. (Computer Science and Engineering) from M.B.M. Engineering College,
JNV University Jodhpur in 1999 and M.E. (Computer Technology and Application) from Delhi College of Engineering,
University of Delhi. His major areas of interests include: Wireless Communications, Computer Network.
Prof. C S Rai is working in University School of Information and Communicaton Technology. He obtained his M.E.
degree in Computer Engineering from SGS Institute of Technology & Science, Indore. He completed Ph.D. in area
of Neural Network from Guru Gobind Singh Indraprastha University in 2003. His teaching and research interests
include: Artifi cial Neural Systems, Computer Networks, Signal Processing
Prof. Nupur Prakash is working as a VC, Indira Gandhi Delhi Technological University for Women. She received her
B.E. (Electronics & Communication Engineering) and M.E. (Computer Science & Technology) degree from University
of Roorkee (now I.I.T. Roorkee) in 1981 and 1986 respectively. She completed her Ph.D. (Computer Engineering &
Technology) from Punjab University, Chandigarh in 1998 in the area of Natural language Processing using Artifi cial
Neural Networks.
[5] Z Shen, J G Andrews and B L Evans,
"Optimal Power Allocation in
Multiuser OFDM Systems," in IEEE
Global Communications Conference,
December 2003.
[6] C Y Wong, R S Cheng, K B Lataief
and R D Murch, "Multiuser OFDM
System with Adaptive Subcarrier, Bit,
and Power Allocation," IEEE Journal on
selected Areas in Communications, vol.
17, Oct 1999.
[7] W Rhee and J M Cioff , "Increase
in Capacity of Multiuser OFDM
System using Dynamic Subcannel
Allocation," in IEEE vehic. Tech. Conf.,
Tokyo, May2000.
[8] G Zhang, "Subcarrier and Bit
Allocation for Realtime Services in
Multiuser OFDMA Systems," in IEEE
International Conference, Jun. 2004.
[9] H Yin and H Liu, "An Effi cient
Multiuser Loading Algorithm
for OFDM-based Broadband
Wireless Systems," in IEEE Global
Telecommunications Conference,
2000. n
CSI Communications | April 2014 | 31
The term ‘Cellular Automata’ represents
a rather broad class of computational
systems. There are a number of common
features, but the only universal property
is that they are made up of a number of
discrete elements called cells. Each cell
encapsulates some portion of the state of
the system. Typically, the cell population
is homogeneous, each one encapsulating
an equal portion of the state, and
arranged spatially in a regular fashion to
form an n-dimensional lattice. A Cellular
Automata has the following features:
1. It consists of a number of
indistinguishable cells (often several
thousand or even millions) arranged
in a regular lattice. The cells can
be placed in a long line (a one-
dimensional CA), in a rectangular
array or even occasionally in a
three-dimensional cube. In social
simulations, cells may represent
individuals or collective actors such
as countries.
2. Each cell can be in one of a small
number of stages – for example, ‘on’
or ‘off ’, or ‘alive’ or ‘dead’. We shall
encounter examples in which the
stages represent attitudes (such as
supporting one of several political
parties), individual characteristics
(such as racial origin) or actions (such
as cooperating or not cooperating
with others).
3. Time advances through the
simulation in stepladder. At each
time step, the stage of each cell may
change.
4. The stage of a cell after any time step
is determined by a set of rules which
specify how that stage depends on
the previous stage of that cell and
the stages of the cell’s immediate
neighbours. The same rules are used
to update the stage of every cell in
the lattice. The model is therefore
consistent with respect to the rules.
5. Because the rules only make
reference to the stages of other cells
in a cell’s vicinity, cellular automata
are best used to model situations
where the interactions are local.
For example, if gossip spreads by
word of mouth and individuals only
talk to their immediate neighbours,
the interaction is local and can be
modelled with a CA.
To summarize, cellular automata model a
world in which space is represented as a
uniform lattice, time advances by steps,
and the ‘laws’ of the world are represented
by a uniform set of rules which compute
each cell’s stage from its own previous
stage and those of its close neighbours.
Neighbourhood Classifi cationIn classic cellular automata theory there are three types of neighborhoods. They
are diff erent in shape and size. Other confi gurations have been proposed but were not accepted.
Types of Cellular AutomataLinear CA–Based on XOR logic
– Total 7 rules (60, 90, 102, 150, 170, 204,
240)
–Can be expressed through matrix (T),
- characteristic polynomial
–Next state of the CA cell P(t+1) = T. P(t)
60 102 150 204
1 0 0 0
0 1 1 0
0 1 1 1
0 0 0 1
T=
Additive CA–Based on XOR and XNOR logic
– Total 14 rules (linear rules +
195,165,153,105,85,51,15)
– Can be expressed through matrix, inversion
vector, and characteristic polynomial
– The next state of the CA cell P(t+1) = T.
P(t) +F
60 153 105 204 0 1 1 0F=
Some rules out of 256 are as follows:-
XOR Logic XNOR Logic
Rule 60 : qi(t+1) =
qi-1
(t) ⊕ qi(t)
Rule 195 : qi(t+1) =
qi-1
(t) ⊕ qi(t)
Rule 90 : qi(t+1) =
qi-1
(t) ⊕ qi+1
(t)
Rule 165 : qi(t+1) =
qi-1
(t) ⊕ qi+1
(t)
Rule 102 : qi(t+1) =
qi(t) ⊕ q
i+1(t)
Rule 153 : qi(t+1) =
qi(t) ⊕ q
i+1(t)
Rule 150 : qi(t+1) =
qi-1
(t) ⊕ qi(t) ⊕ q
i-1(t)
Rule 105 : qi(t+1) =
qi-1
(t) ⊕ qi(t) ⊕ q
i-1(t)
Rule 170 : qi(t+1) =
qi-1
(t)
Rule 85 : qi(t+1) =
qi-1
(t)
Rule 204 : qi(t+1) =
qi (t)
Rule 51 : qi(t+1) =
qi (t)
Rule 240 : qi(t+1) =
qi+1
(t)
Rule 15 : qi(t+1) =
qi+1
(t)
CA Technology for Target Applications• Error Correcting Codes
• Pattern Recognition
• Modelling of Physical Systems
• Cellular Mobile Network
• Classifi cation
• Data Compression
• Cryptosystem
• Authentication
• VLSI Circuit Testing
ConclusionCellular Automata have been around
since 1950. Geography was hesitant to
adopt CA as an urban modeling technique
(it didn’t happen before the mid-1980s).
Since then, many extensions of CA have
been proposed, some eff ective, others
not. Nowadays CA is a valuable tool for
spatially distributed modeling with many
applications (urban growth, wildfi re
spread and transportation).
References[1] J Von Neumann, “The Theory of Self-
Reproducing Automata”, University of Illinois Press, Urbana, Ill, 1966.
[2] A Llachinski, “Cellular Automata: A Discrete Universe”, World Scientifi c Publishing, Singapore, September 2001.
[3] S Wolfram, “A New Kind of Science”, Champaign, IL: Wolfram Media, 2002.
n
Cellular Automata
Dr. Rupali BhardwajAssistant Professor, Thapar University, PatialaArticle
Neighborhood state 111 110 101 100 011 010 001 000
Next State 0 1 0 1 1 0 1 0 (Rule 90)
Next State 1 0 0 1 0 1 1 0 (Rule 150)
Dr. Rupali Bhardwaj, born on July 24, 1976 at Dhampur, (UP). She had received post graduate degree (MCA) in
1999, from Gurukul Kangri University and doctorate degree from Bansthali Vidyapeeth, Rajasthan in 2011. She is
working as Assistant Professor at Thapar University in SMCA dept. She has published over 15 research papers in
International and National Journals of repute. She is life time member of CSI.
Abo
ut th
e A
utho
r
CSI Communications | April 2014 | 32 www.csi-india.org
Practitioner Workbench
Wallace Jacob Sr. Asst. Prof. at Tolani Maritime Institute
Programming.Tips () »
Fun with 'C' Programs I. Is it possible to type, compile and execute a 'C' program without using the opening and closing curly braces?
Well, the answer is: It is possible using
the concepts of digraphs and trigraphs.
Theoretically, trigraphs refers to three
characters to represent a single character.
The trigraph ??< represents the '{' i.e.
(open curly brace) and the trigraph ??>
represents the closing curly brace. The
program below illustrates the usage of
trigraphs in a typical 'C' program.
Program listing one
#include<stdio.h>
main()??<
printf("Using trigraphs");
??>
In order to compile the program, the following instruction needs to be typed:
gcc <program-name.c> -trigraphs
On executing the program : ./a.out, the
following output might appear:
Using trigraphs
[Note: The trigraph ??= is for the # symbol,
similarly ??/ is used for the \ symbol.
An alternative to using the '{' and '}' is the
use of digraphs <% and %> respectively.
The code in program listing two illustrates
the use of digraphs:
Program listing two
#include<stdio.h>
main()<%
printf("Using digraphs");
%>
In order to compile the program, the
following instruction needs to be typed:
gcc <program-name.c>
On executing the program : ./a.out, the
following output might appear:
Using digraphs
The trigraphs ??< and ??> are replaced
by their single character equivalents by
the 'C' preprocessor before any other
processing, while digraphs are handled
during tokenization.]
II. Is there any method of converting the terminal driver from line-at-a-time mode to character-at-a-time mode?line-at-a-time mode implies that the user
has to press the <ENTER> key to read the
input from the terminal, character-at-a-
time mode implies that as soon as the user
types in a character it will be read from the
terminal. There are several methods of
converting the terminal driver from line-
at-a-time mode to character-at-a-time
mode. One of the methods of converting
from line-at-a-time mode to character-at-
a-time mode is illustrated below:
Program listing three
#include<stdio.h>
main(){ char ch;
system("stty raw"); /*for changing the terminal driver to character-at-a-time mode */
printf("\nEnter a printable character: "); ch=getchar();
printf("\n\nch = %c", ch);
system("stty cooked"); /*for changing the terminal driver to line-at-a-time mode */
return 0;}
n
Wallace Jacob is a Senior Assistant Professor at Tolani Maritime Institute, Induri, Talegaon-Chakan Road, Talegaon
Dabhade, Pune, Maharashtra. He has contributed articles to CSI Communications especially in the Programming.
Tips section under Practitioner Workbench.
Abo
ut th
e A
utho
r
Kind Attention: Prospective Contributors of CSI Communications -
Please note that cover themes of future issues of CSI Communications are planned as follows -
• May 2014 - Graph Theory
• June 2014 - Security in Software Development
• July 2014 - Business Analytics
• August 2014 - Software Engineering
• September 2014 - IT History
Articles and contributions may be submitted in the categories such as: Cover Story, Research Front, Technical Trends and Article.
Please send your contributions before 20th April for consideration in May 2014 issue.
For detailed instructions regarding submission of articles, please refer to CSI Communications March 2014 issue, where Call for Contributions is
published on page 37.
[Issued on behalf of Editors of CSI Communications]
CSI Communications | April 2014 | 33
Programming.Learn("R") »
Packages in RIn this issue, let us discuss about the packages in R. Packages help
us to organize functions, data, code etc. in a well defi ned format.
Package is a collection of related set of functions, data fi les,
help fi les etc. provided for addressing a particular problem. They
are intended for various purposes such as statistical analysis,
graphics display, industrial applications. R provides a standard
set of packages which are available in any R installation. Other
packages are available from public package repositories, which
have to be downloaded and installed. Collection of these packages
are stored in the R libraries. To use a package, it should be loaded
into R environment. Packages can be operated either by GUI
(Fig. 1) or through commands.
Fig. 1 ‘Packages’ menu in R GUI
Listing PackagesTo list out the packages available in R, we can use the command
library ( ). This will list out all the set of available packages in a new
window as given in Fig. 2. The list of all packages installed in the
system can be obtained by the command installed. packages ( ).
Certain packages are loaded on startup by default. This can be
listed by using the command getOption ("defaultPackages").
Example:
> getOption ("defaultPackages")
[1] "datasets" "utils" "grDevices" "graphics" "stats" "methods"
Loading Packages For using the remaining packages that are not loaded by default,
we have to load them using commands or by using GUI. For
loading a particular package the command library ( ) is used, with
the package name as argument.
In R GUI, we can load a package using the Load Package option in
the Packages menu.
Finding and installing Packages inside RR provides several repositories for browsing packages. The
major repositories are CRAN and Bioconductor. CRAN is
hosted by the R foundation and Bioconductor is an open source
project for building tools to analyze genomic data. By default, R
fetch packages from CRAN. In the R interface, we can choose
repository from the Select repositories option.
Packages can be installed using R GUI and also through the
console. Packages are installed automatically into the R library.
Using R console: We can download the package using an
internet connection and install packages through the console.
For installing packages through the console use the command
install. packages () with the package name as the argument. The
repository from where the packages have to be downloaded is
given using repos parameter.
Example:
install.packages('RMySQL', repos='http://cran.us.r-project.
org')
We can also remove the installed packages using the remove. packages( ) command.
Using R GUI : In R GUI, from the Packages menu, select Install
package(s). Then R will list out all available mirrors. We have
to choose the mirror which is geographically close. Then select
the package we want to install and click OK. There is likewise an
option in the menu for installing packages from the zip fi le that we
have already downloaded. This can be done by using the option
Install package(s) from local zip fi les in the Packages menu.
n
Practitioner Workbench
Umesh P and Silpa BhaskaranDepartment of Computational Biology and Bioinformatics, University of Kerala
Fig. 2 Using library () command
"By connecting a device to the Internet, it is transformed from a stand-alone unit—which attracts a one-off payment—into a service that
generates recurring income. Value in the IoT lies not in the devices, but in selling new services off the back of them." - Wall Street Journal
CSI Communications | April 2014 | 34 www.csi-india.org
Abstract: With each passing day, the
number of gadgets that are connecting
to the Internet is surpassing the number
of people connecting to the Internet.
This technology trend is pursued actively
by the automotive industry, which is
working on developing a ‘Connected
Car’. In this article, we present a brief
on how the automotive industry is on
course to a disruptive transformation
with developments around smarter
vehicles and related infrastructure. While
technologies mature, we believe the
world will witness an intermediate wave,
enabled by a healthy pairing of cars with
smartphones.
Introduction After the global proliferation and rapid
consumerization of smartphones, the
next disruptive transformation predicted
is the concept of ‘Internet of Things’.
From networked computers, to connected
people, we are now moving towards
connected ‘things’. Various sensors
embedded in personal devices, household
& industrial appliances, consumer and
enterprise equipment, including clothing
and vehicles are turning items and things
of daily use into smart devices. With
pervasive connectivity mechanisms, these
devices can interact with each other with
little or no human intervention, thereby
conjuring a humongous network – the
Internet of Things! The ability to sense
and send data over remote locations to
enable detection of signifi cant events and
take relevant actions sooner than later, is
the primary tenet behind the Internet of
Things (IoT).
IoT in Automotive Space There have been exciting recent
developments around IoT in the
automotive industry. Automakers,
telecommunication service providers and
leading technology companies are coming
together to build the Connected Car.
The Apple versus Google battle has
transcended the smartphone boundaries
to smart cars. The year of 2014 started
with Google announcing the formation
of an Open Automotive Alliance with top
car manufacturers (GM, Honda, Audi,
Hyundai) and chipmaker NVIDIA, to
bring Android OS into car dashboards.
Apple soon followed with the release
of CarPlay in early March with Volvo,
Ferrari, Mercedes-Benz and later with
other automakers such as BMW, Ford,
Jaguar, Honda, Nissan, etc. Prior to this,
QNX (now owned by BlackBerry) has
been commonly providing an enhanced,
embedded platform with connectivity for
infotainment in high-end automobiles.
These big players in mobile platforms are
setting their eye on creating a common
platform to allow a connected experience
across the smartphone and the vehicles.
Closer home, Mahindra Reva’s e2o is
the fi rst and only Indian car with ‘anywhere,
anytime’ connectivity with the customers.
Together with Vodafone as the connectivity
solution provider, it off ers telematics
features for convenience and safety.
Telecom Service Providers (TSPs)
are actively contributing in this space
with dedicated Machine-to-Machine
communication services through
embedded SIM chips. Vodafone is
working with BMW and Volkswagen to
bring connectivity to their vehicles. AT&T
provides a modular platform – Drive
with 4G LTE network connectivity for
automakers to off er customized features
such as diagnostics, voice recognition,
entertainment and automotive app store,
for an enhanced in-vehicle experience for
users. This will also enable the car to act
as a Wi-Fi hub, wherein all passengers
connect to a single access point for an
enhanced and immersive experience of
being connected on-the-go.
Infotainment Infotainment refers to a system that brings
information functions (i.e., navigation,
location-based services, rear seat web
browsing, social networking, etc.) into
the vehicle’s entertainment system. In the
past, high-end car manufacturers provided
Infotainment systems with very limited
functionality and connectivity and users
had no choice but to depend on the apps
provided by the automaker. The approach
taken by Apple to bring iOS to the car will
extend the iPhone to the vehicle. CarPlay
integrates the iPhone apps with the car’s
dashboard system once the latter is
plugged in via the USB. So, the user can
use the phone and messaging functions,
play music from iTunes, watch videos
and run navigation apps on the in-dash
display with a touch screen interface.
Apple’s voice-companion - Siri will also
allow actions through vocal commands
with minimal distraction while driving.
Similarly, the Google Projected Mode is
tipped to bring Android to the dashboard
and off er the calls, messaging, navigation
and multimedia functions to the vehicle.
Coming to the main advantage, this would
also bring the entire apps ecosystem
to the dashboard and present endless
possibilities for an in-car experience - read
out email and calendar reminders, order a
pizza on the way to the restaurant, switch
on the heater as you near your home – the
list could be endless.
Vehicle Communications As more and more connected cars
emerge and in-vehicle embedded
connectivity becomes common, a whole
new paradigm of vehicle communications
is set to unfold.
Madhusudhan Reddy Nukala*, Shreyas Bhargave** and Bipin Patwardhan****Principal Architect, iGATE**Technology Consultant, iGATE***Sr. Technical Architect, iGATE
CIO Perspective
Managing Technology>>
Transforming the Automotive Industry with Connected Cars –�An Internet of Things Perspective
There have been exciting recent developments around IoT in the automotive industry. Automakers, telecommunication service providers and leading technology companies are coming together to build the Connected Car.
CSI Communications | April 2014 | 35
Vehicle-to-Vehicle (V2V)
communication, i.e. wireless exchange of the
position, speed and location data between
near-by vehicles can help to sense impending
threat and off er the opportunity to improve
the safety of commuters signifi cantly. Each
vehicle will continuously broadcast an ‘I Am
Here’ message along with the speed and
position from its computer.
Vehicle-to-Infrastructure (V2X)
communication is the wireless exchange
of information between vehicles and
roadside infrastructure. The vehicles in
transit will communicate with the roads,
digital signage, traffi c lights, safety and
control systems. This can avoid crashes
and traffi c congestion through intelligent
safety applications. As a result, it will
enable recognizing high risk situations
in advance and help take mitigation
measures in a timely manner by issuing
alerts and safety advisories. Drivers can
also be made aware of various other
conditions such as roadwork, diversion
and adverse weather conditions.
These mechanisms together
will not only facilitate in reducing the
number of accidents and casualties but
also in tracking, tracing and monitoring
vehicles on the move. Even in the event
of emergency, vehicles would be able
to quickly intimate details to roadside
assistance, emergency services,
insurance providers as well as family
members. In eff ect, the capability of V2V
and V2X communications will play a
major role in securing the safety of man
and vehicle alike.
Vehicles and Smartphones – A Potent Combination As the integration with smartphones and
vehicles gets deeper, the information
exchange will be two-way – Smartphone
to Vehicle and vice versa. Using the
On-Board Diagnostics (OBD/OBD-II)
data, information regarding engine and
other crucial vehicle parameters can be
displayed on the driver’s smartphones
and same can be sent to service provider
for analysis. Alerts related to the car and
performing actions on certain vehicle
parts will become seamless.
Actions • Lock/Un-lock vehicle doors
• Roll windows up/down
• AC temperature +/-
Alerts/Notifi cations• Open doors
• Lights ON
• Hand brake ON
Thus, leveraging the smartphones to
the fullest without depending on vehicles
having connectivity embedded within can
potentially bring out smart cars sooner. At
iGATE, we have developed a few solution
prototypes around the driver monitoring,
crash detection and vehicle diagnostics.
These applications demonstrate the
profi ling of a driver for a trip based on the
occurrences of pre-defi ned signifi cant
events, detecting a crash and triggering
alerts to pre-confi gured contact numbers
as well as on-device analytics with
complex event processing to provide
continuous feedback to the driver. The
concept applications have been developed
using on-board sensors and suitable
micro-controllers.
Smartphone sensors for driving
insights Commercial smartphones commonly
have sensors such as Accelerometer,
Gyroscope or Orientation sensor and GPS.
By docking the smartphone to the vehicle,
data from these sensors can be used to
detect driving patterns such as sharp
turns, sudden acceleration, hard braking,
drifting and speeding. This can be used
to profi le the driver as safe or aggressive,
to rate and compare diff erent drivers and
share such data with insurance providers
for customized premiums. Pay-As-You-
Drive (PAYD) and Pay-How-You-Drive
(PHYD) are the upcoming off erings from
auto insurance companies that reward
safe drivers and penalize rash ones with
diff erential premiums.
Smartphones paired with vehicle
sensors for emergency alerts In case of an accident, paring on-board
sensors with passengers’ smartphone
enables a mobile app to intimate
emergency services with vital information
about the location and impact of the
crash. The app can also trigger SOS alerts
to near and dear ones to inform about
the incident. It can also be programed to
notify life-saving information like blood
group and other health records of the
passengers to enable paramedics to
respond accordingly.
On-Board Diagnostics for on-device
analytics The On-Board Diagnostics (OBD/OBD-
II) port is commonly used in automobile
service and maintenance. While much
of the information from this such as
faults, vehicle and engine speed, engine
temperature, fl uid levels, gear shifts,
battery status, etc. is accessed regularly
at vehicle repair shops, till now it was
largely used for post-facto analysis;
i.e. only when some problem arises.
However, with smartphones pairing
with vehicles, this information can be
readily made available to the vehicle
owners, giving them a better picture of
the car performance. Monitoring these
parameters actively and with some
level of on-device analytics, drivers can
get proactive service alerts on their
smartphones and potential faults can be
identifi ed for early diagnosis and care.
For predictive analytics to be
eff ective, the vehicular data from a large
number of vehicles needs to be aggregated
for detailed study and analysis. While that
can help to detect and derive patterns, a
subset of the rules can be made available
for users through smartphone apps.
Conclusion We are used to being connected as
home, at work and at many other places.
Experiencing the same level of connectivity
when on the road in a seamless manner
will be a natural extension of our digital
lives. As cars get smarter and pair up with
the other cars, smartphones and things,
suitable analytical processing can be
applied to various operational parameters
along with the near-by happenings,
allowing automobile drivers as well as road
safety authorities to get better visibility
about the performance of the vehicle as
well as the ambient situation, allowing
for timely actions. As our cars get on to
the Internet bandwagon, a much smarter,
interconnected and well-informed
world of enhanced safety, security and
convenience awaits us. n
As cars get smarter and pair up with the other cars, smartphones and things, suitable analytical processing can be applied to various operational parameters along with the near-by happenings, allowing automobile drivers as well as road safety authorities to get better visibility about the performance of the vehicle as well as the ambient situation, allowing for timely actions.
CSI Communications | April 2014 | 36 www.csi-india.org
Abo
ut th
e A
utho
rs
Madhusudhan Reddy Nukala (Principal Architect, iGATE): Madhusudhan has 14+ years of experience and
is currently leading the IoT initiative in iGATE’s Research & Innovation Group. In addition to IoT, he has strong
exposure to Enterprise Mobility, J2EE and EAI tools. He is active in providing technology consulting services and
has been involved in defi ning and identifying technology standards and frameworks in the Enterprise Mobility and
J2EE for top Fortune 500 companies. At iGATE’s Research & Innovation Group, he is involved in building hands-on
experience on emerging technologies through the creation of prototype applications, proof-of-concepts, thought
papers etc.
Shreyas Bhargave (Technology Consultant, iGATE): With over 14 years of experience in IT industry, Shreyas is
a technical architect and technology evangelist at the Technology Centre of Excellence in iGATE’s Research and
Innovation group. His current focus is on exploring emerging technologies such as IoT, Wearables, Augmented
Reality, Speech Recognition, Gamifi cation, etc. and their adoption in businesses and software service companies.
Prior to this, he had been active in the Enterprise Mobility and technology consulting. He holds a Bachelor of
Engineering degree from Mumbai University and is pursuing Master of Science from BITS Pilani.
Bipin Patwardhan (Sr. Technical Architect, iGATE): Bipin has over 15 years of experience in the IT industry. At iGATE,
he is part of the Future and Emerging Technologies group. The group explores new and emerging technologies
including wearable computing, analytics and augmented reality, to name a few. Technology exploration is supported
by the development of concept solutions to demonstrate suitability across various domains.
CSI Communications | April 2014 | 37
Information Security »
Security Features in Contemporary Browsers and Tips for Safe Browsing
Security Corner Krishna Chaitanya Telikicherla*, Harigopal K B Ponnapalli** and Dr. Ashutosh Saxena***
*Research Associate, Security and Privacy Research Lab, Infosys**Principal Research Analyst, Infosys, India***Principal Research Scientist, Infosys, India
Abstract: This article is the tenth in the series of articles, focusing on security of the web platform. In our previous articles, we have
explained about the security policies implemented by browsers, some of the web application vulnerabilities and their mitigation
techniques. In the last article, we have shifted our focus from developers to end users, explaining some of the important security
features provided by modern browsers. In this article, we continue with the same theme and explain few more security and privacy
features provided by modern browsers and also share a few tips for having a safe browsing experience.
IntroductionWith the growth of e-commerce, social
networks and several other web based
transaction systems, the amount of
sensitive information which an average
web user stores on the web is increasing
rapidly. Attackers constantly fi nd ways
of stealing sensitive data of end users
using various techniques, of which social
engineering tricks are some of the most
prominent ones. Modern browsers have
several features which prevent malicious
attempts of attackers such as opening
popups, spreading malware etc. In the last
article, we have explained about phishing
and malware fi lters and SSL/TLS features
which are built into modern browsers. In
this article, we will explain about private
browsing mode, popup blockers, domain
highlighting features provided by browsers
and a few generic tips for safe browsing.
Security and Privacy Features Provided by BrowsersAs mentioned in the last article, browsers
come up with several inbuilt security
and privacy features which protect users
from various threats. Some of them are
explained below:
Private browsing modeWeb browsers cache information such
as cookies, browsing history, images,
auto-fi ll form data etc., which can be
retrieved at a later point of time. The
cached data prevents unnecessary
roundtrips to servers and often enhances
user experience. However, this data can
be misused by people with malicious
intent, especially in the cases of shared
machines (e.g., public kiosks). Though
browsers provide a way to delete
cookies, clear history, cache etc. through
various browser settings, an average
web user will not be familiar with these
options. Therefore, users leaving behind
traces of their browsing history, which
compromises their privacy. To mitigate
this privacy problem, modern browsers
came up with a private browsing mode,
which is known with diff erent names
in diff erent browsers (e.g., “Incognito”
mode in Chrome, “InPrivate Browsing” in
Internet Explorer and “Private Browsing”
in Firefox). In a private browsing mode,
data entered in forms, browsing history,
new cookies etc. will not be available to
future browsing sessions once the private
mode window is closed. Also, browser
extensions will be disabled in this mode
by default, thereby preventing extensions
from stealing user’s data in a webpage. So
on a shared machine at an Internet kiosk,
a user will not be able to fi nd out what
sites the previous user visited, if private
mode is used. It should be noted that the
privacy provided by this mode is purely
on the client side. Any intermittent proxy
server can maintain a log of websites
visited by a user.
Popup blockersPopups are windows that open
automatically, without the intervention
or permission of end users. Advertisers
use popups to promote their business by
attracting the attention of users. Several
websites which accept online payments
open their banking partner’s website via
popups. Though popups are useful for
several genuine purposes, they are also
the cause of several security problems.
Attackers use popups as a mechanism
to conduct social engineering attacks
and spread malware. To prevent users
from falling prey to popup-based attacks,
browser vendors have introduced inbuilt
popup blockers into their browsers,
which block all popups by default. Users
are prompted with a message informing
that popups are blocked on the site
they are visiting (see Fig. 1). They can
add exceptions if they feel that popups
on certain sites are required for certain
important interactions (e.g., online
banking scenario).
Domain highlightingPhishing is a technique commonly used
by attackers to trick end users and steal
sensitive information of users. In a typical
phishing attack, an attacker creates a fake
webpage which mimics a genuine website
and spreads it to users. If an unsuspecting
user visits the page and submits sensitive
data, the attacker will gain access to it. To
strengthen the attack, attackers normally
use sub domains which are deceptive e.g.,
http://www.icicibank----------.evil.com. At
a quick glance, it appears that the site being
visited belongs to ICICI bank, but it is only a
subdomain which is cleverly crafted by the
attacker. To prevent users from falling prey
to such tricks, modern browsers highlight
the domain name of the site and grey out
the rest of the URL in the address bar. Fig. 1
shows that the domain “popuptest.com” is
clearly highlighted and distinguished from
rest of the URL by all three browsers (IE,
Firefox and Chrome). This important visual
clue helps web users to quickly identify the
domain they are visiting.
Few Tips for Safe BrowsingPrivate browsing, popup blocking, domain
highlighting are some of the features
which are directly provided by browser
vendors. While leveraging these features,
users should also follow certain practices
to ensure a safe browsing experience.
Some of them are listed below.
Sensitive Data ManagementWe have seen that private mode helps
in deleting all traces of a user’s browsing
session. However, in cases where users
browse with older versions of browsers
which do not support private mode (e.g.,
in Internet kiosks), users should manually
CSI Communications | April 2014 | 38 www.csi-india.org
delete the traces. While most browsers
provide features to auto fi ll forms,
remember passwords, recover from crash,
etc., they are primarily meant for users who
use a secure personal machine. While it is
not advisable to do sensitive operations
at public kiosks, a safe browsing practice
should include deleting sensitive data
traces like cookies, history before closing
the browser. A browser with private mode
is a better alternative since it does not
leave any traces after a browsing session
is concluded.
Auto-UpdateSecurity is a continuous process and is not
a one time job. Attackers keep innovating
new ways of exploiting browsers, vendors
come up with patches to fi x them. It is very
important for end users to regularly update
their browser to a latest version that in all
probability off ers better security. However,
uses rarely update their browsers, which
challenges browser vendors to provide a
safe browsing experience. Contemporary
browser vendors provide an option to auto-
update browsers to the latest versions in
the background without requiring much
interaction from users. Auto-update
feature relieves the end user from requiring
to download and apply latest patches. If
users want to manually verify if a latest
version is available, they can visit the
“About” section of their browser settings
page. The auto-update feature is turned on
by default and users can opt to turn it off
(not recommended though).
Installing browser extensionsUsers should be extremely watchful
before downloading free browser
extensions and add-ons that claim to
add several interesting features (e.g.,
extension which pose as video codecs).
They might be potential malware.
Browser extensions and add-ons become
a part of the running browser application
and will have elevated access to otherwise
sensitive inaccessible data. Hence, it
is very trivial for a rogue extension to
silently export a user’s sensitive data
to a spammer. Users are suggested
to carefully evaluate the reputation of
browser extensions and the permissions
they seek, before installing them.
Logging out of a websiteUsers often think that closing the browser
directly without logging out is a more
secure option. Contemporary browsers
have an option to reopen a user’s last
browsing session. Depending on the site’s
design, this may allow an attacker to
automatically login as a user, to a user’s
previously visited site. Hence, it is very
important that users properly logout of
websites before they quit the browser.
Saving bookmarksUsers bookmark interesting websites to
refer them at a later point of time. While it
is a good provision, if the URL contains any
sensitive data like username, password,
session Id, they will also be saved in the
bookmark. An attacker who has access to
that machine can view this sensitive data
easily. While bookmarking an interesting
site, it is good to watch the URL in address
bar and not to bookmark it if it contains
any sensitive data.
Using the “Remember Me” featureMost of the popular websites off er a “Remember Me” feature that allows users
Fig. 1: Popup blockers in IE10 and latest versions of Firefox, Chrome blocking popups automa cally
Fig. 2: Internet Explorer (IE10) showing an op on to reopen the last browsing session
CSI Communications | April 2014 | 39
to login into websites for the next time without entering credentials. Most of such features assume the user to use a secure personal machine. From a developer’s perspective, implementing this feature requires storing the credentials or a reference to them in a secure manner on the user machine itself. This leaves the user’s account open for attackers. It is very diffi cult to get such implementations correct and many attacks were reported which exploit this feature. It is always safe to re-enter the password every time a user logs into a web site, rather using the “Remember Me” feature.
ConclusionIn this article, we have explained some of
the security and privacy features provided
by modern web browsers. We have also
explained a few safety guidelines, using
which users can have a safer browsing
experience. The web is moving very fast with
the introduction of several new specifi cations
under the HTML5 umbrella. Newer browser
architectures and security models are fast
evolving. Though users of web browsers are
not expected to keep track of these technical
changes, they are expected to update to the
latest versions of browsers to have a safe
browsing experience.
Disclaimer: All names of the websites,
services and applications mentioned in
this article are intended for informative
purposes only with no malicious and /
or promotional intents. Readers may
check with vendors, product and service
providers for the latest updates. All
trademarks, copyrights are owned by their
respective owners.
References[1] PopupTest.com – A website to test
popup blocking software.
[2] Incognito mode in Chrome: https://
s u p p o r t . go o g l e . c o m /c h ro m e /
answer/95464?hl=en
[3] Domain highlighting in IE8:
h t t p : // b l o g s . m s d n .co m / b/i e /
archive/2008/03/11/address-bar-
improvements-in-internet-explorer-
8-beta-1.aspx
n
Abo
ut th
e A
utho
rs
Krishna Chaitanya Telikicherla is a Research Associate with Security and Privacy Research Lab, Infosys Labs. His research focus
is primarily on web security, specifi cally analyzing browser security policies, web attacks, defenses and formal verifi cation of
web specifi cations. He is a regular blogger and speaker at several developer and security meets in India. For his contributions to
technical communities, Microsoft has presented him the prestigious “Most Valuable Professional (MVP)” award for 4 consecutive
years (2010-2013). He can be contacted at [email protected]
Harigopal K B Ponnapalli is a Principal Research Analyst at Infosys, India. His research interests include web application security
assurance, strong authentication and PKI. Ponnapalli received his M.Tech from the Indian Institute of Technology, Kharagpur, India.
He has 15+ years of experience in application security. He authored multiple papers and coauthored a book titled "Distributed
Systems Security: Issues, Processes and Solutions" (Wiley, 2009). He also fi led a few patents to his credit. You can contact him at
Ashutosh Saxena is a Principal Research Scientist at Infosys, India. His main research interest is Information Security. Dr. Saxena
received his Ph.D in computer science and has more than 80 international publications and SEVEN granted patents. He’s a life
member of CSI and senior member of IEEE. Contact him at [email protected].
CSI Communications | April 2014 | 40 www.csi-india.org
Information Security »
Security Aspects in Internet of Things Domain
Security Corner Tapalina Bhattasali*, Dr. Rituparna Chaki** and Dr. Nabendu Chaki***
*Ph.D Scholar, Department of CSE, University of Calcutta**Associate Professor, AKCSIT, University of Calcutta***Associate Professor, Department of CSE, University of Calcutta
Advances in wireless technology permit
real-time acquisition, transmission and
processing of huge amount of critical data.
It has been seen that number of devices
connected to Internet exceeds number
of human beings around the world.
According to Libelium report, number of
devices connected to Internet will reach
to more than 50 billion around the year
2020. There will be urgent requirement
of huge data around bronto-byte (280 KB)
in near future, which enhances demand
for M2M communication. To connect to
Internet, each device must have unique
identity such as IP address. IPv4 protocol
is not capable to handle huge number of
devices, due to its limited address space
(232). Beside this, IPv4 address space has
been exhausted in February 2010. For this
reason, IPv6 steps in. IPv6 address space
of 2128 (approximately 340 undecillion
or 3.4×1038) is equivalent to assigning
100 address to each atom on the surface
of the world! Internet of Things (IoT)
has its roots in these. It is an emerging
concept which has the potential to make
life more comfortable, with the vision
of reducing human intervention. “IoT”
term was introduced by Kevin Ashton of
MIT Auto-ID Centre in 1999. The term
“Internet of Things” composed of two
words and concepts namely, “Internet”
and “Thing”, where “Internet” can be
defi ned as world-wide network of
interconnected computer networks, based
on a standard communication protocol
TCP/IP protocol, while “Thing” is an object
having independent existence, but not
precisely identifi able. Therefore, “Internet
of Things” means a world-wide network
of uniquely addressable, interconnected
objects, communicating with each other
over hybrid network to built Internet like
structure based on standard. Pervasive
environment provides better service
by hiding underlying technologies to
adapt IoT. IoT incorporates concepts
from pervasive, ubiquitous, and ambient
computing. IoT device can be a sensor
node, a light bulb, a microwave oven, a
smart phone, a tablet, a PC or a laptop,
a powerful server or a cloud. According
to NIC, Internet nodes may reside in
everyday things such as food packages,
furniture, paper documents and many
more by the year 2025.
Fig. 1: Internet of Things
It creates heterogeneous environment
by integrating Internet oriented features
(middleware), things oriented features
(sensors), semantic oriented features
(knowledge). “5A” that is based on “Any”
paradigm such as Anything, Anyone,
Anywhere, Anyhow, Anytime can be easily
implemented by using the concept of IoT.
It is a major step towards the evolution of
next generation network. According to ITU
Internet Reports 2005, four dimensions of
IoT have been presented in Fig. 2.
In order to make critical decisions
and provide quick response to the users,
IoT based applications involve real time
decision making, which in turn needs
to support high volume network traffi c
being driven by an alarming number of
heterogeneous devices. Major benefi ts
of cloud-based intelligent IoT framework
implementation can be summarized as
follows.
• No requirement of huge disk storage,
memory and resources during
execution of any application.
• Used by diff erent users from diff erent
locations using diff erent devices at
the same time.
• Support heterogeneous platforms
and operating systems.
• Diff erent versions of the application
can be applied without upgrading
user’s machine or software.
Technical Aspects of Internet of ThingsTechnology is a decisive factor for
enabling the realization of the IoT
concept. Following issues are going to
build up IoT. According to Cisco, there is a
diff erence between Internet of Things and
Internet of Everything (IoE); where IoT is
made up of billions of connected objects
and IoE is the smart network that are
required to support all the data generated
and transmitted by these objects. IoT
focuses mainly on objects or things,
whereas IoE brings together people,
process, data and things to make network
connection more relevant and valuable.
Fig. 2: Four dimensions of IoT
CSI Communications | April 2014 | 41
Four dimensions of IoT are- Process
(delivering right information to right
place at right time); People (connecting
people in valuable ways); Data (convert
data into intelligence for better decision
making); Things (Internet of Things). IoE
is the integration of Machine to Machine
(M2M), Machine to People (M2P),
People to People (P2P) communications.
Example includes SCADA (Supervisory
Control and Data Acquisition), smart
grid, smart building, (M2M); remote
patient monitoring, smart parking (M2P);
e-commerce site (P2P). Internet of Things
includes M2M communication, Intranet
of Things, Web of Things, Cloud of Things.
M2M communication refers to the
technologies that allow both wireless and
wired systems to communicate with other
devices. Intranet of Things refers to the
network, where all the devices should be
within local area network, hidden behind
a fi rewall and locally controlled without
supporting interoperability. Web of Things
is an evolution of Internet of Things where
everyday objects are connected by fully
integrating them to the Web. It is about
reusing the Web standard (such as URI,
HTTP, etc.) to access the functionality of
the smart objects. Auto-ID Lab recently
used the term “Cloud of Things” (CoT) to
connect physical objects to the cloud.
Unique addressing schemes for
objects, their representation, and storage
of the exchanged information and
interoperability are surely going to be
main challenges. It is very likely that IPv6,
namely the IPv6 over Low-Power Wireless
Personal Area Networks (6LoWPAN),
is going to be the main candidate for
interconnecting intelligent things since
it has a potential of leveraging the two
basic concepts which brought success to
the conventional Internet, namely packet
switching and the "end-to end" principle.
The adaptation between full IPv6 and
the specifi c 6LowPAN format can be
performed by 6LowPAN routers, which
are situated at the edge of 6LowPAN
islands delimiting the constrained IoT
environment from the conventional
Internet. This greatly facilitates
interoperability, optimization and security
management of end devices. It enables the
use of IPv6 in low-power, low-bandwidth
wireless networks with constrained
processing capabilities. The focus must
be on lightweight communications, since
end devices are extremely resource-
constrained in terms of computing, energy,
and memory. Interconnection of such
resource-constrained devices develops
the front-end of an IoT system as opposed
to the back-end supporting background
processes like heavy computation, global
interconnection via Internet etc. Most of
the wireless communications between
end devices in the IoT environments
take place over unreliable channels. High
level of interference could occur from
other radio devices situated in close
proximity to IoT. In this context, wireless
personal area networks (WPAN) may be
of interest as they consider low- power
communication for resource-constrained
devices. For instance, IEEE 802.15.4
standard introduces a radio technology
for low-power, low-data-rate applications.
It has become a basis for a number of
low-power radio stacks, such as ZigBee,
6LoWPAN, due to its wide adoption and
ubiquity. When it comes to widespread
adoption and interoperability, a family
of 802.11 standards can be considered.
Although it is feasible for personal
computers, smart phones and other
handheld devices, but relatively high
power consumption has prevented it from
adoption into the world of embedded
communication. It has been claimed that
the low-power versions of this popular
standard have emerged recently thus
paving the way for its integration into
the environment of resource-constrained
devices. Another wireless technology
which can be seen as the enabler of IoT
is bluetooth, particularly bluetooth low
energy. Most of the emerging mobile
phones are going to be equipped with low-
energy bluetooth technology very soon,
which is likely to provide for a suffi cient
basis to make it truly ubiquitous.
Security Issues Increase in number of devices and amount
of data to support “Any” paradigm, raise
security concern. One of the major
challenges that must be overcome in
order to push Internet of Things into the
real world is security. IoT is forecast to
become a major security risk in 2014
as more products are connected to
Internet, according to predictions report
by the Information Security Forum (ISF).
The security threats are potentially
devastating, so organisations must ensure
that technology for both consumers and
Fig. 3: Cloud based intelligent IoT framework
IoT is forecast to become a major security risk in 2014 as more products are connected to Internet, according to predictions report by the Information Security Forum (ISF).
CSI Communications | April 2014 | 42 www.csi-india.org
companies adhere to high standards of
safety and security. From the year 2014
onwards, attacks will continue to become
more innovative and sophisticated.
Therefore effi cient security solutions
must be prepared to tolerate unknown,
unexpected, high impact security events.
Security loopholes can occur at multiple
places in an IoT environment. Following
are the main issues which can determine
security vulnerabilities that may arise in
this type of environment.
• Heterogeneous environment
and mobility of objects result in
inconsistent interpretation of
collected data. They have great
infl uence over the protocol and
network security service.
• Large volume of data transmission
gives rise to scarcity of bandwidth
which results in denial of service.
• It is open to several unique
vulnerabilities because of its
distributed and ad-hoc nature.
• Burden of traditional security features
may be too large for limited resource
objects.
• Tracking of interacting objects may
become diffi cult in shared, unreliable
wireless medium.
• Data shared with unknown objects,
stored in third party domain, where
probability of data security decreases.
• Smart applications such as smart
healthcare, smart home, smart
transport, and smart city may need
to deal with user’s personal data that
may lead to serious threats to privacy
of the users.
It poses enormous security and
privacy risks. Data confi dentiality is
considered to be the most important issue
in this type of framework. This is required
to protect the data from disclosure,
and should not leak vital information
to external or neighboring networks.
Keeping the data confi dential does not
protect it from external modifi cations. An
adversary can alter the data by adding
some fragments or by manipulating the
data within a packet. This packet can later
be forwarded towards destination. Lack of
data integrity mechanism is sometimes
very dangerous. Data loss can also
occur due to improper communication
environment. Apart from modifying the
data packets, the adversary can also
change a packet stream by integrating
fabricated packets. The system should be
capable to verify the original source of data.
Adversary may sometimes capture data
in transit and replay them later to create
confusion. Most applications require
accurate estimation of source of the
event. Lack of smart tracking mechanisms
allow an attacker to send incorrect reports
about the location. Adversary may target
availability of critical data by capturing
or disabling a particular node, which may
sometimes result in serious damage.
Secure management of key distribution is
another challenging task.
Major attacks on IoT Devices could be
summarized as follows.
• Physical Attacks - example: micro
probing.
• Network Attacks – example: denial of
Service attack, routing attack.
• Software Attacks- example: virus,
worm, logic bomb.
• Environmental Attacks.
• Side Channel Attacks – example:
timing analysis, power analysis.
• Cryptanalysis Attacks-example:
cipher text only attack, man-in-the-
middle attack.
In completely automated
mechanisms, there is usually no prior
knowledge about each other and cannot
always be able to identify intruder. During
transmission between smart objects
in a network, it may be susceptible to
eavesdropping, either for insuffi cient
protection of communication medium
or for use of compromised session key.
Routing information in IoT can be spoofed,
altered, or replayed. Other known relevant
routing attacks include Sinkhole attack
or Blackhole attack, Selective forwarding,
Wormhole attack, Sybil attack.
There are several existing threats in
IP-enabled environment. Security in IPv6 is
almost same as IPv4 security in many ways.
However, there basic diff erences between
the two have led to some new security
vulnerabilities. In the transition period,
coexistence of IPv4 and IPv6 especially
creates problem regarding security. Major
threats related to IP enabled domain
(IPv6 / IPv4/ 6LoWPAN) are Protocol
transition attack, Reconnaissance attack,
Fragmentation attack, ICMPv6 misuse
attack, Routing header misuse attack.
6LoWPAN threats include both IPv6 and
WSN specifi c threats.
Threats related to sensor-cloud
environment include SPAM over Internet
Telephony (SPIT), Denial of Service (DoS),
Service theft.
It is almost impossible to isolate the
components of the IoT network physically
from the possible attackers and restrict
physical access to them. This in turn
endangers the integrity and confi dentiality
of information stored on end devices and
may cause availability violation.
A wireless nature of communication
greatly facilitates eavesdropping and
a number of other attacks on wireless
interface, such as Jamming, DoS, Relay
attack etc.
Bluetooth communication mainly
faces threats like Bluejacking, OBEX Push,
Bluesnarfi ng, HeloMoto, Bluebugging,
DoS attacks.
Constrained computational and
energy resources do not allow for utilization
of complex security mechanisms, which
can ensure confi dentiality and integrity
of data residing in end devices and
transmitted over an inherently insecure
wireless channel.
Communication with smart objects
in resource-constrained environments
must necessarily take into account
the limitations, especially in scenarios
where security is a crucial aspect and
conventional cryptographic primitives are
inadequate. Major threats include Privacy
threat, Firmware Replacement Attack,
Cloning of smart objects by untrusted
manufacturer.
Cloud computing is an on-demand
self-service model, where resources
are shared and pooled to serve multiple
customers using a multi-tenant model.
In cloud environment main concern
is lack of trust. In this, single physical
medium is shared among multiple virtual
machines (VM). Therefore integrity and
availability are two major requirements
in this scenario. Most of the threats are
Major threats related to IP enabled domain (IPv6 / IPv4/ 6LoWPAN) are Protocol transition attack, Reconnaissance attack, Fragmentation attack, ICMPv6 misuse attack, Routing header misuse attack. 6LoWPAN threats include both IPv6 and WSN specifi c threats.
CSI Communications | April 2014 | 43
caused due to poor management and
access control of VM. Session hijacking/
overriding, Virtual machine escape, SQL
injection attack, Cross-site scripting
attack are the major threats. Multi-
tenancy in cloud can expose customers’
VM that may lead to information leakage.
As customer does not have direct access
to physical storage of data, there is a
possibility that unauthorized copy of data
is misused later for malicious purpose.
There is no assurance that data will be
physically deleted from all places of
third party environment when data are
no longer required. Protection of stored
sensitive data is dependent on security
controls provided by service provider.
Trust, security and privacy issues are
major roadblocks in cloud computing
adoption. Cloud characteristics bring in a
set of risks and enhanced security controls
are required to mitigate those risks.
Therefore, intelligent framework
should be considered in such a way so that
it can analyze the above mentioned issues
and to adapt dynamic mechanism.
Security Requirements • Accurate implementation
of confi dentiality, integrity,
authentication, non-repudiation,
access control.
• Privacy preserving technology.
• Decentralized trust model for objects
within network.
• Dual stack security model at
6LoWPAN router/gateway.
• Use of lightweight cryptography
requires minimum amount of
essential resources of target objects.
• Maximum security can be achieved
by designing eff ective IDS. In
heterogeneous domain it acts as
second line of defence. Design of
eff ective IDS capable to work on
heterogeneous environment of IoT
(IPv4-IPv6-6LoWPAN enabled IDS).
• Proper integration of all security
features of heterogeneous domains.
ConclusionResearchers have been working for
quite some time in designing ubiquitous
framework for smart applications.
Different projects impose security
in different ways. Even though, most
projects succeeded in implementing
their proposed security frameworks, it is
not easy to provide a fully-secured IoT
system in heterogeneous domain that
can combine all security components
in a single solution. There is no single
security framework that could claim
full protection for cloud based IoT
environment. As IoT covers different
type of domains, security for individual
domain may exist, but no integrated
security framework has been considered.
Two most sensitive security concerns
are transmission and storage of critical
data. Therefore, main focus should be
given to two of these major security
requirements to make the system more
efficient. One technique is to develop
low overhead cryptography for securing
data transmission and other is to build
secure trust model to store data in third
party environment. Without proper
security framework, intelligence in IoT
may lead to major catastrophe. There
is no suitable standard defined till date.
So more research works are needed on
security for Internet of Things.
References[1] ITU Internet Reports 2005: The Internet of
Things, Executive Summary, http://www.
itu.int/wsis/tunis/newsroom/stats/The-
Internet-of-Things-2005.pdf.
[2] Libelium Unveils the Top 50 Internet
of Things Applications, http://www.
i t w i re .co m /o p i n i o n - a n d - a n a l ys i s /
beerfi les/54432-libelium-unveils-the-top-
50-internet-of-things-applications.
[3] Internet of Things in 2020: A roadmap
for the future, Workshop report by EPoSS
(EuropeanTechnology Platform on Smart
Systems Integration), http://www.iot-
visitthefuture.eu/fi leadmin/ documents/
researchforeurope270808_IoT_in_2020_
Workshop_Report_V1_1.pdf.
[4] T Bhattasali, R Chaki, and N Chaki, “Study
of Security Issues in Pervasive Environment
of Next Generation Internet of Things”, In
Proceedings of CISIM 2013, 2013, Springer,
LNCS.
[5] T Bhattasali, R Chaki, and N Chaki, “Secure
and Trusted Cloud of Things”, INDICON
2013,IEEE Xplore. n
Abo
ut th
e A
utho
rs
Tapalina Bhattasali is at present doing her PhD in Computer Science & Engineering from University of Calcutta. She
has a few years of working experience in academic fi eld. She has number of international publications to her credit.
She is a member of various professional organizations like CSI, ACM. Her primary research area includes Security in
wireless domain, Internet of Things and Cloud Computing. She can be reached at [email protected].
Dr. Rituparna Chaki is an Associate Professor in AKCSIT, University of Calcutta. Her primary areas of research
are Wireless Mobile Ad-hoc Networks and Wireless Sensor Networks. She has also served as a Systems Manager
for Joint Plant Committee, Government of India for several years before she switched to Academia. Dr. Chaki has
number of international publications to her credit. Dr. Chaki has also served in the committees of several international
conferences.
Dr. Nabendu Chaki is an Associate Professor in the Department Computer Science & Engineering, University of
Calcutta. Besides editing several volumes in Springer proceedings, he has authored several text books and several
refereed research papers in reputed Journals and International conferences. His areas of research interests include
distributed systems and software engineering. Besides being in the editorial board for several International Journals,
he has also served as program chair of several international conferences.
Diff erent projects impose security in diff erent ways. Even though, most projects succeeded in implementing their proposed security frameworks, it is not easy to provide a fully-secured IoT system in heterogeneous domain that can combine all security components in a single solution. There is no single security framework that could claim full protection for cloud based IoT environment.
CSI Communications | April 2014 | 44 www.csi-india.org
Solution to March 2014 crossword
Brain Teaser Dr. Debasish Jana
Editor, CSI Communications
Crossword »Test your Knowledge on Internet of Things (IoT)Solution to the crossword with name of fi rst all correct solution provider(s) will appear in the next issue. Send your answers to CSI
Communications at email address [email protected] with subject: Crossword Solution - CSIC April 2014
CLUESACROSS1. A system that can enable machines to respond to human requests based on
meaning (8, 3)
7. The fi rst publicly used version of the Internet Protocol (4)
8. Global network connecting any smart object (8, 2, 6)
10. Portable data terminal (3)
11. Wireless non-contact use of RF electromagnetic fi elds to transfer data (4)
12. The person who envisioned Device to Device communication (4, 3)
14. Proximity based standards for devices to establish radio communication (3)
16. A universal unique electronic identifi er used to identity for every physical
object (3)
18. A device that senses measurable information and then reacts to it (6)
21. Data about data (8)
22. A forwarding element that enables various local networks to be connected (7)
24. Properties of an entity that makes it defi nable and recognizable (8)
25. Intel system on chip (SoC) platform designed for smartphones and tablets (4)
26. The transmission of a packet to multiple destinations in a single send
operation (12)
28. Internet Engineering Task Force (4)
29. An on-line database service allowing developers to connect sensor-derived
data (6)
DOWN2. Media access control (3)
3. A wireless technology standard for exchanging data over short distances (9)
4. A method of communications between two electronic devices over the
World Wide Web (3, 7)
5. Authentication information required to connect to a resource (10)
6. An optical machine-readable representation of data (7)
7. Named set of operations that characterizes the behavior of an entity (9)
8. Ability of making systems and organizations to inter operate (16)
9. Extensible Markup Language (3)
13. A componentized version of the Windows XP Professional edition (3)
15. Standardized connection of computer peripherals (3)
17. A platform to connect the ideas, people and companies creating the Internet
of Things (10)
18. Service oriented architecture (3)
19. Framework for resource description (3)
20. A communications protocol for message-oriented middleware based on
XML (4)
23. Language for describing web ontology (3)
27. The communications protocol that promises to connect every device on the
Internet (4)
Did you hear about Internet of Things?
Although IoT research and availability are not in full scale, back in July 2009, Kevin Ashton commented in "That 'Internet of Things' Thing" published in RFID Journal, “...We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so.”
We are overwhelmed by the responses and solutions received from our enthusiastic readers
Congratulations toDr. Madhu S Nair (Dept. of Computer Science, University of Kerala,
Kariavattom, Thiruvananthapuram, Kerala)
for ALL correct answers to March 2014 month’s crossword.
1
T H E S2
A U R U S3
B Z4
U
O5
C H I T R A N K A N6
B L A I7
G8
P H O N E M E G9
I S C I I
A A10
I11
T R A N S O S
S G12
I D D T
A R13
I N D L I N U X E14
P
I I S L15
G16
Q H
N17
S C18
L T U O
D W19
T R A N S L I T E R A T I O N20
P I N A A K I X M L E
A M21
P H22
O N E I I L T23
M24
I A S T B C L P I
A N S25
K O L A C
D A26
K A R T I K A N O D S
H T R L C
Y H U I27
S A R O V A R28
B A R A H A I M E N
M N G29
F O N T A
1 2 3
4
5 6 7
8
9 10 11
12 13 14
15 16 17
18 19
20
21 22
23 24
25
26 27
28
29
CSI Communications | April 2014 | 45
Ask an Expert Dr. Debasish Jana
Editor, CSI Communications
Your Question, Our Answer"Try not to become a man of success. Rather become a man of value.”
~ Albert Einstein
On Android: x and y coordinates of GestureOverlayView
From: Rashmi Trivedi
Hello Sir / Madam
I have a class which extends Fragments. I have a GestureOverlayView,
set as KeyStrokeType = MULTIPLE, in the fragment xml. I want to
extract the coordinate values of the stroke as and when i write on the
GestureOverlay.
I am new to Android and Java programming. Please help.
Thank you.
A In Android development framework, the Fragment class
helps to create applications that could span the available
width of the device and supports layouts that span multiple
panes (suitable for tablets) or could be confined to single
pane (mobile handset) as well. On mobile handsets, you
require separate Activity that could host a Fragment and to
accommodate space, you switch between Activities.
Using GestureOverlayView, drawing free hand becomes
convenient. A transparent overlay for gesture input can be
placed on top of other widgets and may contain other widgets.
Presume that you extend Fragment and have
GestureOverlayView, so your class should like the following:
public class MyFragment extends Fragment implements OnGesturePerformedListener {. . .}
Using GestureOverlayView, you need to call the method
addOnGesturePerformedListener to add the listener and must
implement the interface OnGesturePerformedListener. That’s
why, you need to use implements OnGesturePerformedListener.
Thereafter, whenever a gesture is detected, the method
onGesturePerformedListener gets called.
If you have a method onTouchEvent, then within that method,
you get a MotionEvent as argument to the listener. From that
argument, say, called as touchevt, you may query the x and y co-
ordinates by calling getX() and get(Y) respectively for the event.
For example,
public boolean onTouchEvent(MotionEvent touchevt) { float x = touchevt.getX(); float y = touchevt.getY(); . . . .}
Another sample program segment that extends an Activity and
implements OnGesturePerformedListener is given below.
public class GestureSample extends Activity implements OnGesturePerformedListener { private GstrLrary gstrL; @Override public void onCreate (Bundle savedInst) { super.onCreate(savedInst); GestureOverlayView gstrOvrlyVw = new GestureOverlayView(this); View infl = getLayoutInflater().inflate (R.layout.main, null); gstrOvrlyVw.addView(infl); gstrOvrlyVw.addOnGesturePerformedListener(this);gstrL = GstrLraries.fromRawResource(this, R.raw.gestures); if (!gstrL.load()) { finish(); } setContentView(gstrOvrlyVw);}@Overridepublic void onGesturePerformed(GestureOverlayView overlay, Gesture gesture) {ArrayList<Prediction> predictions = gstrL.recognize(gesture); for (Prediction prediction : predictions) { if (prediction.score > 1.0) { Toast.makeText(this, prediction.name, Toast.LENGTH_SHORT).show(); } } }}
In Android, Toast is a notifi cation message that pops up, stays
displayed for a certain amount of time, and automatically fades in
and out. This is used mostly for debugging purpose.
Also, the following code fragment shows use of OnGestureStarted
that gets called when a manipulation starts. From the MotionEvent
argument, we may get the values of x and y coordinates as shown
below:
public void onGestureStarted (GestureOverlayView ovrl, MotionEvent evt) { if (mGestureType == MULTIPLE_STROKE) { ovrl.cancelFadingOut(); } float mX = evt.getX();float mY = evt.getY();. . . .}
For more info on GestureOverlayView, you may refer:
http://developer.android.com/reference/android/gesture/
GestureOverlayView.html
n
Do you have something to ask? Send your questions to CSI Communications with subject line ‘Ask an Expert’ at email address [email protected]
CSI Communications | April 2014 | 46 www.csi-india.org
CSI Reports
From CSI SIGs / Divisions / Regions and Other News »Please check detailed reports and news at:
http://www.csi-india.org/web/guest/csic-reports
SPEAKER(S) TOPIC AND GISTDIVISION IV COMMUNICATIONS
Dr. A Basu, Dr. AK Nayak, Dr. Suvendu Rup, Dr. Anjali Mohapatra,
Dr. Debasish Jana, and Dr. Rachita Mishra
Guests on stage
21-22 February 2014: National Seminar on “Recent Advancement in Information Technology (NSRAIT – 2014)”Dr. Basu talked on Cloud Computing & Big Data and emergence of Cloud as information technology designed for availability of computing resources to users “on demand”. Dr. Nayak talked on Emerging Trends in ICT for National Development. Dr. Rup highlighted Recent Advances in Intra-Key-Frame Coding and Side Information Generation Schemes in Distributed Video Coding. Dr. Mohapatra spoke on bio-informatics & described Motif Search in DNA Sequences using Generalized Suffi x Tree. Dr. Jana spoke on Novel ECDLP-based Blind Signature scheme based on Elliptic Curve Discrete Logarithm Problem. Dr. Rachita focused on General-Purpose computing on Graphics Processing Units (GPGPU), which is utilization of graphics processing unit (GPU) as multiple processors, to perform computation in applications traditionally handled by CPU.
Dr. Prasad spoke on Model Based Testing of Object-Oriented Programs. Dr. Pattnaik spoke about computational intelligence. Dr. Samal focused on real time operating system& spoke about key characteristic of RTOS, level of its consistency concerning time it takes to accept and complete application task. Dr. Pattnaik delivered session on Cloud Computing, its application area and implementation. Dr. Das talked on Delay-Tolerant Network. He described how applications are expected to tolerate much longer delays using DTN.
DIVISION I & IV & REGION-1 IN COLLABORATION WITH IEEE UP SECTION AND CSI MATHURA CHAPTER
Sanjeev Nikore, Prof. Rajeev Tripathi, Prof. Krishna Kant,
Prof. Nishchal Verma and Prof. Ekram Khan
Inaugural Session
1-2 March 2014: International Conference on “Information Systems and Computer Networks: ISCON-2014”Prof. Kant introduced Conference theme. Mr. Nikore addressed topic of employee relationship management which focused on set up of do-it-yourself knowledge exploration. Prof. Tripathi focused on Adaptive Modulation and Coding Schemes as promising technique to support demands for high data rates and wideband proposed for 4G mobile communication. Prof. Verma delivered key note speech on Intelligent Informatics. This deals with interdisciplinary research on artifi cial intelligence, cognitive science, knowledge engineering, information technology and engineering management. Prof. Khan spoke on designing wireless video communication system which is a challenging task due to high error rates of wireless channels, limited and dynamically varying bandwidth availability and low energy and complexity requirements of portable multimedia devices.
DIVISION-II (SOFTWARE), CSI ALLAHABAD CHAPTER, IEEE CSI COUNCIL AND IFIP-TC9 ICT & SOCIETY
Prof. GC Nandi, Prof. Greg Adamson, Prof. MGPL Narayana, Supriya Kummamuru, Prof. OP Vyas, Prof. Anupam Agarwal, Prof. MM Gore and Prof. TV Gopal
L-R: Prof JN Tripathi; DK Dwivedi; Prof. KK Bhutani, Prof. GC Nandi; Prof. TV Gopal; and Prof. Greg Adamson (on the screen through SKYPE)
9 March 2014: Seminar on “Norbert Weiner, Cybernetics, Humanity & Technology”Prof. Nandi inaugurated Seminar and emphasized that researchers must focus on issues relating to Social Cybernetics. Prof. Adamson gave enlightening talk through SKYPE about the Norbert Weiner & his wide ranging contributions to Science of Automation. Prof. Narayana gave presentations on Cybernetic approach for Business Solution Design. Ms. Kummamuru gave presentation on Evolution of Cybernetic Model: Outcome of TCS consulting practice through SKYPE. Prof. Vyas explained Mobile Software Engineering-Opportunities and Challenges. Prof. Agarwal spoke on Human Computer Interaction. Prof. Gore talked about Ethics & Cybernetics. Prof. TV Gopal gave presentation about what impacts Progress of Cybernetics.
CSI Communications | April 2014 | 47
CSI NATIONAL YOUNG IT PROFESSIONAL AWARDS
Prof Bipin Mehta, Prof. RP Soni, Mr. Naishadh Diwanji, Dr. Nityesh Bhatt, Mr. Vijay Shah and Dr. Harshal Arolkar
YITP-2013-Na onal Round Par cipants-Jury and Chapter OB
6 March 2014: CSI National YITP Finals and Award Ceremony
After short listing nominations, 35 teams comprising of professionals from IT companies, technical institutes, entrepreneurs and researchers participated at Regional Level. Evaluation process had 2-tier selection to select Winner, Runner-up & Special Mention. Regional round was conducted at Allahabad, Kolkata, Ahmedabad, Bhubneswar, Aurangabad and Thiruchirappally Chapter. Most outstanding technology project of any kind, completed during the year 2012-13 where project duration could be of 2-3 years from the start date, were judged. The selection committee considered factors like criticality of IT usage, improvement of customer service, innovation, quality of management and impact on organization and society to judge each project. Winners were Centre for Development of Advance Computing, Kolkata Team Amritasu Das, Ravi Sankar and Surya Kant. Project was Handheld Electronic Nose - An Embedded Application for quality assessment of tea.
DIVISION III & IV AND CSI INDORE CHAPTER IN ASSOCIATION WITH IEEE AND SRI AUROBINDO INSTITUTE OF TECHNOLOGY, INDORE
Prof. Aynur Unal, Anadi Upadhyay, Prof. P Trimurthi, Dr. AK Nayak, Anurag Mandloi, Kinshuk Trivedi, Dr. Sudhakar Bharti, Dr. CK Jain, Dr. Aaquil Bunglowala and Dr. Durgesh Kumar Mishra
Guests and dignitaries on stage
8-9 March 2014: International Conference on “IT in Business, Industries and Government”Prof. Unal said that Technology has brought revolution in Medical Sciences. She shared her Research work on Big Data in fi eld of Medical Sciences. Mr. Upadhyay discussed issues related to Big Data & Analytics. He also discussed details related to Data mining, Data analysis and Online Recommendation Angle. Prof. Trimurthi said that Data Analytics prevailed even in ancient times. The need is to have Data and analyze it correctly. Data & Research will always help for better future. With examples he said – Data & proper analytical system gives momentum and right direction to your career. Mr Mandloi was connected via Online Lecture from USA. He informed that his company Early Warning Services provides Online Data Security for 5 reputed multi-national banks. They identity defaulters of these banks. They also provide the online data security via social security numbers. 32 subject experts (National & International) shared their experience in this event.
CSI NATIONAL HEADQUARTERS, TARAMANI, CHENNAI
CSI Staff members
Organizers and par cipants of the CSIDay Celebra ons
6 March 2014: CSI Day Celebrations
To commemorate the beginning of CSI Golden Jubilee Celebrations, CSI Flag was hoisted by Mr. Rajan T Joseph, Director (Education). All staff members Mr. S Ramasamy, Mr. Y Kathiresan, Mr. Gnanasekaran, Mr. Natarajan, Mr. Mythreyan, Ms. Miraclin, Ms. Manjusha, Ms. Srividya and Ms. Chithra took pledge to serve for the CSI Community with vigour. Director of Education remembered CSI stalwarts during his speech after hoisting the flag. The meeting came to an end after cutting a cake.
CSI BEST PHD THESIS AWARD –2013 CHENNAI
S Ramanathan, Sanjay Mohapatra, Dr. B Poorna,
Rajan T Joseph, S Ramasamy and Prof. P Kumar
Ph.D award winners with CSI OBs
22 March 2014: PhD Thesis Award Presenting Ceremony
The Best PhD Thesis Awards for the year 2013 were presented at a ceremony. The Awards, Certificates and Cash Prize were distributed by Mr S Ramanathan, Hon. Secretary & Chief Guest, Mr Sanjay Mohapatra and Dr B Poorna. The event was held concurrently with the valedictory function of “National Conference on Recent Advances in Computing and Communications” organized by CSI Chennai Chapter and the CSI SB Shri Shankarlal Sundarbai Shasun Jain College for Women, Chennai. The Awards were presented to Dr. P N Jebarani Sargunar, Dr. S Malathi and to Dr. R Shreelekshmi respectively.
CSI-EDUCATION DIRECTORATE, MIT PUNE
Mr. Shekhar Sahasrabudhe, RVP-VI
Mr. Sahasrabudhe presen ng trophy to winners
22 March 2014: National Student Project Contest and Expo
Objective was to encourage students from CSI student branches to design innovative projects, improve their skill set and become market ready. The contest aimed at involving young students all over India in the quest of innovation in IT and provided them an opportunity to demonstrate their projects with strong social relevance. The Contest was open to students across India, who formed teams of 2 within their respective colleges and participated in rounds at various levels. The Contest aimed to identify students who can develop solutions for real time problems and scenarios with a focus on societal benefit. This competition was held at various regional centres and Finals was conducted at MIT, Pune .
CSI Communications | April 2014 | 48 www.csi-india.org
CSI News
From CSI Chapters »Please check detailed news at:
http://www.csi-india.org/web/guest/csic-chapters-sbs-news
SPEAKER(S) TOPIC AND GIST
GHAZIABAD (REGION I)Mr. R K Vyas, Dr. Laxman Prasad, Prof. Y K Mittal, Ms.
Kavita Saxena, Mr. Saurabh Agrawal and Mr. Anilji Garg
22 February 2014: Regional Finals of “4th CSI Discover Thinking School Quiz Contest”
Six teams who came after winning chapter rounds represented Haryana,
Delhi and Uttar Pradesh. After enthralling fi ve rounds of quizzing, teams
from DPS Indirapuram and DPS Sonepat were in tie for First position. After
nail biting tie breaker, team from DPS Indirapuram consisting of Shivam
Bhatia and Sidharth Bhat emerged as Winners. Team from DPS Sonepat
consisting of Pavitra Mohan Singh and Neena Gulati was the Runners Up.
Winning team will represent Region I in National Finals.
Final winners of QUIZ with Guests
AHMEDABAD (REGION III)Mr. S Mahalingam, Former CFO & Executive Director,
TCS and Fellow & Past President
20 February 2014: Public Lecture “Making of a vibrant society- some ideas”
Mr. Mahalingam shared his expertise, ideas and thoughts on making of
a Vibrant Society and suggested to implement innovative and creative
work for larger interest of society. More than 50 participants attended
this public lecture including Fellow, Patron, Senior Members of CSI and
Faculty Members.
Mr. S Mahalingam delivering his lecture
COIMBATORE (REGION VII)Mr. A Bharani Dharan, Dr. R Joseph Xavier, Dr. K Sanakara
Narayanan and Dr. R Udaya Chandran
31 January - 1 February 2014: Two days workshop on “Hadoop Eco-System A Practitioner Approach”
Mr. Dharan spoke about benefi ts of Hadoop. Second issue of SRIT CSI
MESSENGER magazine was released. First session involved explanation of
cloud working architecture and benefi ts of virtual installation. Participants
were provided hands on working of opennebulla. Second session involved
single node confi guration of Hadoop open source and were provided with
another software ONE to be installed using VirtualBox. Later participants
were provided with training on ONE with new confi gurations for multi node
confi guration.
Dignitaries on dais for inaugura on L-R: S Pravinthraja, Dr. R Udaychandran, Dr. R Joseph Xavier and A Bharanidharan
Mr. Rajesh Kumar, Founder & Managing Director, Aaum
Research and Analytics Private Limited
14 February 2014: Lecture on “Analytics for Business success and Excellence”
Mr. Kumar spoke and motivated participants who are already in business
and or about to start business and enlighten them about stepping in to
world of business. He suggested an analytical approach at its very simplicity
thereby helping listeners to accept the ideas presented and interacted with
them during the session.
Faculty member and par cipants during lecture
CSI Communications | April 2014 | 49
SPEAKER(S) TOPIC AND GIST
COIMBATORE (REGION VII)Chief guest Dr. S Gunasekaran, Dr. Vasantha
Sudhanandhen and Principal Dr. S Shanmugasundaram
15 February 2014: Workshop on “Cloud Computing Tool”
Dr. Gunasekaran spoke about the benefi ts of Cloud Computing Tool. The
fi rst session involved explanation of cloud working architecture and benefi ts
of Cloud Computing Tool. Participants were provided hands on working
of Cloud Sim Tool which involved the confi guration of cloud analyst &
Reporting tool.
Felicita on by Principal Dr. S Shanmugasundaram
VELLORE (REGION VII)P Srinivasa Rao, Dr. G Viswanathan, Summet Verma,
Sankar Viswanathan, GV Selvam, Prof. V Raj and
Prof. S Narayanan
21-22 November 2013: International Conference on “Computing, Cybernetics and Intelligent Information System, CCIIS2013”
About 250 delegates attended the conference. Major topics for technical
paper presentations and deliberation included: Next-generation Computing
and Communications Systems, Human Computer Interactions, Information
Modeling, Tools and Applications. Four pre-conference workshops on Cloud
Computing, Windows 8 Applications Development, Business Intelligence
and Design Thinking were also organized with support and resource persons
with support from VMWare, Microsoft, Accenture and SAP Lab respectively.
Inaugural session
From Student Branches » http://www.csi-india.org/web/guest/csic-chapters-sbs-news
SPEAKER(S) TOPIC AND GISTAES INSTITUTE OF COMPUTER STUDIES (AESICS), AHMEDABAD (REGION-III)Dr. Sudipto Das and Dr. Pamela Bhattacharya 21 December 2013: Expert talk on “New Research Trends in Management
of Data”
The expert talk provided new ideas and directions for research and innovative
projects in database management related areas.
Dr. Sudipto Das during the talk
B.N.M. INSTITUTE OF TECHNOLOGY, BANGALORE (REGION-V)Mr. Suman Kumar from Inforce Computing 15 February 2014: Workshop on “Android”
Mr. Suman began with an introduction to Android Programming and
covered architecture of Android and provided some examples. Students
also had a hands-on session.
Mr. Suman Kumar conduc ng the session
CSI Communications | April 2014 | 50 www.csi-india.org
SPEAKER(S) TOPIC AND GISTEAST POINT COLLEGE OF ENGINEERING AND TECHNOLOGY, BANGALORE (REGION-V)Mr. Pramod Gowda, Dr. Subhash Kulkarni,
Mr. Anjinappa, Dr. Satish B M and Dr. Prakash S
10-12 December 2013: Students Internet World 2013
Around 1500 students from diff erent Govt. and Private High Schools of
Bangalore Rural District, Karnataka participated. Students Internet World is
being organized since last 5 years to give exposure about internet to Govt.
and Private High Schools students. The event was sponsored by Govt. of
Karnataka, Pearson and Intel.
Dr. Prakash S, Anjinappa, Dr. BM Sa sh, Pramod Gowda and Dr. BM Girish on the dais
NALLA MALLA REDDY ENGINEERING COLLEGE, HYDERABAD (REGION-V)KC Arun, M Akhila, S Lakshmi Sahiti, P Sowmya and
V Maithri
9 October 2013: Workshop on “Networking Fundamentals”
Resource persons delivered knowledge about the importance and
overview of networking fundamentals and demonstrated how to build
Ethernet LAN using Cross over and Patch Cable. This workshop was
coordinated by Mr. Avinash, T Mahendar, N Abhinay, Md. Nisar Ahmed
and G Kalyan Kumar.
(From le ) G Kalyan Kumar, Md Nisar, N Abhinay, T Mahendar, K C Arun, V Maithri, S Lakshmi Sahi , P Sowmya and M Akhila
SRKR ENGINEERING COLLEGE, BHIMAVARAM, ANDHRA PRADESH (REGION-V)Dr. G P Saradhi Varma, S V Ranga Raju, Prof. P Srinivas
Rao, G Murali Ranga Raju, and Dr. D Ranga Raju
8-9 March 2014: National level Technical Symposium on “Current Trends of Information Technology TECHFLEET’14”
The conference includes technical Paper Presentations, Idea and Project
Presentations, Coding Contest, Technical Quiz & workshop on Mobile App
Development. The purpose of the conference was to encourage students
in learning current technical concepts and to improve presentation skills.
The workshop provided exposure to various topics required for developing
android applications.
Dr. G P Saradhi Varma, S V Ranga Raju, Prof. P Srinivas Rao, G Murali Ranga Raju, and Dr. D Ranga Raju during release of proceedings
G.H.RAISONI COLLEGE OF ENGINEERING, NAGPUR (REGION-VI)Mr. Pafulla Das, Dr. P R Bajaj, Dr. P B Nagarnaik,
Dr. A Y Deshmukh, Dr. Jaju, Mrs. Thomas, Mrs. Shweta
Tayade, Mr. Gopal Sakarkar and MCA dept
22 January 2014: National Conference on “Recent Trends in Information Security’2014”
Technical paper presentation was organized at National conference and
papers from all over India namely Gujarat, Pune, Nanded, Amravti, etc.
which were based on either mini or major projects or research papers were
presented in 3 sessions. Out of 41 papers received 39 were presented during
the two days. Selected papers will be published in International Journal of
Computer Journal, New York, USA.
Inaugura on of Conference Proceeding
MARATHWADA INSTITUTE OF TECHNOLOGY, AURANGABAD (REGION-VI)Mr. Arun Kadekodi, Mr. Satish Sangameswaran,
Mr. Bharat Kumar Dasa and Mr. Mayur Wakde Tendulkar
28 February 2014: Conference on “Recent Trends in IT”
Mr. Kadekodi spoke on Project-x: A student-centric social network.
Mr. Sangameswaran talked on Microsoft MEC: Massively Empowered
Classrooms: A “blended” model to engage with students, teachers, and
institution simultaneously. Mr. Dasa spoke about Big Data: Big Data Introduction,
Defi nition and Importance, NOSQL – A brief introduction, Distributed Computing
– Importance, Hadoop – Overview. Mr Tendulkar spoke on Windows 8 Phone
App Development: Modern Smartphone Development, Getting started with
WP8 app development and Using the Windows Phone developer tools.
Speaker during lecture
CSI Communications | April 2014 | 51
SPEAKER(S) TOPIC AND GISTPROF. RAM MEGHE INSTITUTE OF TECHNOLOGY & RESEARCH, BADNERA (REGION-VI)Dr. DT Ingole, Dr. GR Bamnote, Dr. CA Dhote,
Dr. A S Alvi, Prof. MA Pund and Kunal Singh
21-22 February 2014: Workshop on “PYTHON language”
Workshop was inaugurated by Hon’ble Principal Dr. DT Ingole. Kunal Singh,
Research Engineer, SparkLab Engineering Systems Pvt. Ltd. gave detailed
training to students on PYTHON with basics and programming concepts. 85
participants from diff erent colleges participated in the workshop.
Hon’ble Principal Dr. D T Ingole at Inaugura on Speech
ADHIYAMAAN COLLEGE OF ENGINEERING, HOSUR (REGION-VII)Mr. Saravanan 12 February 2014: Industrial Visit to C-DAC Knowledge Park, Bangalore
One day Industrial Visit to C-DAC Knowledge Park, Bangalore was arranged
for student members. In C-DAC, they attended a Seminar on “Information
Security” given by Mr. Saravanan, Administrative Offi cer, C-DAC. Students
also visited data management centres and Super Computer.
CSI Members of College Industrial Visit to C-DAC Knowledge Park, Bangalore
AMAL JYOTHI COLLEGE, KANJIRAPPALLY (REGION-VII)Mr. Manu Zacharia, Creator & Chief Architect of Matriux
and Information Security evangelist, Microsoft MVP &
Information Security evangelist
18-19 March 2014: Workshop on “Ethical Hacking & Cyber Security”
Vulnerability Assessment and Penetration Testing (VAPT) is an integral
part of every critical network. Organizations are required to carry out
frequent and period assessment of their networks to ascertain the
security posture of their information systems. Course aimed at providing
required technical skillsets to carry out penetration testing and document
detailed fi ndings.
Mr. Manu Zacharia interac ng with students
DR.SIVANTHI ADITANAR COLLEGE OF ENGINEERING, TIRUCHENDUR (REGION-VII)Mr. E Arun, BeMITSS, Tirunelveli 4 January 2014: One-day Workshop on “Dot Net”
Mr. E Arun gave eff ective hands-on-training in dot net. He focused on the
building blocks of C#.NET, VB .NET, database connectivity, User Interface
and applications.
Mr. E Arun, speaker at the event
EASWARI ENGINEERING COLLEGE, CHENNAI (REGION-VII)Chief guest Mr. V Srinivasan and Dr. M Sekar, Principal 17 February 2014: Technical Contest “MINDBEND”
Dr. Sekar spoke on advancement of computer technology and shared
his experience about working on a project during his college days.
Mr. Srinivasan explained important qualities and competencies, students
should have when they attend their placements. MINDBEND had two
events “Inquizitive”(Technical Quiz) and “Google It”, and each event had
two rounds. Winners were awarded with cash prizes and certifi cates.
L-R: Dr. D Sivakumar, V Srinivasan, Dr. M Sekar, Prof. S Kayalvizhi, and Mrs. T M Navamani
CSI Communications | April 2014 | 52 www.csi-india.org
SPEAKER(S) TOPIC AND GISTEINSTEIN COLLEGE OF ENGINEERING, TIRUNELVELI (REGION-VII)Mr. M Murali, Mrs. Beena baskaran &
Mr. Khasim mohammed
14-15 February 2014: National level Workshop on “Advanced Cloud Computing on Research Project”
Mr. Murali & his team explained the application development of cloud
computing with various services. He also spoke about visual studio code
development in social network clouds. Various research aspects related to
cloud computing environment were also explored.
L to R: Prof. M Gomathynayagam, Dr. K Ramar, Prof. Ezhilvanan, Mr. Murali, Dr. R Velayutham, Mr. Khasim mohammed, and Mrs. Beena baskaran
ER.PERUMAL MANIMEKALAI COLLEGE OF ENGINEERING- HOSUR, TAMILNADU (REGION-VII)Dr. S Appan 3 February 2014: One-day Seminar on “Emerging Trends and opportunities
in Cloud Computing”
Dr. Appan gave inspiring speech on cloud computing and utility computing.
He also motivated students to enroll in certifi cation courses like oracle,
Cisco, PMI.
Dr. Appan addressing students
JEPPIAAR INSTITUTE OF TECHNOLOGY, CHENNAI (REGION-VII)Mr. Roy Arnold and Ms. Kalpana Balaraman 28 February 2014: National Level Technical Symposium “Techisetz’14”
Mr. Arnold and Ms. Balaraman from Infosys, ETA, gave a lot of useful inputs
to students for their better future and released Techisetz magazine which
contains technical articles from JIT students. More than 300 Students from
various Engineering colleges enthusiastically participated and won cash
prizes in 9 events.
L-R : Ms. Kalpana Balaraman, Mr. Roy Arnold and Dr. N Marie Wilson releasing the Techisetz’14 magazine
MALABAR COLLEGE OF ENGINEERING AND TECHNOLOGY, KERALA (REGION-VII)Dr. S Babusundar, Dr. R Vijaya Kumar, Dr. K A Navas,
Dr. B Kannan, Dr. A Sreekumar and Mr. Diljith
6-7 March 2014: National Conference “NCRACEE-2014” and work shop on
“Information Security”
Objective was to provide interdisciplinary forum to bring together engineers,
academicians, scientists, industry researchers and research scholars on
common platform to present, discuss and share their experience and
research innovations. Several tutorial sessions were organized where
experts discussed current trends in information technology and digital
communication. The workshop provided hands on training on information
security and hacking and it was informative. The technical fest was enriched
with many events like IT Quiz, Code Debugging, Web Designing etc.
Inaugura on Ceremony
OXFORD ENGINEERING COLLEGE, TRICHY (REGION-VII)Mr. B Santhosh, Dr. G Kumaravelan, Ms. R Sumathi,
Ms. N Shanmugapriya and Mr. P Sudhakaran
21 February 2014: One Day National Level Seminar on “Data Warehousing and Data Mining”
Mr. B Santhosh delivered lecture on “Introduction to Data Warehousing and
Data Mining”. Dr. G Kumaravelan delivered lecture on “Business Analysis,
Association Rule Mining and Classifi cation”. Ms. R Sumathi delivered the
lecture on “Clustering and Data mining Applications & Tools”.
L-R: Mrs. N Shanmugapriya, B Santhosh, P Sudhakaran, and Mr. C Selvakumar
CSI Communications | April 2014 | 53
Please send your student branch news to Education Director at [email protected]. News sent to any other email id will not be considered. Low-
resolution photos and news without gist will not be published. Please send only 1 photo per event, not more.
SPEAKER(S) TOPIC AND GISTVELAMMAL ENGINEERING COLLEGE, CHENNAI (REGION-VII)Dr. V Masilamani 17 March 2014: Guest Lecture on “NP-hard and NP-Complete problems”
Participants were given introduction about NP-hard problems. NP hard
problems are of three types viz, decision problems, search problems or
optimization problems. Moreover decision problem Pi is said to be NP-
complete if it is NP-hard and it is also in the class NP itself. NP-hard problems
are often tackled with rule-based languages, in the areas of Data mining,
Selection, Diagnosis; Process monitoring, Control and Scheduling.
Dr. Masilamani, Professor, IIITDM, distribu ng cer fi cates to the winners
Following new Student Branches Were Opened as Detailed Below –
REGION III Institute of Technology & Management Universe (ITMU), Vadodara
The inaugural ceremony of CSI Student Branch in Institute of Technology & Management Universe Vadodara was held on 10th September 2013. Dr. DB Choksi, Prof. Bhuvan Parikh & Mr. Pravin Jain were invited as guests of honor. Dr. K Baba Pai, Director ITMU welcomed all dignitaries & Dr. SK Vij gave introduction of all guests. It was followed by a Guest Lecture by Dr. D.B. Choksi on “Distributed Computing”.
CSI Communications | April 2014 | 54 www.csi-india.org
CSI Membership = 360° Knowledge
Your membership in CSI provides instant
access to key career / business building
resources - Knowledge, Networking,
Opportunities.
CSI provides you with 360° coverage for your Technology goals
Learn more at www.csi-india.org
WE INVITE YOU TO JOINComputer Society of India
India's largest technical
professional associationJoin usand
become a member
I am interested in the work of CSI . Please send me information on how to become an individual/institutional*
member
Name ______________________________________ Position held_______________________
Address______________________________________________________________________
______________________________________________________________________
City ____________Postal Code _____________
Telephone: _______________ Mobile:_______________ Fax:_______________ Email:_______________________
*[Delete whichever is not applicable]
Interested in joining CSI? Please send your details in the above format on the following email address. [email protected]
CSI Communications | April 2014 | 55
EXECUTIVE COMMITTEE
REGIONAL VICE PRESIDENTS
CSI Executive Committee 2013-2014/2015
Immd Past President (2014-15)
Prof. S. V Raghavan324 A, Maulana Azad Road,
Vigyan Bhavan Annexe,
New Delhi : 110011
Phone : (O) 011 23022115,
(F) 011 23022116
email : [email protected]
President (2014-15)
Mr. H R MohanAssociate Vice President (Systems)
The Hindu, 859 Anna Salai, Chennai - 600002
Phone : 044-28576411, (O) : 044-22313738(R)
(M)�: 98414 32179
email : [email protected]
Region-III (2013-15)
Prof. R P Soni (O) Campus Director (Computer Education)
GLS Institute of Computer Technology
Opp Law Garden, Ellisbridge, Ahmedabad 380006
R)61/343, Saraswatinagar, Ambawadi, Ahmedabad 380015
Phone : (R) 079-26746902
(M) : 093761 80747
email : [email protected]
Region-IV (2014-16)
Mr. Hari Shankar MishraCommand Care, Opp.
Loreto Convent School,
A.G. Offi ce Road,
Doranda, Ranchi – 834002, Jharkhand
Phone : 0651-2411318 (R)
Mobile : 9431361450
Email : [email protected]
Region-I (2013-15)
Mr. R K Vyas70, Sanskant Nagar Society,
Plot No.3, Sector-14, Rohini,
New Delhi: 110085
Phone: 011-27866259
(M) 91-9810592760
email: [email protected]
Region-II (2014-16)
Mr Devaprasanna Sinha73B Ekdalia Road,
Kolkata - 700 019
Phone : (033)24408849
Mobile : 91 9830129551
Email : devaprasannasinha@rediff mail.com
Hon. Treasurer (2013-15)
Mr. Ranga RajagopalAcenet Technologies India P. Ltd.
1084/4 Trichy Road, Sungam,
Coimbatore 641 018
(M) : 09442631004
email : ranga_gopal1@rediff mail.com
Vice President (2014-15)
Prof. Bipin V. MehtaDirector, School of Computer Studies,
Ahmedabad University,
AG Teachers College Campus,
Navrangpura,
Ahmedabad - 3800009
Email : [email protected]
Phone : (079)-2656-8750
Hon. Secretary (2014-16)
Mr. Sanjay MohapatraDuplex 26, Plot 1565 (p),
Sector-VI, CDA,
Cuttack-14, Orissa.
(M) : 91-9861010656
email: [email protected]
CSI Communications | April 2014 | 56 www.csi-india.org
REGIONAL VICE PRESIDENTS
DIVISION CHAIRPERSONS
Region-V (2013-15)
Mr. Raju L kanchibhotlaAashirvad, 42/260/1/2,
Shramik nagar,
Moulali Hyderabad-500046, India
(M) : 91 9000555202,
94 40 32914192
email : [email protected]
Region-VII (2013-14)
S P Soman Chief Executive Offi cer,Skiltek Computers (Pvt.) Ltd.,P. B. No. 4234, Kochi – 682 017, KeralaPhone : (0484) 2349494/233923391 (484) 2402527 / 2347473(M) : 098460 65365/98460 65765email : [email protected]
Region-VI (2014-16)
Dr. Shirish S. SaneDattaprasad, Plot No. 19,
Kulkarni Colony,
Sadhu Waswani Road, Nashik 422 002
Phone : 0253-2313607(R)
Mobile : 09890014942
Email : [email protected]
Division-I: (2013-15)
Prof. M N HodaDirector, BVICAM,
A-4, Paschim Vihar,
Rohtak Road,
New Delhi – 110063.
Phone: 011- 25275055
(M) : 09212022066
email : [email protected]
Division-II (2014-16)
Dr. R NadarajanProfessor and Head,
Department of Applied Mathematics and
Computational Sciences, PSG College of
Technology, Coimbatore - 641 004
Phone : (O) 2572177
Mobile : 9952427229
Email : [email protected]
Division-III: (2013-15)
Dr. A K Nayak Director, Indian Institute of
Business Management
BudhMarg, Patna-800 001
Phone : 0612 3269704/5(0),
0612 2538809(R)
Mobile : 09431018581
email : [email protected]
Division-IV (2014-16)
Dr. Durgesh Kumar MishraH-123-B, Vigyan Nagar,
Annapurna Road, Indore
Mobile : 9826047547
Email : [email protected]
Division-V: (2013-15)
Dr. Anirban BasuFlat #309, Ansal Forte, 16/2A Rupena
Agrahara, Hosur Road, Bangalore 560068
Phone : 080 25731706
(M) : 09448121434
email : [email protected]
CSI Calendar 2014
Prof. Bipin V Mehta
Vice President, CSI & Chairman, Conf. CommitteeEmail: [email protected]
Date Event Details & Organizers Contact Information
April 2014 events
8-9 Apr 2014 TITCON-2014: First International Conference on Trends in Technology for ConvergenceAt Salem. Organised by the CSI SB of AVS Engineering College, Salem
http://www.avsenggcollege.ac.in/titcon/
Dr. H Abdul Shabeer
10 Apr 2014 NCRTIT-14: 3rd National Conference on Recent Trends in Information TechnologyAt Chennai. Organised by Dept. of IT, B.S. Abdur Rahman University in association with CSI
Chennai& IEEE CS Madras http://ncrtit2014.weebly.com/
Dr. Latha TamitseIvan
11-13 Apr 2014 TAMC-2014: 11th Annual Conference on Theory and Applications of Models of Computation At Chennai, Organised by CSI Div II & Anna University
http://www.annauniv.edu/tamc2014/
Dr. T V Gopal
19 Apr 2014 SACTA-2014: 9th National Conference on "Smarter Approaches in Computing Technologies
& Applications.
At Ghaziabad. Organised by Institute of Technology & Science with CSI Div 1 and Region 1.
http://www.its.edu.in/IT/Conference/SACTA-2014.html
Dr. Rabins Porwal
24-25 Apr 2014 AOSMT-2014: 2nd National Seminar and Workshop on Advances in Open Source Mobile TechnologiesAt Ahmedabad. Organized by SIG-WNs, CSI Ahmedabad Chapter
http://www.sabareducation.org/conference/aosmt/
Dr. Dharm Singh
Dr. Nilesh Modi
Amit Joshi
May 2014 events
8-9 May 2014 ICASG 2014: International Conference on Architecture Software systems and Green computing 2014At Chennai. Organised by Dept. of CSE & IT, Aarupadai Veedu Inst. of Technology in association
with CSI Chennai & IEEE CS Madras
http://www.avit.ac.in/icasg2014.php
Mr. M Ramasubramaniam
17 May 2014 WTISD 2014:Broadband for Sustainable DevelopmentAt Udaipur. Organised by SIG-WNs- CSI and IEI ULC
Dr. Dharm Singh
31 May-7 Jun 2014 ICSE 2014: 36th International Conference on Software EngineeringAt Hyderabad. Organised by CSI SIGSE
http://2014.icse-conferences.org/
Sharon Neetal
June 2014 events
2–4 Jun 2014 IFIP Networking 2014 ConferenceAt Trondheim, Norway, http://networking2014.item.ntnu.no/
Prof. S V Raghavan
July 2014 events
4-5 Jul 2014 ICIS-14: International Conference on Information ScienceAt Cochin. Organized by the Dept. of CSE, College of Engineering Cherthala in association
with CSI Cochin Chapter & Div III, IV & V and sponsored by Technical Education Quality
Improvement Programme (TEQIP II).
http://www.iciscec.in/
Ms. Sony P
August 2014 events
8–9 Aug 2014 ICICSE: II International Conference on Innovations in Computer Science and EngineeringAt Hyderabad. Organized by Guru Nanak Institutions, Ibrahimpatnam, Hyderabad in
association with CSI Div IV
Dr. H S Saini
Dr. D D Sarma
20 Aug 2014 Workshop on "Ethernet LAN Construction using Crossover and Patch Cable"At Hyderabad. Organized by CSI SB and Dept. of IT, Nalla Malla Reddy Engineering College,
Hyderabad
Mr. K C Arun
December 2014 events
19-21 Dec 2014 EAIT-2014: Fourth International Conference on Emerging Applications of Information Technology At Kolkta. Organized by CSI Kolkata Chapter at Indian Statistical Institute, Kolkata
https://sites.google.com/site/csieait/ For paper ssubmission visit
https://cmt.research.microsoft.com/EAIT2014
Prof. Aditya Bagchi
Dr. Debasish Jana
Prof. Pinakpani Pal
Prof. R T Goswami, [email protected]
Registered with Registrar of News Papers for India - RNI 31668/78 If undelivered return to : Regd. No. MH/MR/N/222/MBI/12-14 Samruddhi Venture Park, Unit No.3, Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I 4th fl oor, MIDC, Andheri (E). Mumbai-400 093 Date of Publication: 10 & 11 every month