50/- · 2015. 2. 4. · microsoft streaminsight ramakrishnan iyer and radharaman mishra 16 indoor...

57
CSI Communications | April 2014 | 1 www.csi-india.org ISSN 0970-647X | Volume No. 38 | Issue No. 1 | April 2014 ` 50/- Cover Story The Internet of Things: Technologies, Communications and Computing 7 Technical Trends Human Gait- Using Biometric for Mobile Phone Security 22 CIO Perspective Transforming the Automotive Industry with Connected Cars 31 Technical Trends Building Intelligent Internet of Things Applications using Microsoft StreamInsight 13 Security Corner Security Aspects in Internet of Things Domain 36

Upload: others

Post on 17-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 1ww

w.c

si-i

nd

ia.o

rg

ISS

N 0

97

0-6

47

X |

Vo

lum

e N

o. 3

8 |

Iss

ue

No

. 1 |

Ap

ril

20

14`

50

/-

Cover StoryThe Internet of Things: Technologies, Communications and Computing 7

Technical TrendsHuman Gait- Using Biometric for Mobile Phone Security 22CIO PerspectiveTransforming the Automotive Industry with Connected Cars 31

Technical TrendsBuilding Intelligent Internet of Things Applications using Microsoft StreamInsight 13

ySecurity CornerSecurity Aspects in Internet of Things Domain 36

Page 2: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

Happenings@ICT H R Mohan

President, CSI, AVP (Systems), The Hindu, ChennaiEmail: [email protected]

ICT News Briefs in March 2014The following are the ICT news and headlines

of interest in March 2014. They have been

compiled from various news & Internet sources

including the dailies – The Hindu, Business Line,

and Economic Times.

Voices & Views • Indian Healthcare industry to spend

$1.08 billion on IT products and services

in 2014 – Gartner.

• The engineering services outsourcing

currently stands at about $10 billion will

further expand with increased adoption of

3D printing – CEO, Mindtree.

• The global 3D printing industry to reach

$10.8 billion from the current $2 billion by

2012. – Wohlers Associates

• National Skill Development Corporation

has provided skills training to 13,49,742

people in its fi rst three years of operations.

It has also created a capacity to train

7.5 crore people over the next 10 years –

S Ramadorai, Chairman, NSDC.

• Telcos are natural partners for Facebook’s

initiative of internet.org, a global

partnership with the goal of making

Internet access available to the next

5 billion people – Director, Facebook

• India’s e-commerce to go up from

$1 billion to $76 billion by 2020. In 2013

alone, online shopping has increased

by 88%

• The media and entertainment industry

grew by around 12% in 2013 – FICCI-

KPMG report.

• ‘We don’t really see a slowdown in the IT

market’. ‘Internet of Things’ is the next big

thing to happen – Founder & Chairman,

Persistent Systems.

• ‘Our technology can pack more in same

spectrum’ – Ashish Chowdhary, EVP/

President, Nokia Solutions and Networks.

• MOOCs are surely the way forward for

India which faces the shortage of good

faculty. They are the great democratiser.

Anyone can register and take courses, as

there is no application process, and no

costs – Anant Agarwal, President, edX.

• Hardware sector is a ‘victim’ industry.

It has become far weaker than it was in

1970s, at least in relation to the global

industry – R Chandrashekhar, President,

Nasscom.

• There are four types of applications that

defi ne a connected vehicle - infotainment/

media, advanced telematics, vehicle-to-X

communications and autonomous driving

capabilities – Forrester research on

connected cars.

• Indian companies represent 3% of the

global IT and BPO outsourcing market.

• Intel forecasts that 40 million tablets

would be sold worldwide next year.

• The topline of many IT companies will grow in the 15-18% range in 2014 – higher than Nasscom’s 13-15% growth projections – Analysts.

• With a stagnant $32-billion domestic

market contribution, the size of the IT-

BPO industry would grow to $118 billion in

2013-14 from $108 billion in 2013. Social,

mobility, cloud chip in 5-10% of IT fi rms’

income – Nasscom. • Indian IT laws ‘ill-suited’ for social

media. Reforms could see Net platforms

contributing Rs. 2.5 lakh cr to economy by

2015 – GNI Report.

• Mobile data use zooms 87% riding the 3G

wave. Data usage has gone up from about

26 petabytes (PB) a month in 2012 to

50 petabytes in 2013 – MBit Index study. • Out sourcing destinations: India is the

clear global leader by revenue, while

China is the most serious challenger

by scale – a study of nine Asia-Pacifi c (APAC) countries.

• Digital marketing is the new frontier for IT

sector – Nasscom.

Govt, Policy, Telecom, Compliance • DOT panel wants penalties for violation

by telcos as per gravity of the off ence with a fi ne of Rs. 1 lakh for a warning, Rs. 1 crore for a minor breach, Rs. 5 crore for moderate, Rs. 20 crore for major and Rs. 50 crore for severe off ences.

• Mobile phone production sees drastic decline due to Govt. regulations and taxation rules.

• BSNL has the largest fi xed-line infrastructure in the country, with a network of over 600,000 route kilometres of optical fi bre cable. It’s optical fi bre network may be hived off into a new unit.

• Chinese state fi rms ‘not blocking’ Indian IT companies – Vice-Minister for Industry and Information Technology.

• India ready to join the 4G club; voice-over-LTE is Achilles Heel.

• By 2017, India to have 67 million LTE (4G) subscribers – Broadcom.

• Competition panel clears Lenovo’s acquisition of IBM server business.

• M-Pesa, an alternative to credit/debit card – Vodafone.

• Walden’s semiconductor fund plan hits a roadblock, with the Planning Commission yet to approve the project.

IT Manpower, Staffi ng & Top Moves • IT companies planning to hire people from

the IIIT-Hyderabad will have to pay a fee of 8% (of the annual package a candidate gets) will get a chance to pick the best.

• A non-engineering science graduate can

aspire for a monthly stipend of Rs. 11,500

during the fi rst year of service in Wipro

and an MS degree at the end of the fourth

year under the company’s ‘earn while you

learn’ programme.

• Nandan Nilekani, the former head of UIDAI

to contest in the Lok Sabha elections 2014

from Bangalore South constituency.

• Vodafone to off er 9% average salary hike

this year.

• Nasdaq-listed Syntel has about 80% of

its global workforce of 23,652 (as of Dec

2013) employed across its 12 development

centres in India.

• Nokia hints at job cuts in Chennai unit.

Company News: Tie-ups, Joint Ventures, New Initiatives • Karbonn mobiles is developing a

smartphone that can accommodate both

Android and Windows operating systems.

• LG India bets big on mobile, fl at panel

TVs to drive growth. Plans to invest

Rs. 800 crore this year on R&D,

production and marketing.

• At $19 billion, Facebook valued each of

WhatsApp’s current 450 million users at

roughly $400.

• Mobile video ad fi rm Vdopia eyes overseas

expansion. Almost 7 out of 10 Internet

users in India watch online videos.

• Australian National University has even

created the fi rst ever Hindi MOOC, a 10-

week course, called ‘Engaging India’ which

will start on April 29.

• Veeble Softtech, developes a new app

– LocoMapia (LM) – a real time location

sharing mobile app that works even

without GPS.

• TNQ Books introduces browser-based

proofi ng technology replacing the

traditional PDF-based proofi ng.

• India Post which has 1,39,086 post offi ces

in its network is open to e-commerce

prospects.

• Mobiado, luxury mobile brand, set to

enter India with handsets priced between

Rs. 2.6 lakh and Rs. 20 lakh.

• IIT Bombay students working on a data

analysis app for AAP.

• Microsoft woos small enterprises with

Azure cloud platform. Announces its

hardware trade-in scheme.

• Airtel’s Rs. 200-cr venture capital fund

fi nds no takers.

• SAP Labs India opens its projects to

employees as crowdsourcing model

across its R&D centres who can work on

them depending on their level of interests.

n

Page 3: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 3

ContentsVolume No. 38 • Issue No. 1 • April 2014

CSI Communications

Please note:

CSI Communications is published by Computer

Society of India, a non-profi t organization.

Views and opinions expressed in the CSI

Communications are those of individual authors,

contributors and advertisers and they may

diff er from policies and offi cial statements of

CSI. These should not be construed as legal or

professional advice. The CSI, the publisher, the

editors and the contributors are not responsible

for any decisions taken by readers on the basis of

these views and opinions.

Although every care is being taken to ensure

genuineness of the writings in this publication,

CSI Communications does not attest to the

originality of the respective authors’ content.

© 2012 CSI. All rights reserved.

Instructors are permitted to photocopy isolated

articles for non-commercial classroom use

without fee. For any other copying, reprint or

republication, permission must be obtained

in writing from the Society. Copying for other

than personal use or internal reference, or of

articles or columns not owned by the Society

without explicit permission of the Society or the

copyright owner is strictly prohibited.

Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093.

Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Printed at GP Off set Pvt. Ltd., Mumbai 400 059.

Editorial Board

Chief EditorDr. R M Sonar

EditorsDr. Debasish Jana

Dr. Achuthsankar Nair

Resident EditorMrs. Jayshree Dhere

Published byExecutive Secretary

Mr. Suchit Gogwekar

For Computer Society of India

Design, Print and Dispatch byCyberMedia Services Limited

PLUSBrain TeaserDr. Debasish Jana

40

Ask an ExpertDr. Debasish Jana

41

CSI Reports 42

CSI News 44

Cover Story

7 The Internet of Things: Technologies,

Communications and Computing

Tadrash Shah and Chintan M Bhatt

10 Origin and Applications of

Internet of Things

Dr. Murugavalli Subramaniam and B Ganesh

11 Internet of Things: A Birds Eye View

Mr. Sarwesh P, Dr. N S V Shet and Dr. K Chandrasekaran

Technical Trends

13 Building Intelligent Internet of

Things Applications using

Microsoft StreamInsight

Ramakrishnan Iyer and Radharaman Mishra

16 Indoor Positioning System (IPS)

using Beacons

Venkatesh Babu and Ashok Yalamanchili

19 The Need to use ‘Near-Source’ Processing

in Internet-of-Things Solutions

Bipin Patwardhan

22 Human Gait- Using Biometric for

Mobile Phone Security

Kamal Sharma

Research Front

25 Resource Allocation Algorithm to Improve

the Quality-of-Service in OFDMA System

R L Ujjwal, Prof. C S Rai and Prof. Nupur Prakash

Article

28 Cellular Automata Dr. Rupali Bhardwaj

Practitioner Workbench

29 Programming.Tips() » Fun with ‘C’ Programs

Wallace Jacob

30 Programming.Learn(“R”) » Packages in R

Umesh P and Silpa Bhaskaran

CIO Perspective

3 1 Transforming the Automotive

Industry with Connected Cars

Madhusudhan Reddy Nukala, Shreyas Bhargave and Bipin Patwardhan

Security Corner

33 Information Security »

Security Features in Contemporary

Browsers and Tips for Safe Browsing

Krishna Chaitanya Telikicherla, Harigopal K B Ponnapalli and Dr. Ashutosh Saxena

36 Information Security »

Security Aspects in Internet of

Things Domain

Tapalina Bhattasali, Dr. Rituparna Chaki and Dr. Nabendu Chaki

Page 4: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 4 www.csi-india.org

Important Contact Details »For queries, correspondence regarding Membership, contact [email protected]

Know Your CSI

Executive Committee (2013-14/15) »President Vice-President Hon. SecretaryMr. H R Mohan Prof. Bipin V Mehta Mr. Sanjay [email protected] [email protected] [email protected]

Hon. Treasurer Immd. Past PresidentMr. Ranga Rajagopal Prof. S V [email protected] [email protected]

Nomination Committee (2014-2015)

Prof. P. Kalyanaraman Mr. Sanjeev Kumar Mr. Subimal Kundu

Regional Vice-PresidentsRegion - I Region - II Region - III Region - IVMr. R K Vyas Mr. Devaprasanna Sinha Prof. R P Soni Mr. Hari Shankar Mishra Delhi, Punjab, Haryana, Himachal Assam, Bihar, West Bengal, Gujarat, Madhya Pradesh, Jharkhand, Chattisgarh,

Pradesh, Jammu & Kashmir, North Eastern States Rajasthan and other areas Orissa and other areas in

Uttar Pradesh, Uttaranchal and and other areas in in Western India Central & South

other areas in Northern India. East & North East India [email protected] Eastern India

[email protected] [email protected] [email protected]

Region - V Region - VI Region - VII Mr. Raju L kanchibhotla Dr. Shirish S Sane Mr. S P Soman Karnataka and Andhra Pradesh Maharashtra and Goa Tamil Nadu, Pondicherry,

[email protected] [email protected] Andaman and Nicobar,

Kerala, Lakshadweep

[email protected]

Division ChairpersonsDivision-I : Hardware (2013-15) Division-II : Software (2014-16) Division-III : Applications (2013-15) Prof. M N Hoda Dr. R Nadarajan Dr. A K Nayak [email protected] [email protected] [email protected]

Division-IV : Communications Division-V : Education and Research (2014-16) (2013-15)

Dr. Durgesh Kumar Mishra Dr. Anirban Basu [email protected] [email protected]

Important links on CSI website »About CSI http://www.csi-india.org/about-csiStructure and Orgnisation http://www.csi-india.org/web/guest/structureandorganisationExecutive Committee http://www.csi-india.org/executive-committeeNomination Committee http://www.csi-india.org/web/guest/nominations-committeeStatutory Committees http://www.csi-india.org/web/guest/statutory-committeesWho's Who http://www.csi-india.org/web/guest/who-s-whoCSI Fellows http://www.csi-india.org/web/guest/csi-fellowsNational, Regional & State http://www.csi-india.org/web/guest/104Student Coordinators Collaborations http://www.csi-india.org/web/guest/collaborationsDistinguished Speakers http://www.csi-india.org/distinguished-speakersDivisions http://www.csi-india.org/web/guest/divisionsRegions http://www.csi-india.org/web/guest/regions1Chapters http://www.csi-india.org/web/guest/chaptersPolicy Guidelines http://www.csi-india.org/web/guest/policy-guidelinesStudent Branches http://www.csi-india.org/web/guest/student-branchesMembership Services http://www.csi-india.org/web/guest/membership-serviceUpcoming Events http://www.csi-india.org/web/guest/upcoming-eventsPublications http://www.csi-india.org/web/guest/publicationsStudent's Corner http://www.csi-india.org/web/education-directorate/student-s-cornerCSI Awards http://www.csi-india.org/web/guest/csi-awardsCSI Certifi cation http://www.csi-india.org/web/guest/csi-certifi cationUpcoming Webinars http://www.csi-india.org/web/guest/upcoming-webinarsAbout Membership http://www.csi-india.org/web/guest/about-membershipWhy Join CSI http://www.csi-india.org/why-join-csiMembership Benefi ts http://www.csi-india.org/membership-benefi tsBABA Scheme http://www.csi-india.org/membership-schemes-baba-schemeSpecial Interest Groups http://www.csi-india.org/special-interest-groups

Membership Subscription Fees http://www.csi-india.org/fee-structureMembership and Grades http://www.csi-india.org/web/guest/174Institutional Membership http://www.csi-india.org /web/guest/institiutional-

membershipBecome a member http://www.csi-india.org/web/guest/become-a-memberUpgrading and Renewing Membership http://www.csi-india.org/web/guest/183Download Forms http://www.csi-india.org/web/guest/downloadformsMembership Eligibility http://www.csi-india.org/web/guest/membership-eligibilityCode of Ethics http://www.csi-india.org/web/guest/code-of-ethicsFrom the President Desk http://www.csi-india.org/web/guest/president-s-deskCSI Communications (PDF Version) http://www.csi-india.org/web/guest/csi-communicationsCSI Communications (HTML Version) http://www.csi-india.org/web/guest/csi-communications-

html-versionCSI Journal of Computing http://www.csi-india.org/web/guest/journalCSI eNewsletter http://www.csi-india.org/web/guest/enewsletterCSIC Chapters SBs News http://www.csi-india.org/csic-chapters-sbs-newsEducation Directorate http://www.csi-india.org/web/education-directorate/homeNational Students Coordinator http://www.csi- india .org /web/national-students-

coordinators/homeAwards and Honors http://www.csi-india.org/web/guest/251eGovernance Awards http://www.csi-india.org/web/guest/e-governanceawardsIT Excellence Awards http://www.csi-india.org/web/guest/csiitexcellenceawardsYITP Awards http://www.csi-india.org/web/guest/csiyitp-awardsCSI Service Awards http://www.csi-india.org/web/guest/csi-service-awardsAcademic Excellence Awards http://www.csi-india.org/web/guest/academic-excellence-

awardsContact us http://www.csi-india.org/web/guest/contact-us

Page 5: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 5

At the outset, let me thank you all for providing me a great

opportunity to serve as the President of the Computer Society of

India at the time the society is in its Golden Jubilee period. For me,

it has been a long journey from being a student member during my

studies at IIT Madras way back in 1973. In fact, I literally grew with CSI

throughout my career in the fi eld of Information Technology.

While I have been in touch with you through various columns of

the CSI Communications over the last several years, from this month

onwards, I will be sharing my views and interacting with you through

this exclusive column – President’s Desk.

I had the rare opportunity of being directly mentored by a

number of past presidents of CSI, several of whom hail from Chennai.

These include Major General A. Balasubrahmanian, Prof. S. Sampath,

Prof. H. N. Mahabala, Prof. C.R. Muthukrishnan, Mr. S. Mahalingam

and the immediate past president Prof. S.V. Raghavan. My association

with CSI for a little over 40 years as a member and 30 years in

various capacities, with the Chennai chapter and at the national

level, had provided me with excellent volunteering and networking

opportunities. It also provided me with a chance to interact with

eminent academicians, industrialists, professionals, and government

offi cials across the country who had served in various roles and

nurtured the growth of CSI. Let me also state that I may be one of

the very few who had the opportunity to work with 13 out of 27 past

presidents of CSI directly and two more indirectly – a rare opportunity

to learn from their expertise and management style in creating

opportunities, mentoring & supporting young talents, strategizing

and handling tasks, organizing events, and building relations. All of

these had given me the strength and adequate confi dence to carry out

my responsibilities as your president this year. With the continued

support and guidance from them along with the volunteering spirit

and cooperation of my executive committee members, the chairs of

the CSI chapters, student branch councilors & coordinators across the

country, and the staff at the CSI HQ and CSI Education Directorate, I

hope to steer the CSI ship to new lands and ensure a safe & enjoyable

journey. I look forward to serving a heterogeneous group of members,

numbering over one lakh in this Golden Jubilee period.

As you are aware, the role of CSI and its mode to serve its

members have changed signifi cantly over the years and so have the

expectations of the members. The majority of our current members

is from academia and constitutes a young student community who

would require mentoring, guidance, support, and skill development

during their academic period and, opportunities for their entry into job

market and in establishing their entrepreneurship ventures. A small

proportion of professional members look forward to inputs and updates

in the fast developing world of Information and Communication

Technologies to sustain, excel and grow in their current position.

Another segment of our members who have superannuated from

their service should be engaged productively. This means, CSI has to

adopt diversifi ed strategies to achieve these varying expectations. I

seek valuable inputs and suggestions from all of you in this regard.

Our strength has been in organizing technical meetings,

seminars, workshops, conferences, conventions in all areas of ICT and

creating awareness, updating on the emerging trends and opening

research opportunities. However, the advent of the Internet and its

vast information sharing capabilities propel us to go beyond. The

consumerisation of IT and penetration of mobile technology have

changed the way businesses are started, run, managed and expanded.

We need to focus our attention in these aspects and give our members

a share in the global opportunity.

CSI has several MOUs and established associations with

organisations such as CDAC, SETS, ISACA, PMI, Media Lab Asia,

international societies such as IFIP, IEEE & IEEE CS, SEARCC, BCS,

SCS and national associations such as NASSCOM, MAIT, CII, FICCI

and government agencies such as DEITY, STPIs, State IT Depts.

DST, DOT, AICTE, UGC to name a few. We need to fully utilize these

collaborations so our members receive utmost benefi ts.

As the chair of Conference Committee during 2013-14,

I am happy to inform that the year has been eventful. A list of

activities held by the CSI is being complied and presented at

http://goo.gl/EnUqXE. A signifi cant milestone is the commissioning

of the student portal at http://studentportal.csidiscoverthinking.com/,

which we expect to grow and be used by a large section of our

members. The month of March 2014 has been extremely busy

with a number of activities including several conferences, student

conventions, programming contest, Alan Turing quiz contest, YITP

awards etc. The RVPs, division chairs, national student coordinator

supported by a team of state student coordinators, and awards

committee all deserve a sincere appreciation.

I would like to place on record the excellent work done by the

outgoing team led by Prof. S.V. Raghavan for providing us the directions

to move forward.

I welcome my new executive committee members. Mr. Bipin

Mehta and Mr. Sanjay Mohapatra are joining as Vice President and

Hon. Secretary respectively. Mr. Ranga Rajagopal continues as the

Treasurer, working hard to balance the accounts and sensitizing the

chapters with the compliance aspects in the context of Govt. rules and

regulations. Mr. S. Ramanathan, steps out as the Hon. Secretary after

steering the administration of CSI for two years. Prof. S.V. Raghavan

will be with us as the immediate past president and chair the awards

and academic committees.

There are several new initiatives being planned during this

Golden Jubilee period. The new executive committee in its fi rst

meeting will deliberate, brainstorm, and determine an action plan

and share it with you to seek your support in executing them. In this

process, we would like to have your involvement in a proactive way

right from the planning stage to execution of plans as volunteers. Let

us work together collaboratively for the growth of CSI and its mission

to be of service to the masses.

With regards

H R MohanPresidentComputer Society of India

President’s Message H R Mohan

From : President’s Desk:: [email protected] : President's MessageDate : 1st April, 2014

Dear Members

Page 6: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 6 www.csi-india.org

EditorialRajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree Dhere

Editors

Most of us can not imagine our world without the Internet. The Internet

is becoming more and more accessible, ubiquitous and cost-eff ective

to communicate without worrying about geographic boundaries and

underlying technologies. Billions of people are connected through

the Internet. Physically they can be at any place on earth and still

remain connected virtually. However, such interactions are no more

limited amongst only human beings. Sensors and embedded systems

are making living and non-living objects (anything in fact!) express,

talk, think, react, interact and communicate amongst themselves.

Although it sounds like science fi ction, it is already happening now.

People can monitor growth of their plants/crops sitting anywhere in

the world. One thing is talking to another – e.g. a water tank telling

water pump when to stop and start pumping water based on sensors

that monitor water level and communicate the same to sensors which

operate the water pump. Billions of such objects can talk to each other

over the internet the way human beings do and that is what makes the

Internet of things. We bring this issue with cover theme as ‘Internet

of Things (IoT)’ to let you all know about happenings, technologies,

applications, current trends and issues around IoT. Since such a topic

is more applied in nature, we received good response from industry.

We start our cover story with The Internet of Things: Technologies, Communications and Computing by Tadrash Shah, Master student,

State University of New York and and Chintan M Bhatt, Asst. Professor,

CE Dept., Chandubhai S. Patel Institute of Technology. They mention

about 6 As of IoT: Anything, Anytime, Anyone, Any place, Any services

and Any network. The article covers genesis, historical evidence,

current trend and concerns. The second article is on Origin and Applications of Internet of Things by Dr. Murugavalli Subramaniam

and B Ganesh, CSE, Panimalar Engineering College, Chennai. They

write about industry and social applications and suggest applications

in various domains such as: medical, public distribution system, traffi c

regularization and for physically challenged persons. The third article

takes a Birds Eye View on IoT, it is by Mr. Sarwesh P, Dr. N S V Shet

and Dr. K Chandrasekaran of NITK, Surathkal, Karnataka, introducing

the readers to the notion, evolution, working processes, challenges

and applications of IoT.

In Technical Trend section, we have four articles. The fi rst three

are from iGATE professionals. First one titled: Building Intelligent Internet of Things Applications using Microsoft StreamInsight by

Ramakrishnan Iyer and Radharaman Mishra of Research & Innovation

Tech CoE Group of iGate Global Solutions. They illustrate iGATE’s

iStreamAnalytics Solution based on StreamInsight. The second article

is by Venkatesh Babu and Ashok Yalamanchili, Technology CoEs in

R&I group on Indoor Positioning System (IPS) using Beacons. The

third one is written by Bipin Patwardhan of Research & Innovation,

iGATE on the Need to use 'Near-Source' processing in IoT Solutions.

The last interesting article in the section is by Kamal Sharma titled:

Human Gait- Using Biometric for Mobile Phone Security, covering

how gait (pattern of limb movements while using devices!) can be

eff ectively used for security as every individual has unique gait, which

cannot be copied or imitated.

In research front section, we have one article by R L Ujjwal, Prof. C S Rai,

University School of Information and Communicaton Technologyand

Prof. Nupur Prakash, VC, Indira Gandhi Delhi Technological University

for Women titled: Resource Allocation Algorithm to Improve the Quality-of-Service in OFDMA System. They propose an algorithm and

results of the algorithm indicate that optimum allocation of resources

under OFDMA (Orthogonal Frequency Division Multiple in Access)

system could be achieved to improve quality of service (which includes

parameters like data transfer rate, signal to noise ratio and bit error

rate). In Article section, we have an article by Dr. Rupali Bhardwaj,

Assistant Professor, Thapar University, Patiala on Cellular Automata.

In our section named Practitioner Workbench we have articles

from our regular contributors. Article in Programming.Tips() is by

Wallace Jacob, Sr. Asst. Prof. at Tolani Maritime Institute covering

Fun with C Programs and under Programming.Learn(“R”) we have

continued series on “R” by Umesh P and Silpa Bhaskaran Department

of Computational Biology and Bioinformatics, University of Kerala

writing on Packages in R.

In CIO section, under Managing Technology we have industry experts:

Madhusudhan Reddy Nukala, Shreyas Bhargave and Bipin Patwardhan

of iGATE talking about Transforming the Automotive Industry with Connected Cars–An Internet of Things Perspective.

In Security Corner column’s Information Security section we are

concluding the series of web application security articles with an

article on Security Features in Comtemporary Browsers, which also

provides Tips for Safe Browsing. This is the tenth article by Krishna

Chaitanya Telikicherla, Harigopal K B Ponnapalli and Dr. Ashutosh

Saxena of Infosys and the series ends with this article. Next article

under Information Security is about Security Aspects of IoT Domain

by Tapalina Bhattasali, Dr. Rituparna Chaki and Dr. Nabendu Chaki

of University of Calcutta covering technical aspects, security issues

and requirements.

In other regular sections, we have Dr. Debasish Jana’s (Editor, CSI

Communications) crossword to test readers’ knowledge on IoT and

he is answering the readers’ questions in Ask an Expert section. Mr. H

R Mohan, President, CSI, AVP (Systems), The Hindu, Chennai brings

the readers Happenings@ICT in March 14.

As usual there are features such as CSI Reports and CSI News.

Please note that we welcome your feedback and suggestions at

[email protected]

With warm regards,

Rajendra M Sonar, Achuthsankar S Nair,

Debasish Jana and Jayshree Dhere

Editors

Dear Fellow CSI Members,

Sensors and embedded systems are making living and non-living objects (anything in fact!) express, talk, think, react, interact and communicate amongst themselves. Although it sounds like science fi ction, it is already happening now. People can monitor growth of their plants/crops sitting anywhere in the world. One thing is talking to another – e.g. a water tank telling water pump when to stop and start pumping water based on sensors that monitor water level and communicate the same to sensors which operate the water pump.

Page 7: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 7

At a very generic level of understanding

we can say that Internet of Things (IoT)

is a global network infrastructure where

in the physical and virtual objects are

all made equipped with data capture

and communication capabilities so that

they can use the ubiquitous internet

to transmit data and other controlling

purposes. This defi nition may seem rather

dubious at the fi rst read. The inferences

and the implications of the defi nition will

be clearer as we move forward with the

content of this article.

The time to dream is over and now

is the time to get up and set to work

towards realization of what was dreamt

decades back. The physical objects of the

world will be seamlessly integrated into

information network. The integration may

be various purposes like – data capture,

monitoring and controlling among many

others. Wireless links must spread beyond

smart phones, PCs and Tablets.

Since the existence, the planet

itself – be it nature, humans or physical

objects, has been generating enormous

amount of data and we have just lost it.

We have not been able to hear or capture

the data, but now IoT seems to fulfi ll its

promise. Also, with the parallel growth

of the cloud technologies, the data can

be accessed, manipulated and controlled

from anywhere. To put this simply = “IoT

is a scenario in which objects, animals or

people are provided with unique identifi ers

and the ability to automatically transfer

the data over a network without requiring

human-to-human or human-to-computer

interaction[2].”

Hence, we can say the IoT to be the

convergence of following technologies –

1. Wireless and Bluetooth – QoS,

latency and security

2. Microsystems, Sensors and Actuators &

miniaturization of the same.

3. Cloud technologies – security,

privacy,

4. Networks – Ipv6, lower latencies,

security

6 A connectivity is there in IoT:

Anything, Anytime, Anyone, Any place,

Any services, Any network

Genesis To map these physical devices to the

information network, they must be made

uniquely identifi able by some way. In

today’s scenario the network devices in

the internet of the intranet are addressable

by the IP (IPv4 and IPv6) or the URI. But in

the view of Semantic Web, there are more

technologies evolving which could be

used, infect a few of them are already put

to test, like RFID. RFID tagging has been

demonstrated in various parts of the world

successfully.

Internet of Things Consortium[4] mentions

4 principles for IoT –

1. Value –Make consumers live more

effi cient, safer and seamless.

2. Data – help consumers understand

the benefi ts and value of their data.

3. Security – build consumer confi dence

around IoT experiences

4. Design–delight consumers with

intuitive design and usability.

Cisco puts it the best way – calling it

“Internet of Everything”.

Historical Evidence The systems got the name IoT lately,

but they have been in existence since

quite long. In 1980 at Carnegie Mellon

University there was this Internet

Appliance Coke machine such that

programmers can connect to the

machine and determine whether or

not there would be a cold drink in the

machine to vend or not and whether they

should make a trip down to machine.

Post that, actual roots of IoT can be

traced back to the MIT from the work

of Auto-Center. In 1999, this group was

working in domain of networked RFID and

other sensing technologies. Together with

seven other research universities from

4 diff erent continents were chosen to

design architecture for IoT.

There are various IoT Software

Development Kit that are available, few

of them under open source, to be used

for programming of the devices. One of

them can be found at http://developer.

peoplepowerco.com. Giants like Intel

and ARM are too in the market with

IoT development kits namely Galileo

Development Kit (http://www.intel.com/

content/www/us/en/do-it-yourself/

galileo-maker-quark-board.html) for IoT

and MBed (http://mbed.org/).

Trend In today’s scenario, where IT companies

want to stay, rather need to stay,

competitive by adopting new and

innovative technologies – not just using

them but also developing them – IoT opens

up a whole new world of possibilities.

Wall Street Journal puts it the best

– “…a long-awaited trend that is causing a

surge of optimism in the tech sector…”

Business Insider (BI) stated in the

latest March 14, 2014 report the numbers

forecast for IoT, “1.9 billion devices today,

and 9 billion by 2018, according to BII

(Business Insider Intelligence) estimates,

roughly equal to the number of smart

phones, smart TVs, tablets, wearable

computers and PC combined[1]”. Now

that is huge! This makes to believe the

forecast myth that potentially every

tangible item, animate and inanimate,

shall be connected to the internet in near

future. This has been penetrating the

consumer and business lives.

Thomas Lee, a Stanford university

professor of Electrical Engineering and co-

founder of Ayla Networks Inc. says that

“The value of the devices will be secondary

to the services they enable”. Which seems

so true and bears the promise of IoT as a

coming era of change?

So far, the smart-home products

(a few them listed in the applications

section of this article) seem mainly to be

attracting technology enthusiasts.

Yet another point to be noted is

that, due to the smart phone proliferation

across of segments of society, the IoT

can be realized deep and wide. Hopefully,

the market will be fl ooded with so many

products, few of which extensively

customizable, that users can pick the one

that suit their needs the best.

Applications 1. Fish aquarium is made to be

connected to Raspberry Pi which is

The Internet of Things: Technologies, Communications and Computing

Cover Story

Tadrash Shah* and Chintan M Bhatt***Master student, State University of New York**Asst. Professor, CE dept., Chandubhai S. Patel Institute of Technology, CHARUSAT

Page 8: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 8 www.csi-india.org

further connected to a temperature

sensor and actuator. With the help of

Pi, the thermometer delivers the real-

time temperature to any computer

which queries for it on local network.

This temperature can be controlled

from this computer.

2. Smart Dust –a device made up of tiny

sensors that are capable of wireless

communication and RFID which can

be deployed over a region to record

data for metrological, geophysical

and planetary research. The dust

in fi elds can be used to monitor the

crops, dust In factories can monitor

the output of machines, and dust in

human body to monitor the entire

state of well being.

3. Much awaited and market fl ooded

with a couple of wonderful products

is the Home Automation. The fantasy

becomes the reality. ONIDA launched

an air-conditioner with a remote that

accepts the SMS sent to it and turns

on the AC at the desired temperature

so that by the time you are home, the

home is all cozy for you. There are

video surveillance products which

can be installed in your house and

you can monitor your house, in real-

time as well as recorded data on

cloud, when you are on a tour. These

systems can also intimate you any

suspicious activities by email or SMS

or a call.

4. Another concept -Smart Garden.

Each plant in your garden can be

equipped with a RFID tag so that

remotely you can decide whether

you need to water them more,

fertilize them or transfer them to a

sunnier spot.

Figure: Smart Garden [5]

5. Companies like Silver Spring

Networks sell the wireless meters to

manage the energy usage.

6. GE uses the data generated by the

sensors to monitor the health of Jet

engines and gas turbines.

7. Another example of smart cards can

be – where insurance companies

can respond to sensors and wireless

connections on the cars to charge

drivers by the mile and speed they

drive instead of where they live.

8. The following fi gure shows a clip-on

wireless and Bluetooth clip-on device

on dog’s collar that tracks the dog

activity levels on your Smartphone

(Price $129.95).

Figure: Whistle Dog Collar [7]

Figure: Insider Intelligence[1]

Figure: The Internet of Things - How the Next Evolu on of the Internet (CISCO)[3]

Page 9: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 9

9. A wearable baby monitor that sends

the data about baby’s vital signs to

the users’ smart phones. (Developed

by : Sproutling)

Figure: Wearable baby monitor[8]

10. Apple Smart Body Analyzer–An

another mind-boggling Apple

product that is lesser known, which

measures the air quality in your

room, your heart-rate, weight and

other body compositions which

are then uploaded to the cloud or

Bluetooth over all your Apple devices.

The HealthMate App uses this data

to coach you about changing your

lifestyle, setting weight goals, and

other weekly achievable targets.

11. Washing machines turning on only

when the energy demand on the grid

is minimum as controlled from your

smart phone.

12. A car will automatically call an

emergency service sending its

location and other important data

after an accident. Hence, apart from

being saved by the SRS airbags the

emergency help is also called for you

after an accident.

13. Animals and birds can be tagged with

RFID and their migration, behavior

patterns and other data can be

captured and analyzed for a better

study. This has been found successful

and implemented successfully. A

couple of these technologies are

mature and well standardized in

some domains.

14. BigBelly is a solar-powered trash

receptacle and trash compactor that

alerts sanitation crews when it is full.

Having listed a dozen of applications of

IoT, few of which at conceptual level and

others already in the market. World’s top

10 innovative companies in IoT and their

products can be read about at http://goo.

gl/zs6WND. Also http://iotlist.co/ lists

all the mind-boggling IoT products if you

wish to discover more. Yet another list is

at http://goo.gl/838dsg.

Concerns Data privacy, data integrity and data

sovereignty - A common consensus needs

to be reached where-in how and who

should exploit the data that has been

captured by these IoT devices.

Another concern at the hardware level

is that various manufacturers may design

and produce several diff erent devices.

The consensus needs to be reached here

too for defi ning the conventions that tell

these manufactures what to do and how

to work together. Apple has been so far

successful in allowing wonderful and

seamless communication across various

other and heterogeneous Apple devices,

but we need to break those bounds and

make a reference model that is platform

independent and also cross-proprietary

enabled.

There is this term in US called that we

bumped into – “Big Brother”. These terms

is referred to the Federal Government

that uses your data from myriad sources

for your monitoring. Example, thermal

imaging of private homes for marijuana

lamps, phone and internet data from

private companies to ensure no individual

is breaking law, and much more. Any

human in USA is under constant

surveillance of Federal government. This

surveillance is termed as “Big Brother”.

They say that Big Brother is getting bigger

these days with IoT. Any car equipped as a

smart-car monitors all your where-about,

web surveillance is getting thicker in name

of public safety and much more. This is an

important concern when a person is losing

his privacy at all nodes, and may not like

that. Hence, IoT data sovereignty is a

major concern these days.

Listing many other concerns in brief –

1. Architecture – no unanimous

consensus has been reached upon

regarding the architecture of IoT.

2. The IoT devices needs to be

connected to the power supply and

internet all the time, round the clock,

hence the energy effi ciency of the

sensing is also a primary concern.

3. Apart from data privacy the network

security should be considered –

someone can disable the network

availability, push erroneous data,

breaking in to the network, etc.

Depending on the application either

or all of these can be hazardous and

even life-threatening.

4. Mentioned that heterogeneous

networks and devices will be put to

use the QoS needs to fi ne-tune for

current protocols or may be new

protocols need be devised.

5. Extracting useful information from

the sensor data is also a challenge.

At the hardware level the sensors are

all aff ected by spatial and temporal

data and hence the data may create

noise. Having said that perhaps next generation of data mining algorithms

need to be used.

P.S.: The issue of Telemedicine rose

in the December 2013 issue of CSI

Communications written by Tadrash Shah

Figure: IoT-enabled home with connected devices and appliances working invisibly for consumer[6]

Page 10: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 10 www.csi-india.org

and Prof. Chintan Bhatt also points back

to IoT where patients can be monitored

remotely through halter that can transfer

the data to the hospital. In this setup

patient is granted greater freedom and

independence in monitoring their health

and simultaneously frees up the hospital or

equipment for treating other emergencies.

References[1] http://www.businessinsider.com/

growth-in-the-internet-of-things-

market-2-2014-2

[2] http ://what is .techtarget .com/

defi nition/Internet-of-Things

[3] h t t p s : //w w w. c i s c o . c o m /we b /

a b o u t /a c 7 9/d o c s /i n n ov/ I o T _

IBSG_0411FINAL.pdf

[4] http://iofthings.org/

[5] http://readwrite.com/2013/11/04/

g a r d e n i n g - c o n n e c t e d - h o m e #

awesm=~oyWPdTWxhOVfRo

[6] http://www.ti.com/lit/ml/swrb028/

swrb028.pdf

[7] http://gigaom.com/2013/06/05/

quant i fy ing-your-pup-whist le-

wants-to-create-the-worlds-largest-

database-on-dog-behavior/

[8] http://www.medgadget.com/2013

/09/sproutlings-wearable-baby-

monitor.html n

Abo

ut th

e A

utho

rs

Tadrash Shah obtained his bachelor’s degree, B.E. in Computer Engineering from Gujarat Technological University and currently

pursuing Master’s Degree at State University of New York - Stony Brook. He stood fi rst in his college in Degree Engineering. He has

published two research papers and a book in his undergraduate level. He is interested in the research in the subjects like Algorithms,

High-performance computing and Databases. He has worked and undertook projects at IIT-Gandhinagar, IIT-Bombay and IIM

Ahmedabad.

Prof. Chintan M Bhatt received B.E. and M. Tech. Degrees from Gujarat University (CITC (now CSPIT)) and Dharmsinh Desai

University in Computer Engineering. He is a member of CSI, AIRCC (Academy & Industry Research Collaboration Center) and IAENG

(International Association of Engineers). His areas of interest include Data Mining, Web Mining, Networking, Security and Software

engineering. He has more than 3 years of teaching and research experience.

Page 11: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 11

IntroductionInternet of things refers to identifying a

physical Object through internet. Any

object even a human being, animal or

anything else can be connected in Internet

so that they can be accessible from

anywhere in the world through internet.

In early days, communication was

diffi cult among people. Communication

between neighboring cities, towns or

villages used to take several days/hours.

It depended only on human messengers/

birds that used to carry the message and

deliver it to appropriate destination. This

was the early postal/communication

system. Later invention of motor vehicles

eased the message delivery process.

Invention of telegram and telephone

made possible quick communication

among the various persons and entities

near and far away.

After invention of computers and

network, information started getting

exchanged through the computers.

Initially, they used some sort of cables to

provide information sharing among the

computer systems. But such connection

had some limitations; it only connected

systems in nearby locations. For

connecting systems in remote locations

cables need to be laid for a long distance,

which is very expensive.

To overcome this limitation,

telephone lines were used for connecting

the computers with the help of

modem. This is how internet evolved;

it led to a huge revolution in the globe,

communication was made easy and

information sharing between the systems

was no longer complex.

Earlier the internet was used for

information sharing, sending mails,

download and upload of fi les. But now it

is being used for many applications and

in many fi elds which were unimaginable a

decade ago.

Industry and Social ApplicationIn a boiler industry its temperature

and pressure should be kept under the

control, if it exceeds certain value the

boiler blows up. So the temperature

and pressure needs to be monitored

regularly. Human being going near the

boilers having heavy temperature around

1000° C or more is not possible. Here

comes the help of internet.

In a forest, the major problem is

forest fi re which burns the trees and

animals. Deforestation brings imbalance

in the eco system, and eff ects climate

change. The solution to this is to detect

early so that it can be prevented or

controlled. But how the forest fi re can be

identifi ed in early stage?

In the above two scenarios remote

sensors can be used which can be connected

to the network, and information about the

environment like temperature, pressure

etc. can be received for further analysis and

action. The smoke detecting sensors can

be deployed in forest so that they can send

the information about the fi re quickly to the

control station in order to control the fi re in

early stage to save the forest.

Wireless Sensor Networks, are the

best examples of how non-computers

can be interconnected. These wireless

sensors are used in many fi elds, in Forest

to monitor and send alarm regarding

the Forest fi re, in Military fi eld it will be

deployed in multiple remote locations

so that information can be exchanged

among them.

Radio-Frequency Identifi cation

(RFID) is a wireless device used to identify

any device or a person. It is mostly used to

authenticate a person, to track the device

progress in assembly line. For avoiding

traffi c at toll gates RFID can be used. In a

car, bus or lorry, RFID tag can be fi xed in

the front Glass, so that the vehicles need

not stop there. In India most of the toll

gates use RFID tags to identify the public

vehicles in order to minimize the traffi c

jam in toll gates.

Both Wireless sensors and RFID are

used to track or observe the status of a

vehicle, person, location etc.

Suggested ApplicationsFor MedicalThere exist wearable sensors which can

be used to identify or track person’s or

an object’s movements. Such sensors

can also be used to get the information

regarding patient’s body temperature,

pulse rate, sugar and blood pressure levels

etc. In a hospital it can be used to observe

the patient, and such information can be

recorded automatically in a system and

if anything goes wrong send alarm to the

doctor or a patient by means of SMS or to

a dedicated application in a mobile.

For Public Distribution System (PDS)In India one of the major problems is

civil supply traffi cking. Goods supplied to

one particular area can be taken away by

strangers. This aff ects the needy people

and it’s a big headache for the government

to stop this kind of activity. To prevent this,

the GPS can be fi xed in each public goods

carrying vehicle, so that its movement

can be recorded and they can be tracked

completely from source to destination.

For Physically ImpairedThe sensors can be used for the blinds to

identify the objects ahead when they walk

on the road. Normally, they use a stick to

identify the objects in their way. Instead

sensors can be fi xed on the stick which

emit some ultrasonic sound and observe

back like the principle of SONAR. If the

refl ection is quicker we can calculate the

distance between object and blind person.

The distance can be intimated to the

blind through the headphone. Integrating

such sensors and navigators will help

them walk anywhere without anyone’s

assistance. Using the navigator they can

specify the destination, the navigator will

calculate the optimal route and tell the

route to them through the headphone.

For Traffi c RegularizationThe traffi c violators can be identifi ed using

the RFID enabled number plates. When a

person violates the traffi c automatically

the vehicle id can be obtained using the

RFID number plate if the RFID detectors

are placed in the junctions. For example,

the speed violators can be identifi ed easily

by keeping two RFID receivers about 100m

apart. If a vehicle crossed the fi rst detector

it will read the number of that vehicle and

Origin and Applications of Internet of Things

Cover Story

Dr. Murugavalli Subramaniam* and B Ganesh***Professor and Head, Department of CSE, Panimalar Engineering College, Chennai**Assistant Professor (Grade-I), CSE, Panimalar Engineeering College, Chennai

Page 12: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 12 www.csi-india.org

when it crosses the second detector it

reads the number again and calculates

the speed using the time taken to cross

that 100m distance. If a vehicle crosses

100m distance in 5secs then its speed is

72kmph. If the speed limit of that location

is only 20kmph then it’s clear violation.

The intimation can be sent to the control

room so that the vehicle can be tracked in

some other detector.

The RFID, Wireless sensor and

GPS can together connect any object

in the world so that it is possible to do

information sharing, retrieval, monitoring

and taking necessary steps to control

them with less eff ort and in quick time.

n

Abo

ut th

e A

utho

rs

Dr. Murugavalli Subramaniam is Professor and Head, Department of CSE at Panimalar Engineering College, Chennai.

She has 18 years of teaching experience and 9 years of research experience. She completed her Doctoral Programme in

the area of Image Processing, Anna University. She is a member and Student Branch Coordinator of Computer Society

of India.

B Ganesh is Assistant Professor (Grade-I), CSE, at Panimalar Engineeering College, Chennai. He studied B.E. CSE in

VRS College of Engineering Villupuram and M.E. CSE in AVIT, Chennai. He is having 12 years of experience in Teaching

and Industry together.

Page 13: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 13

Notion of Internet of Things Internet of things (IoT) is a fast growing,

user friendly technology which allows

everything to be connected together and

also allows eff ective communication

between the connected “things”. These

“things” can include any object ranging

from a small pen to a big car.

This technology has expanded to

such an extent that even living organisms

are considered as the part of Internet of

things. In IoT, intelligent devices such as

Passive RFID Tag [Los Alamos], Smart Dust

[Kristofer S. J. Pister, Joe Kahn, and Bernhard

Boser] etc., are connected together in a

large network with unique accessibility.

IoT exchanges data in a fraction of second

and also it consumes less power. It makes

the human life more comfortable and it

helps to build a smarter world.

Evolution of Internet of Things Before 1990’s communication happened

between computers which was called as

electronic data transfer. These computers

formed a network and it was further

classifi ed as Local area network (LAN),

Metropolitan area network (MAN) and

Wide area network (WAN). This WAN

was called as Internet where, several

computers around the world were able to

communicate each other. Subsequently

further improvements in networks

allowed external peripheral devices to be

connected to internet. In present we are

giving instruction to devices instead IoT

will make the devices to think and act

according to our needs.

[Kevin Ashton] the co-founder of

Auto-ID Center at the Massachusetts

Institute of Technology coined the term

IoT in 1999, after him [Ashton] discussed

about IoT in RFIDJournal.com in 2009.

The white paper of [Texas instruments]

says that till now, the world has deployed

about 5 billion “smart” connected things.

Predictions say that there will be 50

billion connected devices by 2020 and in

our lifetime we will experience life with a

trillion-node network. The current network

infrastructure is a barrier in realizing those

numbers. The industry will achieve the

reality of 50 billion connected devices only

by simplifying the way in which things are

connected. People are trying to optimize

the process of internet of things because

in future the trillion-node network may be

implemented.

In many places people have started

implementing the smart things/devices

in real-time applications such as RFID

tracking, smart dust implementation in

battle fi eld, smart health care system,

smart irrigation system for agriculture

and smart grid for power consumption

management, wildlife monitoring by

multimedia sensor networks and some

sensors implemented under the ground,

sea, forest and bank of rivers to prevent

the world from natural disasters like

tsunami, earthquake, forest fi re, fl ood etc .

Working Process of Internet of Things IoT handles all types of devices from a

simple device to an intelligent device.

These devices should have certain

basic capabilities namely sensing,

data capture, data storage, data

processing and it should also be uniquely

accessible. In IoT architecture, devices

can communicate with each other by

forming a network. This network is

similar to computer network but here

computers are replaced by things. In

IoT devices can communicate with each

other directly or through a gateway. It

manages resources, services and collects

the information for sending it according

to requirements of user. There are four

types of communications involved in IoT,

a) Device-to-device: In Fig.1 we can see

that in section 1 and section 2 there

are two ways connecting the devices,

Internet of Things: A Birds Eye View

Cover Story

Mr. Sarwesh P*, Dr. N S V Shet** and Dr. K Chandrasekaran****Research Scholar, E & C Department, NITK, Surathkal, Karnataka **Associate Professor, E & C Department, NITK, Surathkal, Karnataka ***Professor, CSE Department, NITK, Surathkal, Karnataka

Fig. 1: Working process of IoT

Page 14: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 14 www.csi-india.org

either they can connect directly or they

can connect through the gate way. It is

clearly diff erentiated by two kinds of

dotted lines.

b) Device-to-user: The user can be in

section 1, section 3 or section 4 in

either of the cases he has to access

the data from the device only through

service management system section

4. Because all the data related controls

are handled by the section 4.

c) Device-to-server: The device to server

interaction involves all the four sections.

Hence the two domains

d) Server-to-applications: This process is

fully related to section 4 where the user

can access the data directly from the

server.

By seeing the Fig.1 we can clearly

understand the working process of

internet of things.

Challenges for Internet of Things • Connectivity and identifi cation: Proper

standards have to be developed for connectivity and there should be a unique identifi cation mechanism for accessing all kind of devices. For this IPv6 was proposed as one of the solution but there is no standard mechanism till now that can be used for identifi cation.

• Reliable and scalable Network: Here ubiquitous things are connected together and hence effi cient network with good reliability and scalability is required with a Quality of service protocol which would maintain the data fl ow.

• Power management: Power is one of the important parameters to be considered. Energy harvesting by smart devices should be implemented and IoT devices should be self sustainable.

• Security: Security is a very important aspect of IoT. The built-in security should be implemented in devices and protocols. Usually IoT uses wireless infrastructure for communication which is prone to several attacks. Thus proper security measures should be taken to protect the data being transferred.

• Multi device adoption: Thousands of new devices are working and hundreds of new devices will be implemented each and every day. For that, our network should be able to adopt all kinds of devices from lower end to higher end. For example, it should manage RFID

tag, temperature sensor, smart dust, multimedia sensor, server, router, bio sensor, smart chip, server, database system etc in a single track.

The above challenges are considered as

the important requirements for developing

IoT. The researchers are working through

it and they are trying to optimize the

diff erent parts of architecture.

Applications of Internet of Things Smart marketing: In supermarket this technology can

be used to provide the information

to the customers without any human

intervention. For example, A passive

RFID tag can be placed in a cocoa bean

package such that whenever a customer

comes near to the package it will intimate

the customer about the details of beans

automatically through a voice signal.

Smart Products: Using IoT products can be developed such

that they will instruct the user based on

the application. For example, a RFID tag

can be attached with a shirt to monitor the

body temperature of the user and instruct

him accordingly.

Smart eHealth care: In eHealth care system the doctor can

see the body condition of patient without

testing him physically, by using a smart

product called biochip which is inserted in

the patient’s body. It can measure the blood

pressure, cholesterol content, heartbeat,

body temperature, viral infection etc., and

it will report to his family doctor.

Smart Automation: We can implement intelligent multimedia

sensor in car, designed in such a way that

it will focus and analyze the retina of the

person who is driving the car and it will

instruct the driving person that to stop

the car. If the person still drives the car it

will park the car in a parking area of the

road automatically. This will prevent the

accidents.

Smart Pollution monitoring system: If some person is throwing plastics

in ground the multimedia sensor will

monitor and it will warn the person and it

will indicate the fi ne amount that has to

be paid by the person. So pollution will be

reduced and next time people won`t do

such kind of mistakes.

Smart grid Technology: In smart grid technology the excess of power which generated by means of

windmill, thermal power plant, solar power plant, etc., will be directed and distributed to places where energy is required. For example, if a wind mill is generating 1000 mega watts of power in place A and if the people require the power of only 700 mega watts. Remaining 300 mega watts can be sent to Place B otherwise it will be wasted. To save such resources a technology called smart grid technology is booming with the help of IoT.

Internet of Things in Future In ITU people are working on a Packet based

service related network which is called as

“Next Generation Network”. It handles

billions of things together. For example, it

is possible to get the current information

about animals in the amazon’s forest with

in a second, by sitting in our home. In future

devices will sense, speak, hear and at last it

might even start thinking.

Conclusion IoT is a recent technology which is booming and it has a good rate of acceptance among the people. Industries are spending a considerable amount of money and many researchers are working towards the improvement and development of IoT. The applications of IoT are many and so are the users. This technology can be considered as one of the most promising technologies of the 21st century. It is needless to say that the future wouldn’t exist without IoT. It would become as an integral part of the day-to-day human life. People would become extensively dependent on IoT, at least to satisfy their medical needs. The day is not far when each person would directly or indirectly be related to at least two or three IoT networks.

References [1] www.ti.com/iot-intro - Strategic marketing,

Texas Instruments, Sep-2013 [Jim Chase] [2] IERC - Internet of Things European Research

Cluster 3rd edition of the Cluster Book 2012 [Ian G Smith, Ovidiu Vermesan, Peter Friess, Anthony Furness, Martin Pitt]

[3] Internet of things the legal perspectives – 2010 [Rolf H. Weber, Romana Weber]

[4] The Internet of Things, ITU Internet reports, Nov-2005 [Lara srivastava, Comprising Phillippa Biggs, Tim Kelly, Youlia Lozanova, Lilia Perez Chavolla, Jaroslaw Ponder, Raushan Sagalbayeva, Svetlana Skvortsova and Christine sund]

[5] Rethinking the Internet of things-A scalable Approach to Connecting Everything, 2013 [Francis daCosta]

[6] ITU Workshop on the “Internet of Things -Trend and Challenges in Standardization” (Geneva, Switzerland, 18 February 2014)

[7] http://www.iot-a.eu/public [8] http://www.internet-of-things-research.eu

n

Page 15: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 15

Key IT Challenges with Internet of Things ImplementationIoT based business applications have

some signature characteristics:

• Very high event data rates

• Huge volume of continuous data

• Need for continuous monitoring

• Minimal latency

• High level of complexity in fi nding

meaning in the data

• Immediate response in case of an

alert situation

A typical IoT application will be connected

to a huge number of devices that will

continuously provide it with the input data

in the form of events. Traditional relational

database centric application development

models may not be suffi cient for building

such applications and they can use

“Complex Event Processing (CEP)”

technology instead. The application

will need to capture the events, analyze

the data to come up with insights and

patterns. IoT applications by nature will

be not only complex but also critical,

because the insight provided by its output

will be often triggering some other event

of decision making. Due to these reasons

an enterprise will need to come up with

a robust, scalable and proven CEP and

analytics platform, which can leverage

this online data for providing advanced

CEP solution for various benefi ts such as

business insight, better decision making

and cost reduction etc.

IoT applications and traditional

applications (e.g., native or web based

applications) are signifi cantly diff erent

in many ways. Technological and

architectural implications of these

diff erences are profound. It will bring big

opportunities and even bigger challenges

such as:

• Processing large volumes of data

published at a high speed needs a

matching infrastructure

• Eff ective, meaningful and cost

eff ective mining and analysis of the

input events needs a robust analytics

platform

• Since the number of connected

devices might increase drastically,

the architecture need to be scalable

• Applications has to have integration

capabilities with diff erent types of

devices and systems

• Considering the high volume of data,

need to ensure the data quality

• High network bandwidth is required

to read all the raw data generated by

millions of connected devices

• No uniform standards for data

generated from devices which may

result in data silos and can prevent

widespread adoption

Building Intelligent Internet of Things Applications using Microsoft StreamInsight

Ramakrishnan Iyer* and Radharaman Mishra***Principal Architect, Research & Innovation Tech CoE Group of iGATE Global Solutions**Technical Architect, Research & Innovation Tech CoE Group of iGATE Global Solutions

Technical Trends

Abstract: The Internet of Things (IoT) is a web of objects with unique identifi ers that can communicate with each other with or without the aid of a computer or internet. The communication is enabled through the sensors installed into the participating devices. Several technologies like wireless technologies, micro-electromechanical systems (MEMS) and the Internet have contributed to the emergence of the IoT. Due to availability of low-cost sensor devices, market analysts estimate that there could be around 26 billion installed units by 2020 and the market size to be around 2.2 trillion by 2025. IoT has become one of the most talked about emerging technologies, given the potential to come up with various innovative products and services. Since it enables the devices to come alive and be interactive, the product companies and service providers will be using it for continuing with their services even after the product has been actually sold. IoT applications will be smarter than the applications we use currently in a way that they would be able to communicate with each other and enable decision-making giving them intelligence of their own. IoT has the potential for new opportunities across vertical markets such as insurance, consumer electronics, medical, transportation to develop use cases which can leverage this technology to reduce costs, improve customer satisfaction, and create new business models based on the analysis of the data collected. Microsoft StreamInsight is a powerful platform for developing and deploying highly scalable and low latency CEP applications. It is designed to provide event-driven processing solution to continuously arriving data without writing the data to disk for analysis and querying. With StreamInsight, IoT applications can provide better and faster CEP solutions to incoming data in near-real time, as the data gets acquired from the sources as compared to the analytics solutions based on the traditional database reports and dashboards. The primary intent of this paper is to provide enterprises an overview of Microsoft StreamInsight features and capabilities and iGate iStreamAnalytics platform that can be used to develop online complex event processing solutions for quick insights in various verticals.

A typical IoT application will be connected to a huge number of devices that will continuously provide it with the input data in the form of events. Traditional relational database centric application development models may not be suffi cient for building such applications and they can use “Complex Event Processing (CEP)” technology instead.

IoT applications and traditional applications (e.g., native or web based applications) are signifi cantly diff erent in many ways. Technological and architectural implications of these diff erences are profound.

Page 16: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 16 www.csi-india.org

• There could be potential security

implications since the connected

devices can be vulnerable to hacking

and hence need a secure identity

management and authentication to

be implemented

• Defi ning the data retention, archival

and purging could be a challenging

task for the massive amount of data

that get generated from devices

Microsoft StreamInsight CapabilitiesMicrosoft StreamInsight provides a

powerful platform for implementing

robust and highly effi cient IoT applications

involving the complex events processing.

The technologies advancements in the

devices together with the capabilities of

StreamInsight will allow the possibility

of building intelligent applications where

StreamInsight will play a pivotal role

in transforming the raw data from the

input devices into intelligence for the

business. Some of the key capabilities,

StreamInsight off ers are:

• Ability to process multiple data

streams over the internet from

multiple, heterogeneous data sources

and apply business rules to generate

meaningful patterns, exceptions and

trends

• Adapter model to interoperate with

all kinds of data sources and facilitate

seamless integration with both the

incoming and outgoing event traffi c

• Declarative query language (LINQ) to

formulate queries, rules, and patterns

• Parallel processing and use of in

memory cache for delivering better

performance

• Event driven, continuous and

incremental processing for high

throughput, low latency

• Familiar Microsoft .Net based

development platform that allows

leveraging the existing skill sets

and infrastructure investments in

VisualStudio and .Net framework

• Reduced and optimized storage

requirements since the streams need

not be persisted for the processing

• Event Flow Debugger tool for

monitoring the running queries,

replaying the data processing, and

performing root-cause and event-

propagation analysis

iGATE iStreamAnalytics SolutioniGATE iStreamAnalytics is a Microsoft

StreamInsight based solution that is

designed to process events, received as

input data, from multiple sources in real

time. Key solution features are:

• Capability to receive input data

from multiple sources in multiple

Fig1: iStreamAnaly cs- High Level Architecture

Page 17: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 17

formats and can be confi gurable to

be processed in StreamInsight engine

• Prebuilt and confi gurable simple

rules and alerts

• Capability to display the data fl ow

and alerts in near real time

• Services based integration with the

StreamInsight (for both the Event

generator and the Dashboard)

Following diagram shows the high level

architecture of the iStreamAnalytics

solution.

Event GeneratorThis application will act as a gateway for

the various input sources (e.g., device

sensors- speedometer of a vehicle,

device on a patient, smart meters etc.)

to read the data and transform them into

a confi gurable format to the service that

inputs to the StreamInsight engine.

CEP EngineCEP Engine will be responsible for

processing the events that has been

submitted by the devices/sensors (or

the Events Generator). It will be applying

the business rules over the streams and

generating the appropriate alerts. The

rules can be classifi ed into two types:

• Pre-built Rules: The parameter for

the rules will be confi gurable where

thresholds could be defi ned and

alerts could be triggered for data that

does not meet the threshold values.

An example could be if the speed

exceeds 100 miles per hour, trigger

an alert for over speeding.

• Custom Rules: These rules will be

specifi c to business scenarios and

will need to be developed for the

application.

Dashboard Dashboard application will be responsible

for showing the data and alerts generated by

the CEP. The dashboard has the capabilities

to plot the data in the chart format and

displaying alerts in near real time.

Applications Enabled due to

iStreamAnalytics SolutionAny business scenario where an event

generated is of importance, will need

to be monitored (often together with

some other events) and analyzed for

myriad purposes like generating alert,

decision making, triggering some

associated event and so on will benefi t

from the IoT applications. Financial

services, health care, insurance, utilities,

telecommunication, manufacturing and

web analytics are some of the business

domains that will need to implement CEP/

IoT applications.

Following is a list of some of the

specifi c examples of new potential IoT-

based applications that use sensor devices:

• Usage-based insurance: Using

sensors in vehicles, monitor the

driving behaviors using the data

generated from sensors, profi le driver

to provide calculate auto insurance

premium policies

• Healthcare sensing: Collect, monitor

and analyze data at real-time from

patients/consumers to provide a

better healthcare facilities

• Smart meters: Monitoring of various

utilities like electricity, gas and water

etc. and analyze data to trigger

alerts and provide analysis of the

usage, remotely control as well as

automation of utilities and prevent

any critical situations

• Real-time manufacturing

intelligence: Monitor real-time data

of manufacturing operations and

analyze the data to provide insightful

information for improving the entire

manufacturing processes

• Fleet management: By having sensor

devices on the vehicle fl eet, track and

monitor vehicles, optimize routing

operations, vehicle utilization and

improve the overall effi ciency of their

fl eets

• Fraud Detection: Monitor all fi nancial

& non-fi nancial transactions, do

analysis based on business rules and

detect any fraudulent or suspicious

activities being done

ConclusionThough IoT is still in its early stages,

IoT will need enterprises to gear up for

a highly connected world and come up

with new business models and processes

to have a better competitive edge in

the market. Also the sensor devices will

bring a new transformation in how to

detect any change in parameters, use

this information to trigger new events

to help save costs and better decision

making. New analytics tools like Microsoft

StreamInsight are emerging to provide

scalable high performance architecture to

process this massive amount of data.

iGATE is well-positioned with its new

iStreamAnalytics platform which is a real-

time business analytics solution to enable

rapid development of new IoT solutions

for fast-time-to-market in any verticals. It

will allow confi guring usage of any devices

data and providing device monitoring,

dashboards and analytics reports to

enable better decision making. n

Abo

ut th

e A

utho

rs

Ramakrishnan Iyer is a Principal Architect working in Research & Innovation Tech CoE Group of iGATE Global Solutions,

and is responsible for developing technology solutions. He has more than 20 years of experience in Information

Technology with strong expertise in Microsoft technologies, Application Portfolio Rationalization, applications

assessment, and Application Portfolio Modernization. He has extensive experience in architecting and designing large

business applications in various technologies.

Radharaman Mishra is a Technical Architect with the Research & Innovation Tech CoE Group of iGATE Global Solutions.

With over 14 years of experience in the IT services industry, he has worked on software application architecture and

design, development, architecture assessment and consulting. His expertise includes .Net, ASP.Net and Microsoft SQL

Server. He has been working with iGATE’s Fortune 500 customers on various Microsoft-specifi c enterprise application

architectures and design. He has also published papers of technical interests in various external and internal forums.

Though IoT is still in its early stages, IoT will need enterprises to gear up for a highly connected world and come up with new business models and processes to have a better competitive edge in the market.

Page 18: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 18 www.csi-india.org

IntroductionWhat is IPS? An indoor positioning system (IPS) is a

network of devices used to wirelessly

locate objects or people inside a building.

Why IPS?Due to the signal attenuation caused by

construction materials, the satellite based

GPS signal loses signifi cant power indoors.

For this reason the receiver cannot get

coverage of 4 satellites which atleast is

needed to accurately get the location

coordinates.

The consumer devices will have a

maximum location accuracy of 10 mts

when the location is set by the GPS. This

accuracy is not acceptable with respect

to the use cases for indoor positioning

and navigation as a lot of things change

at indoor level, for eg. aisles are placed

adjacent to each other within a distance

of 1-2 metres in a retail store or there can

be multiple stores within a distance of

10 meters in a mall.

Also due to the nature of indoor

environment, GPS cannot provide

information about the fl oor and building

level at which user is located.

This brings up the need for a system

where a user/object has to be located

inside a building accurately and precisely

to make positioning and navigation inside

indoors as easy as outdoors.

Current ScenarioEven though there was a market pull for

this technology from a long time, it didn’t

come into mainstream due to limitations

of the software / hardware available with

consumers in general. Now that smart

phones are ubiquitous, the technology

is gaining momentum in terms of scale

and variety with the entry of innovative

companies.

Future MarketThe global indoor positioning market is

estimated to grow from $448.6 million

in 2013 to $2.60 billion in 2018. (Source:

www.marketsandmarkets.com)

Usage of IPSIndicative list of use cases and scenarios

where IPS can be used are given below

Consumer: • Transportation hubs like Airports,

Railway & Bus stations

• Indoor venus like university campus,

hospitals

• Commercial venus like shopping

malls, offi ces

Non Consumer: • Emergency services like fi re rescue,

police and medical

• Asset tracking & logistics for offi ces,

hospitals, industries and retail stores

• Industrial Automation

Indoor Positioning System (IPS) using Beacons

Venkatesh Babu* and Ashok Yalamanchili** *Sr. Principal Architect, Technology CoEs in R&I group @ iGATE**Technical Lead, Technology CoEs in R&I group @ iGATE

Technical Trends

Source: www.extremetech.com (h p://www.extremetech.com/extreme/126843-think-gps-is-cool-ips-will-blow-your-mind)

Page 19: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 19

Enabling Technologies for IPS SolutionSome of the enabling technologies used

for an IPS solution are listed below

• Wi-Fi access points

• BLE Beacons

• Sensors (Accelerometer, Gyro,

Compass, etc.)

• Indoor Lights

• Magnetic Field

• Low Orbit Satellites

• Camera Technology

iGATE chose to experiment with BLE

Beacons and Wi-Fi access points. Sample

BLE beacons images are given below.

Source: Beacon’s images are from their respec ve vendor websites

iGATE’s Exploratory Activities iGATE has worked on the PoCs for

proximity using Estimote’s iBeacons,

positioning and navigation using indoo.rs

bluetooth beacons and its framework.

Proximity PoC: In this PoC, bluetooth

beacons are placed in the store at strategic

positions and confi gured with their major

and minor identifi ers. If the user with the

mobile app comes into the fi eld of the

beacons, then an off er that is confi gured

for that beacon will be pushed to the user.

Indoor positioning and Navigation PoC:This PoC will provide the user his current

location with an accuracy of 1 meter which

gives accurate results from an analytics

perspective. The user can also navigate

inside the store based on the products he

has in his shopping cart.

iGATE is building a omni channel

solution which will enable retailers to

push real time personalised promotions

and off ers to the customers, also identify

the customer behaviour across physical

stores. The off ers that are pushed are

based on the users past shopping history

across diff erent channels like web, mobile,

and physical store. In addition to this the

product also gives insights like how the

customer has moved inside the store,

dwell times at particular aisles.

Source: Internet, Enhanced by iGATE

Page 20: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 20 www.csi-india.org

ChallengesThere were many challenges encountered

by iGATE while implementing an indoor

positioning system. Some of the these

challenges are mentioned below

Precision and Latency - The amount of

time for which the user can get his current

position with maximum accuracy varied

a lot from vendor to vendor. We got a

precision of 1-2 mts for 70% of the time

by using Bluetooth Low Energy (BLE)

beacons based IPS. When the Wi-Fi

Access Points were used for positioning,

we got a precision of 5-8 mts for 60%

of the time. Latency is the time taken by

the system to identify the users position

from the time the request to get location is

sent from the device to the server. Typical

latency of 5-6 seconds was observed to

get the position with good accuracy.

Signal accuracy & stability - The

signals emitted from either Wi-Fi AP’s

/ Bluetooth beacons are prone to be

absorbed by human bodies, walls, aisles

and other structural elements. This

creates interference to these signals and

it gets more complicated if people are

moving which creates more fl uctuations

ultimately leading to stability issues. One

of the main challenges for the IPS to work

consistently is to minimize the eff ect of

these interferences by fi lters implemented

by IPS providers.

Structural movements – Any change in

the position of a sensor or change in the

structure will need a recalibration of the

entire area of interest, so that accurate

results are provided by the IPS.

Power consumption - Although Bluetooth

LE consumes less power on a mobile

device compared to Bluetooth 2.0/3.0,

continuously fetching the position will

involve signifi cant battery consumption

as the location has to be fetched from the

server. Beacon vendors typically specify

a battery life of 1-2 years per beacon, but

during our solution implementation, we

found that batteries drained out in less

than 6 months.

Supporting multiple devices - Another

major challenge for these IPS solutions

is to have compatibility with multiple

platforms, device and Operating System

versions. As the current mobile market is

highly fragmented this becomes a major

challenge in selecting the IPS solution.

ConclusionIPS seems very promising which can be

leveraged in many scenarios / areas.

There are many vendors that are heavily

investing in this space. Some of the major

players that are having a considerable

impact in this space are

• Navizon (http://navizon.com/

indoors-solutions)

• Meridian apps (http://www.

meridianapps.com/)

• Aisle411 (http://aisle411.com/

solutions/publisher-solutions/)

• Indoors (http://indoo.rs/)

Even though there are many vendors out

there in this space, the technology is still

at a very nascent stage, accurate and easy-

to-setup solutions can make IPS realize its

full potential in many areas.

References[1] marketsandmarkets.com. (2013).

Indoor Positioning and Indoor Navigation (IPIN) Market [(Network-based Positioning; Independent Positioning; Hybrid Positioning); by Solutions (Maps and Navigation; Location based Analytics)]: Worldwide Market Forecasts and Analysis (2013 - 2018). Dallas: Markets and Markets.

[2] Naguib, D. A. (2011, 9 11). The Great Indoors: Challenges and Use Cases: Qualcomm.

[3] Indoors. (2013, 09 07). Indoors. Retrieved 12 26, 2013 from Accurate indoor localization: http://indoo.rs/features/

[4] Loctronix. (2011, 09 26). Consumer Applications for Indoor Positioning. Retrieved 26 12, 2013 from Loctronix: http://www.loctronix.com/news/Insider/I1-1-A2-ConsumerApps.html

[5] Indoor LBS. (2014, 01 16). Indoor Location & Mapping Services Report. Retrieved 01 24, 2014 from Indoor LBS: http://www.indoorlbs.com/p/market-

report.html n

Abo

ut th

e A

utho

rs

Venkatesh Babu is a Sr. Principal Architect working in the Technology CoEs in R&I group @ iGATE. He has more

than 20 years of experience in IT industry and is currently involved with R & D of emerging trends & technologies.

The R&I Technology CoE team works on PoCs, Solutions, and provides thought leadership for evangelization of new

trends / technologies for solving business problems of clients.

Ashok Yalamanchili is a Technical Lead with more than 7 years of experience in IT industry. At iGATE, he is currently

working in the Technology CoEs in R&I group working on emerging technologies and trends. The R&I Technology CoE

team works on creating POCs, Solutions, evaluating new technologies and helps in client engagements.

Page 21: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 21

Introduction Most people are familiar with common

means of data processing – data generated

by a device is transmitted to a central

location where it is processed and used for

business reporting or for making business

decision. In recent time, this method of

data processing is facing a challenge not

only from the volume of data that is being

generated, but also from the fact that a

wide variety of sources are generating

data, adding to the complexity of data

processing. While it may be relatively easy

to address the problem of data variety by

using well-defi ned data formats, it seems

that the problem of data volume can only

be addressed by essentially using more

and more processing power – be it either

by using ever-larger processing systems

or by using clusters of distributed systems.

'Smart' Devices Though the landscape is changing, most

data being generated is by conventional

methods of business, like collecting

electricity consumption data at the end

of the month, mobile usage on a daily

basis, and so on. While 'smart devices'

like music enabled shoes and watches

are not a new phenomenon, recently

there has been an enormous interest in

applying 'smart' concepts not just for

consumer gadgets, but also to enterprise

applications and enterprise processes.

Hence, concepts like 'smart meters'

are being actively installed in homes to

monitor electricity consumption, 'smart

cars' are being developed to monitor

driver as well as car performance and use

that information for insurance off erings

and vehicle maintenance, to name a

few applications. Such 'smart' devices

when connected (mostly wirelessly) to

enterprise applications over the Internet,

constitute the area of 'Internet-of-Things',

IoT for short.

While many IoT solutions are still

in development phase, the number of

solutions is expected to grow. As per the

Gartner 2013 Hype Cycle, IoT is reaching

the peak of expectations and expected

to reach mainstream in the next 5 to

10 years, if not earlier. Thus, it is expected

that this interest will not only drive

creation of innovative and novel gadgets

and devices, but will also be the prime

drivers for applications to be developed

that consume such data and use it to

infl uence business decisions.

As per Gartner reports, the impact of

connected smart devices is expected to

add $1.9 trillion to the global economy. Not

only are conventional devices like servers,

storage equipment, network devices

expected to become 'smarter', but many

other devices like cardiac monitors, health

monitors, automobile and devices like

washing machines and air conditioners

are also expected to become 'smart'. This

is expected to drive around $3.8 trillion in

spending on information technology, to

monitor, manage and derive meaningful

inferences from data generated.

Challenges with Existing Architectures With tremendous growth in volume of

data, most enterprises are exploring and/

or working with Big Data technologies like

Hadoop, MongoDB, Cassandra and others

to manage data and extract business

benefi ts from it. Enterprises are using a

combination of tools and technologies to

handle volume, velocity and variety of data

(three Vs of data). While it is complex to

address data on these axes, what adds to

the complexity is that Big Data solutions

need to be integrated with existing Data

Warehouse + Business Intelligence +

reporting solutions. Traditionally, Business

Intelligence (BI) and Data Warehouse

(DW) solutions have addressed the

problem of data processing and reporting.

While these solutions have been very

successful and can address data volume

to a certain extent, their Achilles heel

has turned out to be data variety – as

these solutions depend on an underlying

RDBMS for data storage – where data can

be received in diff erent formats.

To manage increasing data volumes

and the increased urgency around

actionable information, Big Data Analytics

seems to be the most natural solution.

Big Data solutions try to address all three

Vs of data, by using a combination of

tools and technologies and by keeping

data in as near-native format as possible

(rather than retrofi tting it to a specifi c

structure). However, BI and DW based

solutions as well Big Data based solutions

most commonly persist the data before

processing it and hence put heavy

demands on the infrastructure in terms

of huge processing power as well as

extremely large storage capacity.

'Near-Source' Processing With smart devices expected to add

exponentially to the data volumes, an

already challenged area – processing the

data - will be stretched to its limits. Not

only will processing and storing these data

volumes pose diffi culties, but transmitting

such data and extracting 'on time' inferences

from them will also be a challenge.

To overcome some of these stated

problems of data processing, we would

like to suggest the concept or 'near-

source' processing. But, what is 'near-

source' processing? As we defi ne it, 'near-

source' processing is nothing but placing

computing technology as near to the

source as possible, and processing the data

as soon as possible, for immediate insights.

But, how diff erent is it from using

an intermediate computer system that

collects data and processes it before

The Need to use 'Near-Source' Processing in Internet-of-Things Solutions

Bipin Patwardhan Research & Innovation, iGATE, Mumbai, India

Technical Trends

Abstract: The 'Internet-of-Things' revolution is about making ordinary devices more 'intelligent' regarding their environment and more 'adaptive'

to user needs. As making devices 'intelligent and adaptive' means these devices monitoring their environment and reacting to it, it involves

collection of a lot of data, as well as processing it into insights. With the installed base of such devices expected to explode into multi-billions, the

amount of data that is expected to fl ow and be processed is going to be mind boggling.

Hence, we believe that Internet-of-Things solutions should consider some form of 'near-source' processing in order to provide more

immediate feedback to users and also to reduce the amount of data transferred from the device to the system/application where it is processed.

Page 22: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 22 www.csi-india.org

sending it to a central server? While

the concept many not be very diff erent,

the way it diff ers, is its use of low-cost

computing elements to receive and

process the data. While earlier, one

would have needed to use a full-fl edged

desktop-class system for this purpose,

with the availability of low-cost computing

hardware like Aurdino, Raspberry Pi and

Intel Edison, 'near-source' processing

solutions will be easier to implement and

will also be cost eff ective. Additionally,

such low-cost hardware will serve the

stated purpose as in most cases, the

amount of data to be processed will not

be extremely large. The 'near-source'

processing unit will be expected to store

and process only a limited set of data,

the size of which can be defi ned as per

the business requirement. Extremely

complex processing tasks will continue to

be performed by data centers using BI and

DW or Big Data setups. In fact, in addition

to such low-cost, dedicated hardware

platforms, smartphones with suitable

applications can also be used to perform

the task of 'near-source' processing units.

Architecture The architecture for a 'near-source'

processing system is given in Fig. 1.

As depicted, raw data generated

by smart devices can be received by one

or more 'near-source' processing units.

Each unit can process the data to identify

events and/or alerts based on provided

rules, which in turn are made available to

the user. After processing the data, the

'near-source' processing units can send

either event data or the raw data to other

analytic systems, for detailed processing

and analysis.

While 'near-source' processing

solutions will not be expected to crunch

Terabytes and Petabytes of data, they

will be able to process a few Megabytes

of data within milliseconds and generate

immediate feedback for users. Such

immediate feedback in terms of

'actionable insights' can help businesses

benefi t from favorable conditions as

well as take preventive actions in case

of adverse conditions. Additionally, by

processing data near to the source, it

will be possible to generate 'higher-level'

events from the raw data and transmit

these to downstream systems for further

processing, reducing the need to transmit

all the raw data 'as-is' for processing.

It should be noted that 'near-source'

processing is by no means meant to

replace analytic systems, but can be used

to provide immediate, relevant feedback

to users and also help reduce the amount

of data transferred from the 'smart' device,

to the place where it is to be processed.

Benefi ts Some of the benefi ts of 'Near-Source'

processing can be

1. Immediate feedback by processing

data without delay.

2. Improved visibility for users, as they

will get feedback about how data is

being processed.

3. Reduced transmission costs –

transmitting only high-level events

and their related information instead

of raw, unprocessed data.

4. Reduced central infrastructure costs

– central processing centers will not

need to store and process the full

raw data set. Only specifi c event data

need be stored for analysis.

5. Privacy, Security, Compression – raw

data, as generated by 'smart' devices

will mostly not be encumbered

by privacy and security layers. For

sensitive data sets, 'near-source'

processing can be used to encrypt

the data before it is transmitted over

networks. To reduce the amount of

data transmitted, data compression

techniques can also be used.

Application Areas Some of the application areas for 'near-

source' processing can be 1. Connected automobiles –

Automobiles that are able to process inputs from their surroundings to take appropriate action.

2. Home medical care – Data collected from medical devices can be processed within the confi nes of the patient's home, before it is transmitted to the healthcare worker.

3. Traffi c Management – Traffi c patterns can be identifi ed from one or more traffi c signals, to build a comprehensive picture of local conditions, before transmitting events

of signifi cance to the central system.

Conclusion With the expected wide proliferation

of smart devices in coming years, the

amount of data generated and processed

is expected to go up dramatically. While

many enterprise data processing needs

can be addressed by using suitably

powerful Big Data deployments, in case of

'smart' devices, it is worthwhile to explore

avenues that will help reduce the amount

of data transmitted over the network and

also to extract insights 'on time'. Fig. 1: Architecture for 'Near-Source' Processing

Page 23: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 23

For addressing the need of 'on time'

processing, we believe that enterprises

need to explore the avenue of 'near-

source' processing units. Such units can

monitor data generated by smart devices,

identify patterns, generate suitable 'events

of signifi cance' and only transmit relevant,

reduced data sets (along with event data)

back to the enterprises for additional

processing. For detailed analysis, 'near

source' processing units can store a copy

of the generated data for a suitable period

of time, making it available on demand.

Thus, 'near-source' processing units can

provide 'local' intelligence and provide 'on

time' analytics, helping design responsive

systems, thereby reducing the amount of

data transmitted over the network and

processed centrally. n

Abo

ut th

e A

utho

r

Bipin Patwardhan is a Technical Architect with more than 15 years of experience in the IT industry. At iGATE, he is

leading the High Performance Computing CoE. The CoE builds capabilities around technologies that help delivery

high performance for enterprise applications. Presently, the CoE covers areas like Parallel Programming, GPU

Programming, Grid Computing, Real-time Analysis and In-Memory Computing.

Page 24: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 24 www.csi-india.org

Introduction Mobile phones has become important

part of our life, almost every individual

carries a mobile phone these days and

will be more critical part in years to come.

We use mobile phone more than just

talking; we use it for browsing internet,

booking ticket, hotel, online shopping

and the most important online banking.

Value of phone is more than the value of

the hardware; it has important personal

and fi nancial information like bank details.

Security of the phone plays important

role users today, OEM provide method

of authentication such as pin and pattern

lock (dots to connect). Study carried out

on 464 participants shows need for an

alternative security system for mobile

uses. Study shows that users do not lock

their phone due to various reason top

most being the ease of use as they have to

unlock the phone and users are afraid to

forget the password or pin which results

in wiping the data and setting phone to

factory default (Asher, et al., 2011).

Researchers are looking for an

alternative approach such as biometric

for authentication such as imagine

biometric, fi ngerprint, voice recognition

and gait of the owner. Biometric such as

fi ngerprint, face and voice recognition and

active biometric, that is it requires user

intervention, the pattern of human walk

also know humangait has a pattern which

can be used to lock the mobile devices,

also known as passive biometric since it

does not requires human intervention.

Human gait is a tried and test as

passive biometric, and very diffi cult to

copy a human gait. The report focuses

on human gait and various methods of

human gait (see 3). It also discusses

how it can be eff ectively used to secure

a mobile phone (see 4). Challenges and

its countermeasures (see 5) based on the

literature available.

What is Human Gait?In early 1900's Marks suggested that

walking patter can be divided into series

of phase (Marks, 2010). Human Gait

takes top-down approach. It starts

as impulse in human brain and end

with movement of the body in form of

walking, running or dancing. Loco motor

programming happens in surpraspinal

centre, which leads the idea in to pattern

of muscles activities required for walking

as suggested by Enoka (Vaughan, et al.,

1999). The human gait is divided into

gait cycles, which start from one foot and

ends with the same foot in the process of

walking (Marks, 2010; Ayyappa, 1997).

Gait cycle is further divided into three

main tasks.

• The fi rst task is a weight acceptance

period, in which body balances itself

on one foot and prepare itself to lift

another foot maintaining its balance

and absorbing shock.

• Next task is "single limb support

task", which is a mid state phase. In

this phase one foot is lift in air and

swing forward while balancing the

body weight on one foot.

• The last task is "limb advancement

phase", in this phase foot is rested

on the ground maintain the body

balance and preparing the other foot

for the gait cycle.

The above gait behaviour is study in detail

in clinical gait analysis, which does not

focus on identifying uniqueness of the

person (BenAbdelkader, et al., 2002),

studies in fi eld of medicine (Kale, 2004),

psychology (Birren & Schaie, 2005) and

biometrics (Gafurov, 2008; Mäntyjärvi, et

al., 2005), had provided various evidence

that human gait contains distinctive

pattern which is unique to every individual

and can be used as an authentication

mechanism.

Various Methods Used in Biometric GaitThere are three diff erent methods used in

biometric gait recognition: Machine Vision

Based, Floor Sensor Based and Wearable

Sensor Based Gait Recognition.

In machine vision based gait

approach, cameras are place strategically

to capture gait data. Captured image is

pixelated and converted into black and

white, and recognises the movement. It

can be eff ectively used for surveillance,

which out obstructing the users (Nixon, et

al., 1999; Han & Bhanu, 2006).

In the fl oor sensor approach[12],

[13], sensors mats are place on the fl oor

to collect gait data. Ground reaction

forces generated during normal walk

is used to generate the pattern and

uniqueness of the individual. It is

eff ectively used in building, museums to

restrict physical access to certain area

based on the walking pattern (Jenkins &

Ellis, 2007; Nakajima, et al., 2000).

Last approach is wearable sensor,,

name itself says that the sensors are

wear by the used and they are placed on

diff erent body parts such as leg, foot, thigh,

hip and wrist. Examples of the wearable

sensors are accelerometers (measuring

acceleration), gyro sensors (measuring

rotation and number of degrees per second

of rotation), force sensors (measuring the

force when walking) etc (Mäntyjärvi, et

al., 2005; Søndrol, 2005).

Gait analysis has been used as

one of the method in forensics analysis.

Gait analysis data captured from the

surveillance camera was used to fi nd the

murderer of Swedish Foreign Minister,

Anna Lindh[20]. Various incidents of

robbery has been used to identify the

robber for example a back robbery in

Aalsgarde Denmark [42] and Norwegian

NOKAS robbery[25, 24].

Performance and Eff ectiveness of Human GaitBiometric has been proved an eff ective

mean of security, but compared to other

biometric mechanism gait can be with

minimal or almost non user intervention

(Bashir, et al., 2010). For example, to

measure fi nger print, hand needs to be

place on the sensor and to measure face

or iris recognition, user has to pause their

work and wait at the scanner. Incase of gait

using any of the above 3 methods mention

above users do not need to wait or pause

their work it can be done smoothly.

Human Gait- Using Biometric for Mobile Phone Security

Kamal Sharma MSc Computing

Technical Trends

Page 25: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 25

A study by Mjaaland, et al., (2011) was

carried out on 50 participants so see if the

gate can be copied or imptate, it produded

EER of 6.2 %, and has been proved that it

is impossible to imitate or copy the gate

(Mjaaland, et al., 2011). Results indicate

the result worsen then more training was

provided to participants.

Modern smart phones such as iPhone,

android and blackberry phone has built-

in piezoresistive MEMS accelerometers,

which can measure acceleration in three

axis (x,y,z) to measure gyration in three

dimensions of movement when users walks

with the phone either in pocket or in hand.

The iPhone's accelerometer and

A-GPS module has been used by

researchers in the study of gait analysis

using Fast DTW algorithm which is

a variant of Dynamic Time Warping

(DTW) algorithm called FastDTW

(Tanviruzzaman, et al., 2009).

Challenges and Countermeasures of Using Human GaitHuman gait is a passive biometric

technique, will keeps looking for the owner

of the phone. Like other bio-metric system

human gait is not stable and has false-

positive. Most of the research done of

gait focuses on walking normally (60 gait

cycles per minute), at normal speed (132

milliseconds) on the fl at surface (Chan &

Rudins, 1994). Study by Tanawongsuwan

and Bobick(2002), shows that by changing

walking pattern such as speed and surface

can result to a diff erent gait. This is one of

the biggest limitations in applying human

gait in practical implementation.

Change is clothing and footwear can

produce diff erent gait and fail in verifi cation

process. Some other example such as

accident or injury, emotional state (sad or

over excited) or even if the user is drunk

can result a diff erent gait. The best way

to countermeasure is to have a secondary

authentication in place which would be

pin or password (Derawi, et al., 2010). An

"Adaptive Component and Discriminant

Analysis" (ACDA) is designed by (Bashir,

et al., (2010) which seamlessly integrates

with subspace analysis for robust

recognition and more accurate result.

Study by Derawi, et al., (2010)

show error rate of 20.1% indicated

biometeric gate is not mature enough

as practical solution and requires some

enhancements. Derawi, et al., (2010)

suggets cycle extraction technique should

be enhanced to get more accurate result.

Geng, et al., (2010) suggest use

of multiple biometric to improve the

accuracy and effi cient. Study was carried

out using gait and face recognition and

resulted more reliable result, although it

can argued the challenges of implementing

the same in mobile phone and it's increase

cost. So more economical and practical

approach would be use of traditional pin

or password based authentication.

Gait (Biometric) AuthenticationAuthentication is means of securing

access, for example you need to have

username and password to access a

system. For more secure system tokens are

you which are two factor authentication,

you have (password) and you are(tokens).

And in biometric you have and you are

clubbed in one where you are the key or

password.

Authentication process can be

broken into three process illustrated in

Fig. 1 below enrolment, verifi cation and

identifi cation (Maltoni, et al., 2009).

The above fi gure shows process

related to fi ngerprint authentication but it

is also been applied to gait authentication

process. The process of registering or

enrolling the users gait data into database

is done in the enrolment process.

Verifi cation process is the process in

which users gait data is verifi ed against

the gait data of other user in the database.

And fi nally result of the records match

is returned in the identifi cation process.

Based on the result of the process user

is authenticated and decided if users

should be allowed or restrict the access

(BenAbdelkader, et al., 2002).

We have seen earlier that every walk

will not result in the same gait data, so that

system is designed to enter more than one

gait data per user, where users is advised

to walk at diff erent pace, and in the

process of identifi cation systems uses a

preset threshold value to identify the user.

Success or failure of the implementation

of gate depends on the degree threshold

confi gured. If the threshold is set to smaller

Fig. 1: Enrolment, verifi ca on and iden fi ca on (Maltoni, et al., 2009)

Page 26: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 26 www.csi-india.org

value there are greater changes of false

positive (identifying some other users to

be that person) and larger the threshold it

is quite possible that same person could

fail authentication dues to variance in

the gait as discussed in section 5 above.

Success of the system is measure as false

acceptance rate (FAR) and false rejection

rate (FRR) which is false acceptance

and rejection against total number of

authentication (Søndrol, 2005).

Critical Evaluation As seen in section 4 above, research shows

that gait can be used for identifi cation

and authentication for security purpose.

Literature review revealed some use of

Machine Vision Based and Floor Sensor

Based being eff ectively used in the fi eld

of forensic and investigation crimes such

as murders and robbery. Wearable Sensor

Based Gait Recognition is most suitable

for implementation of authentication in

the smart phone available today. It can

be argued after seeing the limitation and

the false positive rate, it is not completely

ready to be used. Some literature review

revealed that it should be in combination

with other bio other bio-metric or other

traditional authentication methods like pin

or password.

There are other factors

to authentication and security

implementation such as feasibility,

although in theory passive biometric

seems feasible. Putting it into use is

something which only time will decide.

Another factor is cost; the existing pin

based authentication is economical and

does the job pretty well. It can be argued

that mobile companies or researchers

investing time and money to invent which

may not be required. This report focused

only on gait as an alternate and has

ignored other options such as fi ngerprint,

voice or ear size. Study has showed other

biometric such as fi ngerprint and voice

recognition to be more effi cient, accurate

and mature compared to gait (Wang &

Liu, 2011).

Further search on the google play

(formerly known as android market)

and iPhone App store, revealed there

already exist apps for iris scanner,

fi ngerprint and face recognition, example

eyeD® Biometric Password Manager

by Winkpass Creations, Inc for iphone

(Apple Inc 1, 2011) and other apps for

voice based password, face recognition

and fi ngerprint recognition. Although

while exploring some of the apps

revealed they were fake apps which are

used to play jokes and impress friend

example "Biometric Fingerprint Access"

By "Fuzzy Squirrel Software, LLC" (Apple

Inc 1, 2011), same is true for Google play

(earlier known as android market). But no

apps were found for gait analysis. It can

be argued that there is more popularity

among the users for other biometric

systems compared to gait which might

have lead to release of so many apps and

even fake paid apps.

As discussed in the introduction

smart phone are capable of do more

than just making calls, but we did not

discuss the fun part of it such as games,

music, camera live video records which

are memory and processor intensive, this

study have ignored this fact how it would

impact the performance of the smart

phone, although the smart phone available

today are getting more faster and reliable

in terms of memory and processor.

The other aspect is the battery life of

the phone, since gait is a passive biometric,

how would it impact the battery life of the

phone. Further study is recommended to

understand the technical feasibility of the

same (Bloom, et al., 2004).

ConclusionThis report started by evaluating gait as an

alternate option for mobile phone security.

Literatures say that gait is a reliable and

can be eff ectively used for security and

surveillance. Every individual has unique

gait, which cannot be copied or imitated.

Report highlights that gait can be

easily implemented in the smart phone

available in the market, as they have the

required hardware inbuilt (sensors). But

after carefully examining the limitations of

the gait, there is more research required in

this fi eld before it can be fully implement

in practical, although to overcome the

limitation it is recommended gait can

be used in combination with other

authentication methods biometric and

traditional like pin or password. Search

in the apps markets for biometric apps

revealed that gait is of less interest

among the app builder compared to other

biometrics. Hence it can be concluded

that gait as a technology is in a premature

state and an extensive research work is

required use this technology to secure and

authenticate mobile phone.

References [1] Apple Inc 1, 2011. eyeD® Biometric

Password Manager by Winkpass

Creations, Inc. [Online] Available at:

http://itunes.apple.com/us/app/

eyed-biometric-password-manager/

id389295175?mt=8 [Accessed 14 May

2012].

[2] Apple Inc, 2011. Biometric Fingerprint

Access By Fuzzy Squirrel Software, LLC.

[Online] Available at: http://itunes.

apple.com/us/app/biometric-finger

print-access/id419601677?mt=8

[Accessed 14 May 2012].

[3] Asher, N B et al., 2011. On the needfor

diff erent security methods on mobile

phones. New York, USA, Mobile

HCI '11.

[4] Ayyappa, E, 1997. Normal Human

Locomotion. Journal of Porsthetics and

Orthetics, 9(1), p. 10–17.

[5] Bashir, K, Xiang, T & Gong, S, 2010.

Gait recognition without subject

cooperation. Journal Pattern Recognition

Letters, 31 (13), pp. 2052-2060.

[6] BenAbdelkader, C, Cutler, R & Davis, L,

2002. Stride and Cadence as a Biometric

in Automatic Person Identifi cation and

Verifi cation. s.l., Microsoft Research.

[7] Birren, J E & Schaie, K W S, 2005.

Handbook of the Psychology of Aging. 6th

ed. s.l.:Academic Press.

[8] Bloom, L et al., 2004. Investigating the

Relationship Between Battery Life and

User Acceptance of Dynamic, Energy-

Aware Interfaces on Handhelds. Mobile

Human-Computer Interaction – MobileHCI

2004 , Volume 3160, pp. 43-79.

[9] Carmines, E G & Zeller, R A, 1979.

Reliability and Validity Assessment

(Quantitative Applications in the Social

Sciences). London: Sage Publications

Inc.

[9] Chan, C W & Rudins, A, 1994. Foot

Biomechanics DuringWalking and

Running. Mayo Clinic Proceedings,

Volume 69, p. 448–61.

[10] Christopher, 2010. Smart Phones

that Know Their Users by How They

Walk. [Online] Available at: http://

www.technologyreview.com/blog /

mimssbits/25767/ [Accessed 01 May

2012].

[11] Derawi, M O, Nickel, C, Bours, P &

Busch, C, 2010. Unobtrusive User-

Authentication on Mobile Phones using

Biometric Gait Recognition. Norway,

The Sixth International Conference

on Intelligent Information Hiding

and Multimedia Signal Processing,

Darmstadt.

Page 27: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 27

[12] Gafurov, D, 2008. Performance and

Security Analysis of Gait-based User

Authentication, Oslo: Ph.D. dissertation,

Faculty of Mathematics and Natural

Sciences, University of Oslo.

[13] Geng, X et al., 2010. Context-

awarefusion:Acasestudy on fusion

ofgaitand faceforhuman identifi cation

in video. Pattern Recognition , 43(10),

pp. 3660-3673.

[14] Han, J & Bhanu, B, 2006. Individual

recognition using gait energy image.

IEEE Transactions on Pattern Analysis

and Machine Intelligence, 28(2),

p. 316–322.

[15] Jenkins, J & Ellis, C, 2007. Using ground

reaction forces from gait analysis: Body

mass as aweak biometric. Pervasive, p.

251–267.

[16] Kale, A A, 2004. Algorithms for gait-

based human identifi cation from a

monocular video sequence, MD, USA:

Ph.D. dissertation, College Park.

[17] Lee, L & Grimson, E, 2002. Gait analysis for

recognition and classifi cation. Cambridge,

MA, IEEE, p. 155–161.

[18] Maltoni, D, Maio, D, Jain, A K &

Prabhakar, S, 2009. Handbook of

Fingerprint Recognition. 2nd ed. London:

Springer Verlag.

[19] Mäntyjärvi, J et al., 2005. Identifying

users of portable devices from gait pattern

with accelerometers. Oulu, Finland, IEEE.

[18] Marks, G E, 2010. Manual of Artifi cial

Limbs. New York: BiblioBazaar, LLC.

[19] Mjaaland, B B, Bours, P A H &

Gligoroski, D, 2011. Walk the walk:

attacking gait biometrics by imitation.

Berlin, Heidelberg, Springer-Verlag.

[20] Nakajima, K, Mizukami, Y, Tanaka, K

& Tamura, T, 2000. Footprint-based

personal recognition. IEEE Transactions

on Biomedical Engineeing, 47(11), pp.

1534-1537.

[21] Nixon, M S et al., 1999. Automatic

Gait Recognition. Biometrics – Personal

Identifi cation in Networked Society,

p. 231–250.

[22] Søndrol, T, 2005. Using the Human

Gait for Authentication, Gjøvik, Norway:

MSc Thesis, Gjøvik University College,

NISlab.

[23] Tanawongsuwan, R & Bobick,

A, 2002. Performance analysis of

time-distance gait parameters under

diff erent speeds. Guildford, UK, ACM,

pp. 715-724 .

[24] Tanviruzzaman, M, Ahamed, S I, Hasan,

C S & O’brien, C, 2009. ePet: When

Cellular Phone Learns to Recognize Its

Owner. ACM, pp. 13-17.

[25] Vaughan, C L, Davis, B L & O'Connor, J

C, 1999. Dynamics of Human Gait. 2nd

ed. Cape Town: Kiboho Publishers.

[26] Wang, S & Liu, J, 2011. Biometrics on

mobile phone, Recent Application in

Biometrics. Beijing, China: InTech. n

Abo

ut th

e A

utho

r Kamal Sharma is currently working as Technical Consultant with Mcafee India (An Intel Company). He has over 15 years

of rich IT Experience IT Infrastracture and IT Security Domain. He hold Masters degree in computing from University

of Central Lancashire, UK. During the work tenure has working for organizations like IBM, Symantec, Trend Micro and

Symantec. His areas of specialization are Comptuer Networks and Security and has been subject matter expert for

various security software’s like DLP (Data Loss Prevention), Cloud / Virtulization Security and Encryption.

Page 28: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 28 www.csi-india.org

ResearchFront

Resource Allocation Algorithm to Improve the Quality-of-Service in OFDMA System

R L Ujjwal*, Prof. C S Rai** and Prof. Nupur Prakash****Asstt. Professor, University School of Information and Communicaton Technology**University School of Information and Communicaton Technology***VC, Indira Gandhi Delhi Technological University for Women

IntroductionWireless mobile communications play a

very important role in our life. It provides

the communication services anywhere

and at anytime. In order to improve quality

of service, determined on the basis of

acceptable data transfer rate, signal to

noise ratio (SNR) and bit error rate (BER),

it is imperative to provide high capacity

downlink in cellular systems. It can be

achieved by management of resources

in orthogonal frequency division multiple

access (OFDMA) systems. Recently, the

OFDMA technique became popular which

can provide broadband transmission

over wireless channels for applications

including wireless multimedia and future

generation mobile communication

systems. The OFDMA divides the entire

transmission bandwidth into N orthogonal

subchannels (It make possible to eliminate

intersymbol interference that is a major

problem in the wideband transmission

over multipath fading channels). There

are two types of allocation schemes. First

one is static resource allocation, such

as frequency division multiple access

(FDMA) and time division multiple

access (TDMA). These schemes are not

optimal because they are fi xed regardless

of the current channel condition. Second

one is dynamic resource allocation, such

as OFDMA which allocates channels

adaptively to the users based on their

channels gain.

System ModelThe OFDMA is a system that assigns

subcarriers to diff erent users concurrently.

It means, more than one users can access

the air interface at the same time. The

OFDMA transmitter is same as OFDM

transmitter with some additions. In

OFDMA a user uses all channels at a

time, while in OFDM the diff erent users

can used diff erent channel at the same

time. The basic structure of the OFDMA

transmitter in IEEE 802.16e standard is

shown in Fig. 1. The stream of information

bits from the MAC layer are fi rst fed

into the data randomizer, MSB fi rst. The

data randomizer XORs the bits with bits

produced by a shift register. The randomizer

is applied only to information bits and is

present in both the uplink and the down

link. The purpose of randomization is to

avoid long sequences of consecutive “1” or

“0” in bits stream. A long run of “1” or “0”

can lose synchronization at the receiver

side. After data randomization, the

scrambled (Randomize) bits go into the

forward error correction (FEC) function,

which uses an error-correction code to

add redundancy bits for error correction.

The interleaving process is performed on

encoded data at the output of FEC. The

purpose of interleaver is to protect the

transmission against long sequences of

consecutive errors, which are very diffi cult

to correct. The interleaver operates in

two phases that is frequency space and

constellation space. In frequency space,

the consecutive coded bits are reordered

to make sure that these bits are later

mapped to nonadjacent subcarriers for

frequency diversity. In constellation space,

the consecutive coded bits are reordered

to make sure that these bits are later

mapped fairly to more and less signifi cant

bits of the constellation. The purpose of

repetition function is to increase reliability

of the transmitted bits. The bits may

be repeated by a repetition rate of 2, 4,

and 6. After the repetition, the symbol

mapper maps the bits to data symbols

based on the constellation used. The pilot

insertion function inserts pilot symbols.

The purpose of pilot symbol is channel

estimate. After pilot symbol insertion, the

high rate stream of data symbols goes

to the serial-to-parallel converter that

converts high rate serial stream of data

symbols into low rate parallel substream,

where the number of substream may be

equal to number of subcarriers in OFDMA

system. Then the data symbols go into

the subcarrier mapper, which assigns the

individual data symbols to the individual

subcarriers. The subcarriers mapper is

necessary in the OFDMA system because

the diff erent data symbols may have come

from diff erent users, and assigning data

symbols to diff erent subcarriers allows

multiple users to access the air interface

simultaneously.

Fig. 1: Block diagram of OFDMA transmi er

The output of subcarriers mapper

goes to inverse fast Fourier transform

(IFFT) where, the data symbols transform

from the frequency domain to the time

domain. Then, the transformed symbols

along with cyclic prefi x symbols go

into parallel-to-serial converter, which

arranges the transformed symbols in

time domain serially. The output of

parallel-to-serial converter is a block of

K transformed symbols, and this block is

called an OFDMA symbol. The digital-

to-analog converter changes the time

domain digital data to analog signal, then

RF modulation is performed and the signal

is up-converted to transmission frequency

and fi nally transmitted over the air.

Wireless mobile communications play a very important role in our life. It provides the communication services anywhere and at anytime. In order to improve quality of service, determined on the basis of acceptable data transfer rate, signal to noise ratio (SNR) and bit error rate (BER), it is imperative to provide high capacity downlink in cellular systems. It can be achieved by management of resources in orthogonal frequency division multiple access (OFDMA) systems.

Page 29: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 29

Let us denote the numbers of

subchannels by N and number of users

by K. The resource allocation scheme

provided to the OFDMA transmitter. We

assume that all K users in the system share

N subchannels with total transmit power

constraint Ptotal

and bandwidth B. The

channel information is fi xed in each time

slot and only the broadband scenario is

considered. At the base station transmitter,

the bits for each of the diff erent K users are

allocated to the N subcarriers, and each

subcarrier n (1 ≤ n ≤ N) of user k (1 ≤ k ≤ K)

is assigned a power pk,n

.

Resource Allocation Algorithm The quality-of-services can be improved

through optimum resource allocation

to users in OFDMA system. An optimal

algorithm can allocate subcarriers and

power to the users on the basis of the

quality of service requirements and

increases the capacity of system. The

users are divided in two categories that is

sensitive user (SU) category and general

user (GU) category, diff erentiated on the

basis on required data transfer rate, signal

to noise ratio, and bit error rate. The users of

SU category are more sensitive and require

guaranteed QoS, application like audio and

video. The users of GU category are less

sensitive and require less QoS compare

to the users of SU category, services like

E-mail, SMS etc. In this resources allocation

algorithm, the higher priority is given to

the users of SU category in assigning sub-

carrier but initially the each user gets a

sub-carrier that makes algorithm fair and

avoid starvation for users of GU category.

In this algorithm, sub-carrier and power

allocation performed sequentially that

reduces the complexity of algorithm.

The resource allocation algorithm can be described as:

1. Initialization

- User k = 1, 2… K

{Where – K is total number users in a

system}

- A is a set of available sub-carriers and

A = {1, 2… N}

{Where - N is number of sub-carriers}.

- Estimate the number of sub-

carriers required by each user

- The data rate Rk = 0 for all k and

a set of assigned sub-carriers to a

user is empty (Ωk =φ) for all k

2. Allocate a sub-carrier to each user

of both type of categories if the total

number of sub-carriers K is less than N

- Find a channel n that has highest

channel-to-noise ratio.

- Allocates channel n to the user k

and sets become Ωk = Ω

k ∪ {n}

and A=A- {n}

- If user category is SU than

Update the data rate Rk for SU category

Else

Update the data rate Rk for GU category

3. While (A≠φ or until fulfi ll requirement

of users of SU category)

- Find a channel n that has highest

channel-to-noise ratio.

- Allocates channel n to the user k and

sets become Ωk=Ω

k ∪ {n} and A=A- {n}

- Update the data rate Rk for SU category

4. After fulfi ll the requirement of users

of SU category, if any sub-carriers are

available then that sub-carriers are

allocated to users of GU category

- Find a channel n that has highest

channel-to-noise ratio.

- Allocates channel n to the user k and

sets become Ωk=Ω

k ∪ {n} and A=A- {n}

- Update the data rate Rk for GU category

Results and AnalysisThe wireless channel is modeled as a

frequency-selective multipath channel.

The total bandwidth is 5 MHz and it

is divided in 32 subcarriers. The total

power available at base station is 2W.

The number of user for the system varies

from 2 to 16 in increments of 2. In Fig. 2,

simulation result is showing that the new

effi cient algorithm increases the OFDMA

system capacity and bandwidth utilization

that is all time high compare to existing

algorithm developed by Rhee and Cioff .

Also the algorithm is more optimal and

fair where a set of proportional fairness

constraints is imposed and allocates best

subcarrier to the user that improves the

performance of the system.

Fig. 2: System capacity

Conclusion The results indicate that optimum

allocation of resources under OFDMA

system could be achieved through the

proposed algorithm. The system is

sensitive to requirements of diff erent

categories of users i.e. general users and

sensitive users and is capable of according

priority to sensitive users while ensuring

that general users are not ignored. It

demonstrates that the system capacity

can be enhanced without compromising

the fairness of allocation between diff erent

user categories.

References[1] J Joung, C K Ho, P H Tan and S Sun,

"Energy Minimization in OFDMA

Downlink Systems: A Sequential

Linear Assignment Algorothm for

Resource Allocation," IEEE Wireless

Communications Letters, vol. 1, no. 4,

2012.

[2] K W Choi, W S Jeon and D G Jeong,

"Resouce Allocation in OFDMA

Wireless Communications Systems

supporting Multimedia Services,"

IEEE/ACM Transations on Networking,

vol. 17, no. 3, June 2009.

[3] Z Mao and X Wang, "Effi ecient

Optimal and Suboptimal Radio

Resource Allocation in OFDMS

System," IEEE Transactions on Wireless

Communications, vol. 7, no. 2, 2008.

[4] T S Rappaport, A Annamalai, R M

Beuhrer and W H Tranter, "Wireless

Communications: Past Events

and a Future Perspective," IEEE

Communication Magezine., vol. 40,

pp. 148-161, May 2002.

The system is sensitive to requirements of diff erent categories of users i.e. general users and sensitive users and is capable of according priority to sensitive users while ensuring that general users are not ignored. It demonstrates that the system capacity can be enhanced without compromising the fairness of allocation between diff erent user categories.

Page 30: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 30 www.csi-india.org

Abo

ut th

e A

utho

rs

R L Ujjwal is working as Asstt. Professor in University School of Information and Communicaton Technology since

1st September 2006. He obtained his B.E. (Computer Science and Engineering) from M.B.M. Engineering College,

JNV University Jodhpur in 1999 and M.E. (Computer Technology and Application) from Delhi College of Engineering,

University of Delhi. His major areas of interests include: Wireless Communications, Computer Network.

Prof. C S Rai is working in University School of Information and Communicaton Technology. He obtained his M.E.

degree in Computer Engineering from SGS Institute of Technology & Science, Indore. He completed Ph.D. in area

of Neural Network from Guru Gobind Singh Indraprastha University in 2003. His teaching and research interests

include: Artifi cial Neural Systems, Computer Networks, Signal Processing

Prof. Nupur Prakash is working as a VC, Indira Gandhi Delhi Technological University for Women. She received her

B.E. (Electronics & Communication Engineering) and M.E. (Computer Science & Technology) degree from University

of Roorkee (now I.I.T. Roorkee) in 1981 and 1986 respectively. She completed her Ph.D. (Computer Engineering &

Technology) from Punjab University, Chandigarh in 1998 in the area of Natural language Processing using Artifi cial

Neural Networks.

[5] Z Shen, J G Andrews and B L Evans,

"Optimal Power Allocation in

Multiuser OFDM Systems," in IEEE

Global Communications Conference,

December 2003.

[6] C Y Wong, R S Cheng, K B Lataief

and R D Murch, "Multiuser OFDM

System with Adaptive Subcarrier, Bit,

and Power Allocation," IEEE Journal on

selected Areas in Communications, vol.

17, Oct 1999.

[7] W Rhee and J M Cioff , "Increase

in Capacity of Multiuser OFDM

System using Dynamic Subcannel

Allocation," in IEEE vehic. Tech. Conf.,

Tokyo, May2000.

[8] G Zhang, "Subcarrier and Bit

Allocation for Realtime Services in

Multiuser OFDMA Systems," in IEEE

International Conference, Jun. 2004.

[9] H Yin and H Liu, "An Effi cient

Multiuser Loading Algorithm

for OFDM-based Broadband

Wireless Systems," in IEEE Global

Telecommunications Conference,

2000. n

Page 31: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 31

The term ‘Cellular Automata’ represents

a rather broad class of computational

systems. There are a number of common

features, but the only universal property

is that they are made up of a number of

discrete elements called cells. Each cell

encapsulates some portion of the state of

the system. Typically, the cell population

is homogeneous, each one encapsulating

an equal portion of the state, and

arranged spatially in a regular fashion to

form an n-dimensional lattice. A Cellular

Automata has the following features:

1. It consists of a number of

indistinguishable cells (often several

thousand or even millions) arranged

in a regular lattice. The cells can

be placed in a long line (a one-

dimensional CA), in a rectangular

array or even occasionally in a

three-dimensional cube. In social

simulations, cells may represent

individuals or collective actors such

as countries.

2. Each cell can be in one of a small

number of stages – for example, ‘on’

or ‘off ’, or ‘alive’ or ‘dead’. We shall

encounter examples in which the

stages represent attitudes (such as

supporting one of several political

parties), individual characteristics

(such as racial origin) or actions (such

as cooperating or not cooperating

with others).

3. Time advances through the

simulation in stepladder. At each

time step, the stage of each cell may

change.

4. The stage of a cell after any time step

is determined by a set of rules which

specify how that stage depends on

the previous stage of that cell and

the stages of the cell’s immediate

neighbours. The same rules are used

to update the stage of every cell in

the lattice. The model is therefore

consistent with respect to the rules.

5. Because the rules only make

reference to the stages of other cells

in a cell’s vicinity, cellular automata

are best used to model situations

where the interactions are local.

For example, if gossip spreads by

word of mouth and individuals only

talk to their immediate neighbours,

the interaction is local and can be

modelled with a CA.

To summarize, cellular automata model a

world in which space is represented as a

uniform lattice, time advances by steps,

and the ‘laws’ of the world are represented

by a uniform set of rules which compute

each cell’s stage from its own previous

stage and those of its close neighbours.

Neighbourhood Classifi cationIn classic cellular automata theory there are three types of neighborhoods. They

are diff erent in shape and size. Other confi gurations have been proposed but were not accepted.

Types of Cellular AutomataLinear CA–Based on XOR logic

– Total 7 rules (60, 90, 102, 150, 170, 204,

240)

–Can be expressed through matrix (T),

- characteristic polynomial

–Next state of the CA cell P(t+1) = T. P(t)

60 102 150 204

1 0 0 0

0 1 1 0

0 1 1 1

0 0 0 1

T=

Additive CA–Based on XOR and XNOR logic

– Total 14 rules (linear rules +

195,165,153,105,85,51,15)

– Can be expressed through matrix, inversion

vector, and characteristic polynomial

– The next state of the CA cell P(t+1) = T.

P(t) +F

60 153 105 204 0 1 1 0F=

Some rules out of 256 are as follows:-

XOR Logic XNOR Logic

Rule 60 : qi(t+1) =

qi-1

(t) ⊕ qi(t)

Rule 195 : qi(t+1) =

qi-1

(t) ⊕ qi(t)

Rule 90 : qi(t+1) =

qi-1

(t) ⊕ qi+1

(t)

Rule 165 : qi(t+1) =

qi-1

(t) ⊕ qi+1

(t)

Rule 102 : qi(t+1) =

qi(t) ⊕ q

i+1(t)

Rule 153 : qi(t+1) =

qi(t) ⊕ q

i+1(t)

Rule 150 : qi(t+1) =

qi-1

(t) ⊕ qi(t) ⊕ q

i-1(t)

Rule 105 : qi(t+1) =

qi-1

(t) ⊕ qi(t) ⊕ q

i-1(t)

Rule 170 : qi(t+1) =

qi-1

(t)

Rule 85 : qi(t+1) =

qi-1

(t)

Rule 204 : qi(t+1) =

qi (t)

Rule 51 : qi(t+1) =

qi (t)

Rule 240 : qi(t+1) =

qi+1

(t)

Rule 15 : qi(t+1) =

qi+1

(t)

CA Technology for Target Applications• Error Correcting Codes

• Pattern Recognition

• Modelling of Physical Systems

• Cellular Mobile Network

• Classifi cation

• Data Compression

• Cryptosystem

• Authentication

• VLSI Circuit Testing

ConclusionCellular Automata have been around

since 1950. Geography was hesitant to

adopt CA as an urban modeling technique

(it didn’t happen before the mid-1980s).

Since then, many extensions of CA have

been proposed, some eff ective, others

not. Nowadays CA is a valuable tool for

spatially distributed modeling with many

applications (urban growth, wildfi re

spread and transportation).

References[1] J Von Neumann, “The Theory of Self-

Reproducing Automata”, University of Illinois Press, Urbana, Ill, 1966.

[2] A Llachinski, “Cellular Automata: A Discrete Universe”, World Scientifi c Publishing, Singapore, September 2001.

[3] S Wolfram, “A New Kind of Science”, Champaign, IL: Wolfram Media, 2002.

n

Cellular Automata

Dr. Rupali BhardwajAssistant Professor, Thapar University, PatialaArticle

Neighborhood state 111 110 101 100 011 010 001 000

Next State 0 1 0 1 1 0 1 0 (Rule 90)

Next State 1 0 0 1 0 1 1 0 (Rule 150)

Dr. Rupali Bhardwaj, born on July 24, 1976 at Dhampur, (UP). She had received post graduate degree (MCA) in

1999, from Gurukul Kangri University and doctorate degree from Bansthali Vidyapeeth, Rajasthan in 2011. She is

working as Assistant Professor at Thapar University in SMCA dept. She has published over 15 research papers in

International and National Journals of repute. She is life time member of CSI.

Abo

ut th

e A

utho

r

Page 32: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 32 www.csi-india.org

Practitioner Workbench

Wallace Jacob Sr. Asst. Prof. at Tolani Maritime Institute

Programming.Tips () »

Fun with 'C' Programs I. Is it possible to type, compile and execute a 'C' program without using the opening and closing curly braces?

Well, the answer is: It is possible using

the concepts of digraphs and trigraphs.

Theoretically, trigraphs refers to three

characters to represent a single character.

The trigraph ??< represents the '{' i.e.

(open curly brace) and the trigraph ??>

represents the closing curly brace. The

program below illustrates the usage of

trigraphs in a typical 'C' program.

Program listing one

#include<stdio.h>

main()??<

printf("Using trigraphs");

??>

In order to compile the program, the following instruction needs to be typed:

gcc <program-name.c> -trigraphs

On executing the program : ./a.out, the

following output might appear:

Using trigraphs

[Note: The trigraph ??= is for the # symbol,

similarly ??/ is used for the \ symbol.

An alternative to using the '{' and '}' is the

use of digraphs <% and %> respectively.

The code in program listing two illustrates

the use of digraphs:

Program listing two

#include<stdio.h>

main()<%

printf("Using digraphs");

%>

In order to compile the program, the

following instruction needs to be typed:

gcc <program-name.c>

On executing the program : ./a.out, the

following output might appear:

Using digraphs

The trigraphs ??< and ??> are replaced

by their single character equivalents by

the 'C' preprocessor before any other

processing, while digraphs are handled

during tokenization.]

II. Is there any method of converting the terminal driver from line-at-a-time mode to character-at-a-time mode?line-at-a-time mode implies that the user

has to press the <ENTER> key to read the

input from the terminal, character-at-a-

time mode implies that as soon as the user

types in a character it will be read from the

terminal. There are several methods of

converting the terminal driver from line-

at-a-time mode to character-at-a-time

mode. One of the methods of converting

from line-at-a-time mode to character-at-

a-time mode is illustrated below:

Program listing three

#include<stdio.h>

main(){ char ch;

system("stty raw"); /*for changing the terminal driver to character-at-a-time mode */

printf("\nEnter a printable character: "); ch=getchar();

printf("\n\nch = %c", ch);

system("stty cooked"); /*for changing the terminal driver to line-at-a-time mode */

return 0;}

n

Wallace Jacob is a Senior Assistant Professor at Tolani Maritime Institute, Induri, Talegaon-Chakan Road, Talegaon

Dabhade, Pune, Maharashtra. He has contributed articles to CSI Communications especially in the Programming.

Tips section under Practitioner Workbench.

Abo

ut th

e A

utho

r

Kind Attention: Prospective Contributors of CSI Communications -

Please note that cover themes of future issues of CSI Communications are planned as follows -

• May 2014 - Graph Theory

• June 2014 - Security in Software Development

• July 2014 - Business Analytics

• August 2014 - Software Engineering

• September 2014 - IT History

Articles and contributions may be submitted in the categories such as: Cover Story, Research Front, Technical Trends and Article.

Please send your contributions before 20th April for consideration in May 2014 issue.

For detailed instructions regarding submission of articles, please refer to CSI Communications March 2014 issue, where Call for Contributions is

published on page 37.

[Issued on behalf of Editors of CSI Communications]

Page 33: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 33

Programming.Learn("R") »

Packages in RIn this issue, let us discuss about the packages in R. Packages help

us to organize functions, data, code etc. in a well defi ned format.

Package is a collection of related set of functions, data fi les,

help fi les etc. provided for addressing a particular problem. They

are intended for various purposes such as statistical analysis,

graphics display, industrial applications. R provides a standard

set of packages which are available in any R installation. Other

packages are available from public package repositories, which

have to be downloaded and installed. Collection of these packages

are stored in the R libraries. To use a package, it should be loaded

into R environment. Packages can be operated either by GUI

(Fig. 1) or through commands.

Fig. 1 ‘Packages’ menu in R GUI

Listing PackagesTo list out the packages available in R, we can use the command

library ( ). This will list out all the set of available packages in a new

window as given in Fig. 2. The list of all packages installed in the

system can be obtained by the command installed. packages ( ).

Certain packages are loaded on startup by default. This can be

listed by using the command getOption ("defaultPackages").

Example:

> getOption ("defaultPackages")

[1] "datasets" "utils" "grDevices" "graphics" "stats" "methods"

Loading Packages For using the remaining packages that are not loaded by default,

we have to load them using commands or by using GUI. For

loading a particular package the command library ( ) is used, with

the package name as argument.

In R GUI, we can load a package using the Load Package option in

the Packages menu.

Finding and installing Packages inside RR provides several repositories for browsing packages. The

major repositories are CRAN and Bioconductor. CRAN is

hosted by the R foundation and Bioconductor is an open source

project for building tools to analyze genomic data. By default, R

fetch packages from CRAN. In the R interface, we can choose

repository from the Select repositories option.

Packages can be installed using R GUI and also through the

console. Packages are installed automatically into the R library.

Using R console: We can download the package using an

internet connection and install packages through the console.

For installing packages through the console use the command

install. packages () with the package name as the argument. The

repository from where the packages have to be downloaded is

given using repos parameter.

Example:

install.packages('RMySQL', repos='http://cran.us.r-project.

org')

We can also remove the installed packages using the remove. packages( ) command.

Using R GUI : In R GUI, from the Packages menu, select Install

package(s). Then R will list out all available mirrors. We have

to choose the mirror which is geographically close. Then select

the package we want to install and click OK. There is likewise an

option in the menu for installing packages from the zip fi le that we

have already downloaded. This can be done by using the option

Install package(s) from local zip fi les in the Packages menu.

n

Practitioner Workbench

Umesh P and Silpa BhaskaranDepartment of Computational Biology and Bioinformatics, University of Kerala

Fig. 2 Using library () command

"By connecting a device to the Internet, it is transformed from a stand-alone unit—which attracts a one-off payment—into a service that

generates recurring income. Value in the IoT lies not in the devices, but in selling new services off the back of them." - Wall Street Journal

Page 34: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 34 www.csi-india.org

Abstract: With each passing day, the

number of gadgets that are connecting

to the Internet is surpassing the number

of people connecting to the Internet.

This technology trend is pursued actively

by the automotive industry, which is

working on developing a ‘Connected

Car’. In this article, we present a brief

on how the automotive industry is on

course to a disruptive transformation

with developments around smarter

vehicles and related infrastructure. While

technologies mature, we believe the

world will witness an intermediate wave,

enabled by a healthy pairing of cars with

smartphones.

Introduction After the global proliferation and rapid

consumerization of smartphones, the

next disruptive transformation predicted

is the concept of ‘Internet of Things’.

From networked computers, to connected

people, we are now moving towards

connected ‘things’. Various sensors

embedded in personal devices, household

& industrial appliances, consumer and

enterprise equipment, including clothing

and vehicles are turning items and things

of daily use into smart devices. With

pervasive connectivity mechanisms, these

devices can interact with each other with

little or no human intervention, thereby

conjuring a humongous network – the

Internet of Things! The ability to sense

and send data over remote locations to

enable detection of signifi cant events and

take relevant actions sooner than later, is

the primary tenet behind the Internet of

Things (IoT).

IoT in Automotive Space There have been exciting recent

developments around IoT in the

automotive industry. Automakers,

telecommunication service providers and

leading technology companies are coming

together to build the Connected Car.

The Apple versus Google battle has

transcended the smartphone boundaries

to smart cars. The year of 2014 started

with Google announcing the formation

of an Open Automotive Alliance with top

car manufacturers (GM, Honda, Audi,

Hyundai) and chipmaker NVIDIA, to

bring Android OS into car dashboards.

Apple soon followed with the release

of CarPlay in early March with Volvo,

Ferrari, Mercedes-Benz and later with

other automakers such as BMW, Ford,

Jaguar, Honda, Nissan, etc. Prior to this,

QNX (now owned by BlackBerry) has

been commonly providing an enhanced,

embedded platform with connectivity for

infotainment in high-end automobiles.

These big players in mobile platforms are

setting their eye on creating a common

platform to allow a connected experience

across the smartphone and the vehicles.

Closer home, Mahindra Reva’s e2o is

the fi rst and only Indian car with ‘anywhere,

anytime’ connectivity with the customers.

Together with Vodafone as the connectivity

solution provider, it off ers telematics

features for convenience and safety.

Telecom Service Providers (TSPs)

are actively contributing in this space

with dedicated Machine-to-Machine

communication services through

embedded SIM chips. Vodafone is

working with BMW and Volkswagen to

bring connectivity to their vehicles. AT&T

provides a modular platform – Drive

with 4G LTE network connectivity for

automakers to off er customized features

such as diagnostics, voice recognition,

entertainment and automotive app store,

for an enhanced in-vehicle experience for

users. This will also enable the car to act

as a Wi-Fi hub, wherein all passengers

connect to a single access point for an

enhanced and immersive experience of

being connected on-the-go.

Infotainment Infotainment refers to a system that brings

information functions (i.e., navigation,

location-based services, rear seat web

browsing, social networking, etc.) into

the vehicle’s entertainment system. In the

past, high-end car manufacturers provided

Infotainment systems with very limited

functionality and connectivity and users

had no choice but to depend on the apps

provided by the automaker. The approach

taken by Apple to bring iOS to the car will

extend the iPhone to the vehicle. CarPlay

integrates the iPhone apps with the car’s

dashboard system once the latter is

plugged in via the USB. So, the user can

use the phone and messaging functions,

play music from iTunes, watch videos

and run navigation apps on the in-dash

display with a touch screen interface.

Apple’s voice-companion - Siri will also

allow actions through vocal commands

with minimal distraction while driving.

Similarly, the Google Projected Mode is

tipped to bring Android to the dashboard

and off er the calls, messaging, navigation

and multimedia functions to the vehicle.

Coming to the main advantage, this would

also bring the entire apps ecosystem

to the dashboard and present endless

possibilities for an in-car experience - read

out email and calendar reminders, order a

pizza on the way to the restaurant, switch

on the heater as you near your home – the

list could be endless.

Vehicle Communications As more and more connected cars

emerge and in-vehicle embedded

connectivity becomes common, a whole

new paradigm of vehicle communications

is set to unfold.

Madhusudhan Reddy Nukala*, Shreyas Bhargave** and Bipin Patwardhan****Principal Architect, iGATE**Technology Consultant, iGATE***Sr. Technical Architect, iGATE

CIO Perspective

Managing Technology>>

Transforming the Automotive Industry with Connected Cars –�An Internet of Things Perspective

There have been exciting recent developments around IoT in the automotive industry. Automakers, telecommunication service providers and leading technology companies are coming together to build the Connected Car.

Page 35: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 35

Vehicle-to-Vehicle (V2V)

communication, i.e. wireless exchange of the

position, speed and location data between

near-by vehicles can help to sense impending

threat and off er the opportunity to improve

the safety of commuters signifi cantly. Each

vehicle will continuously broadcast an ‘I Am

Here’ message along with the speed and

position from its computer.

Vehicle-to-Infrastructure (V2X)

communication is the wireless exchange

of information between vehicles and

roadside infrastructure. The vehicles in

transit will communicate with the roads,

digital signage, traffi c lights, safety and

control systems. This can avoid crashes

and traffi c congestion through intelligent

safety applications. As a result, it will

enable recognizing high risk situations

in advance and help take mitigation

measures in a timely manner by issuing

alerts and safety advisories. Drivers can

also be made aware of various other

conditions such as roadwork, diversion

and adverse weather conditions.

These mechanisms together

will not only facilitate in reducing the

number of accidents and casualties but

also in tracking, tracing and monitoring

vehicles on the move. Even in the event

of emergency, vehicles would be able

to quickly intimate details to roadside

assistance, emergency services,

insurance providers as well as family

members. In eff ect, the capability of V2V

and V2X communications will play a

major role in securing the safety of man

and vehicle alike.

Vehicles and Smartphones – A Potent Combination As the integration with smartphones and

vehicles gets deeper, the information

exchange will be two-way – Smartphone

to Vehicle and vice versa. Using the

On-Board Diagnostics (OBD/OBD-II)

data, information regarding engine and

other crucial vehicle parameters can be

displayed on the driver’s smartphones

and same can be sent to service provider

for analysis. Alerts related to the car and

performing actions on certain vehicle

parts will become seamless.

Actions • Lock/Un-lock vehicle doors

• Roll windows up/down

• AC temperature +/-

Alerts/Notifi cations• Open doors

• Lights ON

• Hand brake ON

Thus, leveraging the smartphones to

the fullest without depending on vehicles

having connectivity embedded within can

potentially bring out smart cars sooner. At

iGATE, we have developed a few solution

prototypes around the driver monitoring,

crash detection and vehicle diagnostics.

These applications demonstrate the

profi ling of a driver for a trip based on the

occurrences of pre-defi ned signifi cant

events, detecting a crash and triggering

alerts to pre-confi gured contact numbers

as well as on-device analytics with

complex event processing to provide

continuous feedback to the driver. The

concept applications have been developed

using on-board sensors and suitable

micro-controllers.

Smartphone sensors for driving

insights Commercial smartphones commonly

have sensors such as Accelerometer,

Gyroscope or Orientation sensor and GPS.

By docking the smartphone to the vehicle,

data from these sensors can be used to

detect driving patterns such as sharp

turns, sudden acceleration, hard braking,

drifting and speeding. This can be used

to profi le the driver as safe or aggressive,

to rate and compare diff erent drivers and

share such data with insurance providers

for customized premiums. Pay-As-You-

Drive (PAYD) and Pay-How-You-Drive

(PHYD) are the upcoming off erings from

auto insurance companies that reward

safe drivers and penalize rash ones with

diff erential premiums.

Smartphones paired with vehicle

sensors for emergency alerts In case of an accident, paring on-board

sensors with passengers’ smartphone

enables a mobile app to intimate

emergency services with vital information

about the location and impact of the

crash. The app can also trigger SOS alerts

to near and dear ones to inform about

the incident. It can also be programed to

notify life-saving information like blood

group and other health records of the

passengers to enable paramedics to

respond accordingly.

On-Board Diagnostics for on-device

analytics The On-Board Diagnostics (OBD/OBD-

II) port is commonly used in automobile

service and maintenance. While much

of the information from this such as

faults, vehicle and engine speed, engine

temperature, fl uid levels, gear shifts,

battery status, etc. is accessed regularly

at vehicle repair shops, till now it was

largely used for post-facto analysis;

i.e. only when some problem arises.

However, with smartphones pairing

with vehicles, this information can be

readily made available to the vehicle

owners, giving them a better picture of

the car performance. Monitoring these

parameters actively and with some

level of on-device analytics, drivers can

get proactive service alerts on their

smartphones and potential faults can be

identifi ed for early diagnosis and care.

For predictive analytics to be

eff ective, the vehicular data from a large

number of vehicles needs to be aggregated

for detailed study and analysis. While that

can help to detect and derive patterns, a

subset of the rules can be made available

for users through smartphone apps.

Conclusion We are used to being connected as

home, at work and at many other places.

Experiencing the same level of connectivity

when on the road in a seamless manner

will be a natural extension of our digital

lives. As cars get smarter and pair up with

the other cars, smartphones and things,

suitable analytical processing can be

applied to various operational parameters

along with the near-by happenings,

allowing automobile drivers as well as road

safety authorities to get better visibility

about the performance of the vehicle as

well as the ambient situation, allowing

for timely actions. As our cars get on to

the Internet bandwagon, a much smarter,

interconnected and well-informed

world of enhanced safety, security and

convenience awaits us. n

As cars get smarter and pair up with the other cars, smartphones and things, suitable analytical processing can be applied to various operational parameters along with the near-by happenings, allowing automobile drivers as well as road safety authorities to get better visibility about the performance of the vehicle as well as the ambient situation, allowing for timely actions.

Page 36: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 36 www.csi-india.org

Abo

ut th

e A

utho

rs

Madhusudhan Reddy Nukala (Principal Architect, iGATE): Madhusudhan has 14+ years of experience and

is currently leading the IoT initiative in iGATE’s Research & Innovation Group. In addition to IoT, he has strong

exposure to Enterprise Mobility, J2EE and EAI tools. He is active in providing technology consulting services and

has been involved in defi ning and identifying technology standards and frameworks in the Enterprise Mobility and

J2EE for top Fortune 500 companies. At iGATE’s Research & Innovation Group, he is involved in building hands-on

experience on emerging technologies through the creation of prototype applications, proof-of-concepts, thought

papers etc.

Shreyas Bhargave (Technology Consultant, iGATE): With over 14 years of experience in IT industry, Shreyas is

a technical architect and technology evangelist at the Technology Centre of Excellence in iGATE’s Research and

Innovation group. His current focus is on exploring emerging technologies such as IoT, Wearables, Augmented

Reality, Speech Recognition, Gamifi cation, etc. and their adoption in businesses and software service companies.

Prior to this, he had been active in the Enterprise Mobility and technology consulting. He holds a Bachelor of

Engineering degree from Mumbai University and is pursuing Master of Science from BITS Pilani.

Bipin Patwardhan (Sr. Technical Architect, iGATE): Bipin has over 15 years of experience in the IT industry. At iGATE,

he is part of the Future and Emerging Technologies group. The group explores new and emerging technologies

including wearable computing, analytics and augmented reality, to name a few. Technology exploration is supported

by the development of concept solutions to demonstrate suitability across various domains.

Page 37: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 37

Information Security »

Security Features in Contemporary Browsers and Tips for Safe Browsing

Security Corner Krishna Chaitanya Telikicherla*, Harigopal K B Ponnapalli** and Dr. Ashutosh Saxena***

*Research Associate, Security and Privacy Research Lab, Infosys**Principal Research Analyst, Infosys, India***Principal Research Scientist, Infosys, India

Abstract: This article is the tenth in the series of articles, focusing on security of the web platform. In our previous articles, we have

explained about the security policies implemented by browsers, some of the web application vulnerabilities and their mitigation

techniques. In the last article, we have shifted our focus from developers to end users, explaining some of the important security

features provided by modern browsers. In this article, we continue with the same theme and explain few more security and privacy

features provided by modern browsers and also share a few tips for having a safe browsing experience.

IntroductionWith the growth of e-commerce, social

networks and several other web based

transaction systems, the amount of

sensitive information which an average

web user stores on the web is increasing

rapidly. Attackers constantly fi nd ways

of stealing sensitive data of end users

using various techniques, of which social

engineering tricks are some of the most

prominent ones. Modern browsers have

several features which prevent malicious

attempts of attackers such as opening

popups, spreading malware etc. In the last

article, we have explained about phishing

and malware fi lters and SSL/TLS features

which are built into modern browsers. In

this article, we will explain about private

browsing mode, popup blockers, domain

highlighting features provided by browsers

and a few generic tips for safe browsing.

Security and Privacy Features Provided by BrowsersAs mentioned in the last article, browsers

come up with several inbuilt security

and privacy features which protect users

from various threats. Some of them are

explained below:

Private browsing modeWeb browsers cache information such

as cookies, browsing history, images,

auto-fi ll form data etc., which can be

retrieved at a later point of time. The

cached data prevents unnecessary

roundtrips to servers and often enhances

user experience. However, this data can

be misused by people with malicious

intent, especially in the cases of shared

machines (e.g., public kiosks). Though

browsers provide a way to delete

cookies, clear history, cache etc. through

various browser settings, an average

web user will not be familiar with these

options. Therefore, users leaving behind

traces of their browsing history, which

compromises their privacy. To mitigate

this privacy problem, modern browsers

came up with a private browsing mode,

which is known with diff erent names

in diff erent browsers (e.g., “Incognito”

mode in Chrome, “InPrivate Browsing” in

Internet Explorer and “Private Browsing”

in Firefox). In a private browsing mode,

data entered in forms, browsing history,

new cookies etc. will not be available to

future browsing sessions once the private

mode window is closed. Also, browser

extensions will be disabled in this mode

by default, thereby preventing extensions

from stealing user’s data in a webpage. So

on a shared machine at an Internet kiosk,

a user will not be able to fi nd out what

sites the previous user visited, if private

mode is used. It should be noted that the

privacy provided by this mode is purely

on the client side. Any intermittent proxy

server can maintain a log of websites

visited by a user.

Popup blockersPopups are windows that open

automatically, without the intervention

or permission of end users. Advertisers

use popups to promote their business by

attracting the attention of users. Several

websites which accept online payments

open their banking partner’s website via

popups. Though popups are useful for

several genuine purposes, they are also

the cause of several security problems.

Attackers use popups as a mechanism

to conduct social engineering attacks

and spread malware. To prevent users

from falling prey to popup-based attacks,

browser vendors have introduced inbuilt

popup blockers into their browsers,

which block all popups by default. Users

are prompted with a message informing

that popups are blocked on the site

they are visiting (see Fig. 1). They can

add exceptions if they feel that popups

on certain sites are required for certain

important interactions (e.g., online

banking scenario).

Domain highlightingPhishing is a technique commonly used

by attackers to trick end users and steal

sensitive information of users. In a typical

phishing attack, an attacker creates a fake

webpage which mimics a genuine website

and spreads it to users. If an unsuspecting

user visits the page and submits sensitive

data, the attacker will gain access to it. To

strengthen the attack, attackers normally

use sub domains which are deceptive e.g.,

http://www.icicibank----------.evil.com. At

a quick glance, it appears that the site being

visited belongs to ICICI bank, but it is only a

subdomain which is cleverly crafted by the

attacker. To prevent users from falling prey

to such tricks, modern browsers highlight

the domain name of the site and grey out

the rest of the URL in the address bar. Fig. 1

shows that the domain “popuptest.com” is

clearly highlighted and distinguished from

rest of the URL by all three browsers (IE,

Firefox and Chrome). This important visual

clue helps web users to quickly identify the

domain they are visiting.

Few Tips for Safe BrowsingPrivate browsing, popup blocking, domain

highlighting are some of the features

which are directly provided by browser

vendors. While leveraging these features,

users should also follow certain practices

to ensure a safe browsing experience.

Some of them are listed below.

Sensitive Data ManagementWe have seen that private mode helps

in deleting all traces of a user’s browsing

session. However, in cases where users

browse with older versions of browsers

which do not support private mode (e.g.,

in Internet kiosks), users should manually

Page 38: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 38 www.csi-india.org

delete the traces. While most browsers

provide features to auto fi ll forms,

remember passwords, recover from crash,

etc., they are primarily meant for users who

use a secure personal machine. While it is

not advisable to do sensitive operations

at public kiosks, a safe browsing practice

should include deleting sensitive data

traces like cookies, history before closing

the browser. A browser with private mode

is a better alternative since it does not

leave any traces after a browsing session

is concluded.

Auto-UpdateSecurity is a continuous process and is not

a one time job. Attackers keep innovating

new ways of exploiting browsers, vendors

come up with patches to fi x them. It is very

important for end users to regularly update

their browser to a latest version that in all

probability off ers better security. However,

uses rarely update their browsers, which

challenges browser vendors to provide a

safe browsing experience. Contemporary

browser vendors provide an option to auto-

update browsers to the latest versions in

the background without requiring much

interaction from users. Auto-update

feature relieves the end user from requiring

to download and apply latest patches. If

users want to manually verify if a latest

version is available, they can visit the

“About” section of their browser settings

page. The auto-update feature is turned on

by default and users can opt to turn it off

(not recommended though).

Installing browser extensionsUsers should be extremely watchful

before downloading free browser

extensions and add-ons that claim to

add several interesting features (e.g.,

extension which pose as video codecs).

They might be potential malware.

Browser extensions and add-ons become

a part of the running browser application

and will have elevated access to otherwise

sensitive inaccessible data. Hence, it

is very trivial for a rogue extension to

silently export a user’s sensitive data

to a spammer. Users are suggested

to carefully evaluate the reputation of

browser extensions and the permissions

they seek, before installing them.

Logging out of a websiteUsers often think that closing the browser

directly without logging out is a more

secure option. Contemporary browsers

have an option to reopen a user’s last

browsing session. Depending on the site’s

design, this may allow an attacker to

automatically login as a user, to a user’s

previously visited site. Hence, it is very

important that users properly logout of

websites before they quit the browser.

Saving bookmarksUsers bookmark interesting websites to

refer them at a later point of time. While it

is a good provision, if the URL contains any

sensitive data like username, password,

session Id, they will also be saved in the

bookmark. An attacker who has access to

that machine can view this sensitive data

easily. While bookmarking an interesting

site, it is good to watch the URL in address

bar and not to bookmark it if it contains

any sensitive data.

Using the “Remember Me” featureMost of the popular websites off er a “Remember Me” feature that allows users

Fig. 1: Popup blockers in IE10 and latest versions of Firefox, Chrome blocking popups automa cally

Fig. 2: Internet Explorer (IE10) showing an op on to reopen the last browsing session

Page 39: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 39

to login into websites for the next time without entering credentials. Most of such features assume the user to use a secure personal machine. From a developer’s perspective, implementing this feature requires storing the credentials or a reference to them in a secure manner on the user machine itself. This leaves the user’s account open for attackers. It is very diffi cult to get such implementations correct and many attacks were reported which exploit this feature. It is always safe to re-enter the password every time a user logs into a web site, rather using the “Remember Me” feature.

ConclusionIn this article, we have explained some of

the security and privacy features provided

by modern web browsers. We have also

explained a few safety guidelines, using

which users can have a safer browsing

experience. The web is moving very fast with

the introduction of several new specifi cations

under the HTML5 umbrella. Newer browser

architectures and security models are fast

evolving. Though users of web browsers are

not expected to keep track of these technical

changes, they are expected to update to the

latest versions of browsers to have a safe

browsing experience.

Disclaimer: All names of the websites,

services and applications mentioned in

this article are intended for informative

purposes only with no malicious and /

or promotional intents. Readers may

check with vendors, product and service

providers for the latest updates. All

trademarks, copyrights are owned by their

respective owners.

References[1] PopupTest.com – A website to test

popup blocking software.

[2] Incognito mode in Chrome: https://

s u p p o r t . go o g l e . c o m /c h ro m e /

answer/95464?hl=en

[3] Domain highlighting in IE8:

h t t p : // b l o g s . m s d n .co m / b/i e /

archive/2008/03/11/address-bar-

improvements-in-internet-explorer-

8-beta-1.aspx

n

Abo

ut th

e A

utho

rs

Krishna Chaitanya Telikicherla is a Research Associate with Security and Privacy Research Lab, Infosys Labs. His research focus

is primarily on web security, specifi cally analyzing browser security policies, web attacks, defenses and formal verifi cation of

web specifi cations. He is a regular blogger and speaker at several developer and security meets in India. For his contributions to

technical communities, Microsoft has presented him the prestigious “Most Valuable Professional (MVP)” award for 4 consecutive

years (2010-2013). He can be contacted at [email protected]

Harigopal K B Ponnapalli is a Principal Research Analyst at Infosys, India. His research interests include web application security

assurance, strong authentication and PKI. Ponnapalli received his M.Tech from the Indian Institute of Technology, Kharagpur, India.

He has 15+ years of experience in application security. He authored multiple papers and coauthored a book titled "Distributed

Systems Security: Issues, Processes and Solutions" (Wiley, 2009). He also fi led a few patents to his credit. You can contact him at

[email protected]

Ashutosh Saxena is a Principal Research Scientist at Infosys, India. His main research interest is Information Security. Dr. Saxena

received his Ph.D in computer science and has more than 80 international publications and SEVEN granted patents. He’s a life

member of CSI and senior member of IEEE. Contact him at [email protected].

Page 40: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 40 www.csi-india.org

Information Security »

Security Aspects in Internet of Things Domain

Security Corner Tapalina Bhattasali*, Dr. Rituparna Chaki** and Dr. Nabendu Chaki***

*Ph.D Scholar, Department of CSE, University of Calcutta**Associate Professor, AKCSIT, University of Calcutta***Associate Professor, Department of CSE, University of Calcutta

Advances in wireless technology permit

real-time acquisition, transmission and

processing of huge amount of critical data.

It has been seen that number of devices

connected to Internet exceeds number

of human beings around the world.

According to Libelium report, number of

devices connected to Internet will reach

to more than 50 billion around the year

2020. There will be urgent requirement

of huge data around bronto-byte (280 KB)

in near future, which enhances demand

for M2M communication. To connect to

Internet, each device must have unique

identity such as IP address. IPv4 protocol

is not capable to handle huge number of

devices, due to its limited address space

(232). Beside this, IPv4 address space has

been exhausted in February 2010. For this

reason, IPv6 steps in. IPv6 address space

of 2128 (approximately 340 undecillion

or 3.4×1038) is equivalent to assigning

100 address to each atom on the surface

of the world! Internet of Things (IoT)

has its roots in these. It is an emerging

concept which has the potential to make

life more comfortable, with the vision

of reducing human intervention. “IoT”

term was introduced by Kevin Ashton of

MIT Auto-ID Centre in 1999. The term

“Internet of Things” composed of two

words and concepts namely, “Internet”

and “Thing”, where “Internet” can be

defi ned as world-wide network of

interconnected computer networks, based

on a standard communication protocol

TCP/IP protocol, while “Thing” is an object

having independent existence, but not

precisely identifi able. Therefore, “Internet

of Things” means a world-wide network

of uniquely addressable, interconnected

objects, communicating with each other

over hybrid network to built Internet like

structure based on standard. Pervasive

environment provides better service

by hiding underlying technologies to

adapt IoT. IoT incorporates concepts

from pervasive, ubiquitous, and ambient

computing. IoT device can be a sensor

node, a light bulb, a microwave oven, a

smart phone, a tablet, a PC or a laptop,

a powerful server or a cloud. According

to NIC, Internet nodes may reside in

everyday things such as food packages,

furniture, paper documents and many

more by the year 2025.

Fig. 1: Internet of Things

It creates heterogeneous environment

by integrating Internet oriented features

(middleware), things oriented features

(sensors), semantic oriented features

(knowledge). “5A” that is based on “Any”

paradigm such as Anything, Anyone,

Anywhere, Anyhow, Anytime can be easily

implemented by using the concept of IoT.

It is a major step towards the evolution of

next generation network. According to ITU

Internet Reports 2005, four dimensions of

IoT have been presented in Fig. 2.

In order to make critical decisions

and provide quick response to the users,

IoT based applications involve real time

decision making, which in turn needs

to support high volume network traffi c

being driven by an alarming number of

heterogeneous devices. Major benefi ts

of cloud-based intelligent IoT framework

implementation can be summarized as

follows.

• No requirement of huge disk storage,

memory and resources during

execution of any application.

• Used by diff erent users from diff erent

locations using diff erent devices at

the same time.

• Support heterogeneous platforms

and operating systems.

• Diff erent versions of the application

can be applied without upgrading

user’s machine or software.

Technical Aspects of Internet of ThingsTechnology is a decisive factor for

enabling the realization of the IoT

concept. Following issues are going to

build up IoT. According to Cisco, there is a

diff erence between Internet of Things and

Internet of Everything (IoE); where IoT is

made up of billions of connected objects

and IoE is the smart network that are

required to support all the data generated

and transmitted by these objects. IoT

focuses mainly on objects or things,

whereas IoE brings together people,

process, data and things to make network

connection more relevant and valuable.

Fig. 2: Four dimensions of IoT

Page 41: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 41

Four dimensions of IoT are- Process

(delivering right information to right

place at right time); People (connecting

people in valuable ways); Data (convert

data into intelligence for better decision

making); Things (Internet of Things). IoE

is the integration of Machine to Machine

(M2M), Machine to People (M2P),

People to People (P2P) communications.

Example includes SCADA (Supervisory

Control and Data Acquisition), smart

grid, smart building, (M2M); remote

patient monitoring, smart parking (M2P);

e-commerce site (P2P). Internet of Things

includes M2M communication, Intranet

of Things, Web of Things, Cloud of Things.

M2M communication refers to the

technologies that allow both wireless and

wired systems to communicate with other

devices. Intranet of Things refers to the

network, where all the devices should be

within local area network, hidden behind

a fi rewall and locally controlled without

supporting interoperability. Web of Things

is an evolution of Internet of Things where

everyday objects are connected by fully

integrating them to the Web. It is about

reusing the Web standard (such as URI,

HTTP, etc.) to access the functionality of

the smart objects. Auto-ID Lab recently

used the term “Cloud of Things” (CoT) to

connect physical objects to the cloud.

Unique addressing schemes for

objects, their representation, and storage

of the exchanged information and

interoperability are surely going to be

main challenges. It is very likely that IPv6,

namely the IPv6 over Low-Power Wireless

Personal Area Networks (6LoWPAN),

is going to be the main candidate for

interconnecting intelligent things since

it has a potential of leveraging the two

basic concepts which brought success to

the conventional Internet, namely packet

switching and the "end-to end" principle.

The adaptation between full IPv6 and

the specifi c 6LowPAN format can be

performed by 6LowPAN routers, which

are situated at the edge of 6LowPAN

islands delimiting the constrained IoT

environment from the conventional

Internet. This greatly facilitates

interoperability, optimization and security

management of end devices. It enables the

use of IPv6 in low-power, low-bandwidth

wireless networks with constrained

processing capabilities. The focus must

be on lightweight communications, since

end devices are extremely resource-

constrained in terms of computing, energy,

and memory. Interconnection of such

resource-constrained devices develops

the front-end of an IoT system as opposed

to the back-end supporting background

processes like heavy computation, global

interconnection via Internet etc. Most of

the wireless communications between

end devices in the IoT environments

take place over unreliable channels. High

level of interference could occur from

other radio devices situated in close

proximity to IoT. In this context, wireless

personal area networks (WPAN) may be

of interest as they consider low- power

communication for resource-constrained

devices. For instance, IEEE 802.15.4

standard introduces a radio technology

for low-power, low-data-rate applications.

It has become a basis for a number of

low-power radio stacks, such as ZigBee,

6LoWPAN, due to its wide adoption and

ubiquity. When it comes to widespread

adoption and interoperability, a family

of 802.11 standards can be considered.

Although it is feasible for personal

computers, smart phones and other

handheld devices, but relatively high

power consumption has prevented it from

adoption into the world of embedded

communication. It has been claimed that

the low-power versions of this popular

standard have emerged recently thus

paving the way for its integration into

the environment of resource-constrained

devices. Another wireless technology

which can be seen as the enabler of IoT

is bluetooth, particularly bluetooth low

energy. Most of the emerging mobile

phones are going to be equipped with low-

energy bluetooth technology very soon,

which is likely to provide for a suffi cient

basis to make it truly ubiquitous.

Security Issues Increase in number of devices and amount

of data to support “Any” paradigm, raise

security concern. One of the major

challenges that must be overcome in

order to push Internet of Things into the

real world is security. IoT is forecast to

become a major security risk in 2014

as more products are connected to

Internet, according to predictions report

by the Information Security Forum (ISF).

The security threats are potentially

devastating, so organisations must ensure

that technology for both consumers and

Fig. 3: Cloud based intelligent IoT framework

IoT is forecast to become a major security risk in 2014 as more products are connected to Internet, according to predictions report by the Information Security Forum (ISF).

Page 42: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 42 www.csi-india.org

companies adhere to high standards of

safety and security. From the year 2014

onwards, attacks will continue to become

more innovative and sophisticated.

Therefore effi cient security solutions

must be prepared to tolerate unknown,

unexpected, high impact security events.

Security loopholes can occur at multiple

places in an IoT environment. Following

are the main issues which can determine

security vulnerabilities that may arise in

this type of environment.

• Heterogeneous environment

and mobility of objects result in

inconsistent interpretation of

collected data. They have great

infl uence over the protocol and

network security service.

• Large volume of data transmission

gives rise to scarcity of bandwidth

which results in denial of service.

• It is open to several unique

vulnerabilities because of its

distributed and ad-hoc nature.

• Burden of traditional security features

may be too large for limited resource

objects.

• Tracking of interacting objects may

become diffi cult in shared, unreliable

wireless medium.

• Data shared with unknown objects,

stored in third party domain, where

probability of data security decreases.

• Smart applications such as smart

healthcare, smart home, smart

transport, and smart city may need

to deal with user’s personal data that

may lead to serious threats to privacy

of the users.

It poses enormous security and

privacy risks. Data confi dentiality is

considered to be the most important issue

in this type of framework. This is required

to protect the data from disclosure,

and should not leak vital information

to external or neighboring networks.

Keeping the data confi dential does not

protect it from external modifi cations. An

adversary can alter the data by adding

some fragments or by manipulating the

data within a packet. This packet can later

be forwarded towards destination. Lack of

data integrity mechanism is sometimes

very dangerous. Data loss can also

occur due to improper communication

environment. Apart from modifying the

data packets, the adversary can also

change a packet stream by integrating

fabricated packets. The system should be

capable to verify the original source of data.

Adversary may sometimes capture data

in transit and replay them later to create

confusion. Most applications require

accurate estimation of source of the

event. Lack of smart tracking mechanisms

allow an attacker to send incorrect reports

about the location. Adversary may target

availability of critical data by capturing

or disabling a particular node, which may

sometimes result in serious damage.

Secure management of key distribution is

another challenging task.

Major attacks on IoT Devices could be

summarized as follows.

• Physical Attacks - example: micro

probing.

• Network Attacks – example: denial of

Service attack, routing attack.

• Software Attacks- example: virus,

worm, logic bomb.

• Environmental Attacks.

• Side Channel Attacks – example:

timing analysis, power analysis.

• Cryptanalysis Attacks-example:

cipher text only attack, man-in-the-

middle attack.

In completely automated

mechanisms, there is usually no prior

knowledge about each other and cannot

always be able to identify intruder. During

transmission between smart objects

in a network, it may be susceptible to

eavesdropping, either for insuffi cient

protection of communication medium

or for use of compromised session key.

Routing information in IoT can be spoofed,

altered, or replayed. Other known relevant

routing attacks include Sinkhole attack

or Blackhole attack, Selective forwarding,

Wormhole attack, Sybil attack.

There are several existing threats in

IP-enabled environment. Security in IPv6 is

almost same as IPv4 security in many ways.

However, there basic diff erences between

the two have led to some new security

vulnerabilities. In the transition period,

coexistence of IPv4 and IPv6 especially

creates problem regarding security. Major

threats related to IP enabled domain

(IPv6 / IPv4/ 6LoWPAN) are Protocol

transition attack, Reconnaissance attack,

Fragmentation attack, ICMPv6 misuse

attack, Routing header misuse attack.

6LoWPAN threats include both IPv6 and

WSN specifi c threats.

Threats related to sensor-cloud

environment include SPAM over Internet

Telephony (SPIT), Denial of Service (DoS),

Service theft.

It is almost impossible to isolate the

components of the IoT network physically

from the possible attackers and restrict

physical access to them. This in turn

endangers the integrity and confi dentiality

of information stored on end devices and

may cause availability violation.

A wireless nature of communication

greatly facilitates eavesdropping and

a number of other attacks on wireless

interface, such as Jamming, DoS, Relay

attack etc.

Bluetooth communication mainly

faces threats like Bluejacking, OBEX Push,

Bluesnarfi ng, HeloMoto, Bluebugging,

DoS attacks.

Constrained computational and

energy resources do not allow for utilization

of complex security mechanisms, which

can ensure confi dentiality and integrity

of data residing in end devices and

transmitted over an inherently insecure

wireless channel.

Communication with smart objects

in resource-constrained environments

must necessarily take into account

the limitations, especially in scenarios

where security is a crucial aspect and

conventional cryptographic primitives are

inadequate. Major threats include Privacy

threat, Firmware Replacement Attack,

Cloning of smart objects by untrusted

manufacturer.

Cloud computing is an on-demand

self-service model, where resources

are shared and pooled to serve multiple

customers using a multi-tenant model.

In cloud environment main concern

is lack of trust. In this, single physical

medium is shared among multiple virtual

machines (VM). Therefore integrity and

availability are two major requirements

in this scenario. Most of the threats are

Major threats related to IP enabled domain (IPv6 / IPv4/ 6LoWPAN) are Protocol transition attack, Reconnaissance attack, Fragmentation attack, ICMPv6 misuse attack, Routing header misuse attack. 6LoWPAN threats include both IPv6 and WSN specifi c threats.

Page 43: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 43

caused due to poor management and

access control of VM. Session hijacking/

overriding, Virtual machine escape, SQL

injection attack, Cross-site scripting

attack are the major threats. Multi-

tenancy in cloud can expose customers’

VM that may lead to information leakage.

As customer does not have direct access

to physical storage of data, there is a

possibility that unauthorized copy of data

is misused later for malicious purpose.

There is no assurance that data will be

physically deleted from all places of

third party environment when data are

no longer required. Protection of stored

sensitive data is dependent on security

controls provided by service provider.

Trust, security and privacy issues are

major roadblocks in cloud computing

adoption. Cloud characteristics bring in a

set of risks and enhanced security controls

are required to mitigate those risks.

Therefore, intelligent framework

should be considered in such a way so that

it can analyze the above mentioned issues

and to adapt dynamic mechanism.

Security Requirements • Accurate implementation

of confi dentiality, integrity,

authentication, non-repudiation,

access control.

• Privacy preserving technology.

• Decentralized trust model for objects

within network.

• Dual stack security model at

6LoWPAN router/gateway.

• Use of lightweight cryptography

requires minimum amount of

essential resources of target objects.

• Maximum security can be achieved

by designing eff ective IDS. In

heterogeneous domain it acts as

second line of defence. Design of

eff ective IDS capable to work on

heterogeneous environment of IoT

(IPv4-IPv6-6LoWPAN enabled IDS).

• Proper integration of all security

features of heterogeneous domains.

ConclusionResearchers have been working for

quite some time in designing ubiquitous

framework for smart applications.

Different projects impose security

in different ways. Even though, most

projects succeeded in implementing

their proposed security frameworks, it is

not easy to provide a fully-secured IoT

system in heterogeneous domain that

can combine all security components

in a single solution. There is no single

security framework that could claim

full protection for cloud based IoT

environment. As IoT covers different

type of domains, security for individual

domain may exist, but no integrated

security framework has been considered.

Two most sensitive security concerns

are transmission and storage of critical

data. Therefore, main focus should be

given to two of these major security

requirements to make the system more

efficient. One technique is to develop

low overhead cryptography for securing

data transmission and other is to build

secure trust model to store data in third

party environment. Without proper

security framework, intelligence in IoT

may lead to major catastrophe. There

is no suitable standard defined till date.

So more research works are needed on

security for Internet of Things.

References[1] ITU Internet Reports 2005: The Internet of

Things, Executive Summary, http://www.

itu.int/wsis/tunis/newsroom/stats/The-

Internet-of-Things-2005.pdf.

[2] Libelium Unveils the Top 50 Internet

of Things Applications, http://www.

i t w i re .co m /o p i n i o n - a n d - a n a l ys i s /

beerfi les/54432-libelium-unveils-the-top-

50-internet-of-things-applications.

[3] Internet of Things in 2020: A roadmap

for the future, Workshop report by EPoSS

(EuropeanTechnology Platform on Smart

Systems Integration), http://www.iot-

visitthefuture.eu/fi leadmin/ documents/

researchforeurope270808_IoT_in_2020_

Workshop_Report_V1_1.pdf.

[4] T Bhattasali, R Chaki, and N Chaki, “Study

of Security Issues in Pervasive Environment

of Next Generation Internet of Things”, In

Proceedings of CISIM 2013, 2013, Springer,

LNCS.

[5] T Bhattasali, R Chaki, and N Chaki, “Secure

and Trusted Cloud of Things”, INDICON

2013,IEEE Xplore. n

Abo

ut th

e A

utho

rs

Tapalina Bhattasali is at present doing her PhD in Computer Science & Engineering from University of Calcutta. She

has a few years of working experience in academic fi eld. She has number of international publications to her credit.

She is a member of various professional organizations like CSI, ACM. Her primary research area includes Security in

wireless domain, Internet of Things and Cloud Computing. She can be reached at [email protected].

Dr. Rituparna Chaki is an Associate Professor in AKCSIT, University of Calcutta. Her primary areas of research

are Wireless Mobile Ad-hoc Networks and Wireless Sensor Networks. She has also served as a Systems Manager

for Joint Plant Committee, Government of India for several years before she switched to Academia. Dr. Chaki has

number of international publications to her credit. Dr. Chaki has also served in the committees of several international

conferences.

Dr. Nabendu Chaki is an Associate Professor in the Department Computer Science & Engineering, University of

Calcutta. Besides editing several volumes in Springer proceedings, he has authored several text books and several

refereed research papers in reputed Journals and International conferences. His areas of research interests include

distributed systems and software engineering. Besides being in the editorial board for several International Journals,

he has also served as program chair of several international conferences.

Diff erent projects impose security in diff erent ways. Even though, most projects succeeded in implementing their proposed security frameworks, it is not easy to provide a fully-secured IoT system in heterogeneous domain that can combine all security components in a single solution. There is no single security framework that could claim full protection for cloud based IoT environment.

Page 44: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 44 www.csi-india.org

Solution to March 2014 crossword

Brain Teaser Dr. Debasish Jana

Editor, CSI Communications

Crossword »Test your Knowledge on Internet of Things (IoT)Solution to the crossword with name of fi rst all correct solution provider(s) will appear in the next issue. Send your answers to CSI

Communications at email address [email protected] with subject: Crossword Solution - CSIC April 2014

CLUESACROSS1. A system that can enable machines to respond to human requests based on

meaning (8, 3)

7. The fi rst publicly used version of the Internet Protocol (4)

8. Global network connecting any smart object (8, 2, 6)

10. Portable data terminal (3)

11. Wireless non-contact use of RF electromagnetic fi elds to transfer data (4)

12. The person who envisioned Device to Device communication (4, 3)

14. Proximity based standards for devices to establish radio communication (3)

16. A universal unique electronic identifi er used to identity for every physical

object (3)

18. A device that senses measurable information and then reacts to it (6)

21. Data about data (8)

22. A forwarding element that enables various local networks to be connected (7)

24. Properties of an entity that makes it defi nable and recognizable (8)

25. Intel system on chip (SoC) platform designed for smartphones and tablets (4)

26. The transmission of a packet to multiple destinations in a single send

operation (12)

28. Internet Engineering Task Force (4)

29. An on-line database service allowing developers to connect sensor-derived

data (6)

DOWN2. Media access control (3)

3. A wireless technology standard for exchanging data over short distances (9)

4. A method of communications between two electronic devices over the

World Wide Web (3, 7)

5. Authentication information required to connect to a resource (10)

6. An optical machine-readable representation of data (7)

7. Named set of operations that characterizes the behavior of an entity (9)

8. Ability of making systems and organizations to inter operate (16)

9. Extensible Markup Language (3)

13. A componentized version of the Windows XP Professional edition (3)

15. Standardized connection of computer peripherals (3)

17. A platform to connect the ideas, people and companies creating the Internet

of Things (10)

18. Service oriented architecture (3)

19. Framework for resource description (3)

20. A communications protocol for message-oriented middleware based on

XML (4)

23. Language for describing web ontology (3)

27. The communications protocol that promises to connect every device on the

Internet (4)

Did you hear about Internet of Things?

Although IoT research and availability are not in full scale, back in July 2009, Kevin Ashton commented in "That 'Internet of Things' Thing" published in RFID Journal, “...We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so.”

We are overwhelmed by the responses and solutions received from our enthusiastic readers

Congratulations toDr. Madhu S Nair (Dept. of Computer Science, University of Kerala,

Kariavattom, Thiruvananthapuram, Kerala)

for ALL correct answers to March 2014 month’s crossword.

1

T H E S2

A U R U S3

B Z4

U

O5

C H I T R A N K A N6

B L A I7

G8

P H O N E M E G9

I S C I I

A A10

I11

T R A N S O S

S G12

I D D T

A R13

I N D L I N U X E14

P

I I S L15

G16

Q H

N17

S C18

L T U O

D W19

T R A N S L I T E R A T I O N20

P I N A A K I X M L E

A M21

P H22

O N E I I L T23

M24

I A S T B C L P I

A N S25

K O L A C

D A26

K A R T I K A N O D S

H T R L C

Y H U I27

S A R O V A R28

B A R A H A I M E N

M N G29

F O N T A

1 2 3

4

5 6 7

8

9 10 11

12 13 14

15 16 17

18 19

20

21 22

23 24

25

26 27

28

29

Page 45: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 45

Ask an Expert Dr. Debasish Jana

Editor, CSI Communications

Your Question, Our Answer"Try not to become a man of success. Rather become a man of value.”

~ Albert Einstein

On Android: x and y coordinates of GestureOverlayView

From: Rashmi Trivedi

Hello Sir / Madam

I have a class which extends Fragments. I have a GestureOverlayView,

set as KeyStrokeType = MULTIPLE, in the fragment xml. I want to

extract the coordinate values of the stroke as and when i write on the

GestureOverlay.

I am new to Android and Java programming. Please help.

Thank you.

A In Android development framework, the Fragment class

helps to create applications that could span the available

width of the device and supports layouts that span multiple

panes (suitable for tablets) or could be confined to single

pane (mobile handset) as well. On mobile handsets, you

require separate Activity that could host a Fragment and to

accommodate space, you switch between Activities.

Using GestureOverlayView, drawing free hand becomes

convenient. A transparent overlay for gesture input can be

placed on top of other widgets and may contain other widgets.

Presume that you extend Fragment and have

GestureOverlayView, so your class should like the following:

public class MyFragment extends Fragment implements OnGesturePerformedListener {. . .}

Using GestureOverlayView, you need to call the method

addOnGesturePerformedListener to add the listener and must

implement the interface OnGesturePerformedListener. That’s

why, you need to use implements OnGesturePerformedListener.

Thereafter, whenever a gesture is detected, the method

onGesturePerformedListener gets called.

If you have a method onTouchEvent, then within that method,

you get a MotionEvent as argument to the listener. From that

argument, say, called as touchevt, you may query the x and y co-

ordinates by calling getX() and get(Y) respectively for the event.

For example,

public boolean onTouchEvent(MotionEvent touchevt) { float x = touchevt.getX(); float y = touchevt.getY(); . . . .}

Another sample program segment that extends an Activity and

implements OnGesturePerformedListener is given below.

public class GestureSample extends Activity implements OnGesturePerformedListener { private GstrLrary gstrL; @Override public void onCreate (Bundle savedInst) { super.onCreate(savedInst); GestureOverlayView gstrOvrlyVw = new GestureOverlayView(this); View infl = getLayoutInflater().inflate (R.layout.main, null); gstrOvrlyVw.addView(infl); gstrOvrlyVw.addOnGesturePerformedListener(this);gstrL = GstrLraries.fromRawResource(this, R.raw.gestures); if (!gstrL.load()) { finish(); } setContentView(gstrOvrlyVw);}@Overridepublic void onGesturePerformed(GestureOverlayView overlay, Gesture gesture) {ArrayList<Prediction> predictions = gstrL.recognize(gesture); for (Prediction prediction : predictions) { if (prediction.score > 1.0) { Toast.makeText(this, prediction.name, Toast.LENGTH_SHORT).show(); } } }}

In Android, Toast is a notifi cation message that pops up, stays

displayed for a certain amount of time, and automatically fades in

and out. This is used mostly for debugging purpose.

Also, the following code fragment shows use of OnGestureStarted

that gets called when a manipulation starts. From the MotionEvent

argument, we may get the values of x and y coordinates as shown

below:

public void onGestureStarted (GestureOverlayView ovrl, MotionEvent evt) { if (mGestureType == MULTIPLE_STROKE) { ovrl.cancelFadingOut(); } float mX = evt.getX();float mY = evt.getY();. . . .}

For more info on GestureOverlayView, you may refer:

http://developer.android.com/reference/android/gesture/

GestureOverlayView.html

n

Do you have something to ask? Send your questions to CSI Communications with subject line ‘Ask an Expert’ at email address [email protected]

Page 46: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 46 www.csi-india.org

CSI Reports

From CSI SIGs / Divisions / Regions and Other News »Please check detailed reports and news at:

 http://www.csi-india.org/web/guest/csic-reports

SPEAKER(S) TOPIC AND GISTDIVISION IV COMMUNICATIONS

Dr. A Basu, Dr. AK Nayak, Dr. Suvendu Rup, Dr. Anjali Mohapatra,

Dr. Debasish Jana, and Dr. Rachita Mishra

Guests on stage

21-22 February 2014: National Seminar on “Recent Advancement in Information Technology (NSRAIT – 2014)”Dr. Basu talked on Cloud Computing & Big Data and emergence of Cloud as information technology designed for availability of computing resources to users “on demand”. Dr. Nayak talked on Emerging Trends in ICT for National Development. Dr. Rup highlighted Recent Advances in Intra-Key-Frame Coding and Side Information Generation Schemes in Distributed Video Coding. Dr. Mohapatra spoke on bio-informatics & described Motif Search in DNA Sequences using Generalized Suffi x Tree. Dr. Jana spoke on Novel ECDLP-based Blind Signature scheme based on Elliptic Curve Discrete Logarithm Problem. Dr. Rachita focused on General-Purpose computing on Graphics Processing Units (GPGPU), which is utilization of graphics processing unit (GPU) as multiple processors, to perform computation in applications traditionally handled by CPU.

Dr. Prasad spoke on Model Based Testing of Object-Oriented Programs. Dr. Pattnaik spoke about computational intelligence. Dr. Samal focused on real time operating system& spoke about key characteristic of RTOS, level of its consistency concerning time it takes to accept and complete application task. Dr. Pattnaik delivered session on Cloud Computing, its application area and implementation. Dr. Das talked on Delay-Tolerant Network. He described how applications are expected to tolerate much longer delays using DTN.

DIVISION I & IV & REGION-1 IN COLLABORATION WITH IEEE UP SECTION AND CSI MATHURA CHAPTER

Sanjeev Nikore, Prof. Rajeev Tripathi, Prof. Krishna Kant,

Prof. Nishchal Verma and Prof. Ekram Khan

Inaugural Session

1-2 March 2014: International Conference on “Information Systems and Computer Networks: ISCON-2014”Prof. Kant introduced Conference theme. Mr. Nikore addressed topic of employee relationship management which focused on set up of do-it-yourself knowledge exploration. Prof. Tripathi focused on Adaptive Modulation and Coding Schemes as promising technique to support demands for high data rates and wideband proposed for 4G mobile communication. Prof. Verma delivered key note speech on Intelligent Informatics. This deals with interdisciplinary research on artifi cial intelligence, cognitive science, knowledge engineering, information technology and engineering management. Prof. Khan spoke on designing wireless video communication system which is a challenging task due to high error rates of wireless channels, limited and dynamically varying bandwidth availability and low energy and complexity requirements of portable multimedia devices.

DIVISION-II (SOFTWARE), CSI ALLAHABAD CHAPTER, IEEE CSI COUNCIL AND IFIP-TC9 ICT & SOCIETY

Prof. GC Nandi, Prof. Greg Adamson, Prof. MGPL Narayana, Supriya Kummamuru, Prof. OP Vyas, Prof. Anupam Agarwal, Prof. MM Gore and Prof. TV Gopal

L-R: Prof JN Tripathi; DK Dwivedi; Prof. KK Bhutani, Prof. GC Nandi; Prof. TV Gopal; and Prof. Greg Adamson (on the screen through SKYPE)

9 March 2014: Seminar on “Norbert Weiner, Cybernetics, Humanity & Technology”Prof. Nandi inaugurated Seminar and emphasized that researchers must focus on issues relating to Social Cybernetics. Prof. Adamson gave enlightening talk through SKYPE about the Norbert Weiner & his wide ranging contributions to Science of Automation. Prof. Narayana gave presentations on Cybernetic approach for Business Solution Design. Ms. Kummamuru gave presentation on Evolution of Cybernetic Model: Outcome of TCS consulting practice through SKYPE. Prof. Vyas explained Mobile Software Engineering-Opportunities and Challenges. Prof. Agarwal spoke on Human Computer Interaction. Prof. Gore talked about Ethics & Cybernetics. Prof. TV Gopal gave presentation about what impacts Progress of Cybernetics.

Page 47: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 47

CSI NATIONAL YOUNG IT PROFESSIONAL AWARDS

Prof Bipin Mehta, Prof. RP Soni, Mr. Naishadh Diwanji, Dr. Nityesh Bhatt, Mr. Vijay Shah and Dr. Harshal Arolkar

YITP-2013-Na onal Round Par cipants-Jury and Chapter OB

6 March 2014: CSI National YITP Finals and Award Ceremony

After short listing nominations, 35 teams comprising of professionals from IT companies, technical institutes, entrepreneurs and researchers participated at Regional Level. Evaluation process had 2-tier selection to select Winner, Runner-up & Special Mention. Regional round was conducted at Allahabad, Kolkata, Ahmedabad, Bhubneswar, Aurangabad and Thiruchirappally Chapter. Most outstanding technology project of any kind, completed during the year 2012-13 where project duration could be of 2-3 years from the start date, were judged. The selection committee considered factors like criticality of IT usage, improvement of customer service, innovation, quality of management and impact on organization and society to judge each project. Winners were Centre for Development of Advance Computing, Kolkata Team Amritasu Das, Ravi Sankar and Surya Kant. Project was Handheld Electronic Nose - An Embedded Application for quality assessment of tea.

DIVISION III & IV AND CSI INDORE CHAPTER IN ASSOCIATION WITH IEEE AND SRI AUROBINDO INSTITUTE OF TECHNOLOGY, INDORE

Prof. Aynur Unal, Anadi Upadhyay, Prof. P Trimurthi, Dr. AK Nayak, Anurag Mandloi, Kinshuk Trivedi, Dr. Sudhakar Bharti, Dr. CK Jain, Dr. Aaquil Bunglowala and Dr. Durgesh Kumar Mishra

Guests and dignitaries on stage

8-9 March 2014: International Conference on “IT in Business, Industries and Government”Prof. Unal said that Technology has brought revolution in Medical Sciences. She shared her Research work on Big Data in fi eld of Medical Sciences. Mr. Upadhyay discussed issues related to Big Data & Analytics. He also discussed details related to Data mining, Data analysis and Online Recommendation Angle. Prof. Trimurthi said that Data Analytics prevailed even in ancient times. The need is to have Data and analyze it correctly. Data & Research will always help for better future. With examples he said – Data & proper analytical system gives momentum and right direction to your career. Mr Mandloi was connected via Online Lecture from USA. He informed that his company Early Warning Services provides Online Data Security for 5 reputed multi-national banks. They identity defaulters of these banks. They also provide the online data security via social security numbers. 32 subject experts (National & International) shared their experience in this event.

CSI NATIONAL HEADQUARTERS, TARAMANI, CHENNAI

CSI Staff members

Organizers and par cipants of the CSIDay Celebra ons

6 March 2014: CSI Day Celebrations

To commemorate the beginning of CSI Golden Jubilee Celebrations, CSI Flag was hoisted by Mr. Rajan T Joseph, Director (Education). All staff members Mr. S Ramasamy, Mr. Y Kathiresan, Mr. Gnanasekaran, Mr. Natarajan, Mr. Mythreyan, Ms. Miraclin, Ms. Manjusha, Ms. Srividya and Ms. Chithra took pledge to serve for the CSI Community with vigour. Director of Education remembered CSI stalwarts during his speech after hoisting the flag. The meeting came to an end after cutting a cake.

CSI BEST PHD THESIS AWARD –2013 CHENNAI

S Ramanathan, Sanjay Mohapatra, Dr. B Poorna,

Rajan T Joseph, S Ramasamy and Prof. P Kumar

Ph.D award winners with CSI OBs

22 March 2014: PhD Thesis Award Presenting Ceremony

The Best PhD Thesis Awards for the year 2013 were presented at a ceremony. The Awards, Certificates and Cash Prize were distributed by Mr S Ramanathan, Hon. Secretary & Chief Guest, Mr Sanjay Mohapatra and Dr B Poorna. The event was held concurrently with the valedictory function of “National Conference on Recent Advances in Computing and Communications” organized by CSI Chennai Chapter and the CSI SB Shri Shankarlal Sundarbai Shasun Jain College for Women, Chennai. The Awards were presented to Dr. P N Jebarani Sargunar, Dr. S Malathi and to Dr. R Shreelekshmi respectively.

CSI-EDUCATION DIRECTORATE, MIT PUNE

Mr. Shekhar Sahasrabudhe, RVP-VI

Mr. Sahasrabudhe presen ng trophy to winners

22 March 2014: National Student Project Contest and Expo

Objective was to encourage students from CSI student branches to design innovative projects, improve their skill set and become market ready. The contest aimed at involving young students all over India in the quest of innovation in IT and provided them an opportunity to demonstrate their projects with strong social relevance. The Contest was open to students across India, who formed teams of 2 within their respective colleges and participated in rounds at various levels. The Contest aimed to identify students who can develop solutions for real time problems and scenarios with a focus on societal benefit. This competition was held at various regional centres and Finals was conducted at MIT, Pune .

Page 48: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 48 www.csi-india.org

CSI News

From CSI Chapters »Please check detailed news at:

 http://www.csi-india.org/web/guest/csic-chapters-sbs-news

SPEAKER(S) TOPIC AND GIST

GHAZIABAD (REGION I)Mr. R K Vyas, Dr. Laxman Prasad, Prof. Y K Mittal, Ms.

Kavita Saxena, Mr. Saurabh Agrawal and Mr. Anilji Garg

22 February 2014: Regional Finals of “4th CSI Discover Thinking School Quiz Contest”

Six teams who came after winning chapter rounds represented Haryana,

Delhi and Uttar Pradesh. After enthralling fi ve rounds of quizzing, teams

from DPS Indirapuram and DPS Sonepat were in tie for First position. After

nail biting tie breaker, team from DPS Indirapuram consisting of Shivam

Bhatia and Sidharth Bhat emerged as Winners. Team from DPS Sonepat

consisting of Pavitra Mohan Singh and Neena Gulati was the Runners Up.

Winning team will represent Region I in National Finals.

Final winners of QUIZ with Guests

AHMEDABAD (REGION III)Mr. S Mahalingam, Former CFO & Executive Director,

TCS and Fellow & Past President

20 February 2014: Public Lecture “Making of a vibrant society- some ideas”

Mr. Mahalingam shared his expertise, ideas and thoughts on making of

a Vibrant Society and suggested to implement innovative and creative

work for larger interest of society. More than 50 participants attended

this public lecture including Fellow, Patron, Senior Members of CSI and

Faculty Members.

Mr. S Mahalingam delivering his lecture

COIMBATORE (REGION VII)Mr. A Bharani Dharan, Dr. R Joseph Xavier, Dr. K Sanakara

Narayanan and Dr. R Udaya Chandran

31 January - 1 February 2014: Two days workshop on “Hadoop Eco-System A Practitioner Approach”

Mr. Dharan spoke about benefi ts of Hadoop. Second issue of SRIT CSI

MESSENGER magazine was released. First session involved explanation of

cloud working architecture and benefi ts of virtual installation. Participants

were provided hands on working of opennebulla. Second session involved

single node confi guration of Hadoop open source and were provided with

another software ONE to be installed using VirtualBox. Later participants

were provided with training on ONE with new confi gurations for multi node

confi guration.

Dignitaries on dais for inaugura on L-R: S Pravinthraja, Dr. R Udaychandran, Dr. R Joseph Xavier and A Bharanidharan

Mr. Rajesh Kumar, Founder & Managing Director, Aaum

Research and Analytics Private Limited

14 February 2014: Lecture on “Analytics for Business success and Excellence”

Mr. Kumar spoke and motivated participants who are already in business

and or about to start business and enlighten them about stepping in to

world of business. He suggested an analytical approach at its very simplicity

thereby helping listeners to accept the ideas presented and interacted with

them during the session.

Faculty member and par cipants during lecture

Page 49: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 49

SPEAKER(S) TOPIC AND GIST

COIMBATORE (REGION VII)Chief guest Dr. S Gunasekaran, Dr. Vasantha

Sudhanandhen and Principal Dr. S Shanmugasundaram

15 February 2014: Workshop on “Cloud Computing Tool”

Dr. Gunasekaran spoke about the benefi ts of Cloud Computing Tool. The

fi rst session involved explanation of cloud working architecture and benefi ts

of Cloud Computing Tool. Participants were provided hands on working

of Cloud Sim Tool which involved the confi guration of cloud analyst &

Reporting tool.

Felicita on by Principal Dr. S Shanmugasundaram

VELLORE (REGION VII)P Srinivasa Rao, Dr. G Viswanathan, Summet Verma,

Sankar Viswanathan, GV Selvam, Prof. V Raj and

Prof. S Narayanan

21-22 November 2013: International Conference on “Computing, Cybernetics and Intelligent Information System, CCIIS2013”

About 250 delegates attended the conference. Major topics for technical

paper presentations and deliberation included: Next-generation Computing

and Communications Systems, Human Computer Interactions, Information

Modeling, Tools and Applications. Four pre-conference workshops on Cloud

Computing, Windows 8 Applications Development, Business Intelligence

and Design Thinking were also organized with support and resource persons

with support from VMWare, Microsoft, Accenture and SAP Lab respectively.

Inaugural session

From Student Branches » http://www.csi-india.org/web/guest/csic-chapters-sbs-news

SPEAKER(S) TOPIC AND GISTAES INSTITUTE OF COMPUTER STUDIES (AESICS), AHMEDABAD (REGION-III)Dr. Sudipto Das and Dr. Pamela Bhattacharya 21 December 2013: Expert talk on “New Research Trends in Management

of Data”

The expert talk provided new ideas and directions for research and innovative

projects in database management related areas.

Dr. Sudipto Das during the talk

B.N.M. INSTITUTE OF TECHNOLOGY, BANGALORE (REGION-V)Mr. Suman Kumar from Inforce Computing 15 February 2014: Workshop on “Android”

Mr. Suman began with an introduction to Android Programming and

covered architecture of Android and provided some examples. Students

also had a hands-on session.

Mr. Suman Kumar conduc ng the session

Page 50: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 50 www.csi-india.org

SPEAKER(S) TOPIC AND GISTEAST POINT COLLEGE OF ENGINEERING AND TECHNOLOGY, BANGALORE (REGION-V)Mr. Pramod Gowda, Dr. Subhash Kulkarni,

Mr. Anjinappa, Dr. Satish B M and Dr. Prakash S

10-12 December 2013: Students Internet World 2013

Around 1500 students from diff erent Govt. and Private High Schools of

Bangalore Rural District, Karnataka participated. Students Internet World is

being organized since last 5 years to give exposure about internet to Govt.

and Private High Schools students. The event was sponsored by Govt. of

Karnataka, Pearson and Intel.

Dr. Prakash S, Anjinappa, Dr. BM Sa sh, Pramod Gowda and Dr. BM Girish on the dais

NALLA MALLA REDDY ENGINEERING COLLEGE, HYDERABAD (REGION-V)KC Arun, M Akhila, S Lakshmi Sahiti, P Sowmya and

V Maithri

9 October 2013: Workshop on “Networking Fundamentals”

Resource persons delivered knowledge about the importance and

overview of networking fundamentals and demonstrated how to build

Ethernet LAN using Cross over and Patch Cable. This workshop was

coordinated by Mr. Avinash, T Mahendar, N Abhinay, Md. Nisar Ahmed

and G Kalyan Kumar.

(From le ) G Kalyan Kumar, Md Nisar, N Abhinay, T Mahendar, K C Arun, V Maithri, S Lakshmi Sahi , P Sowmya and M Akhila

SRKR ENGINEERING COLLEGE, BHIMAVARAM, ANDHRA PRADESH (REGION-V)Dr. G P Saradhi Varma, S V Ranga Raju, Prof. P Srinivas

Rao, G Murali Ranga Raju, and Dr. D Ranga Raju

8-9 March 2014: National level Technical Symposium on “Current Trends of Information Technology TECHFLEET’14”

The conference includes technical Paper Presentations, Idea and Project

Presentations, Coding Contest, Technical Quiz & workshop on Mobile App

Development. The purpose of the conference was to encourage students

in learning current technical concepts and to improve presentation skills.

The workshop provided exposure to various topics required for developing

android applications.

Dr. G P Saradhi Varma, S V Ranga Raju, Prof. P Srinivas Rao, G Murali Ranga Raju, and Dr. D Ranga Raju during release of proceedings

G.H.RAISONI COLLEGE OF ENGINEERING, NAGPUR (REGION-VI)Mr. Pafulla Das, Dr. P R Bajaj, Dr. P B Nagarnaik,

Dr. A Y Deshmukh, Dr. Jaju, Mrs. Thomas, Mrs. Shweta

Tayade, Mr. Gopal Sakarkar and MCA dept

22 January 2014: National Conference on “Recent Trends in Information Security’2014”

Technical paper presentation was organized at National conference and

papers from all over India namely Gujarat, Pune, Nanded, Amravti, etc.

which were based on either mini or major projects or research papers were

presented in 3 sessions. Out of 41 papers received 39 were presented during

the two days. Selected papers will be published in International Journal of

Computer Journal, New York, USA.

Inaugura on of Conference Proceeding

MARATHWADA INSTITUTE OF TECHNOLOGY, AURANGABAD (REGION-VI)Mr. Arun Kadekodi, Mr. Satish Sangameswaran,

Mr. Bharat Kumar Dasa and Mr. Mayur Wakde Tendulkar

28 February 2014: Conference on “Recent Trends in IT”

Mr. Kadekodi spoke on Project-x: A student-centric social network.

Mr. Sangameswaran talked on Microsoft MEC: Massively Empowered

Classrooms: A “blended” model to engage with students, teachers, and

institution simultaneously. Mr. Dasa spoke about Big Data: Big Data Introduction,

Defi nition and Importance, NOSQL – A brief introduction, Distributed Computing

– Importance, Hadoop – Overview. Mr Tendulkar spoke on Windows 8 Phone

App Development: Modern Smartphone Development, Getting started with

WP8 app development and Using the Windows Phone developer tools.

Speaker during lecture

Page 51: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 51

SPEAKER(S) TOPIC AND GISTPROF. RAM MEGHE INSTITUTE OF TECHNOLOGY & RESEARCH, BADNERA (REGION-VI)Dr. DT Ingole, Dr. GR Bamnote, Dr. CA Dhote,

Dr. A S Alvi, Prof. MA Pund and Kunal Singh

21-22 February 2014: Workshop on “PYTHON language”

Workshop was inaugurated by Hon’ble Principal Dr. DT Ingole. Kunal Singh,

Research Engineer, SparkLab Engineering Systems Pvt. Ltd. gave detailed

training to students on PYTHON with basics and programming concepts. 85

participants from diff erent colleges participated in the workshop.

Hon’ble Principal Dr. D T Ingole at Inaugura on Speech

ADHIYAMAAN COLLEGE OF ENGINEERING, HOSUR (REGION-VII)Mr. Saravanan 12 February 2014: Industrial Visit to C-DAC Knowledge Park, Bangalore

One day Industrial Visit to C-DAC Knowledge Park, Bangalore was arranged

for student members. In C-DAC, they attended a Seminar on “Information

Security” given by Mr. Saravanan, Administrative Offi cer, C-DAC. Students

also visited data management centres and Super Computer.

CSI Members of College Industrial Visit to C-DAC Knowledge Park, Bangalore

AMAL JYOTHI COLLEGE, KANJIRAPPALLY (REGION-VII)Mr. Manu Zacharia, Creator & Chief Architect of Matriux

and Information Security evangelist, Microsoft MVP &

Information Security evangelist

18-19 March 2014: Workshop on “Ethical Hacking & Cyber Security”

Vulnerability Assessment and Penetration Testing (VAPT) is an integral

part of every critical network. Organizations are required to carry out

frequent and period assessment of their networks to ascertain the

security posture of their information systems. Course aimed at providing

required technical skillsets to carry out penetration testing and document

detailed fi ndings.

Mr. Manu Zacharia interac ng with students

DR.SIVANTHI ADITANAR COLLEGE OF ENGINEERING, TIRUCHENDUR (REGION-VII)Mr. E Arun, BeMITSS, Tirunelveli 4 January 2014: One-day Workshop on “Dot Net”

Mr. E Arun gave eff ective hands-on-training in dot net. He focused on the

building blocks of C#.NET, VB .NET, database connectivity, User Interface

and applications.

Mr. E Arun, speaker at the event

EASWARI ENGINEERING COLLEGE, CHENNAI (REGION-VII)Chief guest Mr. V Srinivasan and Dr. M Sekar, Principal 17 February 2014: Technical Contest “MINDBEND”

Dr. Sekar spoke on advancement of computer technology and shared

his experience about working on a project during his college days.

Mr. Srinivasan explained important qualities and competencies, students

should have when they attend their placements. MINDBEND had two

events “Inquizitive”(Technical Quiz) and “Google It”, and each event had

two rounds. Winners were awarded with cash prizes and certifi cates.

L-R: Dr. D Sivakumar, V Srinivasan, Dr. M Sekar, Prof. S Kayalvizhi, and Mrs. T M Navamani

Page 52: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 52 www.csi-india.org

SPEAKER(S) TOPIC AND GISTEINSTEIN COLLEGE OF ENGINEERING, TIRUNELVELI (REGION-VII)Mr. M Murali, Mrs. Beena baskaran &

Mr. Khasim mohammed

14-15 February 2014: National level Workshop on “Advanced Cloud Computing on Research Project”

Mr. Murali & his team explained the application development of cloud

computing with various services. He also spoke about visual studio code

development in social network clouds. Various research aspects related to

cloud computing environment were also explored.

L to R: Prof. M Gomathynayagam, Dr. K Ramar, Prof. Ezhilvanan, Mr. Murali, Dr. R Velayutham, Mr. Khasim mohammed, and Mrs. Beena baskaran

ER.PERUMAL MANIMEKALAI COLLEGE OF ENGINEERING- HOSUR, TAMILNADU (REGION-VII)Dr. S Appan 3 February 2014: One-day Seminar on “Emerging Trends and opportunities

in Cloud Computing”

Dr. Appan gave inspiring speech on cloud computing and utility computing.

He also motivated students to enroll in certifi cation courses like oracle,

Cisco, PMI.

Dr. Appan addressing students

JEPPIAAR INSTITUTE OF TECHNOLOGY, CHENNAI (REGION-VII)Mr. Roy Arnold and Ms. Kalpana Balaraman 28 February 2014: National Level Technical Symposium “Techisetz’14”

Mr. Arnold and Ms. Balaraman from Infosys, ETA, gave a lot of useful inputs

to students for their better future and released Techisetz magazine which

contains technical articles from JIT students. More than 300 Students from

various Engineering colleges enthusiastically participated and won cash

prizes in 9 events.

L-R : Ms. Kalpana Balaraman, Mr. Roy Arnold and Dr. N Marie Wilson releasing the Techisetz’14 magazine

MALABAR COLLEGE OF ENGINEERING AND TECHNOLOGY, KERALA (REGION-VII)Dr. S Babusundar, Dr. R Vijaya Kumar, Dr. K A Navas,

Dr. B Kannan, Dr. A Sreekumar and Mr. Diljith

6-7 March 2014: National Conference “NCRACEE-2014” and work shop on

“Information Security”

Objective was to provide interdisciplinary forum to bring together engineers,

academicians, scientists, industry researchers and research scholars on

common platform to present, discuss and share their experience and

research innovations. Several tutorial sessions were organized where

experts discussed current trends in information technology and digital

communication. The workshop provided hands on training on information

security and hacking and it was informative. The technical fest was enriched

with many events like IT Quiz, Code Debugging, Web Designing etc.

Inaugura on Ceremony

OXFORD ENGINEERING COLLEGE, TRICHY (REGION-VII)Mr. B Santhosh, Dr. G Kumaravelan, Ms. R Sumathi,

Ms. N Shanmugapriya and Mr. P Sudhakaran

21 February 2014: One Day National Level Seminar on “Data Warehousing and Data Mining”

Mr. B Santhosh delivered lecture on “Introduction to Data Warehousing and

Data Mining”. Dr. G Kumaravelan delivered lecture on “Business Analysis,

Association Rule Mining and Classifi cation”. Ms. R Sumathi delivered the

lecture on “Clustering and Data mining Applications & Tools”.

L-R: Mrs. N Shanmugapriya, B Santhosh, P Sudhakaran, and Mr. C Selvakumar

Page 53: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 53

Please send your student branch news to Education Director at [email protected]. News sent to any other email id will not be considered. Low-

resolution photos and news without gist will not be published. Please send only 1 photo per event, not more.

SPEAKER(S) TOPIC AND GISTVELAMMAL ENGINEERING COLLEGE, CHENNAI (REGION-VII)Dr. V Masilamani 17 March 2014: Guest Lecture on “NP-hard and NP-Complete problems”

Participants were given introduction about NP-hard problems. NP hard

problems are of three types viz, decision problems, search problems or

optimization problems. Moreover decision problem Pi is said to be NP-

complete if it is NP-hard and it is also in the class NP itself. NP-hard problems

are often tackled with rule-based languages, in the areas of Data mining,

Selection, Diagnosis; Process monitoring, Control and Scheduling.

Dr. Masilamani, Professor, IIITDM, distribu ng cer fi cates to the winners

Following new Student Branches Were Opened as Detailed Below –

REGION III Institute of Technology & Management Universe (ITMU), Vadodara

The inaugural ceremony of CSI Student Branch in Institute of Technology & Management Universe Vadodara was held on 10th September 2013. Dr. DB Choksi, Prof. Bhuvan Parikh & Mr. Pravin Jain were invited as guests of honor. Dr. K Baba Pai, Director ITMU welcomed all dignitaries & Dr. SK Vij gave introduction of all guests. It was followed by a Guest Lecture by Dr. D.B. Choksi on “Distributed Computing”.

Page 54: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 54 www.csi-india.org

CSI Membership = 360° Knowledge

Your membership in CSI provides instant

access to key career / business building

resources - Knowledge, Networking,

Opportunities.

CSI provides you with 360° coverage for your Technology goals

Learn more at www.csi-india.org

WE INVITE YOU TO JOINComputer Society of India

India's largest technical

professional associationJoin usand

become a member

I am interested in the work of CSI . Please send me information on how to become an individual/institutional*

member

Name ______________________________________ Position held_______________________

Address______________________________________________________________________

______________________________________________________________________

City ____________Postal Code _____________

Telephone: _______________ Mobile:_______________ Fax:_______________ Email:_______________________

*[Delete whichever is not applicable]

Interested in joining CSI? Please send your details in the above format on the following email address. [email protected]

Page 55: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 55

EXECUTIVE COMMITTEE

REGIONAL VICE PRESIDENTS

CSI Executive Committee 2013-2014/2015

Immd Past President (2014-15)

Prof. S. V Raghavan324 A, Maulana Azad Road,

Vigyan Bhavan Annexe,

New Delhi : 110011

Phone : (O) 011 23022115,

(F) 011 23022116

email : [email protected]

President (2014-15)

Mr. H R MohanAssociate Vice President (Systems)

The Hindu, 859 Anna Salai, Chennai - 600002

Phone : 044-28576411, (O) : 044-22313738(R)

(M)�: 98414 32179

email : [email protected]

Region-III (2013-15)

Prof. R P Soni (O) Campus Director (Computer Education)

GLS Institute of Computer Technology

Opp Law Garden, Ellisbridge, Ahmedabad 380006

R)61/343, Saraswatinagar, Ambawadi, Ahmedabad 380015

Phone : (R) 079-26746902

(M) : 093761 80747

email : [email protected]

Region-IV (2014-16)

Mr. Hari Shankar MishraCommand Care, Opp.

Loreto Convent School,

A.G. Offi ce Road,

Doranda, Ranchi – 834002, Jharkhand

Phone : 0651-2411318 (R)

Mobile : 9431361450

Email : [email protected]

Region-I (2013-15)

Mr. R K Vyas70, Sanskant Nagar Society,

Plot No.3, Sector-14, Rohini,

New Delhi: 110085

Phone: 011-27866259

(M) 91-9810592760

email: [email protected]

Region-II (2014-16)

Mr Devaprasanna Sinha73B Ekdalia Road,

Kolkata - 700 019

Phone : (033)24408849

Mobile : 91 9830129551

Email : devaprasannasinha@rediff mail.com

Hon. Treasurer (2013-15)

Mr. Ranga RajagopalAcenet Technologies India P. Ltd.

1084/4 Trichy Road, Sungam,

Coimbatore 641 018

(M) : 09442631004

email : ranga_gopal1@rediff mail.com

Vice President (2014-15)

Prof. Bipin V. MehtaDirector, School of Computer Studies,

Ahmedabad University,

AG Teachers College Campus,

Navrangpura,

Ahmedabad - 3800009

Email : [email protected]

Phone : (079)-2656-8750

Hon. Secretary (2014-16)

Mr. Sanjay MohapatraDuplex 26, Plot 1565 (p),

Sector-VI, CDA,

Cuttack-14, Orissa.

(M) : 91-9861010656

email: [email protected]

Page 56: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Communications | April 2014 | 56 www.csi-india.org

REGIONAL VICE PRESIDENTS

DIVISION CHAIRPERSONS

Region-V (2013-15)

Mr. Raju L kanchibhotlaAashirvad, 42/260/1/2,

Shramik nagar,

Moulali Hyderabad-500046, India

(M) : 91 9000555202,

94 40 32914192

email : [email protected]

Region-VII (2013-14)

S P Soman Chief Executive Offi cer,Skiltek Computers (Pvt.) Ltd.,P. B. No. 4234, Kochi – 682 017, KeralaPhone : (0484) 2349494/233923391 (484) 2402527 / 2347473(M) : 098460 65365/98460 65765email : [email protected]

Region-VI (2014-16)

Dr. Shirish S. SaneDattaprasad, Plot No. 19,

Kulkarni Colony,

Sadhu Waswani Road, Nashik 422 002

Phone : 0253-2313607(R)

Mobile : 09890014942

Email : [email protected]

Division-I: (2013-15)

Prof. M N HodaDirector, BVICAM,

A-4, Paschim Vihar,

Rohtak Road,

New Delhi – 110063.

Phone: 011- 25275055

(M) : 09212022066

email : [email protected]

Division-II (2014-16)

Dr. R NadarajanProfessor and Head,

Department of Applied Mathematics and

Computational Sciences, PSG College of

Technology, Coimbatore - 641 004

Phone : (O) 2572177

Mobile : 9952427229

Email : [email protected]

Division-III: (2013-15)

Dr. A K Nayak Director, Indian Institute of

Business Management

BudhMarg, Patna-800 001

Phone : 0612 3269704/5(0),

0612 2538809(R)

Mobile : 09431018581

email : [email protected]

Division-IV (2014-16)

Dr. Durgesh Kumar MishraH-123-B, Vigyan Nagar,

Annapurna Road, Indore

Mobile : 9826047547

Email : [email protected]

Division-V: (2013-15)

Dr. Anirban BasuFlat #309, Ansal Forte, 16/2A Rupena

Agrahara, Hosur Road, Bangalore 560068

Phone : 080 25731706

(M) : 09448121434

email : [email protected]

Page 57: 50/- · 2015. 2. 4. · Microsoft StreamInsight Ramakrishnan Iyer and Radharaman Mishra 16 Indoor Positioning System (IPS) using Beacons Security CornerVenkatesh Babu and Ashok Yalamanchili

CSI Calendar 2014

Prof. Bipin V Mehta

Vice President, CSI & Chairman, Conf. CommitteeEmail: [email protected]

Date Event Details & Organizers Contact Information

April 2014 events

8-9 Apr 2014 TITCON-2014: First International Conference on Trends in Technology for ConvergenceAt Salem. Organised by the CSI SB of AVS Engineering College, Salem

http://www.avsenggcollege.ac.in/titcon/

Dr. H Abdul Shabeer

[email protected]

10 Apr 2014 NCRTIT-14: 3rd National Conference on Recent Trends in Information TechnologyAt Chennai. Organised by Dept. of IT, B.S. Abdur Rahman University in association with CSI

Chennai& IEEE CS Madras  http://ncrtit2014.weebly.com/

Dr. Latha TamitseIvan

[email protected]

11-13 Apr 2014 TAMC-2014: 11th Annual Conference on Theory and Applications of Models of Computation At Chennai, Organised by CSI Div II & Anna University

http://www.annauniv.edu/tamc2014/

Dr. T V Gopal

[email protected]

19 Apr 2014 SACTA-2014: 9th National Conference on "Smarter Approaches in Computing Technologies

& Applications.

At Ghaziabad. Organised by Institute of Technology & Science with CSI Div 1 and Region 1.

http://www.its.edu.in/IT/Conference/SACTA-2014.html

Dr. Rabins Porwal

[email protected]

24-25 Apr 2014 AOSMT-2014: 2nd National Seminar and Workshop on Advances in Open Source Mobile TechnologiesAt Ahmedabad. Organized by SIG-WNs, CSI Ahmedabad Chapter

http://www.sabareducation.org/conference/aosmt/

Dr. Dharm Singh

[email protected]

Dr. Nilesh Modi

[email protected]

Amit Joshi

[email protected]

May 2014 events

8-9 May 2014 ICASG 2014: International Conference on Architecture Software systems and Green computing 2014At Chennai. Organised by Dept. of CSE & IT, Aarupadai Veedu Inst. of Technology in association

with CSI Chennai & IEEE CS Madras

http://www.avit.ac.in/icasg2014.php

Mr. M Ramasubramaniam

[email protected]

17 May 2014 WTISD 2014:Broadband for Sustainable DevelopmentAt Udaipur. Organised by SIG-WNs- CSI and IEI ULC

Dr. Dharm Singh

[email protected]

31 May-7 Jun 2014 ICSE 2014: 36th International Conference on Software EngineeringAt Hyderabad. Organised by CSI SIGSE

http://2014.icse-conferences.org/

Sharon Neetal

[email protected]

June 2014 events

2–4 Jun 2014 IFIP Networking 2014 ConferenceAt Trondheim, Norway, http://networking2014.item.ntnu.no/

Prof. S V Raghavan

[email protected]

July 2014 events

4-5 Jul 2014 ICIS-14: International Conference on Information ScienceAt Cochin. Organized by the Dept. of CSE, College of Engineering Cherthala in association

with CSI Cochin Chapter & Div III, IV & V and sponsored by Technical Education Quality

Improvement Programme (TEQIP II).

http://www.iciscec.in/

Ms. Sony P

[email protected]

August 2014 events

8–9 Aug 2014 ICICSE: II International Conference on Innovations in Computer Science and EngineeringAt Hyderabad. Organized by Guru Nanak Institutions, Ibrahimpatnam, Hyderabad in

association with CSI Div IV

Dr. H S Saini

[email protected]

Dr. D D Sarma

[email protected]

20 Aug 2014 Workshop on "Ethernet LAN Construction using Crossover and Patch Cable"At Hyderabad. Organized by CSI SB and Dept. of IT, Nalla Malla Reddy Engineering College,

Hyderabad

Mr. K C Arun

[email protected]

December 2014 events

19-21 Dec 2014 EAIT-2014: Fourth International Conference on Emerging Applications of Information Technology At Kolkta. Organized by CSI Kolkata Chapter at Indian Statistical Institute, Kolkata

https://sites.google.com/site/csieait/ For paper ssubmission visit

https://cmt.research.microsoft.com/EAIT2014

Prof. Aditya Bagchi

Dr. Debasish Jana

Prof. Pinakpani Pal

Prof. R T Goswami, [email protected]

Registered with Registrar of News Papers for India - RNI 31668/78 If undelivered return to : Regd. No. MH/MR/N/222/MBI/12-14 Samruddhi Venture Park, Unit No.3, Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I 4th fl oor, MIDC, Andheri (E). Mumbai-400 093 Date of Publication: 10 & 11 every month