International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 International Manuscript ID : 22296166V7I1201702 Volume 7 Issue 1 May - June 2017

Implementation of Secured IPv6 for 6LoWPAN Based of Things

Dr. Vijayaraghavan. A Professor & Head Department of CSE HMSIT, Tumkur, Karnataka,

Abstract transmitting and receiving chips are integrated with In the current era of digital world as well as RFID which can communicate at distant point. globalization, the interconnectivity is growing at very swift rate. Now days, we are surrounded with As per the reports from Forbes.com, the market of number of gadgets, mobile devices, smartphones, Internet of Things will reach around 267 billion wireless nodes and many other objects which are dollars by year 2020. The analysis from Gartner digitally connected in real time. Internet of Things underlines that around 8.4 billion objects with (IoT) is one of the prominent domains in wireless investment of 273 billion dollars will be networking which enable the link between the real interconnected with each other in current year world objects. With the implementation of IoT, the 2017. This figure of 8.4 billion objects is 31% more physical objects in real world can be connected than the implementation figures of previous year with each other to share the information and 2016. communicate in real time with higher degree of performance as well as security. IoT works on the Some of the key applications of IoT include development and integration of smart objects • Smart Cities which can be controlled using remote network • Smart Retail Points infrastructure. This manuscript underlines the • Smart Grid security and power aware programming in IoT for • Smart Agriculture and Farming higher performance in Cooja. • Internet of Vehicles (IoV) • Connected Cars Keywords: Wireless Networks, Internet of Things, • Connected Railways Infrastructure Wireless Security • Wearable Devices

• Smart Home INTRODUCTION • Smart Offices The term Internet of Things was first presented by • Defined Networking Kevin Ashton in year 1999. The implementation of • Smart Supply Chain IoT is widespread now because of the availability • Smart Healthcare and Smart Ambulances of high performance wireless technologies. Radio • Industrial Internet Frequency Identification (RFID) tags and Sensors • Energy Management are base in the implementation of IoT. The RFID o and many others tags can be embedded in real world devices and objects which can be monitored remotely using RESEARCH DOMAINS IN INTERNET OF software based applications. The RFID readers can THINGS (IoT) be used to locate, read and sense the RFID As the domain of IoT is in the implementation implanted objects. Very small micro sized phase especially in developing countries, there is huge scope of research in assorted dimensions. In Approved with the Standing Committee of UGC (University Grants Commission), Govt. of India UGC UGC Approved List Journal No. 45420

International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 International Manuscript ID : 22296166V7I1201702 Volume 7 Issue 1 May - June 2017

IoT, there are enormous government as well enable to inter-object connectivity with enormous corporate projects in assorted sectors. Due to speed and performance. It is written and increasing deployment of IoT, there is the need to programmed in C and C++. Most of the analyze various factors which can affect the overall performance aware protocols like ANT+, performance and efficiency in the implementation low energy, Wi-Fi Direct, Zigbee, Z-Wave and phase. others can be easy integrated with IoTivity.

Following are some of key research issues in IoT Following is the list of other open source • Security, Privacy and Trust Architectures implementations for Internet of Things • Big Data Analysis and Scalability • Device Interoperability and Compliance Development Toolkits and Libraries • Robustness and Fault Tolerance • Arduino • Cognitive Networking • Eclipse IoT Project • Energy Aware Approaches • Kinoma • Virtualization • M2MLabs Mainspring • Ontology Models • -RED • ThingBox FREE AND OPEN SOURCE TOOLS FOR IoT PROGRAMMING Automation for Home and Offices OpenIoT (URL: http://www.openiot.eu/) - It is • Eclipse SmartHome free and open source platform to manage and • Home Gateway Initiative (HGI) program the sensors on cloud and Internet based • Ninja Blocks environment. The concept of Sensing as a Service • openHAB is finely adopted in OpenIoT. • PrivateEyePi • RaZberry Zetta (URL: http://www.zettajs.org/) - It is free • The Thing System and open source platform that is having base of Node.js. Zetta is used to create the IoT Servers Middleware which can control and run the worldwide • IoTSyS distributed systems, sensors and computers • Kaa including on-cloud. • OpenIoT

• OpenRemote DSA (URL: http://www.iot-dsa.org/) - Distributed services Architecture is one of the powerful IoT library under free and open source Operating Systems distribution. It makes the inter-objects • AllJoyn communication very effective with higher degree • Brillo of performance. DSA provides the toolkit for • Contiki managing the IoT based applications, services as • FreeRTOS well as objects. • Raspbian • RIOT Node-RED (URL: http://nodered.org/) - Node- • Spark RED provides the programming interface and APIs • TinyOS for the Internet of Things. Using Node-RED, the flow based creation of remote IoT objects can be IoT Integration Tools and Horizontal Platforms done with an easy web browser based flow editor. • Canopy In the flow editor of Node-RED, the JavaScript • Chimera IoT code can be executed and remote objects can be • DeviceHive programmed with easy as well powerful • IoT Toolkit functionalities • M2MLabs Mainspring

• Mango IoTivity (URL: https://www.iotivity.org/) - • Nimbits IoTivity a powerful open source library which • Open Source Internet of Things (OSIoT) Approved with the Standing Committee of UGC (University Grants Commission), Govt. of India UGC UGC Approved List Journal No. 45420

International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 International Manuscript ID : 22296166V7I1201702 Volume 7 Issue 1 May - June 2017

• OpenRemote get the desired results. Contiki works on IPv4 as • Pico Labs well as IPv6 networking with the integration of • prpl Foundation lightweight protocols so that low power chips and • RabbitMQ radio frequency chips can be connected without • SiteWhere performance issues. • SiteWhere URL for Downloading Instant Contiki : • ThingSpeak http://sourceforge.net/projects/contiki/files/Instant • webinos %20Contiki/

• Yaler

Once the compressed Instant Contiki is Protocols downloaded, it can be used on any host operating • Advanced Message Queuing Protocol system. The Instant Contiki is available on (AMQP) sourceforge.net as compressed file which is • Constrained Application Protocol (CoAP) required to be extracted. The uncompressed or • Extensible Messaging and Presence extracted Instant Contiki can be executed on Protocol (XMPP) VMWare Player which is a virtualization tool. The • OASIS Message Queuing Telemetry VMWare Player can be downloaded free and Transport (MQTT) available on • Very Simple Control Protocol (VSCP) http://www.vmware.com/go/downloadplayer/. In the extracted folder of Instant Contiki, there is Implementations for Engineering an executable file • Instant_Contiki_Ubuntu_12.04_32-bit.vmx. • Open Source Robotics Foundation • OpenWSN

USING CONTIKI OPERATING SYSTEM WITH COOJA SIMULATOR FOR PROGRAMMING OF INTERNET OF THINGS URL: http://www.contiki-os.org/

Contiki is one of the widely used operating system for IoT programming using different types of sensors and RFIDs. It is free and open source operating system under BSD license with the base code of programming language C. Contiki can be Figure 1: Directory Structure and Files in used for the communication between low powered Instant Contiki RFID chips in wireless networks with higher degree of performance and security. This executable file on executing will automatically open in VMWare Player and we will The programming on Contiki is done using Cooja be ready to work with Contiki in Virtualization Network Simulator in which the base libraries of Software in parallel with any host operating RFID chips and sensors are available in C. To system. The default password for Contiki operating program, control and monitor the remote IoT system is “user”. devices, the back-end C programs and related header files can be customized and recompiled to

Approved with the Standing Committee of UGC (University Grants Commission), Govt. of India UGC UGC Approved List Journal No. 45420

International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 International Manuscript ID : 22296166V7I1201702 Volume 7 Issue 1 May - June 2017

Figure 2: Instant Contiki Login Screen

After loading Contiki O.S., the following so that the Cooja Simulator gets loaded for commands are executed in the Terminal of Contiki implementation of IoT.

Figure 3: Loading Cooja Simulator in Contiki

Approved with the Standing Committee of UGC (University Grants Commission), Govt. of India UGC UGC Approved List Journal No. 45420

International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 International Manuscript ID : 22296166V7I1201702 Volume 7 Issue 1 May - June 2017

In File Menu of Cooja, select New Simulation as follows CREATING NEW NETWORK IN COOJA SIMULATOR

Figure 4: Creating New IoT Simulation in Cooja

In the dialog box, the basic network parameters are set which includes the Name of Simulation, Radio Medium, Startup Delay and Random Seed.

Figure 5: Setup of basic properties of simulation in Cooja Approved with the Standing Committee of UGC (University Grants Commission), Govt. of India UGC UGC Approved List Journal No. 45420

International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 International Manuscript ID : 22296166V7I1201702 Volume 7 Issue 1 May - June 2017

Once the basic layout and working environment is known as motes. There are many types of motes in prepared, there is need to import the RFID tags, Cooja which can be programmed. sensor nodes or any other wireless devices which are required to be connected and communicating in IoT. In wireless networking and IoT, these are

Figure 6: Invoking Wireless and RFID Motes in Cooja Simulator

Even physical motes can be connected using ports of C at back-end of Cooja. These C source code on the system so that real time interfacing can be files can be customized and recompiled to get the done. Every mote with the base properties and new or desired output from these motes. programming APIs are specified in the source code

Approved with the Standing Committee of UGC (University Grants Commission), Govt. of India UGC UGC Approved List Journal No. 45420

International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 International Manuscript ID : 22296166V7I1201702 Volume 7 Issue 1 May - June 2017

Figure 7: Importing C Source Code for Recompilation in Cooja

Figure 8: Compiling C Source Code for desired behavior of wireless motes in Cooja

After compilation of C code, the number of virtual that the transmission of radio signals can be viewed motes can be imported in the simulation area so and analyzed.

Approved with the Standing Committee of UGC (University Grants Commission), Govt. of India UGC UGC Approved List Journal No. 45420

International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 International Manuscript ID : 22296166V7I1201702 Volume 7 Issue 1 May - June 2017

Figure 9: Viewing wireless motes with positions in Cooja

Figure 10: Running of Simulation and Behavior Analytics of Motes

In this simulation of IoT network, the scenario of key exchange with dynamic cryptography of dynamic key exchange between the motes is done security keys. in which the dynamic security key is being generated and authenticated for communication. In Once the simulation is complete, the network log IoT security, it is necessary to devise and files are analyzed which includes the source and implement the protocols and algorithms by which destination motes, time and overall activities the overall privacy and security in communication performed during simulation. In the Mote Output can be enforced to avoid any intrusion. As IoT can Window, the log data can be copied and further be used for military applications, it becomes analyzed using data mining and machine learning mandatory to work on highly secured algorithms of tools for predictive analytics.

Approved with the Standing Committee of UGC (University Grants Commission), Govt. of India UGC UGC Approved List Journal No. 45420

International Journal of Computing and Business Research (IJCBR) ISSN (Online) : 2229-6166 International Manuscript ID : 22296166V7I1201702 Volume 7 Issue 1 May - June 2017

[3] Gura N., Patel A., Wander A., Eberle H., Conclusion & Shantz S., Comparing elliptic curve Internet of Things is one of emerging domain of cryptography and RSA on 8-bit CPUs, In research at various academic as well as corporate International Workshop on Cryptographic establishments. Because of increasing number of Hardware and Embedded Systems, pp. devices, there are so many segments for research in 119-132, Springer Berlin Heidelberg, this area. Following are some of the approaches on 2004. which the novel and effectual algorithms can be [4] Watro R., Kong D., Cuti S. F., Gardiner devised and implemented using Cooja C., Lynn C., & Kruus P., TinyPK: • Interoperability and Cross-Protocol securing sensor networks with public key Compatibility technology, In proceedings of the 2nd • Development of Energy Aware IoT ACM workshop on Security of ad hoc and Scenarios sensor networks, pp. 59-64, ACM, 2004. • Power Aware Scheduling and Routing [5] Liao W.H., & Huang C. C., SF-MAC: A • Prediction and Avoidance of Energy spatially fair MAC protocol for Consumption Attacks underwater acoustic sensor networks, • Lifetime Analytics for Robustness of IoT IEEE Sensors Journal, 12(6), pp. 1686- Environment 1694, Jan. 2012. • Reproducible and Multi-Interface [6] Rodríguez-Colina E., Multiple attribute Implementations dynamic spectrum decision making for o and many others cognitive radio networks, In 2011 Eighth International Conference on Wireless and REFERENCES Optical Communications Networks, pp. 1- [1] Chan H., & Perrig A. “Security and 5, IEEE July 2011. privacy in sensor networks, Computer [7] Ioannis K., Dimitriou T., & Freiling F. C., Networks, 36(10), pp. 103-105, Oct. 2003. Towards intrusion detection in wireless [2] Huang Q., Cukier J., Kobayashi H., Liu sensor networks, In Proc. of the 13th B., & Zhang J., Fast authenticated key European Wireless Conference, pp. 1-10, establishment protocols for self- 2007. organizing sensor networks, In [8] Sung W. T., Multi-sensors data fusion Proceedings of the 2nd ACM international system for wireless sensors networks of conference on Wireless sensor networks factory monitoring via BPN technology, and applications, pp. 141-150, ACM, Feb. Expert Systems with Applications, 37(3), 2003. pp. 2124-2131, 2010.

Approved with the Standing Committee of UGC (University Grants Commission), Govt. of India UGC UGC Approved List Journal No. 45420