50/- ` ISSN 0970-647X | Volume No. 38 | Issue No. 1 | April 2014 No. 38 | Issue No. | Volume 0970-647X ISSN

Technical Trends Cover Story Human Gait- Using Biometric The Internet of Things: Technologies, for Security 22 Communications and Computing 7 CIO Perspective Technical Trends Transforming the Automotive IT Industry Perspective Building Intelligent Internet Industry with Connected Cars 31 Interview with Mr. Deepak of Things Applications Security Corner Ghaisas 32 www.csi-india.org www.csi-india.org using Microsoft StreamInsight 13 Security Aspects in CSIInternet Communications of Things | April Domain 2014 | 1 36 Security Corner Information Security » Enhancing Security of Websites with Content Security Policy 38 H R Mohan Happenings@ICT President, CSI, AVP (Systems), The Hindu, Chennai Email: [email protected]

ICT News Briefs in March 2014

The following are the ICT news and headlines •• Intel forecasts that 40 million tablets •• A non-engineering science graduate can of interest in March 2014. They have been would be sold worldwide next year. aspire for a monthly stipend of Rs. 11,500 compiled from various news & Internet sources •• The topline of many IT companies will during the first year of service in Wipro including the dailies – The Hindu, Business Line, grow in the 15-18% range in 2014 – and an MS degree at the end of the fourth and Economic Times. higher than Nasscom’s 13-15% growth year under the company’s ‘earn while you projections – Analysts. learn’ programme. Voices & Views •• With a stagnant $32-billion domestic •• Nandan Nilekani, the former head of UIDAI •• Indian Healthcare industry to spend market contribution, the size of the IT- to contest in the Lok Sabha elections 2014 $1.08 billion on IT products and services BPO industry would grow to $118 billion in from Bangalore South constituency. in 2014 – Gartner. 2013-14 from $108 billion in 2013. Social, •• Vodafone to offer 9% average salary hike •• The engineering services outsourcing mobility, cloud chip in 5-10% of IT firms’ this year. currently stands at about $10 billion will income – Nasscom. •• Nasdaq-listed Syntel has about 80% of further expand with increased adoption of •• Indian IT laws ‘ill-suited’ for social its global workforce of 23,652 (as of Dec 3D printing – CEO, Mindtree. media. Reforms could see Net platforms 2013) employed across its 12 development •• The global 3D printing industry to reach contributing Rs. 2.5 lakh cr to economy by centres in India. $10.8 billion from the current $2 billion by 2015 – GNI Report. •• Nokia hints at job cuts in Chennai unit. 2012. – Wohlers Associates •• Mobile data use zooms 87% riding the 3G •• National Skill Development Corporation wave. Data usage has gone up from about Company News: Tie-ups, Joint has provided skills training to 13,49,742 26 petabytes (PB) a month in 2012 to Ventures, New Initiatives people in its first three years of operations. 50 petabytes in 2013 – MBit Index study. •• Karbonn mobiles is developing a It has also created a capacity to train •• Out sourcing destinations: India is the that can accommodate both 7.5 crore people over the next 10 years – clear global leader by revenue, while Android and Windows operating systems. S Ramadorai, Chairman, NSDC. China is the most serious challenger •• LG India bets big on mobile, flat panel •• Telcos are natural partners for Facebook’s by scale – a study of nine Asia-Pacific TVs to drive growth. Plans to invest initiative of internet.org, a global (APAC) countries. Rs. 800 crore this year on R&D, partnership with the goal of making •• Digital marketing is the new frontier for IT production and marketing. Internet access available to the next sector – Nasscom. •• At $19 billion, Facebook valued each of 5 billion people – Director, Facebook WhatsApp’s current 450 million users at •• India’s e-commerce to go up from Govt, Policy, Telecom, Compliance roughly $400. •• DOT panel wants penalties for violation $1 billion to $76 billion by 2020. In 2013 •• Mobile video ad firm Vdopia eyes overseas by telcos as per gravity of the offence alone, online shopping has increased expansion. Almost 7 out of 10 Internet with a fine of Rs. 1 lakh for a warning, by 88% Rs. 1 crore for a minor breach, Rs. 5 crore users in India online videos. •• The media and entertainment industry for moderate, Rs. 20 crore for major and •• Australian National University has even grew by around 12% in 2013 – FICCI- Rs. 50 crore for severe offences. created the first ever Hindi MOOC, a 10- KPMG report. •• Mobile phone production sees drastic week course, called ‘Engaging India’ which •• ‘We don’t really see a slowdown in the IT decline due to Govt. regulations and will start on April 29. market’. ‘Internet of Things’ is the next big taxation rules. •• Veeble Softtech, developes a new app thing to happen – Founder & Chairman, •• BSNL has the largest fixed-line – LocoMapia (LM) – a real time location Persistent Systems. infrastructure in the country, with a sharing mobile app that works even •• ‘Our technology can pack more in same network of over 600,000 route kilometres without GPS. spectrum’ – Ashish Chowdhary, EVP/ of optical fibre cable. It’s optical fibre •• TNQ Books introduces browser-based President, Nokia Solutions and Networks. network may be hived off into a new unit. proofing technology replacing the •• MOOCs are surely the way forward for •• Chinese state firms ‘not blocking’ Indian traditional PDF-based proofing. India which faces the shortage of good IT companies – Vice-Minister for Industry •• India Post which has 1,39,086 post offices faculty. They are the great democratiser. and Information Technology. in its network is open to e-commerce Anyone can register and take courses, as •• India ready to join the 4G club; voice- prospects. there is no application process, and no over-LTE is Achilles Heel. •• Mobiado, luxury mobile brand, set to costs – Anant Agarwal, President, edX. •• By 2017, India to have 67 million LTE (4G) enter India with handsets priced between •• Hardware sector is a ‘victim’ industry. subscribers – Broadcom. Rs. 2.6 lakh and Rs. 20 lakh. It has become far weaker than it was in •• Competition panel clears Lenovo’s •• IIT Bombay students working on a data 1970s, at least in relation to the global acquisition of IBM business. analysis app for AAP. industry – R Chandrashekhar, President, •• M-Pesa, an alternative to credit/debit •• Microsoft woos small enterprises with card – Vodafone. Nasscom. Azure cloud platform. Announces its •• Walden’s semiconductor fund plan hits a •• There are four types of applications that hardware trade-in scheme. roadblock, with the Planning Commission define a connected vehicle - infotainment/ •• Airtel’s Rs. 200-cr venture capital fund yet to approve the project. media, advanced telematics, vehicle-to-X finds no takers. communications and autonomous driving IT Manpower, Staffing & Top Moves •• SAP Labs India opens its projects to capabilities – Forrester research on •• IT companies planning to hire people from employees as crowdsourcing model connected cars. the IIIT-Hyderabad will have to pay a fee across its R&D centres who can work on •• Indian companies represent 3% of the of 8% (of the annual package a candidate them depending on their level of interests. global IT and BPO outsourcing market. gets) will get a chance to pick the best. n CSI Communications Contents

Volume No. 38 • Issue No. 1 • April 2014

Editorial Board Cover Story Article The Internet of Things: Technologies, Cellular Automata Chief Editor 7 Communications and Computing 28 Dr. Rupali Bhardwaj Dr. R M Sonar Tadrash Shah and Chintan M Bhatt

Editors Origin and Applications of Practitioner Workbench Dr. Debasish Jana 10 Internet of Things Programming.Tips() » Dr. Achuthsankar Nair Dr. Murugavalli Subramaniam and B Ganesh 29 Fun with ‘C’ Programs Wallace Jacob Resident Editor Internet of Things: A Birds Eye View Mrs. Jayshree Dhere 11 Mr. Sarwesh P, Dr. N S V Shet and Dr. K Programming.Learn(“R”) » Chandrasekaran 30 Packages in R Umesh P and Silpa Bhaskaran Technical Trends Building Intelligent Internet of CIO Perspective Published by 13 Things Applications using Transforming the Automotive Executive Secretary Microsoft StreamInsight Industry with Connected Cars Ramakrishnan Iyer and Radharaman Mishra 3 1 Mr. Suchit Gogwekar Madhusudhan Reddy Nukala, For Computer Society of India Shreyas Bhargave and Bipin Patwardhan Indoor Positioning System (IPS) Design, Print and 16 using Beacons Dispatch by Venkatesh Babu and Ashok Yalamanchili Security Corner CyberMedia Services Limited Information Security » The Need to use ‘Near-Source’ Processing 33 Security Features in Contemporary 19 in Internet-of-Things Solutions Browsers and Tips for Safe Browsing Bipin Patwardhan Krishna Chaitanya Telikicherla, Harigopal K B Ponnapalli and Dr. Ashutosh Saxena Human Gait- Using Biometric for Mobile Phone Security 22 Information Security » Kamal Sharma 36 Security Aspects in Internet of Things Domain Research Front Tapalina Bhattasali, Dr. Rituparna Chaki and Dr. Nabendu Chaki Please note: Resource Allocation Algorithm to Improve CSI Communications is published by Computer the Quality-of-Service in OFDMA System Society of India, a non-profit organization. 25 Views and opinions expressed in the CSI R L Ujjwal, Prof. C S Rai and Prof. Nupur Prakash Communications are those of individual authors, contributors and advertisers and they may differ from policies and official statements of CSI. These should not be construed as legal or professional advice. The CSI, the publisher, the editors and the contributors are not responsible for any decisions taken by readers on the basis of these views and opinions. Although every care is being taken to ensure genuineness of the writings in this publication, CSI Communications does not attest to the PLUS originality of the respective authors’ content. Brain Teaser © 2012 CSI. All rights reserved. 40 Instructors are permitted to photocopy isolated Dr. Debasish Jana articles for non-commercial classroom use Ask an Expert without fee. For any other copying, reprint or 41 republication, permission must be obtained Dr. Debasish Jana in writing from the Society. Copying for other than personal use or internal reference, or of CSI Reports 42 articles or columns not owned by the Society without explicit permission of the Society or the CSI News 44 copyright owner is strictly prohibited.

Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093. Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Printed at GP Offset Pvt. Ltd., Mumbai 400 059.

CSI Communications | April 2014 | 3 Know Your CSI

Executive Committee (2013-14/15) »

President Vice-President Hon. Secretary Mr. H R Mohan Prof. Bipin V Mehta Mr. Sanjay Mohapatra [email protected] [email protected] [email protected] Hon. Treasurer Immd. Past President Mr. Ranga Rajagopal Prof. S V Raghavan [email protected] [email protected]

Nomination Committee (2014-2015) Prof. P. Kalyanaraman Mr. Sanjeev Kumar Mr. Subimal Kundu

Regional Vice-Presidents Region - I Region - II Region - III Region - IV Mr. R K Vyas Mr. Devaprasanna Sinha Prof. R P Soni Mr. Hari Shankar Mishra Delhi, Punjab, Haryana, Himachal Assam, Bihar, West Bengal, Gujarat, Madhya Pradesh, Jharkhand, Chattisgarh, Pradesh, Jammu & Kashmir, North Eastern States Rajasthan and other areas Orissa and other areas in Uttar Pradesh, Uttaranchal and and other areas in in Western India Central & South other areas in Northern India. East & North East India [email protected] Eastern India [email protected] [email protected] [email protected] Region - V Region - VI Region - VII Mr. Raju L kanchibhotla Dr. Shirish S Sane Mr. S P Soman Karnataka and Andhra Pradesh Maharashtra and Goa Tamil Nadu, Pondicherry, [email protected] [email protected] Andaman and Nicobar, Kerala, Lakshadweep [email protected]

Division Chairpersons Division-I : Hardware (2013-15) Division-II : (2014-16) Division-III : Applications (2013-15) Prof. M N Hoda Dr. R Nadarajan Dr. A K Nayak [email protected] [email protected] [email protected] Division-IV : Communications Division-V : Education and Research (2014-16) (2013-15) Dr. Durgesh Kumar Mishra Dr. Anirban Basu [email protected] [email protected] Important links on CSI website » About CSI http://www.csi-india.org/about-csi Membership Subscription Fees http://www.csi-india.org/fee-structure Structure and Orgnisation http://www.csi-india.org/web/guest/structureandorganisation Membership and Grades http://www.csi-india.org/web/guest/174 Executive Committee http://www.csi-india.org/executive-committee Institutional Membership http://www.csi-india.org/web/guest/institiutional- Nomination Committee http://www.csi-india.org/web/guest/nominations-committee membership Statutory Committees http://www.csi-india.org/web/guest/statutory-committees Become a member http://www.csi-india.org/web/guest/become-a-member Who's Who http://www.csi-india.org/web/guest/who-s-who Upgrading and Renewing Membership http://www.csi-india.org/web/guest/183 CSI Fellows http://www.csi-india.org/web/guest/csi-fellows Download Forms http://www.csi-india.org/web/guest/downloadforms National, Regional & State http://www.csi-india.org/web/guest/104 Membership Eligibility http://www.csi-india.org/web/guest/membership-eligibility Student Coordinators Code of Ethics http://www.csi-india.org/web/guest/code-of-ethics Collaborations http://www.csi-india.org/web/guest/collaborations From the President Desk http://www.csi-india.org/web/guest/president-s-desk Distinguished Speakers http://www.csi-india.org/distinguished-speakers CSI Communications (PDF Version) http://www.csi-india.org/web/guest/csi-communications Divisions http://www.csi-india.org/web/guest/divisions CSI Communications (HTML Version) http://www.csi-india.org/web/guest/csi-communications- Regions http://www.csi-india.org/web/guest/regions1 html-version Chapters http://www.csi-india.org/web/guest/chapters CSI Journal of Computing http://www.csi-india.org/web/guest/journal Policy Guidelines http://www.csi-india.org/web/guest/policy-guidelines CSI eNewsletter http://www.csi-india.org/web/guest/enewsletter Student Branches http://www.csi-india.org/web/guest/student-branches CSIC Chapters SBs News http://www.csi-india.org/csic-chapters-sbs-news Membership Services http://www.csi-india.org/web/guest/membership-service Education Directorate http://www.csi-india.org/web/education-directorate/home Upcoming Events http://www.csi-india.org/web/guest/upcoming-events National Students Coordinator http://www.csi-india.org/web/national-students- Publications http://www.csi-india.org/web/guest/publications coordinators/home Student's Corner http://www.csi-india.org/web/education-directorate/student-s-corner Awards and Honors http://www.csi-india.org/web/guest/251 CSI Awards http://www.csi-india.org/web/guest/csi-awards eGovernance Awards http://www.csi-india.org/web/guest/e-governanceawards CSI Certification http://www.csi-india.org/web/guest/csi-certification IT Excellence Awards http://www.csi-india.org/web/guest/csiitexcellenceawards Upcoming Webinars http://www.csi-india.org/web/guest/upcoming-webinars YITP Awards http://www.csi-india.org/web/guest/csiyitp-awards About Membership http://www.csi-india.org/web/guest/about-membership CSI Service Awards http://www.csi-india.org/web/guest/csi-service-awards Why Join CSI http://www.csi-india.org/why-join-csi Academic Excellence Awards http://www.csi-india.org/web/guest/academic-excellence- Membership Benefits http://www.csi-india.org/membership-benefits awards BABA Scheme http://www.csi-india.org/membership-schemes-baba-scheme Contact us http://www.csi-india.org/web/guest/contact-us Special Interest Groups http://www.csi-india.org/special-interest-groups Important Contact Details » For queries, correspondence regarding Membership, contact [email protected]

CSI Communications | April 2014 | 4 www.csi-india.org H R Mohan President’s Message From : President’s Desk:: [email protected] Subject : President's Message Date : 1st April, 2014

Dear Members At the outset, let me thank you all for providing me a great opportunity to serve as the President of the Computer Society of India at the time the society is in its Golden Jubilee period. For me, it has been a long journey from being a student member during my studies at IIT Madras way back in 1973. In fact, I literally grew with CSI throughout my career in the field of Information Technology. While I have been in touch with you through various columns of the CSI Communications over the last several years, from this month onwards, I will be sharing my views and interacting with you through this exclusive column – President’s Desk. I had the rare opportunity of being directly mentored by a number of past presidents of CSI, several of whom hail from Chennai. These include Major General A. Balasubrahmanian, Prof. S. Sampath, Prof. H. N. Mahabala, Prof. C.R. Muthukrishnan, Mr. S. Mahalingam and the immediate past president Prof. S.V. Raghavan. My association with CSI for a little over 40 years as a member and 30 years in CSI has several MOUs and established associations with various capacities, with the Chennai chapter and at the national organisations such as CDAC, SETS, ISACA, PMI, Media Lab Asia, level, had provided me with excellent volunteering and networking international societies such as IFIP, IEEE & IEEE CS, SEARCC, BCS, opportunities. It also provided me with a chance to interact with SCS and national associations such as NASSCOM, MAIT, CII, FICCI eminent academicians, industrialists, professionals, and government and government agencies such as DEITY, STPIs, State IT Depts. officials across the country who had served in various roles and DST, DOT, AICTE, UGC to name a few. We need to fully utilize these nurtured the growth of CSI. Let me also state that I may be one of collaborations so our members receive utmost benefits. the very few who had the opportunity to work with 13 out of 27 past As the chair of Conference Committee during 2013-14, presidents of CSI directly and two more indirectly – a rare opportunity I am happy to inform that the year has been eventful. A list of to learn from their expertise and management style in creating activities held by the CSI is being complied and presented at opportunities, mentoring & supporting young talents, strategizing http://goo.gl/EnUqXE. A significant milestone is the commissioning and handling tasks, organizing events, and building relations. All of of the student portal at http://studentportal.csidiscoverthinking.com/, these had given me the strength and adequate confidence to carry out which we expect to grow and be used by a large section of our my responsibilities as your president this year. With the continued members. The month of March 2014 has been extremely busy support and guidance from them along with the volunteering spirit with a number of activities including several conferences, student and cooperation of my executive committee members, the chairs of conventions, programming contest, Alan Turing quiz contest, YITP the CSI chapters, student branch councilors & coordinators across the awards etc. The RVPs, division chairs, national student coordinator country, and the staff at the CSI HQ and CSI Education Directorate, I supported by a team of state student coordinators, and awards hope to steer the CSI ship to new lands and ensure a safe & enjoyable committee all deserve a sincere appreciation. journey. I look forward to serving a heterogeneous group of members, I would like to place on record the excellent work done by the numbering over one lakh in this Golden Jubilee period. outgoing team led by Prof. S.V. Raghavan for providing us the directions As you are aware, the role of CSI and its mode to serve its to move forward. members have changed significantly over the years and so have the I welcome my new executive committee members. Mr. Bipin expectations of the members. The majority of our current members Mehta and Mr. Sanjay Mohapatra are joining as Vice President and is from academia and constitutes a young student community who Hon. Secretary respectively. Mr. Ranga Rajagopal continues as the would require mentoring, guidance, support, and skill development Treasurer, working hard to balance the accounts and sensitizing the during their academic period and, opportunities for their entry into job chapters with the compliance aspects in the context of Govt. rules and market and in establishing their entrepreneurship ventures. A small regulations. Mr. S. Ramanathan, steps out as the Hon. Secretary after proportion of professional members look forward to inputs and updates steering the administration of CSI for two years. Prof. S.V. Raghavan in the fast developing world of Information and Communication will be with us as the immediate past president and chair the awards Technologies to sustain, excel and grow in their current position. and academic committees. Another segment of our members who have superannuated from There are several new initiatives being planned during this their service should be engaged productively. This means, CSI has to Golden Jubilee period. The new executive committee in its first adopt diversified strategies to achieve these varying expectations. I meeting will deliberate, brainstorm, and determine an action plan seek valuable inputs and suggestions from all of you in this regard. and share it with you to seek your support in executing them. In this Our strength has been in organizing technical meetings, process, we would like to have your involvement in a proactive way seminars, workshops, conferences, conventions in all areas of ICT and right from the planning stage to execution of plans as volunteers. Let creating awareness, updating on the emerging trends and opening us work together collaboratively for the growth of CSI and its mission research opportunities. However, the advent of the Internet and its to be of service to the masses. vast information sharing capabilities propel us to go beyond. The consumerisation of IT and penetration of mobile technology have With regards changed the way businesses are started, run, managed and expanded. H R Mohan We need to focus our attention in these aspects and give our members President a share in the global opportunity. Computer Society of India

CSI Communications | April 2014 | 5 Rajendra M Sonar, Achuthsankar S Nair, Debasish Jana and Jayshree Dhere Editorial Editors

Dear Fellow CSI Members,

Most of us can not imagine our world without the Internet. The Internet third one is written by Bipin Patwardhan of Research & Innovation, is becoming more and more accessible, ubiquitous and cost-effective iGATE on the Need to use 'Near-Source' processing in IoT Solutions. to communicate without worrying about geographic boundaries and The last interesting article in the section is by Kamal Sharma titled: underlying technologies. Billions of people are connected through Human Gait- Using Biometric for Mobile Phone Security, covering the Internet. Physically they can be at any place on earth and still how gait (pattern of limb movements while using devices!) can be remain connected virtually. However, such interactions are no more effectively used for security as every individual has unique gait, which limited amongst only human beings. Sensors and embedded systems cannot be copied or imitated. are making living and non-living objects (anything in fact!) express, talk, think, react, interact and communicate amongst themselves. In research front section, we have one article by R L Ujjwal, Prof. C S Rai, Although it sounds like science fiction, it is already happening now. University School of Information and Communicaton Technologyand People can monitor growth of their plants/crops sitting anywhere in Prof. Nupur Prakash, VC, Indira Gandhi Delhi Technological University the world. One thing is talking to another – e.g. a water tank telling for Women titled: Resource Allocation Algorithm to Improve the water pump when to stop and start pumping water based on sensors Quality-of-Service in OFDMA System. They propose an algorithm and that monitor water level and communicate the same to sensors which results of the algorithm indicate that optimum allocation of resources operate the water pump. Billions of such objects can talk to each other under OFDMA (Orthogonal Frequency Division Multiple in Access) over the internet the way human beings do and that is what makes the system could be achieved to improve quality of service (which includes Internet of things. We bring this issue with cover theme as ‘Internet parameters like data transfer rate, signal to noise ratio and bit error of Things (IoT)’ to let you all know about happenings, technologies, rate). In Article section, we have an article by Dr. Rupali Bhardwaj, applications, current trends and issues around IoT. Since such a topic Assistant Professor, Thapar University, Patiala on Cellular Automata. is more applied in nature, we received good response from industry. In our section named Practitioner Workbench we have articles We start our cover story with The Internet of Things: Technologies, from our regular contributors. Article in Programming.Tips() is by Communications and Computing by Tadrash Shah, Master student, Wallace Jacob, Sr. Asst. Prof. at Tolani Maritime Institute covering State University of New York and and Chintan M Bhatt, Asst. Professor, Fun with C Programs and under Programming.Learn(“R”) we have CE Dept., Chandubhai S. Patel Institute of Technology. They mention continued series on “R” by Umesh P and Silpa Bhaskaran Department about 6 As of IoT: Anything, Anytime, Anyone, Any place, Any services of Computational Biology and Bioinformatics, University of Kerala and Any network. The article covers genesis, historical evidence, writing on Packages in R. current trend and concerns. The second article is on Origin and Applications of Internet of Things by Dr. Murugavalli Subramaniam In CIO section, under Managing Technology we have industry experts: and B Ganesh, CSE, Panimalar Engineering College, Chennai. They Madhusudhan Reddy Nukala, Shreyas Bhargave and Bipin Patwardhan write about industry and social applications and suggest applications of iGATE talking about Transforming the Automotive Industry with in various domains such as: medical, public distribution system, traffic Connected Cars–An Internet of Things Perspective. regularization and for physically challenged persons. The third article takes a Birds Eye View on IoT, it is by Mr. Sarwesh P, Dr. N S V Shet In Security Corner column’s Information Security section we are and Dr. K Chandrasekaran of NITK, Surathkal, Karnataka, introducing concluding the series of web application security articles with an the readers to the notion, evolution, working processes, challenges article on Security Features in Comtemporary Browsers, which also and applications of IoT. provides Tips for Safe Browsing. This is the tenth article by Krishna Chaitanya Telikicherla, Harigopal K B Ponnapalli and Dr. Ashutosh Saxena of Infosys and the series ends with this article. Next article Sensors and embedded systems are making living and under Information Security is about Security Aspects of IoT Domain non-living objects (anything in fact!) express, talk, think, by Tapalina Bhattasali, Dr. Rituparna Chaki and Dr. Nabendu Chaki react, interact and communicate amongst themselves. of University of Calcutta covering technical aspects, security issues Although it sounds like science fiction, it is already and requirements. happening now. People can monitor growth of their plants/crops sitting anywhere in the world. One thing is In other regular sections, we have Dr. Debasish Jana’s (Editor, CSI talking to another – e.g. a water tank telling water pump Communications) crossword to test readers’ knowledge on IoT and when to stop and start pumping water based on sensors he is answering the readers’ questions in Ask an Expert section. Mr. H that monitor water level and communicate the same to R Mohan, President, CSI, AVP (Systems), The Hindu, Chennai brings sensors which operate the water pump. the readers Happenings@ICT in March 14. As usual there are features such as CSI Reports and CSI News.

In Technical Trend section, we have four articles. The first three Please note that we welcome your feedback and suggestions at are from iGATE professionals. First one titled: Building Intelligent [email protected] Internet of Things Applications using Microsoft StreamInsight by Ramakrishnan Iyer and Radharaman Mishra of Research & Innovation Tech CoE Group of iGate Global Solutions. They illustrate iGATE’s With warm regards, iStreamAnalytics Solution based on StreamInsight. The second article Rajendra M Sonar, Achuthsankar S Nair, is by Venkatesh Babu and Ashok Yalamanchili, Technology CoEs in Debasish Jana and Jayshree Dhere R&I group on Indoor Positioning System (IPS) using Beacons. The Editors

CSI Communications | April 2014 | 6 www.csi-india.org Cover Tadrash Shah* and Chintan M Bhatt** *Master student, State University of New York Story **Asst. Professor, CE dept., Chandubhai S. Patel Institute of Technology, CHARUSAT

The Internet of Things: Technologies, Communications and Computing At a very generic level of understanding Genesis IoT development kits namely Galileo we can say that Internet of Things (IoT) To map these physical devices to the Development Kit (http://www.intel.com/ is a global network infrastructure where information network, they must be made content/www/us/en/do-it-yourself/ in the physical and virtual objects are uniquely identifiable by some way. In galileo-maker-quark-board.html) for IoT all made equipped with data capture today’s scenario the network devices in and MBed (http://mbed.org/). and communication capabilities so that the internet of the intranet are addressable Trend they can use the ubiquitous internet by the IP (IPv4 and IPv6) or the URI. But in In today’s scenario, where IT companies to transmit data and other controlling the view of Semantic Web, there are more want to stay, rather need to stay, purposes. This definition may seem rather technologies evolving which could be competitive by adopting new and dubious at the first read. The inferences used, infect a few of them are already put innovative technologies – not just using and the implications of the definition will to test, like RFID. RFID tagging has been them but also developing them – IoT opens be clearer as we move forward with the demonstrated in various parts of the world up a whole new world of possibilities. content of this article. successfully. Wall Street Journal puts it the best The time to dream is over and now [4] – “…a long-awaited trend that is causing a is the time to get up and set to work Internet of Things Consortium mentions surge of optimism in the tech sector…” towards realization of what was dreamt 4 principles for IoT – Business Insider (BI) stated in the decades back. The physical objects of the 1. Value –Make consumers live more latest March 14, 2014 report the numbers world will be seamlessly integrated into efficient, safer and seamless. forecast for IoT, “1.9 billion devices today, information network. The integration may 2. Data – help consumers understand and 9 billion by 2018, according to BII be various purposes like – data capture, the benefits and value of their data. (Business Insider Intelligence) estimates, monitoring and controlling among many 3. Security – build consumer confidence roughly equal to the number of smart others. Wireless links must spread beyond around IoT experiences phones, smart TVs, tablets, wearable smart phones, PCs and Tablets. 4. Design–delight consumers with computers and PC combined[1]”. Now Since the existence, the planet intuitive design and usability. that is huge! This makes to believe the itself – be it nature, humans or physical Cisco puts it the best way – calling it forecast myth that potentially every objects, has been generating enormous “Internet of Everything”. tangible item, animate and inanimate, amount of data and we have just lost it. Historical Evidence shall be connected to the internet in near We have not been able to hear or capture The systems got the name IoT lately, future. This has been penetrating the the data, but now IoT seems to fulfill its but they have been in existence since consumer and business lives. promise. Also, with the parallel growth quite long. In 1980 at Carnegie Mellon of the cloud technologies, the data can University there was this Internet Thomas Lee, a Stanford university be accessed, manipulated and controlled Appliance Coke machine such that professor of Electrical Engineering and co- from anywhere. To put this simply = “IoT programmers can connect to the founder of Ayla Networks Inc. says that is a scenario in which objects, animals or machine and determine whether or “The value of the devices will be secondary people are provided with unique identifiers not there would be a cold drink in the to the services they enable”. Which seems and the ability to automatically transfer machine to vend or not and whether they so true and bears the promise of IoT as a the data over a network without requiring should make a trip down to machine. coming era of change? human-to-human or human-to-computer Post that, actual roots of IoT can be So far, the smart-home products [2] interaction .” traced back to the MIT from the work (a few them listed in the applications section of this article) seem mainly to be Hence, we can say the IoT to be the of Auto-Center. In 1999, this group was attracting technology enthusiasts. convergence of following technologies – working in domain of networked RFID and Yet another point to be noted is 1. Wireless and Bluetooth – QoS, other sensing technologies. Together with that, due to the smart phone proliferation latency and security seven other research universities from across of segments of society, the IoT 2. Microsystems, Sensors and Actuators & 4 different continents were chosen to can be realized deep and wide. Hopefully, miniaturization of the same. design architecture for IoT. the market will be flooded with so many 3. Cloud technologies – security, There are various IoT Software products, few of which extensively privacy, Development Kit that are available, few customizable, that users can pick the one 4. Networks – Ipv6, lower latencies, of them under open source, to be used that suit their needs the best. security for programming of the devices. One of 6 A connectivity is there in IoT: them can be found at http://developer. Applications Anything, Anytime, Anyone, Any place, peoplepowerco.com. Giants like Intel 1. Fish aquarium is made to be Any services, Any network and ARM are too in the market with connected to Raspberry Pi which is

CSI Communications | April 2014 | 7 can be installed in your house and you can monitor your house, in real- time as well as recorded data on cloud, when you are on a tour. These systems can also intimate you any suspicious activities by email or SMS or a call. 4. Another concept -Smart Garden. Each plant in your garden can be equipped with a RFID tag so that remotely you can decide whether you need to water them more, fertilize them or transfer them to a sunnier spot.

Figure: Insider Intelligence[1]

further connected to a temperature crops, dust In factories can monitor sensor and actuator. With the help of the output of machines, and dust in Figure: Smart Garden [5] Pi, the thermometer delivers the real- human body to monitor the entire time temperature to any computer state of well being. 5. Companies like Silver Spring which queries for it on local network. 3. Much awaited and market flooded Networks sell the wireless meters to This temperature can be controlled with a couple of wonderful products manage the energy usage. from this computer. is the Home Automation. The fantasy 6. GE uses the data generated by the 2. Smart Dust –a device made up of tiny becomes the reality. ONIDA launched sensors to monitor the health of Jet sensors that are capable of wireless an air-conditioner with a remote that engines and gas turbines. communication and RFID which can accepts the SMS sent to it and turns 7. Another example of smart cards can be deployed over a region to record on the AC at the desired temperature be – where insurance companies data for metrological, geophysical so that by the time you are home, the can respond to sensors and wireless and planetary research. The dust home is all cozy for you. There are connections on the cars to charge in fields can be used to monitor the video surveillance products which drivers by the mile and speed they drive instead of where they live. 8. The following figure shows a clip-on wireless and Bluetooth clip-on device on dog’s collar that tracks the dog activity levels on your Smartphone (Price $129.95).

Figure: Whistle Dog Collar [7] Figure: The Internet of Things - How the Next Evolution of the Internet (CISCO)[3]

CSI Communications | April 2014 | 8 www.csi-india.org 9. A wearable baby monitor that sends the data about baby’s vital signs to the users’ smart phones. (Developed by : Sproutling)

Figure: Wearable baby monitor[8]

10. Apple Smart Body Analyzer–An Figure: IoT-enabled home with connected devices and appliances working invisibly for consumer[6] another mind-boggling Apple product that is lesser known, which all the mind-boggling IoT products if you of public safety and much more. This is an measures the air quality in your wish to discover more. Yet another list is important concern when a person is losing room, your heart-rate, weight and at http://goo.gl/838dsg. other body compositions which his privacy at all nodes, and may not like are then uploaded to the cloud or Concerns that. Hence, IoT data sovereignty is a Bluetooth over all your Apple devices. Data privacy, data integrity and data major concern these days. The HealthMate App uses this data sovereignty - A common consensus needs Listing many other concerns in brief – to coach you about changing your to be reached where-in how and who 1. Architecture – no unanimous lifestyle, setting weight goals, and should exploit the data that has been consensus has been reached upon other weekly achievable targets. captured by these IoT devices. regarding the architecture of IoT. 11. Washing machines turning on only Another concern at the hardware level 2. The IoT devices needs to be when the energy demand on the grid is that various manufacturers may design connected to the power supply and is minimum as controlled from your and produce several different devices. internet all the time, round the clock, smart phone. The consensus needs to be reached here hence the energy efficiency of the 12. A car will automatically call an too for defining the conventions that tell sensing is also a primary concern. emergency service sending its these manufactures what to do and how 3. Apart from data privacy the network location and other important data to work together. Apple has been so far security should be considered – after an accident. Hence, apart from successful in allowing wonderful and someone can disable the network being saved by the SRS airbags the seamless communication across various availability, push erroneous data, emergency help is also called for you other and heterogeneous Apple devices, breaking in to the network, etc. after an accident. but we need to break those bounds and Depending on the application either 13. Animals and birds can be tagged with make a reference model that is platform or all of these can be hazardous and RFID and their migration, behavior independent and also cross-proprietary even life-threatening. patterns and other data can be enabled. 4. Mentioned that heterogeneous captured and analyzed for a better There is this term in US called that we networks and devices will be put to study. This has been found successful bumped into – “Big Brother”. These terms use the QoS needs to fine-tune for and implemented successfully. A is referred to the Federal Government current protocols or may be new couple of these technologies are that uses your data from myriad sources protocols need be devised. mature and well standardized in for your monitoring. Example, thermal 5. Extracting useful information from some domains. imaging of private homes for marijuana the sensor data is also a challenge. 14. BigBelly is a solar-powered trash lamps, phone and internet data from At the hardware level the sensors are receptacle and trash compactor that private companies to ensure no individual all affected by spatial and temporal alerts sanitation crews when it is full. is breaking law, and much more. Any data and hence the data may create human in USA is under constant noise. Having said that perhaps next Having listed a dozen of applications of surveillance of Federal government. This generation of data mining algorithms IoT, few of which at conceptual level and surveillance is termed as “Big Brother”. need to be used. others already in the market. World’s top They say that Big Brother is getting bigger 10 innovative companies in IoT and their these days with IoT. Any car equipped as a P.S.: The issue of Telemedicine rose products can be read about at http://goo. smart-car monitors all your where-about, in the December 2013 issue of CSI gl/zs6WND. Also http://iotlist.co/ lists web surveillance is getting thicker in name Communications written by Tadrash Shah Continued on Page 21

CSI Communications | April 2014 | 9 Cover Dr. Murugavalli Subramaniam* and B Ganesh** *Professor and Head, Department of CSE, Panimalar Engineering College, Chennai Story **Assistant Professor (Grade-I), CSE, Panimalar Engineeering College, Chennai

Origin and Applications of Internet of Things Introduction and pressure needs to be monitored an object’s movements. Such sensors Internet of things refers to identifying a regularly. Human being going near the can also be used to get the information physical Object through internet. Any boilers having heavy temperature around regarding patient’s body temperature, object even a human being, animal or 1000° C or more is not possible. Here pulse rate, sugar and blood pressure levels anything else can be connected in Internet comes the help of internet. etc. In a hospital it can be used to observe so that they can be accessible from In a forest, the major problem is the patient, and such information can be anywhere in the world through internet. forest fire which burns the trees and recorded automatically in a system and In early days, communication was animals. Deforestation brings imbalance if anything goes wrong send alarm to the difficult among people. Communication in the eco system, and effects climate doctor or a patient by means of SMS or to between neighboring cities, towns or change. The solution to this is to detect a dedicated application in a mobile. early so that it can be prevented or villages used to take several days/hours. For Public Distribution System (PDS) It depended only on human messengers/ controlled. But how the forest fire can be In India one of the major problems is birds that used to carry the message and identified in early stage? civil supply trafficking. Goods supplied to deliver it to appropriate destination. This In the above two scenarios remote one particular area can be taken away by was the early postal/communication sensors can be used which can be connected strangers. This affects the needy people system. Later invention of motor vehicles to the network, and information about the and it’s a big headache for the government eased the message delivery process. environment like temperature, pressure to stop this kind of activity. To prevent this, Invention of telegram and telephone etc. can be received for further analysis and the GPS can be fixed in each public goods made possible quick communication action. The smoke detecting sensors can carrying vehicle, so that its movement among the various persons and entities be deployed in forest so that they can send can be recorded and they can be tracked near and far away. the information about the fire quickly to the completely from source to destination. After invention of computers and control station in order to control the fire in network, information started getting early stage to save the forest. For Physically Impaired exchanged through the computers. Wireless Sensor Networks, are the The sensors can be used for the blinds to Initially, they used some sort of cables to best examples of how non-computers identify the objects ahead when they walk provide information sharing among the can be interconnected. These wireless on the road. Normally, they use a stick to computer systems. But such connection sensors are used in many fields, in Forest identify the objects in their way. Instead had some limitations; it only connected to monitor and send alarm regarding sensors can be fixed on the stick which systems in nearby locations. For the Forest fire, in Military field it will be emit some ultrasonic sound and observe connecting systems in remote locations deployed in multiple remote locations back like the principle of SONAR. If the cables need to be laid for a long distance, so that information can be exchanged reflection is quicker we can calculate the which is very expensive. among them. distance between object and blind person. To overcome this limitation, Radio-Frequency Identification The distance can be intimated to the telephone lines were used for connecting (RFID) is a wireless device used to identify blind through the headphone. Integrating the computers with the help of any device or a person. It is mostly used to such sensors and navigators will help modem. This is how internet evolved; authenticate a person, to track the device them walk anywhere without anyone’s it led to a huge revolution in the globe, progress in assembly line. For avoiding assistance. Using the navigator they can communication was made easy and traffic at toll gates RFID can be used. In a specify the destination, the navigator will information sharing between the systems car, bus or lorry, RFID tag can be fixed in calculate the optimal route and tell the was no longer complex. the front Glass, so that the vehicles need route to them through the headphone. Earlier the internet was used for not stop there. In India most of the toll For Traffic Regularization information sharing, sending mails, gates use RFID tags to identify the public The traffic violators can be identified using download and upload of files. But now it vehicles in order to minimize the traffic the RFID enabled number plates. When a is being used for many applications and jam in toll gates. person violates the traffic automatically in many fields which were unimaginable a Both Wireless sensors and RFID are the vehicle id can be obtained using the decade ago. used to track or observe the status of a vehicle, person, location etc. RFID number plate if the RFID detectors Industry and Social Application are placed in the junctions. For example, In a boiler industry its temperature Suggested Applications the speed violators can be identified easily and pressure should be kept under the For Medical by keeping two RFID receivers about 100m control, if it exceeds certain value the There exist wearable sensors which can apart. If a vehicle crossed the first detector boiler blows up. So the temperature be used to identify or track person’s or it will read the number of that vehicle and Continued on Page 21

CSI Communications | April 2014 | 10 www.csi-india.org Cover Mr. Sarwesh P*, Dr. N S V Shet** and Dr. K Chandrasekaran*** *Research Scholar, E & C Department, NITK, Surathkal, Karnataka **Associate Professor, E & C Department, NITK, Surathkal, Karnataka Story ***Professor, CSE Department, NITK, Surathkal, Karnataka Internet of Things: A Birds Eye View Notion of Internet of Things further improvements in networks smart irrigation system for agriculture Internet of things (IoT) is a fast growing, allowed external peripheral devices to be and smart grid for power consumption user friendly technology which allows connected to internet. In present we are management, wildlife monitoring by everything to be connected together and giving instruction to devices instead IoT multimedia sensor networks and some also allows effective communication will make the devices to think and act sensors implemented under the ground, between the connected “things”. These according to our needs. sea, forest and bank of rivers to prevent “things” can include any object ranging [Kevin Ashton] the co-founder of the world from natural disasters like from a small pen to a big car. Auto-ID Center at the Massachusetts tsunami, earthquake, forest fire, flood etc . This technology has expanded to Institute of Technology coined the term Working Process of Internet of such an extent that even living organisms IoT in 1999, after him [Ashton] discussed are considered as the part of Internet of about IoT in RFIDJournal.com in 2009. Things things. In IoT, intelligent devices such as The white paper of [Texas instruments] IoT handles all types of devices from a Passive RFID Tag [Los Alamos], Smart Dust says that till now, the world has deployed simple device to an intelligent device. [Kristofer S. J. Pister, Joe Kahn, and Bernhard about 5 billion “smart” connected things. These devices should have certain Boser] etc., are connected together in a Predictions say that there will be 50 basic capabilities namely sensing, large network with unique accessibility. billion connected devices by 2020 and in data capture, data storage, data IoT exchanges data in a fraction of second our lifetime we will experience life with a processing and it should also be uniquely and also it consumes less power. It makes trillion-node network. The current network accessible. In IoT architecture, devices the human life more comfortable and it infrastructure is a barrier in realizing those can communicate with each other by helps to build a smarter world. numbers. The industry will achieve the forming a network. This network is reality of 50 billion connected devices only similar to computer network but here Evolution of Internet of Things computers are replaced by things. In Before 1990’s communication happened by simplifying the way in which things are IoT devices can communicate with each between computers which was called as connected. People are trying to optimize other directly or through a gateway. It electronic data transfer. These computers the process of internet of things because manages resources, services and collects formed a network and it was further in future the trillion-node network may be the information for sending it according classified as Local area network (LAN), implemented. to requirements of user. There are four Metropolitan area network (MAN) and In many places people have started types of communications involved in IoT, Wide area network (WAN). This WAN implementing the smart things/devices was called as Internet where, several in real-time applications such as RFID a) Device-to-device: In Fig.1 we can see computers around the world were able to tracking, smart dust implementation in that in section 1 and section 2 there communicate each other. Subsequently battle field, smart health care system, are two ways connecting the devices,

Fig. 1: Working process of IoT

CSI Communications | April 2014 | 11 either they can connect directly or they tag, temperature sensor, smart dust, windmill, thermal power plant, solar power can connect through the gate way. It is multimedia sensor, server, router, bio plant, etc., will be directed and distributed clearly differentiated by two kinds of sensor, smart chip, server, database to places where energy is required. dotted lines. system etc in a single track. For example, if a wind mill is generating b) Device-to-user: The user can be in 1000 mega watts of power in place A and section 1, section 3 or section 4 in The above challenges are considered as if the people require the power of only either of the cases he has to access the important requirements for developing 700 mega watts. Remaining 300 mega the data from the device only through IoT. The researchers are working through watts can be sent to Place B otherwise it service management system section it and they are trying to optimize the will be wasted. To save such resources a 4. Because all the data related controls different parts of architecture. technology called smart grid technology is booming with the help of IoT. are handled by the section 4. Applications of Internet of Things c) Device-to-server: The device to server Internet of Things in Future interaction involves all the four sections. Smart marketing: In ITU people are working on a Packet based Hence the two domains In supermarket this technology can service related network which is called as d) Server-to-applications: This process is be used to provide the information “Next Generation Network”. It handles fully related to section 4 where the user to the customers without any human billions of things together. For example, it can access the data directly from the intervention. For example, A passive is possible to get the current information server. RFID tag can be placed in a cocoa bean about animals in the amazon’s forest with package such that whenever a customer in a second, by sitting in our home. In future By seeing the Fig.1 we can clearly comes near to the package it will intimate understand the working process of devices will sense, speak, hear and at last it the customer about the details of beans might even start thinking. internet of things. automatically through a voice signal. Conclusion Challenges for Internet of Things Smart Products: •• Connectivity and identification: Proper IoT is a recent technology which is Using IoT products can be developed such booming and it has a good rate of standards have to be developed for that they will instruct the user based on connectivity and there should be a acceptance among the people. Industries the application. For example, a RFID tag are spending a considerable amount unique identification mechanism can be attached with a shirt to monitor the for accessing all kind of devices. For of money and many researchers are body temperature of the user and instruct working towards the improvement and this IPv6 was proposed as one of him accordingly. the solution but there is no standard development of IoT. The applications of mechanism till now that can be used Smart eHealth care: IoT are many and so are the users. This for identification. In eHealth care system the doctor can technology can be considered as one of •• Reliable and scalable Network: Here see the body condition of patient without the most promising technologies of the ubiquitous things are connected testing him physically, by using a smart 21st century. It is needless to say that the together and hence efficient network product called biochip which is inserted in future wouldn’t exist without IoT. It would with good reliability and scalability the patient’s body. It can measure the blood become as an integral part of the day- is required with a Quality of service pressure, cholesterol content, heartbeat, to-day human life. People would become extensively dependent on IoT, at least to protocol which would maintain the body temperature, viral infection etc., and satisfy their medical needs. The day is data flow. it will report to his family doctor. •• Power management: Power is one not far when each person would directly of the important parameters to Smart Automation: or indirectly be related to at least two or be considered. Energy harvesting We can implement intelligent multimedia three IoT networks. sensor in car, designed in such a way that by smart devices should be References implemented and IoT devices should it will focus and analyze the retina of the [1] www.ti.com/iot-intro - Strategic marketing, be self sustainable. person who is driving the car and it will Texas Instruments, Sep-2013 [Jim Chase] •• Security: Security is a very instruct the driving person that to stop [2] IERC - Internet of Things European Research the car. If the person still drives the car it Cluster 3rd edition of the Cluster Book 2012 important aspect of IoT. The built- [Ian G Smith, Ovidiu Vermesan, Peter Friess, in security should be implemented will park the car in a parking area of the Anthony Furness, Martin Pitt] in devices and protocols. Usually road automatically. This will prevent the [3] Internet of things the legal perspectives – IoT uses wireless infrastructure for accidents. 2010 [Rolf H. Weber, Romana Weber] [4] The Internet of Things, ITU Internet reports, communication which is prone to Smart Pollution monitoring system: Nov-2005 [Lara srivastava, Comprising several attacks. Thus proper security If some person is throwing plastics Phillippa Biggs, Tim Kelly, Youlia Lozanova, Lilia Perez Chavolla, Jaroslaw Ponder, Raushan measures should be taken to protect in ground the multimedia sensor will the data being transferred. Sagalbayeva, Svetlana Skvortsova and monitor and it will warn the person and it Christine sund] •• Multi device adoption: Thousands will indicate the fine amount that has to [5] Rethinking the Internet of things-A scalable of new devices are working and be paid by the person. So pollution will be Approach to Connecting Everything, 2013 hundreds of new devices will be [Francis daCosta] reduced and next time people won`t do implemented each and every day. [6] ITU Workshop on the “Internet of Things such kind of mistakes. -Trend and Challenges in Standardization” For that, our network should be (Geneva, Switzerland, 18 February 2014) able to adopt all kinds of devices Smart grid Technology: [7] http://www.iot-a.eu/public from lower end to higher end. For In smart grid technology the excess of [8] http://www.internet-of-things-research.eu example, it should manage RFID power which generated by means of n

CSI Communications | April 2014 | 12 www.csi-india.org Technical Ramakrishnan Iyer* and Radharaman Mishra** *Principal Architect, Research & Innovation Tech CoE Group of iGate Global Solutions Trends **Technical Architect, Research & Innovation Tech CoE Group of iGate Global Solutions Building Intelligent Internet of Things Applications using Microsoft StreamInsight

Abstract: The Internet of Things (IoT) is a web of objects with unique identifiers that can communicate with each other with or without the aid of a computer or internet. The communication is enabled through the sensors installed into the participating devices. Several technologies like wireless technologies, micro-electromechanical systems (MEMS) and the Internet have contributed to the emergence of the IoT. Due to availability of low-cost sensor devices, market analysts estimate that there could be around 26 billion installed units by 2020 and the market size to be around 2.2 trillion by 2025. IoT has become one of the most talked about emerging technologies, given the potential to come up with various innovative products and services. Since it enables the devices to come alive and be interactive, the product companies and service providers will be using it for continuing with their services even after the product has been actually sold. IoT applications will be smarter than the applications we use currently in a way that they would be able to communicate with each other and enable decision-making giving them intelligence of their own. IoT has the potential for new opportunities across vertical markets such as insurance, consumer electronics, medical, transportation to develop use cases which can leverage this technology to reduce costs, improve customer satisfaction, and create new business models based on the analysis of the data collected. Microsoft StreamInsight is a powerful platform for developing and deploying highly scalable and low latency CEP applications. It is designed to provide event-driven processing solution to continuously arriving data without writing the data to disk for analysis and querying. With StreamInsight, IoT applications can provide better and faster CEP solutions to incoming data in near-real time, as the data gets acquired from the sources as compared to the analytics solutions based on the traditional database reports and dashboards. The primary intent of this paper is to provide enterprises an overview of Microsoft StreamInsight features and capabilities and iGate iStreamAnalytics platform that can be used to develop online complex event processing solutions for quick insights in various verticals. Key IT Challenges with Internet of Things Implementation IoT applications and traditional applications (e.g., native or web based IoT based business applications have applications) are significantly different in many ways. Technological and some signature characteristics: architectural implications of these differences are profound. • Very high event data rates • Huge volume of continuous data • Need for continuous monitoring patterns. IoT applications by nature will opportunities and even bigger challenges • Minimal latency be not only complex but also critical, such as: • High level of complexity in finding because the insight provided by its output meaning in the data will be often triggering some other event • Processing large volumes of data • Immediate response in case of an of decision making. Due to these reasons published at a high speed needs a alert situation an enterprise will need to come up with matching infrastructure a robust, scalable and proven CEP and • Effective, meaningful and cost A typical IoT application will be connected analytics platform, which can leverage effective mining and analysis of the to a huge number of devices that will this online data for providing advanced input events needs a robust analytics continuously provide it with the input data CEP solution for various benefits such as platform in the form of events. Traditional relational business insight, better decision making • Since the number of connected database centric application development and cost reduction etc. devices might increase drastically, models may not be sufficient for building IoT applications and traditional the architecture need to be scalable such applications and they can use applications (e.g., native or web based • Applications has to have integration “Complex Event Processing (CEP)” applications) are significantly different capabilities with different types of technology instead. The application in many ways. Technological and devices and systems will need to capture the events, analyze architectural implications of these • Considering the high volume of data, the data to come up with insights and differences are profound. It will bring big need to ensure the data quality • High network bandwidth is required A typical IoT application will be connected to a huge number of devices to read all the raw data generated by that will continuously provide it with the input data in the form of events. millions of connected devices Traditional relational database centric application development models may • No uniform standards for data not be sufficient for building such applications and they can use “Complex generated from devices which may Event Processing (CEP)” technology instead. result in data silos and can prevent widespread adoption

CSI Communications | April 2014 | 13 • There could be potential security input devices into intelligence for the • Familiar Microsoft .Net based implications since the connected business. Some of the key capabilities, development platform that allows devices can be vulnerable to hacking StreamInsight offers are: leveraging the existing skill sets and hence need a secure identity • Ability to process multiple data and infrastructure investments in management and authentication to streams over the internet from VisualStudio and .Net framework be implemented multiple, heterogeneous data sources • Reduced and optimized storage • Defining the data retention, archival and apply business rules to generate requirements since the streams need and purging could be a challenging meaningful patterns, exceptions and not be persisted for the processing task for the massive amount of data trends • Event Flow Debugger tool for that get generated from devices • Adapter model to interoperate with monitoring the running queries, all kinds of data sources and facilitate replaying the data processing, and Microsoft StreamInsight Capabilities seamless integration with both the performing root-cause and event- Microsoft StreamInsight provides a incoming and outgoing event traffic propagation analysis powerful platform for implementing • Declarative query language (LINQ) to robust and highly efficient IoT applications iGATE iStreamAnalytics Solution formulate queries, rules, and patterns involving the complex events processing. iGATE iStreamAnalytics is a Microsoft • Parallel processing and use of in The technologies advancements in the StreamInsight based solution that is memory cache for delivering better devices together with the capabilities of designed to process events, received as performance StreamInsight will allow the possibility input data, from multiple sources in real • Event driven, continuous and of building intelligent applications where time. Key solution features are: incremental processing for high StreamInsight will play a pivotal role • Capability to receive input data throughput, low latency in transforming the raw data from the from multiple sources in multiple

Fig1: iStreamAnalytics- High Level Architecture

CSI Communications | April 2014 | 14 www.csi-india.org alerts and provide analysis of the Though IoT is still in its early stages, IoT will need enterprises to gear up for a usage, remotely control as well as highly connected world and come up with new business models and processes automation of utilities and prevent to have a better competitive edge in the market. any critical situations • Real-time manufacturing formats and can be configurable to will need to be developed for the intelligence: Monitor real-time data be processed in StreamInsight engine application. of manufacturing operations and analyze the data to provide insightful • Prebuilt and configurable simple Dashboard rules and alerts information for improving the entire Dashboard application will be responsible • Capability to display the data flow manufacturing processes for showing the data and alerts generated by and alerts in near real time • Fleet management: By having sensor the CEP. The dashboard has the capabilities • Services based integration with the devices on the vehicle fleet, track and to plot the data in the chart format and StreamInsight (for both the Event monitor vehicles, optimize routing displaying alerts in near real time. generator and the Dashboard) operations, vehicle utilization and Applications Enabled due to improve the overall efficiency of their Following diagram shows the high level iStreamAnalytics Solution fleets architecture of the iStreamAnalytics Any business scenario where an event • Fraud Detection: Monitor all financial solution. generated is of importance, will need & non-financial transactions, do to be monitored (often together with analysis based on business rules and Event Generator some other events) and analyzed for detect any fraudulent or suspicious This application will act as a gateway for myriad purposes like generating alert, activities being done the various input sources (e.g., device decision making, triggering some sensors- speedometer of a vehicle, Conclusion associated event and so on will benefit device on a patient, smart meters etc.) Though IoT is still in its early stages, from the IoT applications. Financial to read the data and transform them into IoT will need enterprises to gear up for services, health care, insurance, utilities, a configurable format to the service that a highly connected world and come up telecommunication, manufacturing and inputs to the StreamInsight engine. with new business models and processes web analytics are some of the business to have a better competitive edge in CEP Engine domains that will need to implement CEP/ the market. Also the sensor devices will CEP Engine will be responsible for IoT applications. bring a new transformation in how to processing the events that has been Following is a list of some of the detect any change in parameters, use submitted by the devices/sensors (or specific examples of new potential IoT- this information to trigger new events the Events Generator). It will be applying based applications that use sensor devices: to help save costs and better decision the business rules over the streams and • Usage-based insurance: Using making. New analytics tools like Microsoft generating the appropriate alerts. The sensors in vehicles, monitor the StreamInsight are emerging to provide rules can be classified into two types: driving behaviors using the data scalable high performance architecture to • Pre-built Rules: The parameter for generated from sensors, profile driver process this massive amount of data. the rules will be configurable where to provide calculate auto insurance iGATE is well-positioned with its new thresholds could be defined and premium policies iStreamAnalytics platform which is a real- alerts could be triggered for data that • Healthcare sensing: Collect, monitor time business analytics solution to enable does not meet the threshold values. and analyze data at real-time from rapid development of new IoT solutions An example could be if the speed patients/consumers to provide a for fast-time-to-market in any verticals. It exceeds 100 miles per hour, trigger better healthcare facilities will allow configuring usage of any devices an alert for over speeding. • Smart meters: Monitoring of various data and providing device monitoring, • Custom Rules: These rules will be utilities like electricity, gas and water dashboards and analytics reports to specific to business scenarios and etc. and analyze data to trigger enable better decision making. n

Ramakrishnan Iyer is a Principal Architect working in Research & Innovation Tech CoE Group of iGate Global Solutions, and is responsible for developing technology solutions. He has more than 20 years of experience in Information Technology with strong expertise in Microsoft technologies, Application Portfolio Rationalization, applications assessment, and Application Portfolio Modernization. He has extensive experience in architecting and designing large business applications in various technologies.

Radharaman Mishra is a Technical Architect with the Research & Innovation Tech CoE Group of iGate Global Solutions. With over 14 years of experience in the IT services industry, he has worked on software application architecture and design, development, architecture assessment and consulting. His expertise includes .Net, ASP.Net and Microsoft SQL Server. He has been working with iGATE’s Fortune 500 customers on various Microsoft-specific enterprise application architectures and design. He has also published papers of technical interests in various external and internal forums. About the Authors

CSI Communications | April 2014 | 15 Technical Venkatesh Babu* and Ashok Yalamanchili** *Sr. Principal Architect, Technology CoEs in R&I group @ iGATE Trends **Technical Lead, Technology CoEs in R&I group @ iGATE

Indoor Positioning System (IPS) using Beacons

Introduction of 1-2 metres in a retail store or there can Future Market be multiple stores within a distance of The global indoor positioning market is What is IPS? 10 meters in a mall. estimated to grow from $448.6 million An indoor positioning system (IPS) is a Also due to the nature of indoor in 2013 to $2.60 billion in 2018. (Source: network of devices used to wirelessly environment, GPS cannot provide www.marketsandmarkets.com) locate objects or people inside a building. information about the floor and building Usage of IPS level at which user is located. Why IPS? Indicative list of use cases and scenarios This brings up the need for a system Due to the signal attenuation caused by where IPS can be used are given below construction materials, the satellite based where a user/object has to be located GPS signal loses significant power indoors. inside a building accurately and precisely Consumer: For this reason the receiver cannot get to make positioning and navigation inside •• Transportation hubs like Airports, coverage of 4 satellites which atleast is indoors as easy as outdoors. Railway & Bus stations needed to accurately get the location •• Indoor venus like university campus, Current Scenario hospitals coordinates. Even though there was a market pull for •• Commercial venus like shopping The consumer devices will have a this technology from a long time, it didn’t malls, offices maximum location accuracy of 10 mts come into mainstream due to limitations when the location is set by the GPS. This of the software / hardware available with Non Consumer: accuracy is not acceptable with respect consumers in general. Now that smart •• Emergency services like fire rescue, to the use cases for indoor positioning phones are ubiquitous, the technology police and medical and navigation as a lot of things change is gaining momentum in terms of scale •• Asset tracking & logistics for offices, at indoor level, for eg. aisles are placed and variety with the entry of innovative hospitals, industries and retail stores adjacent to each other within a distance companies. •• Industrial Automation

Source: www.extremetech.com (http://www.extremetech.com/extreme/126843-think-gps-is-cool-ips-will-blow-your-mind)

CSI Communications | April 2014 | 16 www.csi-india.org Source: Internet, Enhanced by iGATE

iGATE’s Exploratory Activities iGATE has worked on the PoCs for proximity using Estimote’s iBeacons, positioning and navigation using indoo.rs bluetooth beacons and its framework. Proximity PoC: In this PoC, bluetooth beacons are placed in the store at strategic positions and configured with their major and minor identifiers. If the user with the mobile app comes into the field of the beacons, then an offer that is configured for that beacon will be pushed to the user. Indoor positioning and Navigation PoC: This PoC will provide the user his current location with an accuracy of 1 meter which gives accurate results from an analytics perspective. The user can also navigate inside the store based on the products he has in his shopping cart. iGATE is building a omni channel Enabling Technologies for IPS iGATE chose to experiment with BLE solution which will enable retailers to Beacons and Wi-Fi access points. Sample Solution push real time personalised promotions BLE beacons images are given below. Some of the enabling technologies used and offers to the customers, also identify for an IPS solution are listed below the customer behaviour across physical •• Wi-Fi access points stores. The offers that are pushed are •• BLE Beacons based on the users past shopping history •• Sensors (Accelerometer, Gyro, across different channels like web, mobile, Compass, etc.) and physical store. In addition to this the •• Indoor Lights product also gives insights like how the •• Magnetic Field Source: Beacon’s images are from their customer has moved inside the store, •• Low Orbit Satellites respective vendor websites dwell times at particular aisles. •• Camera Technology

CSI Communications | April 2014 | 17 highly fragmented this becomes a major challenge in selecting the IPS solution. Conclusion IPS seems very promising which can be leveraged in many scenarios / areas. There are many vendors that are heavily investing in this space. Some of the major players that are having a considerable impact in this space are • Navizon (http://navizon.com/ indoors-solutions) • Meridian apps (http://www. meridianapps.com/) • Aisle411 (http://aisle411.com/ solutions/publisher-solutions/) • Indoors (http://indoo.rs/) Even though there are many vendors out there in this space, the technology is still Challenges moving which creates more fluctuations at a very nascent stage, accurate and easy- There were many challenges encountered ultimately leading to stability issues. One to-setup solutions can make IPS realize its by iGATE while implementing an indoor of the main challenges for the IPS to work full potential in many areas. positioning system. Some of the these consistently is to minimize the effect of References challenges are mentioned below these interferences by filters implemented [1] marketsandmarkets.com. (2013). by IPS providers. Precision and Latency - The amount of Indoor Positioning and Indoor Navigation (IPIN) Market [(Network- time for which the user can get his current Structural movements – Any change in based Positioning; Independent the position of a sensor or change in the position with maximum accuracy varied Positioning; Hybrid Positioning); by a lot from vendor to vendor. We got a structure will need a recalibration of the Solutions (Maps and Navigation; precision of 1-2 mts for 70% of the time entire area of interest, so that accurate Location based Analytics)]: Worldwide by using Bluetooth Low Energy (BLE) results are provided by the IPS. Market Forecasts and Analysis (2013 - beacons based IPS. When the Wi-Fi Power consumption - Although Bluetooth 2018). Dallas: Markets and Markets. [2] Naguib, D. A. (2011, 9 11). The Great Access Points were used for positioning, LE consumes less power on a mobile we got a precision of 5-8 mts for 60% Indoors: Challenges and Use Cases: device compared to Bluetooth 2.0/3.0, Qualcomm. of the time. Latency is the time taken by continuously fetching the position will the system to identify the users position [3] Indoors. (2013, 09 07). Indoors. involve significant battery consumption Retrieved 12 26, 2013 from Accurate from the time the request to get location is as the location has to be fetched from the indoor localization: http://indoo.rs/ sent from the device to the server. Typical server. Beacon vendors typically specify features/ latency of 5-6 seconds was observed to a battery life of 1-2 years per beacon, but [4] Loctronix. (2011, 09 26). Consumer get the position with good accuracy. during our solution implementation, we Applications for Indoor Positioning. Signal accuracy & stability - The found that batteries drained out in less Retrieved 26 12, 2013 from Loctronix: http://www.loctronix.com/news/ signals emitted from either Wi-Fi AP’s than 6 months. Insider/I1-1-A2-ConsumerApps.html / Bluetooth beacons are prone to be Supporting multiple devices - Another [5] Indoor LBS. (2014, 01 16). Indoor absorbed by human bodies, walls, aisles major challenge for these IPS solutions Location & Mapping Services Report. and other structural elements. This is to have compatibility with multiple Retrieved 01 24, 2014 from Indoor LBS: creates interference to these signals and platforms, device and Operating System http://www.indoorlbs.com/p/market- it gets more complicated if people are versions. As the current mobile market is report.html n

Venkatesh Babu is a Sr. Principal Architect working in the Technology CoEs in R&I group @ iGATE. He has more than 20 years of experience in IT industry and is currently involved with R & D of emerging trends & technologies. The R&I Technology CoE team works on PoCs, Solutions, and provides thought leadership for evangelization of new trends / technologies for solving business problems of clients.

Ashok Yalamanchili is a Technical Lead with more than 7 years of experience in IT industry. At iGATE, he is currently working in the Technology CoEs in R&I group working on emerging technologies and trends. The R&I Technology CoE team works on creating POCs, Solutions, evaluating new technologies and helps in client engagements. About the Authors

CSI Communications | April 2014 | 18 www.csi-india.org Technical Bipin Patwardhan Trends Research & Innovation, iGATE, Mumbai, India The Need to use 'Near-Source' Processing in Internet-of-Things Solutions Abstract: The 'Internet-of-Things' revolution is about making ordinary devices more 'intelligent' regarding their environment and more 'adaptive' to user needs. As making devices 'intelligent and adaptive' means these devices monitoring their environment and reacting to it, it involves collection of a lot of data, as well as processing it into insights. With the installed base of such devices expected to explode into multi-billions, the amount of data that is expected to flow and be processed is going to be mind boggling. Hence, we believe that Internet-of-Things solutions should consider some form of 'near-source' processing in order to provide more immediate feedback to users and also to reduce the amount of data transferred from the device to the system/application where it is processed.

Introduction While many IoT solutions are still problem of data processing and reporting. Most people are familiar with common in development phase, the number of While these solutions have been very means of data processing – data generated solutions is expected to grow. As per the successful and can address data volume by a device is transmitted to a central Gartner 2013 Hype Cycle, IoT is reaching to a certain extent, their Achilles heel location where it is processed and used for the peak of expectations and expected has turned out to be data variety – as business reporting or for making business to reach mainstream in the next 5 to these solutions depend on an underlying decision. In recent time, this method of 10 years, if not earlier. Thus, it is expected RDBMS for data storage – where data can data processing is facing a challenge not that this interest will not only drive be received in different formats. only from the volume of data that is being creation of innovative and novel gadgets To manage increasing data volumes generated, but also from the fact that a and devices, but will also be the prime and the increased urgency around wide variety of sources are generating drivers for applications to be developed actionable information, Big Data Analytics data, adding to the complexity of data that consume such data and use it to seems to be the most natural solution. processing. While it may be relatively easy influence business decisions. Big Data solutions try to address all three to address the problem of data variety by As per Gartner reports, the impact of Vs of data, by using a combination of using well-defined data formats, it seems connected smart devices is expected to tools and technologies and by keeping that the problem of data volume can only add $1.9 trillion to the global economy. Not data in as near-native format as possible be addressed by essentially using more only are conventional devices like servers, (rather than retrofitting it to a specific and more processing power – be it either storage equipment, network devices structure). However, BI and DW based by using ever-larger processing systems expected to become 'smarter', but many solutions as well Big Data based solutions or by using clusters of distributed systems. other devices like cardiac monitors, health most commonly persist the data before monitors, automobile and devices like processing it and hence put heavy 'Smart' Devices washing machines and air conditioners demands on the infrastructure in terms Though the landscape is changing, most are also expected to become 'smart'. This of huge processing power as well as data being generated is by conventional is expected to drive around $3.8 trillion in extremely large storage capacity. methods of business, like collecting spending on information technology, to electricity consumption data at the end monitor, manage and derive meaningful 'Near-Source' Processing With smart devices expected to add of the month, mobile usage on a daily inferences from data generated. basis, and so on. While 'smart devices' exponentially to the data volumes, an like music enabled shoes and Challenges with Existing already challenged area – processing the are not a new phenomenon, recently Architectures data - will be stretched to its limits. Not there has been an enormous interest in With tremendous growth in volume of only will processing and storing these data applying 'smart' concepts not just for data, most enterprises are exploring and/ volumes pose difficulties, but transmitting consumer gadgets, but also to enterprise or working with Big Data technologies like such data and extracting 'on time' inferences applications and enterprise processes. Hadoop, MongoDB, Cassandra and others from them will also be a challenge. Hence, concepts like 'smart meters' to manage data and extract business To overcome some of these stated are being actively installed in homes to benefits from it. Enterprises are using a problems of data processing, we would monitor electricity consumption, 'smart combination of tools and technologies to like to suggest the concept or 'near- cars' are being developed to monitor handle volume, velocity and variety of data source' processing. But, what is 'near- driver as well as car performance and use (three Vs of data). While it is complex to source' processing? As we define it, 'near- that information for insurance offerings address data on these axes, what adds to source' processing is nothing but placing and vehicle maintenance, to name a the complexity is that Big Data solutions computing technology as near to the few applications. Such 'smart' devices need to be integrated with existing Data source as possible, and processing the data when connected (mostly wirelessly) to Warehouse + Business Intelligence + as soon as possible, for immediate insights. enterprise applications over the Internet, reporting solutions. Traditionally, Business But, how different is it from using constitute the area of 'Internet-of-Things', Intelligence (BI) and Data Warehouse an intermediate computer system that IoT for short. (DW) solutions have addressed the collects data and processes it before

CSI Communications | April 2014 | 19 sending it to a central server? While or more 'near-source' processing units. Benefits the concept many not be very different, Each unit can process the data to identify Some of the benefits of 'Near-Source' the way it differs, is its use of low-cost events and/or alerts based on provided processing can be computing elements to receive and rules, which in turn are made available to 1. Immediate feedback by processing process the data. While earlier, one the user. After processing the data, the data without delay. would have needed to use a full-fledged 'near-source' processing units can send 2. Improved visibility for users, as they desktop-class system for this purpose, either event data or the raw data to other will get feedback about how data is with the availability of low-cost computing analytic systems, for detailed processing being processed. hardware like Aurdino, Raspberry Pi and and analysis. 3. Reduced transmission costs – Intel Edison, 'near-source' processing While 'near-source' processing transmitting only high-level events solutions will be easier to implement and solutions will not be expected to crunch and their related information instead will also be cost effective. Additionally, Terabytes and Petabytes of data, they of raw, unprocessed data. such low-cost hardware will serve the will be able to process a few Megabytes 4. Reduced central infrastructure costs stated purpose as in most cases, the of data within milliseconds and generate – central processing centers will not amount of data to be processed will not immediate feedback for users. Such need to store and process the full be extremely large. The 'near-source' immediate feedback in terms of raw data set. Only specific event data processing unit will be expected to store 'actionable insights' can help businesses need be stored for analysis. and process only a limited set of data, benefit from favorable conditions as 5. Privacy, Security, Compression – raw the size of which can be defined as per well as take preventive actions in case data, as generated by 'smart' devices the business requirement. Extremely of adverse conditions. Additionally, by will mostly not be encumbered complex processing tasks will continue to processing data near to the source, it by privacy and security layers. For be performed by data centers using BI and will be possible to generate 'higher-level' sensitive data sets, 'near-source' DW or Big Data setups. In fact, in addition events from the raw data and transmit processing can be used to encrypt to such low-cost, dedicated hardware these to downstream systems for further the data before it is transmitted over platforms, with suitable processing, reducing the need to transmit networks. To reduce the amount of applications can also be used to perform all the raw data 'as-is' for processing. data transmitted, data compression the task of 'near-source' processing units. It should be noted that 'near-source' techniques can also be used. processing is by no means meant to Architecture replace analytic systems, but can be used Application Areas The architecture for a 'near-source' to provide immediate, relevant feedback Some of the application areas for 'near- processing system is given in Fig. 1. to users and also help reduce the amount source' processing can be As depicted, raw data generated 1. Connected automobiles – of data transferred from the 'smart' device, by smart devices can be received by one Automobiles that are able to process to the place where it is to be processed. inputs from their surroundings to take appropriate action. 2. Home medical care – Data collected from medical devices can be processed within the confines of the patient's home, before it is transmitted to the healthcare worker. 3. Traffic Management – Traffic patterns can be identified from one or more traffic signals, to build a comprehensive picture of local conditions, before transmitting events of significance to the central system. Conclusion With the expected wide proliferation of smart devices in coming years, the amount of data generated and processed is expected to go up dramatically. While many enterprise data processing needs can be addressed by using suitably powerful Big Data deployments, in case of 'smart' devices, it is worthwhile to explore avenues that will help reduce the amount of data transmitted over the network and Fig. 1: Architecture for 'Near-Source' Processing also to extract insights 'on time'.

CSI Communications | April 2014 | 20 www.csi-india.org For addressing the need of 'on time' reduced data sets (along with event data) provide 'local' intelligence and provide 'on processing, we believe that enterprises back to the enterprises for additional time' analytics, helping design responsive need to explore the avenue of 'near- processing. For detailed analysis, 'near systems, thereby reducing the amount of source' processing units. Such units can source' processing units can store a copy data transmitted over the network and monitor data generated by smart devices, of the generated data for a suitable period processed centrally. identify patterns, generate suitable 'events of time, making it available on demand. n of significance' and only transmit relevant, Thus, 'near-source' processing units can

Bipin Patwardhan is a Technical Architect with more than 15 years of experience in the IT industry. At iGATE, he is leading the High Performance Computing CoE. The CoE builds capabilities around technologies that help delivery high performance for enterprise applications. Presently, the CoE covers areas like Parallel Programming, GPU Programming, Grid Computing, Real-time Analysis and In-Memory Computing. About the Author

Continued from Page 9 and Prof. Chintan Bhatt also points back growth-in-the-internet-of-things- [6] http://www.ti.com/lit/ml/swrb028/ to IoT where patients can be monitored market-2-2014-2 swrb028.pdf remotely through halter that can transfer [2] http://whatis.techtarget.com/ [7] http://gigaom.com/2013/06/05/ the data to the hospital. In this setup definition/Internet-of-Things quantifying-your-pup-whistle- patient is granted greater freedom and [3] https://www.cisco.com/web/ wants-to-create-the-worlds-largest- independence in monitoring their health about/ac79/docs/innov/IoT_ database-on-dog-behavior/ and simultaneously frees up the hospital or IBSG_0411FINAL.pdf [8] http://www.medgadget.com/2013 equipment for treating other emergencies. [4] http://iofthings.org/ /09/sproutlings-wearable-baby- [5] http://readwrite.com/2013/11/04/ monitor.html References gardening-connected-home# n [1] http://www.businessinsider.com/ awesm=~oyWPdTWxhOVfRo

Tadrash Shah obtained his bachelor’s degree, B.E. in Computer Engineering from Gujarat Technological University and currently pursuing Master’s Degree at State University of New York - Stony Brook. He stood first in his college in Degree Engineering. He has published two research papers and a book in his undergraduate level. He is interested in the research in the subjects like Algorithms, High-performance computing and Databases. He has worked and undertook projects at IIT-Gandhinagar, IIT-Bombay and IIM Ahmedabad.

Prof. Chintan M Bhatt received B.E. and M. Tech. Degrees from Gujarat University (CITC (now CSPIT)) and Dharmsinh Desai University in Computer Engineering. He is a member of CSI, AIRCC (Academy & Industry Research Collaboration Center) and IAENG (International Association of Engineers). His areas of interest include Data Mining, Web Mining, Networking, Security and Software engineering. He has more than 3 years of teaching and research experience. About the Authors

Continued from Page 10 when it crosses the second detector it is only 20kmph then it’s clear violation. in the world so that it is possible to do reads the number again and calculates The intimation can be sent to the control information sharing, retrieval, monitoring the speed using the time taken to cross room so that the vehicle can be tracked in and taking necessary steps to control that 100m distance. If a vehicle crosses some other detector. them with less effort and in quick time. 100m distance in 5secs then its speed is The RFID, Wireless sensor and n 72kmph. If the speed limit of that location GPS can together connect any object

Dr. Murugavalli Subramaniam is Professor and Head, Department of CSE at Panimalar Engineering College, Chennai. She has 18 years of teaching experience and 9 years of research experience. She completed her Doctoral Programme in the area of Image Processing, Anna University. She is a member and Student Branch Coordinator of Computer Society of India.

B Ganesh is Assistant Professor (Grade-I), CSE, at Panimalar Engineeering College, Chennai. He studied B.E. CSE in VRS College of Engineering Villupuram and M.E. CSE in AVIT, Chennai. He is having 12 years of experience in Teaching and Industry together. About the Authors

CSI Communications | April 2014 | 21 Technical Kamal Sharma Trends MSc Computing

Human Gait- Using Biometric for Mobile Phone Security

Introduction takes top-down approach. It starts pixelated and converted into black and Mobile phones has become important as impulse in human brain and end white, and recognises the movement. It part of our life, almost every individual with movement of the body in form of can be effectively used for surveillance, carries a mobile phone these days and walking, running or dancing. Loco motor which out obstructing the users (Nixon, et will be more critical part in years to come. programming happens in surpraspinal al., 1999; Han & Bhanu, 2006). We use mobile phone more than just centre, which leads the idea in to pattern In the floor sensor approach[12], talking; we use it for browsing internet, of muscles activities required for walking [13], sensors mats are place on the floor booking ticket, hotel, online shopping as suggested by Enoka (Vaughan, et al., to collect gait data. Ground reaction and the most important online banking. 1999). The human gait is divided into forces generated during normal walk Value of phone is more than the value of gait cycles, which start from one foot and is used to generate the pattern and the hardware; it has important personal ends with the same foot in the process of uniqueness of the individual. It is and financial information like bank details. walking (Marks, 2010; Ayyappa, 1997). effectively used in building, museums to Security of the phone plays important Gait cycle is further divided into three restrict physical access to certain area role users today, OEM provide method main tasks. based on the walking pattern (Jenkins & of authentication such as pin and pattern •• The first task is a weight acceptance Ellis, 2007; Nakajima, et al., 2000). lock (dots to connect). Study carried out period, in which body balances itself Last approach is wearable sensor,, on 464 participants shows need for an on one foot and prepare itself to lift name itself says that the sensors are alternative security system for mobile another foot maintaining its balance wear by the used and they are placed on uses. Study shows that users do not lock and absorbing shock. different body parts such as leg, foot, thigh, their phone due to various reason top •• Next task is "single limb support hip and wrist. Examples of the wearable most being the ease of use as they have to task", which is a mid state phase. In sensors are accelerometers (measuring unlock the phone and users are afraid to this phase one foot is lift in air and acceleration), gyro sensors (measuring forget the password or pin which results swing forward while balancing the rotation and number of degrees per second in wiping the data and setting phone to body weight on one foot. of rotation), force sensors (measuring the factory default (Asher, et al., 2011). •• The last task is "limb advancement force when walking) etc (Mäntyjärvi, et Researchers are looking for an phase", in this phase foot is rested al., 2005; Søndrol, 2005). alternative approach such as biometric on the ground maintain the body Gait analysis has been used as for authentication such as imagine balance and preparing the other foot one of the method in forensics analysis. biometric, fingerprint, voice recognition for the gait cycle. Gait analysis data captured from the and gait of the owner. Biometric such as The above gait behaviour is study in detail surveillance camera was used to find the fingerprint, face and voice recognition and in clinical gait analysis, which does not murderer of Swedish Foreign Minister, active biometric, that is it requires user focus on identifying uniqueness of the Anna Lindh[20]. Various incidents of intervention, the pattern of human walk person (BenAbdelkader, et al., 2002), robbery has been used to identify the also know humangait has a pattern which studies in field of medicine (Kale, 2004), robber for example a back robbery in can be used to lock the mobile devices, psychology (Birren & Schaie, 2005) and Aalsgarde Denmark [42] and Norwegian also known as passive biometric since it biometrics (Gafurov, 2008; Mäntyjärvi, et NOKAS robbery[25, 24]. does not requires human intervention. al., 2005), had provided various evidence Performance and Effectiveness of Human gait is a tried and test as that human gait contains distinctive Human Gait passive biometric, and very difficult to pattern which is unique to every individual Biometric has been proved an effective copy a human gait. The report focuses and can be used as an authentication mean of security, but compared to other on human gait and various methods of mechanism. biometric mechanism gait can be with human gait (see 3). It also discusses Various Methods Used in minimal or almost non user intervention how it can be effectively used to secure (Bashir, et al., 2010). For example, to a mobile phone (see 4). Challenges and Biometric Gait There are three different methods used in measure finger print, hand needs to be its countermeasures (see 5) based on the biometric gait recognition: Machine Vision place on the sensor and to measure face literature available. Based, Floor Sensor Based and Wearable or iris recognition, user has to pause their What is Human Gait? Sensor Based Gait Recognition. work and wait at the scanner. Incase of gait In early 1900's Marks suggested that In machine vision based gait using any of the above 3 methods mention walking patter can be divided into series approach, cameras are place strategically above users do not need to wait or pause of phase (Marks, 2010). Human Gait to capture gait data. Captured image is their work it can be done smoothly.

CSI Communications | April 2014 | 22 www.csi-india.org A study by Mjaaland, et al., (2011) was be enhanced to get more accurate result. The above figure shows process carried out on 50 participants so see if the Geng, et al., (2010) suggest use related to fingerprint authentication but it gate can be copied or imptate, it produded of multiple biometric to improve the is also been applied to gait authentication EER of 6.2 %, and has been proved that it accuracy and efficient. Study was carried process. The process of registering or is impossible to imitate or copy the gate out using gait and face recognition and enrolling the users gait data into database (Mjaaland, et al., 2011). Results indicate resulted more reliable result, although it is done in the enrolment process. the result worsen then more training was can argued the challenges of implementing Verification process is the process in provided to participants. the same in mobile phone and it's increase which users gait data is verified against Modern smart phones such as iPhone, cost. So more economical and practical the gait data of other user in the database. android and blackberry phone has built- approach would be use of traditional pin And finally result of the records match in piezoresistive MEMS accelerometers, or password based authentication. is returned in the identification process. which can measure acceleration in three Based on the result of the process user Gait (Biometric) Authentication axis (x,y,z) to measure gyration in three is authenticated and decided if users Authentication is means of securing dimensions of movement when users walks should be allowed or restrict the access access, for example you need to have with the phone either in pocket or in hand. (BenAbdelkader, et al., 2002). username and password to access a The iPhone's accelerometer and We have seen earlier that every walk system. For more secure system tokens are A-GPS module has been used by will not result in the same gait data, so that you which are two factor authentication, researchers in the study of gait analysis system is designed to enter more than one you have (password) and you are(tokens). using Fast DTW algorithm which is gait data per user, where users is advised And in biometric you have and you are a variant of Dynamic Time Warping to walk at different pace, and in the clubbed in one where you are the key or (DTW) algorithm called FastDTW process of identification systems uses a password. (Tanviruzzaman, et al., 2009). preset threshold value to identify the user. Authentication process can be Success or failure of the implementation Challenges and Countermeasures of broken into three process illustrated in of gate depends on the degree threshold Fig. 1 belowAuthentication enrolment, process verification can be andbroken into three process illustrated in Figure 1 Using Human Gait configured. If the threshold is set to smaller Human gait is a passive biometric belowidentification enrolment, (Maltoni, verification et al., 2009). and identification (Maltoni, et al., 2009). technique, will keeps looking for the owner of the phone. Like other bio-metric system human gait is not stable and has false- positive. Most of the research done of gait focuses on walking normally (60 gait cycles per minute), at normal speed (132 milliseconds) on the flat surface (Chan & Rudins, 1994). Study by Tanawongsuwan and Bobick(2002), shows that by changing walking pattern such as speed and surface can result to a different gait. This is one of the biggest limitations in applying human gait in practical implementation. Change is clothing and footwear can produce different gait and fail in verification process. Some other example such as accident or injury, emotional state (sad or over excited) or even if the user is drunk can result a different gait. The best way to countermeasure is to have a secondary authentication in place which would be pin or password (Derawi, et al., 2010). An "Adaptive Component and Discriminant Analysis" (ACDA) is designed by (Bashir, et al., (2010) which seamlessly integrates with subspace analysis for robust recognition and more accurate result. Study by Derawi, et al., (2010) show error rate of 20.1% indicated biometeric gate is not mature enough as practical solution and requires some enhancements. Derawi, et al., (2010) FigureFig. 1 1: Enrolment Enrolment,, Verification verification and and Identification identification (Maltoni, (Maltoni, et al., et2009) al., 2009) suggets cycle extraction technique should The above figure shows process related to fingerprint authentication but it is also been applied to gait authentication process. The process of registering or CSI Communications | April 2014 | 23 enrolling the users gait data into database is done in the enrolment process. Verification process is the process in which users gait data is verified against the gait data of other user in the database. And finally result of the records match is returned in the identification process. Based on the result of the process user is authenticated and decided if users should be allowed or restrict the access (BenAbdelkader, et al., 2002). We have seen earlier that every walk will not result in the same gait data, so that system is designed to enter more than one gait data per user, where users is advised to walk at different pace, and in the process of identification systems uses a preset threshold value to identify the user. Success or failure of the implementation of gate depends on the degree threshold configured. If the threshold is set to smaller value there are greater changes of false positive (identifying some other users to be that person) and larger the threshold it is quite possible that same person could fail Kamal Sharma; M Sc Computing; 08 - Dec - 2013; Page 6 of 10

value there are greater changes of false and fingerprint recognition. Although References positive (identifying some other users to while exploring some of the apps [1] Apple Inc 1, 2011. eyeD® Biometric be that person) and larger the threshold it revealed they were fake apps which are Password Manager by Winkpass is quite possible that same person could used to play jokes and impress friend Creations, Inc. [Online] Available at: fail authentication dues to variance in example "Biometric Fingerprint Access" http://itunes.apple.com/us/app/ the gait as discussed in section 5 above. By "Fuzzy Squirrel Software, LLC" (Apple eyed-biometric-password-manager/ Success of the system is measure as false Inc 1, 2011), same is true for Google play id389295175?mt=8 [Accessed 14 May acceptance rate (FAR) and false rejection (earlier known as android market). But no 2012]. rate (FRR) which is false acceptance apps were found for gait analysis. It can [2] Apple Inc, 2011. Biometric Fingerprint and rejection against total number of be argued that there is more popularity Access By Fuzzy Squirrel Software, LLC. authentication (Søndrol, 2005). among the users for other biometric [Online] Available at: http://itunes. apple.com/us/app/biometric-finger systems compared to gait which might Critical Evaluation print-access/id419601677?mt=8 have lead to release of so many apps and As seen in section 4 above, research shows [Accessed 14 May 2012]. even fake paid apps. that gait can be used for identification [3] Asher, N B et al., 2011. On the needfor As discussed in the introduction and authentication for security purpose. different security methods on mobile smart phone are capable of do more Literature review revealed some use of phones. New York, USA, Mobile than just making calls, but we did not Machine Vision Based and Floor Sensor HCI '11. discuss the fun part of it such as games, Based being effectively used in the field [4] Ayyappa, E, 1997. Normal Human music, camera live video records which of forensic and investigation crimes such Locomotion. Journal of Porsthetics and are memory and processor intensive, this as murders and robbery. Wearable Sensor Orthetics, 9(1), p. 10–17. study have ignored this fact how it would Based Gait Recognition is most suitable [5] Bashir, K, Xiang, T & Gong, S, 2010. impact the performance of the smart Gait recognition without subject for implementation of authentication in phone, although the smart phone available cooperation. Journal Pattern Recognition the smart phone available today. It can today are getting more faster and reliable Letters, 31 (13), pp. 2052-2060. be argued after seeing the limitation and in terms of memory and processor. [6] BenAbdelkader, C, Cutler, R & Davis, L, the false positive rate, it is not completely The other aspect is the battery life of 2002. Stride and Cadence as a Biometric ready to be used. Some literature review the phone, since gait is a passive biometric, in Automatic Person Identification and revealed that it should be in combination how would it impact the battery life of the Verification. s.l., Microsoft Research. with other bio other bio-metric or other phone. Further study is recommended to [7] Birren, J E & Schaie, K W S, 2005. traditional authentication methods like pin understand the technical feasibility of the Handbook of the Psychology of Aging. 6th or password. same (Bloom, et al., 2004). ed. s.l.:Academic Press. There are other factors [8] Bloom, L et al., 2004. Investigating the to authentication and security Conclusion Relationship Between Battery Life and implementation such as feasibility, This report started by evaluating gait as an User Acceptance of Dynamic, Energy- although in theory passive biometric alternate option for mobile phone security. Aware Interfaces on Handhelds. Mobile seems feasible. Putting it into use is Literatures say that gait is a reliable and Human-Computer Interaction – MobileHCI something which only time will decide. can be effectively used for security and 2004 , Volume 3160, pp. 43-79. Another factor is cost; the existing pin surveillance. Every individual has unique [9] Carmines, E G & Zeller, R A, 1979. based authentication is economical and gait, which cannot be copied or imitated. Reliability and Validity Assessment does the job pretty well. It can be argued Report highlights that gait can be (Quantitative Applications in the Social that mobile companies or researchers easily implemented in the smart phone Sciences). London: Sage Publications investing time and money to invent which available in the market, as they have the Inc. [9] Chan, C W & Rudins, A, 1994. Foot may not be required. This report focused required hardware inbuilt (sensors). But Biomechanics DuringWalking and only on gait as an alternate and has after carefully examining the limitations of Running. Mayo Clinic Proceedings, ignored other options such as fingerprint, the gait, there is more research required in Volume 69, p. 448–61. voice or ear size. Study has showed other this field before it can be fully implement [10] Christopher, 2010. Smart Phones biometric such as fingerprint and voice in practical, although to overcome the that Know Their Users by How They recognition to be more efficient, accurate limitation it is recommended gait can Walk. [Online] Available at: http:// and mature compared to gait (Wang & be used in combination with other www.technologyreview.com/blog/ Liu, 2011). authentication methods biometric and mimssbits/25767/ [Accessed 01 May Further search on the google play traditional like pin or password. Search 2012]. (formerly known as android market) in the apps markets for biometric apps [11] Derawi, M O, Nickel, C, Bours, P & and iPhone App store, revealed there revealed that gait is of less interest Busch, C, 2010. Unobtrusive User- already exist apps for iris scanner, among the app builder compared to other Authentication on Mobile Phones using fingerprint and face recognition, example biometrics. Hence it can be concluded Biometric Gait Recognition. Norway, eyeD® Biometric Password Manager that gait as a technology is in a premature The Sixth International Conference by Winkpass Creations, Inc for iphone state and an extensive research work is on Intelligent Information Hiding (Apple Inc 1, 2011) and other apps for required use this technology to secure and and Multimedia Signal Processing, voice based password, face recognition authenticate mobile phone. Darmstadt. Continued on Page 27

CSI Communications | April 2014 | 24 www.csi-india.org R L Ujjwal*, Prof. C S Rai** and Prof. Nupur Prakash*** Research *Asstt. Professor, University School of Information and Communicaton Technology **University School of Information and Communicaton Technology Front ***VC, Indira Gandhi Delhi Technological University for Women Resource Allocation Algorithm to Improve the Quality-of-Service in OFDMA System Introduction time, while in OFDM the different users The purpose of pilot symbol is channel Wireless mobile communications play a can used different channel at the same estimate. After pilot symbol insertion, the very important role in our life. It provides time. The basic structure of the OFDMA high rate stream of data symbols goes the communication services anywhere transmitter in IEEE 802.16e standard is to the serial-to-parallel converter that and at anytime. In order to improve quality shown in Fig. 1. The stream of information converts high rate serial stream of data of service, determined on the basis of bits from the MAC layer are first fed symbols into low rate parallel substream, acceptable data transfer rate, signal to into the data randomizer, MSB first. The where the number of substream may be noise ratio (SNR) and bit error rate (BER), data randomizer XORs the bits with bits equal to number of subcarriers in OFDMA it is imperative to provide high capacity produced by a shift register. The randomizer system. Then the data symbols go into downlink in cellular systems. It can be is applied only to information bits and is the subcarrier mapper, which assigns the achieved by management of resources present in both the uplink and the down individual data symbols to the individual in orthogonal frequency division multiple link. The purpose of randomization is to subcarriers. The subcarriers mapper is access (OFDMA) systems. Recently, the avoid long sequences of consecutive “1” or necessary in the OFDMA system because OFDMA technique became popular which “0” in bits stream. A long run of “1” or “0” the different data symbols may have come can provide broadband transmission can lose synchronization at the receiver from different users, and assigning data over wireless channels for applications side. After data randomization, the symbols to different subcarriers allows including wireless multimedia and future scrambled (Randomize) bits go into the multiple users to access the air interface generation mobile communication forward error correction (FEC) function, simultaneously. systems. The OFDMA divides the entire which uses an error-correction code to transmission bandwidth into N orthogonal add redundancy bits for error correction. subchannels (It make possible to eliminate The interleaving process is performed on intersymbol interference that is a major encoded data at the output of FEC. The problem in the wideband transmission purpose of interleaver is to protect the over multipath fading channels). There transmission against long sequences of are two types of allocation schemes. First consecutive errors, which are very difficult one is static resource allocation, such to correct. The interleaver operates in as frequency division multiple access two phases that is frequency space and (FDMA) and time division multiple constellation space. In frequency space, access (TDMA). These schemes are not the consecutive coded bits are reordered optimal because they are fixed regardless to make sure that these bits are later of the current channel condition. Second mapped to nonadjacent subcarriers for one is dynamic resource allocation, such frequency diversity. In constellation space, as OFDMA which allocates channels the consecutive coded bits are reordered adaptively to the users based on their to make sure that these bits are later Fig. 1: Block diagram of OFDMA transmitter channels gain. mapped fairly to more and less significant System Model bits of the constellation. The purpose of The output of subcarriers mapper The OFDMA is a system that assigns repetition function is to increase reliability goes to inverse fast Fourier transform subcarriers to different users concurrently. of the transmitted bits. The bits may (IFFT) where, the data symbols transform It means, more than one users can access be repeated by a repetition rate of 2, 4, from the frequency domain to the time the air interface at the same time. The and 6. After the repetition, the symbol domain. Then, the transformed symbols OFDMA transmitter is same as OFDM mapper maps the bits to data symbols along with cyclic prefix symbols go transmitter with some additions. In based on the constellation used. The pilot into parallel-to-serial converter, which OFDMA a user uses all channels at a insertion function inserts pilot symbols. arranges the transformed symbols in time domain serially. The output of Wireless mobile communications play a very important role in our life. It parallel-to-serial converter is a block of provides the communication services anywhere and at anytime. In order K transformed symbols, and this block is to improve quality of service, determined on the basis of acceptable data called an OFDMA symbol. The digital- transfer rate, signal to noise ratio (SNR) and bit error rate (BER), it is to-analog converter changes the time imperative to provide high capacity downlink in cellular systems. It can be domain digital data to analog signal, then achieved by management of resources in orthogonal frequency division RF modulation is performed and the signal multiple access (OFDMA) systems. is up-converted to transmission frequency and finally transmitted over the air.

CSI Communications | April 2014 | 25 constraints is imposed and allocates best The system is sensitive to requirements of different categories of users subcarrier to the user that improves the i.e. general users and sensitive users and is capable of according priority performance of the system. to sensitive users while ensuring that general users are not ignored. It demonstrates that the system capacity can be enhanced without compromising the fairness of allocation between different user categories.

Let us denote the numbers of {Where - N is number of sub-carriers}. subchannels by N and number of users - Estimate the number of sub- by K. The resource allocation scheme carriers required by each user provided to the OFDMA transmitter. We - The data rate Rk = 0 for all k and assume that all K users in the system share a set of assigned sub-carriers to a

N subchannels with total transmit power user is empty (Ωk =φ) for all k constraint Ptotal and bandwidth B. The 2. Allocate a sub-carrier to each user channel information is fixed in each time of both type of categories if the total slot and only the broadband scenario is number of sub-carriers K is less than N Fig. 2: System capacity considered. At the base station transmitter, - Find a channel n that has highest channel-to-noise ratio. the bits for each of the different K users are Conclusion allocated to the N subcarriers, and each - Allocates channel n to the user k The results indicate that optimum subcarrier n (1 ≤ n ≤ N) of user k (1 ≤ k ≤ K) and sets become Ω = Ω ∪ {n} k k allocation of resources under OFDMA is assigned a power p . and A=A- {n} k,n system could be achieved through the - If user category is SU than proposed algorithm. The system is Resource Allocation Algorithm Update the data rate R for SU category The quality-of-services can be improved k sensitive to requirements of different Else through optimum resource allocation categories of users i.e. general users and Update the data rate R for GU category to users in OFDMA system. An optimal k sensitive users and is capable of according algorithm can allocate subcarriers and 3. While (A≠φ or until fulfill requirement priority to sensitive users while ensuring power to the users on the basis of the of users of SU category) that general users are not ignored. It quality of service requirements and - Find a channel n that has highest demonstrates that the system capacity increases the capacity of system. The channel-to-noise ratio. can be enhanced without compromising users are divided in two categories that is - Allocates channel n to the user k and the fairness of allocation between different user categories. sensitive user (SU) category and general sets become Ωk=Ωk ∪ {n} and A=A- {n} - Update the data rate R for SU category user (GU) category, differentiated on the k References basis on required data transfer rate, signal 4. After fulfill the requirement of users [1] J Joung, C K Ho, P H Tan and S Sun, to noise ratio, and bit error rate. The users of of SU category, if any sub-carriers are "Energy Minimization in OFDMA SU category are more sensitive and require available then that sub-carriers are Downlink Systems: A Sequential guaranteed QoS, application like audio and allocated to users of GU category Linear Assignment Algorothm for video. The users of GU category are less - Find a channel n that has highest Resource Allocation," IEEE Wireless sensitive and require less QoS compare channel-to-noise ratio. Communications Letters, vol. 1, no. 4, to the users of SU category, services like - Allocates channel n to the user k and 2012. E-mail, SMS etc. In this resources allocation [2] K W Choi, W S Jeon and D G Jeong, sets become Ωk=Ωk ∪ {n} and A=A- {n} algorithm, the higher priority is given to "Resouce Allocation in OFDMA - Update the data rate Rk for GU category the users of SU category in assigning sub- Wireless Communications Systems carrier but initially the each user gets a Results and Analysis supporting Multimedia Services," sub-carrier that makes algorithm fair and The wireless channel is modeled as a IEEE/ACM Transations on Networking, avoid starvation for users of GU category. frequency-selective multipath channel. vol. 17, no. 3, June 2009. In this algorithm, sub-carrier and power The total bandwidth is 5 MHz and it [3] Z Mao and X Wang, "Effiecient allocation performed sequentially that is divided in 32 subcarriers. The total Optimal and Suboptimal Radio reduces the complexity of algorithm. power available at base station is 2W. Resource Allocation in OFDMS The number of user for the system varies System," IEEE Transactions on Wireless The resource allocation algorithm can from 2 to 16 in increments of 2. In Fig. 2, Communications, vol. 7, no. 2, 2008. be described as: simulation result is showing that the new [4] T S Rappaport, A Annamalai, R M 1. Initialization efficient algorithm increases the OFDMA Beuhrer and W H Tranter, "Wireless - User k = 1, 2… K system capacity and bandwidth utilization Communications: Past Events {Where – K is total number users in a that is all time high compare to existing and a Future Perspective," IEEE system} algorithm developed by Rhee and Cioff. Communication Magezine., vol. 40, - A is a set of available sub-carriers and Also the algorithm is more optimal and pp. 148-161, May 2002. A = {1, 2… N} fair where a set of proportional fairness

CSI Communications | April 2014 | 26 www.csi-india.org [5] Z Shen, J G Andrews and B L Evans, selected Areas in Communications, vol. Multiuser OFDMA Systems," in IEEE "Optimal Power Allocation in 17, Oct 1999. International Conference, Jun. 2004. Multiuser OFDM Systems," in IEEE [7] W Rhee and J M Cioff, "Increase [9] H Yin and H Liu, "An Efficient Global Communications Conference, in Capacity of Multiuser OFDM Multiuser Loading Algorithm December 2003. System using Dynamic Subcannel for OFDM-based Broadband [6] C Y Wong, R S Cheng, K B Lataief Allocation," in IEEE vehic. Tech. Conf., Wireless Systems," in IEEE Global and R D Murch, "Multiuser OFDM Tokyo, May2000. Telecommunications Conference, System with Adaptive Subcarrier, Bit, [8] G Zhang, "Subcarrier and Bit 2000. and Power Allocation," IEEE Journal on Allocation for Realtime Services in n

R L Ujjwal is working as Asstt. Professor in University School of Information and Communicaton Technology since 1st September 2006. He obtained his B.E. (Computer Science and Engineering) from M.B.M. Engineering College, JNV University Jodhpur in 1999 and M.E. (Computer Technology and Application) from Delhi College of Engineering, University of Delhi. His major areas of interests include: Wireless Communications, Computer Network.

Prof. C S Rai is working in University School of Information and Communicaton Technology. He obtained his M.E. degree in Computer Engineering from SGS Institute of Technology & Science, Indore. He completed Ph.D. in area of Neural Network from Guru Gobind Singh Indraprastha University in 2003. His teaching and research interests include: Artificial Neural Systems, Computer Networks, Signal Processing

Prof. Nupur Prakash is working as a VC, Indira Gandhi Delhi Technological University for Women. She received her B.E. (Electronics & Communication Engineering) and M.E. (Computer Science & Technology) degree from University of Roorkee (now I.I.T. Roorkee) in 1981 and 1986 respectively. She completed her Ph.D. (Computer Engineering & Technology) from Punjab University, Chandigarh in 1998 in the area of Natural language Processing using Artificial Neural Networks. About the Authors

Continued from Page 24

[12] Gafurov, D, 2008. Performance and [17] Lee, L & Grimson, E, 2002. Gait analysis for Identification in Networked Society, Security Analysis of Gait-based User recognition and classification. Cambridge, p. 231–250. Authentication, Oslo: Ph.D. dissertation, MA, IEEE, p. 155–161. [22] Søndrol, T, 2005. Using the Human Faculty of Mathematics and Natural [18] Maltoni, D, Maio, D, Jain, A K & Gait for Authentication, Gjøvik, Norway: Sciences, University of Oslo. Prabhakar, S, 2009. Handbook of MSc Thesis, Gjøvik University College, [13] Geng, X et al., 2010. Context- Fingerprint Recognition. 2nd ed. London: NISlab. awarefusion:Acasestudy on fusion Springer Verlag. [23] Tanawongsuwan, R & Bobick, ofgaitand faceforhuman identification [19] Mäntyjärvi, J et al., 2005. Identifying A, 2002. Performance analysis of in video. Pattern Recognition , 43(10), users of portable devices from gait pattern time-distance gait parameters under pp. 3660-3673. with accelerometers. Oulu, Finland, IEEE. different speeds. Guildford, UK, ACM, [14] Han, J & Bhanu, B, 2006. Individual [18] Marks, G E, 2010. Manual of Artificial pp. 715-724 . recognition using gait energy image. Limbs. New York: BiblioBazaar, LLC. [24] Tanviruzzaman, M, Ahamed, S I, Hasan, IEEE Transactions on Pattern Analysis [19] Mjaaland, B B, Bours, P A H & and Machine Intelligence, 28(2), Gligoroski, D, 2011. Walk the walk: C S & O’brien, C, 2009. ePet: When p. 316–322. attacking gait biometrics by imitation. Cellular Phone Learns to Recognize Its [15] Jenkins, J & Ellis, C, 2007. Using ground Berlin, Heidelberg, Springer-Verlag. Owner. ACM, pp. 13-17. reaction forces from gait analysis: Body [20] Nakajima, K, Mizukami, Y, Tanaka, K [25] Vaughan, C L, Davis, B L & O'Connor, J mass as aweak biometric. Pervasive, p. & Tamura, T, 2000. Footprint-based C, 1999. Dynamics of Human Gait. 2nd 251–267. personal recognition. IEEE Transactions ed. Cape Town: Kiboho Publishers. [16] Kale, A A, 2004. Algorithms for gait- on Biomedical Engineeing, 47(11), pp. [26] Wang, S & Liu, J, 2011. Biometrics on based human identification from a 1534-1537. mobile phone, Recent Application in monocular video sequence, MD, USA: [21] Nixon, M S et al., 1999. Automatic Biometrics. Beijing, China: InTech. Ph.D. dissertation, College Park. Gait Recognition. Biometrics – Personal n

Kamal Sharma is currently working as Technical Consultant with Mcafee India (An Intel Company). He has over 15 years of rich IT Experience IT Infrastracture and IT Security Domain. He hold Masters degree in computing from University of Central Lancashire, UK. During the work tenure has working for organizations like IBM, Symantec, Trend Micro and Symantec. His areas of specialization are Comptuer Networks and Security and has been subject matter expert for various security software’s like DLP (Data Loss Prevention), Cloud / Virtulization Security and Encryption. About the Author

CSI Communications | April 2014 | 27 Dr. Rupali Bhardwaj Article Assistant Professor, Thapar University, Patiala Cellular Automata The term ‘Cellular Automata’ represents For example, if gossip spreads by XOR Logic XNOR Logic a rather broad class of computational word of mouth and individuals only Rule 60 : q (t+1) = Rule 195 : q (t+1) = systems. There are a number of common talk to their immediate neighbours, i i qi-1(t) ⊕ qi(t) qi-1(t) ⊕ qi(t) features, but the only universal property the interaction is local and can be Rule 90 : q (t+1) = Rule 165 : q (t+1) = is that they are made up of a number of modelled with a CA. i i qi-1(t) ⊕ qi+1(t) qi-1(t) ⊕ qi+1(t) discrete elements called cells. Each cell To summarize, cellular automata model a Rule 102 : qi(t+1) = Rule 153 : qi(t+1) = encapsulates some portion of the state of ⊕ ⊕ world in which space is represented as a qi(t) qi+1(t) qi(t) qi+1(t) the system. Typically, the cell population uniform lattice, time advances by steps, Rule 150 : qi(t+1) = Rule 105 : qi(t+1) = q (t) ⊕ q (t) ⊕ q (t) q (t) ⊕ q (t) ⊕ q (t) is homogeneous, each one encapsulating and the ‘laws’ of the world are represented i-1 i i-1 i-1 i i-1 an equal portion of the state, and by a uniform set of rules which compute Rule 170 : qi(t+1) = Rule 85 : qi(t+1) = q (t) q (t) arranged spatially in a regular fashion to each cell’s stage from its own previous i-1 i-1 form an n-dimensional lattice. A Cellular stage and those of its close neighbours. Rule 204 : qi(t+1) = Rule 51 : qi(t+1) =

Automata has the following features: qi (t) qi (t) Neighbourhood Classification Rule 240 : q (t+1) = Rule 15 : q (t+1) = In classic cellular automata theory there i i 1. It consists of a number of qi+1(t) qi+1(t) indistinguishable cells (often several are three types of neighborhoods. They thousand or even millions) arranged Neighborhood state 111 110 101 100 011 010 001 000 in a regular lattice. The cells can Next State 0 1 0 1 1 0 1 0 (Rule 90) be placed in a long line (a one- Next State 1 0 0 1 0 1 1 0 (Rule 150) CA Technology for Target dimensional CA), in a rectangular are different in shape and size. Other array or even occasionally in a configurations have been proposed but Applications three-dimensional cube. In social were not accepted. • Error Correcting Codes simulations, cells may represent • Pattern Recognition individuals or collective actors such • Modelling of Physical Systems as countries. • Cellular Mobile Network 2. Each cell can be in one of a small • Classification number of stages – for example, ‘on’ • Data Compression or ‘off’, or ‘alive’ or ‘dead’. We shall • Cryptosystem encounter examples in which the • Authentication stages represent attitudes (such as Types of Cellular Automata • VLSI Circuit Testing Linear CA supporting one of several political Conclusion parties), individual characteristics –Based on XOR logic –Total 7 rules (60, 90, 102, 150, 170, 204, Cellular Automata have been around (such as racial origin) or actions (such since 1950. Geography was hesitant to as cooperating or not cooperating 240) –Can be expressed through matrix (T), adopt CA as an urban modeling technique with others). (it didn’t happen before the mid-1980s). 3. Time advances through the - characteristic polynomial –Next state of the CA cell P(t+1) = T. P(t) Since then, many extensions of CA have simulation in stepladder. At each been proposed, some effective, others time step, the stage of each cell may 1 0 0 0 not. Nowadays CA is a valuable tool for change. 0 1 1 0 60 102 150 204 T= spatially distributed modeling with many 4. The stage of a cell after any time step 0 1 1 1 applications (urban growth, wildfire is determined by a set of rules which 0 0 0 1 spread and transportation). specify how that stage depends on Additive CA References the previous stage of that cell and –Based on XOR and XNOR logic [1] J Von Neumann, “The Theory of Self- the stages of the cell’s immediate –Total 14 rules (linear rules + neighbours. The same rules are used Reproducing Automata”, University 195,165,153,105,85,51,15) of Illinois Press, Urbana, Ill, 1966. to update the stage of every cell in –Can be expressed through matrix, inversion the lattice. The model is therefore [2] A Llachinski, “Cellular Automata: A vector, and characteristic polynomial Discrete Universe”, World Scientific consistent with respect to the rules. –The next state of the CA cell P(t+1) = T. Publishing, Singapore, September 5. Because the rules only make P(t) +F 2001. reference to the stages of other cells 60 153 105 204 F= 0 1 1 0 [3] S Wolfram, “A New Kind of Science”, in a cell’s vicinity, cellular automata Champaign, IL: Wolfram Media, 2002. are best used to model situations Some rules out of 256 are as follows:- n where the interactions are local.

Dr. Rupali Bhardwaj, born on July 24, 1976 at Dhampur, (UP). She had received post graduate degree (MCA) in 1999, from Gurukul Kangri University and doctorate degree from Bansthali Vidyapeeth, Rajasthan in 2011. She is working as Assistant Professor at Thapar University in SMCA dept. She has published over 15 research papers in International and National Journals of repute. She is life time member of CSI. About the Author CSI Communications | April 2014 | 28 www.csi-india.org Practitioner Wallace Jacob Workbench Sr. Asst. Prof. at Tolani Maritime Institute Programming.Tips () » Fun with 'C' Programs I. Is it possible to type, compile and An alternative to using the '{' and '}' is the has to press the key to read the execute a 'C' program without using use of digraphs <% and %> respectively. input from the terminal, character-at-a- the opening and closing curly braces? The code in program listing two illustrates time mode implies that as soon as the user Well, the answer is: It is possible using the use of digraphs: types in a character it will be read from the the concepts of digraphs and trigraphs. terminal. There are several methods of Program listing two Theoretically, trigraphs refers to three converting the terminal driver from line- characters to represent a single character. #include at-a-time mode to character-at-a-time The trigraph ??< represents the '{' i.e. mode. One of the methods of converting (open curly brace) and the trigraph ??> main() from line-at-a-time mode to character-at- represents the closing curly brace. The <% a-time mode is illustrated below: program below illustrates the usage of printf("Using digraphs"); Program listing three trigraphs in a typical 'C' program. Program listing one %> #include In order to compile the program, the main() #include following instruction needs to be typed: { char ch; main() gcc ??< system("stty raw"); /*for changing the terminal driver to printf("Using trigraphs"); On executing the program : ./a.out, the character-at-a-time mode */ following output might appear: ??> Using digraphs In order to compile the program, the printf("\nEnter a printable The trigraphs ??< and ??> are replaced character: "); following instruction needs to be typed: ch=getchar(); by their single character equivalents by gcc -trigraphs the 'C' preprocessor before any other printf("\n\nch = %c", ch); processing, while digraphs are handled On executing the program : ./a.out, the during tokenization.] system("stty cooked"); /*for following output might appear: changing the terminal driver to line-at-a-time mode */ Using trigraphs II. Is there any method of converting the terminal driver from line-at-a-time mode return 0; [Note: The trigraph ??= is for the # symbol, to character-at-a-time mode? } similarly ??/ is used for the \ symbol. line-at-a-time mode implies that the user n

Wallace Jacob is a Senior Assistant Professor at Tolani Maritime Institute, Induri, Talegaon-Chakan Road, Talegaon Dabhade, Pune, Maharashtra. He has contributed articles to CSI Communications especially in the Programming. Tips section under Practitioner Workbench. About the Author

Kind Attention: Prospective Contributors of CSI Communications - Please note that cover themes of future issues of CSI Communications are planned as follows - • May 2014 - Graph Theory • June 2014 - Security in Software Development • July 2014 - Business Analytics • August 2014 - Software Engineering • September 2014 - IT History Articles and contributions may be submitted in the categories such as: Cover Story, Research Front, Technical Trends and Article. Please send your contributions before 20th April for consideration in May 2014 issue. For detailed instructions regarding submission of articles, please refer to CSI Communications March 2014 issue, where Call for Contributions is published on page 37. [Issued on behalf of Editors of CSI Communications]

CSI Communications | April 2014 | 29 Practitioner Umesh P and Silpa Bhaskaran Workbench Department of Computational Biology and Bioinformatics, University of Kerala Programming.Learn("R") » Packages in R

In this issue, let us discuss about the packages in R. Packages help us to organize functions, data, code etc. in a well defined format. Package is a collection of related set of functions, data files, help files etc. provided for addressing a particular problem. They are intended for various purposes such as statistical analysis, graphics display, industrial applications. R provides a standard set of packages which are available in any R installation. Other packages are available from public package repositories, which have to be downloaded and installed. Collection of these packages are stored in the R libraries. To use a package, it should be loaded into R environment. Packages can be operated either by GUI (Fig. 1) or through commands.

Fig. 2 Using library () command

hosted by the R foundation and Bioconductor is an open source project for building tools to analyze genomic data. By default, R fetch packages from CRAN. In the R interface, we can choose repository from the Select repositories option.

Fig. 1 ‘Packages’ menu in R GUI Packages can be installed using R GUI and also through the console. Packages are installed automatically into the R library.

Listing Packages Using R console: We can download the package using an To list out the packages available in R, we can use the command internet connection and install packages through the console. library ( ). This will list out all the set of available packages in a new For installing packages through the console use the command window as given in Fig. 2. The list of all packages installed in the install. packages () system can be obtained by the command installed. packages ( ). with the package name as the argument. The repository from where the packages have to be downloaded is Certain packages are loaded on startup by default. This can be given using repos parameter. listed by using the command getOption ("defaultPackages"). Example: Example: > getOption ("defaultPackages") install.packages('RMySQL', repos='http://cran.us.r-project. [1] "datasets" "utils" "grDevices" "graphics" "stats" "methods" org')

Loading Packages We can also remove the installed packages using the remove. For using the remaining packages that are not loaded by default, packages( ) command. we have to load them using commands or by using GUI. For loading a particular package the command library ( ) is used, with Using R GUI : In R GUI, from the Packages menu, select Install the package name as argument. package(s). Then R will list out all available mirrors. We have to choose the mirror which is geographically close. Then select In R GUI, we can load a package using the Load Package option in the package we want to install and click OK. There is likewise an the Packages menu. option in the menu for installing packages from the zip file that we Finding and installing Packages inside R have already downloaded. This can be done by using the option R provides several repositories for browsing packages. The Install package(s) from local zip files in the Packages menu. major repositories are CRAN and Bioconductor. CRAN is n

"By connecting a device to the Internet, it is transformed from a stand-alone unit—which attracts a one-off payment—into a service that generates recurring income. Value in the IoT lies not in the devices, but in selling new services off the back of them." - Wall Street Journal

CSI Communications | April 2014 | 30 www.csi-india.org Madhusudhan Reddy Nukala*, Shreyas Bhargave** and Bipin Patwardhan*** CIO Perspective *Principal Architect, iGATE **Technology Consultant, iGATE ***Sr. Technical Architect, iGATE Managing Technology>> Transforming the Automotive Industry with Connected Cars – An Internet of Things Perspective Abstract: With each passing day, the automotive industry. Automakers, for an enhanced in-vehicle experience for number of gadgets that are connecting telecommunication service providers and users. This will also enable the car to act to the Internet is surpassing the number leading technology companies are coming as a Wi-Fi hub, wherein all passengers of people connecting to the Internet. together to build the Connected Car. connect to a single access point for an This technology trend is pursued actively The Apple versus Google battle has enhanced and immersive experience of by the automotive industry, which is transcended the smartphone boundaries being connected on-the-go. working on developing a ‘Connected to smart cars. The year of 2014 started Infotainment Car’. In this article, we present a brief with Google announcing the formation Infotainment refers to a system that brings on how the automotive industry is on of an Open Automotive Alliance with top information functions (i.e., navigation, course to a disruptive transformation car manufacturers (GM, Honda, Audi, location-based services, rear seat web with developments around smarter Hyundai) and chipmaker NVIDIA, to browsing, social networking, etc.) into vehicles and related infrastructure. While bring Android OS into car dashboards. the vehicle’s entertainment system. In the technologies mature, we believe the Apple soon followed with the release past, high-end car manufacturers provided world will witness an intermediate wave, of CarPlay in early March with Volvo, Infotainment systems with very limited enabled by a healthy pairing of cars with Ferrari, Mercedes-Benz and later with functionality and connectivity and users smartphones. other automakers such as BMW, Ford, had no choice but to depend on the apps Jaguar, Honda, Nissan, etc. Prior to this, Introduction provided by the automaker. The approach QNX (now owned by BlackBerry) has After the global proliferation and rapid taken by Apple to bring iOS to the car will been commonly providing an enhanced, consumerization of smartphones, the extend the iPhone to the vehicle. CarPlay embedded platform with connectivity for next disruptive transformation predicted integrates the iPhone apps with the car’s infotainment in high-end automobiles. is the concept of ‘Internet of Things’. dashboard system once the latter is These big players in mobile platforms are From networked computers, to connected plugged in via the USB. So, the user can setting their eye on creating a common people, we are now moving towards use the phone and messaging functions, platform to allow a connected experience connected ‘things’. Various sensors play music from iTunes, watch videos across the smartphone and the vehicles. embedded in personal devices, household and run navigation apps on the in-dash Closer home, Mahindra Reva’s e2o is & industrial appliances, consumer and display with a touch screen interface. the first and only Indian car with ‘anywhere, enterprise equipment, including clothing Apple’s voice-companion - Siri will also anytime’ connectivity with the customers. and vehicles are turning items and things allow actions through vocal commands Together with Vodafone as the connectivity of daily use into smart devices. With with minimal distraction while driving. solution provider, it offers telematics pervasive connectivity mechanisms, these Similarly, the Google Projected Mode is features for convenience and safety. devices can interact with each other with tipped to bring Android to the dashboard Telecom Service Providers (TSPs) little or no human intervention, thereby and offer the calls, messaging, navigation are actively contributing in this space conjuring a humongous network – the and multimedia functions to the vehicle. with dedicated Machine-to-Machine Internet of Things! The ability to sense Coming to the main advantage, this would communication services through and send data over remote locations to also bring the entire apps ecosystem embedded SIM chips. Vodafone is enable detection of significant events and to the dashboard and present endless working with BMW and Volkswagen to take relevant actions sooner than later, is possibilities for an in-car experience - read bring connectivity to their vehicles. AT&T the primary tenet behind the Internet of out email and calendar reminders, order a provides a modular platform – Drive Things (IoT). pizza on the way to the restaurant, switch with 4G LTE network connectivity for on the heater as you near your home – the IoT in Automotive Space automakers to offer customized features list could be endless. There have been exciting recent such as diagnostics, voice recognition, developments around IoT in the entertainment and automotive app store, Vehicle Communications As more and more connected cars There have been exciting recent developments around IoT in the automotive emerge and in-vehicle embedded industry. Automakers, telecommunication service providers and leading connectivity becomes common, a whole technology companies are coming together to build the Connected Car. new paradigm of vehicle communications is set to unfold.

CSI Communications | April 2014 | 31 enables a mobile app to intimate As cars get smarter and pair up with the other cars, smartphones and emergency services with vital information things, suitable analytical processing can be applied to various operational about the location and impact of the parameters along with the near-by happenings, allowing automobile drivers as crash. The app can also trigger SOS alerts well as road safety authorities to get better visibility about the performance of to near and dear ones to inform about the vehicle as well as the ambient situation, allowing for timely actions. the incident. It can also be programed to notify life-saving information like blood group and other health records of the Vehicle-to-Vehicle (V2V) passengers to enable paramedics to communication, i.e. wireless exchange of the Actions respond accordingly. position, speed and location data between • Lock/Un-lock vehicle doors On-Board Diagnostics for on-device near-by vehicles can help to sense impending • Roll windows up/down threat and offer the opportunity to improve analytics • AC temperature +/- the safety of commuters significantly. Each The On-Board Diagnostics (OBD/OBD- vehicle will continuously broadcast an ‘I Am Alerts/Notifications II) port is commonly used in automobile Here’ message along with the speed and • Open doors service and maintenance. While much position from its computer. • Lights ON of the information from this such as Vehicle-to-Infrastructure (V2X) faults, vehicle and engine speed, engine communication is the wireless exchange • Hand brake ON temperature, fluid levels, gear shifts, of information between vehicles and Thus, leveraging the smartphones to battery status, etc. is accessed regularly roadside infrastructure. The vehicles in the fullest without depending on vehicles at vehicle repair shops, till now it was transit will communicate with the roads, having connectivity embedded within can largely used for post-facto analysis; digital signage, traffic lights, safety and potentially bring out smart cars sooner. At i.e. only when some problem arises. control systems. This can avoid crashes iGATE, we have developed a few solution However, with smartphones pairing and traffic congestion through intelligent prototypes around the driver monitoring, with vehicles, this information can be safety applications. As a result, it will crash detection and vehicle diagnostics. readily made available to the vehicle enable recognizing high risk situations These applications demonstrate the owners, giving them a better picture of in advance and help take mitigation profiling of a driver for a trip based on the the car performance. Monitoring these measures in a timely manner by issuing occurrences of pre-defined significant parameters actively and with some alerts and safety advisories. Drivers can events, detecting a crash and triggering level of on-device analytics, drivers can also be made aware of various other alerts to pre-configured contact numbers get proactive service alerts on their conditions such as roadwork, diversion as well as on-device analytics with smartphones and potential faults can be and adverse weather conditions. complex event processing to provide identified for early diagnosis and care. These mechanisms together continuous feedback to the driver. The For predictive analytics to be will not only facilitate in reducing the concept applications have been developed effective, the vehicular data from a large number of accidents and casualties but using on-board sensors and suitable number of vehicles needs to be aggregated also in tracking, tracing and monitoring micro-controllers. for detailed study and analysis. While that vehicles on the move. Even in the event Smartphone sensors for driving can help to detect and derive patterns, a of emergency, vehicles would be able insights subset of the rules can be made available to quickly intimate details to roadside Commercial smartphones commonly for users through smartphone apps. assistance, emergency services, have sensors such as Accelerometer, insurance providers as well as family Conclusion Gyroscope or Orientation sensor and GPS. We are used to being connected as members. In effect, the capability of V2V By docking the smartphone to the vehicle, home, at work and at many other places. and V2X communications will play a data from these sensors can be used to Experiencing the same level of connectivity major role in securing the safety of man detect driving patterns such as sharp when on the road in a seamless manner and vehicle alike. turns, sudden acceleration, hard braking, will be a natural extension of our digital Vehicles and Smartphones – drifting and speeding. This can be used lives. As cars get smarter and pair up with A Potent Combination to profile the driver as safe or aggressive, the other cars, smartphones and things, to rate and compare different drivers and As the integration with smartphones and suitable analytical processing can be share such data with insurance providers vehicles gets deeper, the information applied to various operational parameters for customized premiums. Pay-As-You- exchange will be two-way – Smartphone along with the near-by happenings, Drive (PAYD) and Pay-How-You-Drive to Vehicle and vice versa. Using the allowing automobile drivers as well as road (PHYD) are the upcoming offerings from On-Board Diagnostics (OBD/OBD-II) safety authorities to get better visibility auto insurance companies that reward data, information regarding engine and about the performance of the vehicle as safe drivers and penalize rash ones with other crucial vehicle parameters can be well as the ambient situation, allowing differential premiums. displayed on the driver’s smartphones for timely actions. As our cars get on to and same can be sent to service provider Smartphones paired with vehicle the Internet bandwagon, a much smarter, for analysis. Alerts related to the car and sensors for emergency alerts interconnected and well-informed performing actions on certain vehicle In case of an accident, paring on-board world of enhanced safety, security and parts will become seamless. sensors with passengers’ smartphone convenience awaits us. n Continued on Page 35

CSI Communications | April 2014 | 32 www.csi-india.org Krishna Chaitanya Telikicherla*, Harigopal K B Ponnapalli** and Dr. Ashutosh Saxena*** Security Corner *Research Associate, Security and Privacy Research Lab, Infosys **Principal Research Analyst, Infosys, India ***Principal Research Scientist, Infosys, India Information Security » Security Features in Contemporary Browsers and Tips for Safe Browsing Abstract: This article is the tenth in the series of articles, focusing on security of the web platform. In our previous articles, we have explained about the security policies implemented by browsers, some of the web application vulnerabilities and their mitigation techniques. In the last article, we have shifted our focus from developers to end users, explaining some of the important security features provided by modern browsers. In this article, we continue with the same theme and explain few more security and privacy features provided by modern browsers and also share a few tips for having a safe browsing experience.

Introduction traces of their browsing history, which add exceptions if they feel that popups With the growth of e-commerce, social compromises their privacy. To mitigate on certain sites are required for certain networks and several other web based this privacy problem, modern browsers important interactions (e.g., online transaction systems, the amount of came up with a private browsing mode, banking scenario). sensitive information which an average which is known with different names Domain highlighting in different browsers (e.g., “Incognito” web user stores on the web is increasing Phishing is a technique commonly used mode in Chrome, “InPrivate Browsing” in rapidly. Attackers constantly find ways by attackers to trick end users and steal Internet Explorer and “Private Browsing” of stealing sensitive data of end users sensitive information of users. In a typical in Firefox). In a private browsing mode, using various techniques, of which social phishing attack, an attacker creates a fake data entered in forms, browsing history, engineering tricks are some of the most webpage which mimics a genuine website new cookies etc. will not be available to prominent ones. Modern browsers have and spreads it to users. If an unsuspecting future browsing sessions once the private several features which prevent malicious user visits the page and submits sensitive mode window is closed. Also, browser attempts of attackers such as opening data, the attacker will gain access to it. To extensions will be disabled in this mode popups, spreading malware etc. In the last strengthen the attack, attackers normally by default, thereby preventing extensions article, we have explained about phishing use sub domains which are deceptive e.g., from stealing user’s data in a webpage. So and malware filters and SSL/TLS features http://www.icicibank------.evil.com. At on a shared machine at an Internet kiosk, which are built into modern browsers. In a quick glance, it appears that the site being a user will not be able to find out what this article, we will explain about private visited belongs to ICICI bank, but it is only a sites the previous user visited, if private browsing mode, popup blockers, domain subdomain which is cleverly crafted by the mode is used. It should be noted that the highlighting features provided by browsers attacker. To prevent users from falling prey privacy provided by this mode is purely and a few generic tips for safe browsing. to such tricks, modern browsers highlight on the client side. Any intermittent proxy the domain name of the site and grey out Security and Privacy Features server can maintain a log of websites the rest of the URL in the address bar. Fig. 1 Provided by Browsers visited by a user. As mentioned in the last article, browsers shows that the domain “popuptest.com” is come up with several inbuilt security Popup blockers clearly highlighted and distinguished from Popups are windows that open rest of the URL by all three browsers (IE, and privacy features which protect users automatically, without the intervention Firefox and Chrome). This important visual from various threats. Some of them are or permission of end users. Advertisers clue helps web users to quickly identify the explained below: use popups to promote their business by domain they are visiting. Private browsing mode attracting the attention of users. Several Few Tips for Safe Browsing Web browsers cache information such websites which accept online payments Private browsing, popup blocking, domain as cookies, browsing history, images, open their banking partner’s website via highlighting are some of the features auto-fill form data etc., which can be popups. Though popups are useful for which are directly provided by browser retrieved at a later point of time. The several genuine purposes, they are also vendors. While leveraging these features, cached data prevents unnecessary the cause of several security problems. users should also follow certain practices roundtrips to servers and often enhances Attackers use popups as a mechanism to ensure a safe browsing experience. user experience. However, this data can to conduct social engineering attacks Some of them are listed below. be misused by people with malicious and spread malware. To prevent users intent, especially in the cases of shared from falling prey to popup-based attacks, Sensitive Data Management machines (e.g., public kiosks). Though browser vendors have introduced inbuilt We have seen that private mode helps browsers provide a way to delete popup blockers into their browsers, in deleting all traces of a user’s browsing cookies, clear history, cache etc. through which block all popups by default. Users session. However, in cases where users various browser settings, an average are prompted with a message informing browse with older versions of browsers web user will not be familiar with these that popups are blocked on the site which do not support private mode (e.g., options. Therefore, users leaving behind they are visiting (see Fig. 1). They can in Internet kiosks), users should manually

CSI Communications | April 2014 | 33 a part of the running browser application and will have elevated access to otherwise sensitive inaccessible data. Hence, it is very trivial for a rogue extension to silently export a user’s sensitive data to a spammer. Users are suggested to carefully evaluate the reputation of browser extensions and the permissions they seek, before installing them. Logging out of a website Users often think that closing the browser directly without logging out is a more secure option. Contemporary browsers have an option to reopen a user’s last browsing session. Depending on the site’s design, this may allow an attacker to automatically login as a user, to a user’s previously visited site. Hence, it is very important that users properly logout of websites before they quit the browser. Saving bookmarks Users bookmark interesting websites to Fig. 1: Popup blockers in IE10 and latest versions of Firefox, Chrome blocking popups automatically refer them at a later point of time. While it is a good provision, if the URL contains any delete the traces. While most browsers page. The auto-update feature is turned on sensitive data like username, password, provide features to auto fill forms, by default and users can opt to turn it off session Id, they will also be saved in the remember passwords, recover from crash, (not recommended though). bookmark. An attacker who has access to that machine can view this sensitive data etc., they are primarily meant for users who Installing browser extensions use a secure personal machine. While it is easily. While bookmarking an interesting Users should be extremely watchful not advisable to do sensitive operations site, it is good to watch the URL in address before downloading free browser at public kiosks, a safe browsing practice bar and not to bookmark it if it contains extensions and add-ons that claim to should include deleting sensitive data any sensitive data. add several interesting features (e.g., traces like cookies, history before closing extension which pose as video codecs). Using the “Remember Me” feature the browser. A browser with private mode They might be potential malware. Most of the popular websites offer a is a better alternative since it does not Browser extensions and add-ons become “Remember Me” feature that allows users leave any traces after a browsing session is concluded. Auto-Update Security is a continuous process and is not a one time job. Attackers keep innovating new ways of exploiting browsers, vendors come up with patches to fix them. It is very important for end users to regularly update their browser to a latest version that in all probability offers better security. However, uses rarely update their browsers, which challenges browser vendors to provide a safe browsing experience. Contemporary browser vendors provide an option to auto- update browsers to the latest versions in the background without requiring much interaction from users. Auto-update feature relieves the end user from requiring to download and apply latest patches. If users want to manually verify if a latest version is available, they can visit the Fig. 2: Internet Explorer (IE10) showing an option to reopen the last browsing session “About” section of their browser settings

CSI Communications | April 2014 | 34 www.csi-india.org to login into websites for the next time by modern web browsers. We have also check with vendors, product and service without entering credentials. Most of such explained a few safety guidelines, using providers for the latest updates. All features assume the user to use a secure which users can have a safer browsing trademarks, copyrights are owned by their personal machine. From a developer’s experience. The web is moving very fast with respective owners. perspective, implementing this feature the introduction of several new specifications requires storing the credentials or a References under the HTML5 umbrella. Newer browser reference to them in a secure manner on [1] PopupTest.com – A website to test the user machine itself. This leaves the architectures and security models are fast popup blocking software. user’s account open for attackers. It is evolving. Though users of web browsers are [2] Incognito mode in Chrome: https:// very difficult to get such implementations not expected to keep track of these technical support.google.com/chrome/ correct and many attacks were reported changes, they are expected to update to the answer/95464?hl=en which exploit this feature. It is always latest versions of browsers to have a safe [3] Domain highlighting in IE8: safe to re-enter the password every time a browsing experience. http://blogs.msdn.com/b/ie/ user logs into a web site, rather using the Disclaimer: All names of the websites, archive/2008/03/11/address-bar- “Remember Me” feature. services and applications mentioned in improvements-in-internet-explorer- Conclusion this article are intended for informative 8-beta-1.aspx In this article, we have explained some of purposes only with no malicious and / n the security and privacy features provided or promotional intents. Readers may

Krishna Chaitanya Telikicherla is a Research Associate with Security and Privacy Research Lab, Infosys Labs. His research focus is primarily on web security, specifically analyzing browser security policies, web attacks, defenses and formal verification of web specifications. He is a regular blogger and speaker at several developer and security meets in India. For his contributions to technical communities, Microsoft has presented him the prestigious “Most Valuable Professional (MVP)” award for 4 consecutive years (2010-2013). He can be contacted at [email protected]

Harigopal K B Ponnapalli is a Principal Research Analyst at Infosys, India. His research interests include web application security assurance, strong authentication and PKI. Ponnapalli received his M.Tech from the Indian Institute of Technology, Kharagpur, India. He has 15+ years of experience in application security. He authored multiple papers and coauthored a book titled "Distributed Systems Security: Issues, Processes and Solutions" (Wiley, 2009). He also filed a few patents to his credit. You can contact him at [email protected]

Ashutosh Saxena is a Principal Research Scientist at Infosys, India. His main research interest is Information Security. Dr. Saxena received his Ph.D in computer science and has more than 80 international publications and SEVEN granted patents. He’s a life member of CSI and senior member of IEEE. Contact him at [email protected]. About the Authors

Continued from Page 32

Madhusudhan Reddy Nukala (Principal Architect, iGATE): Madhusudhan has 14+ years of experience and is currently leading the IoT initiative in iGATE’s Research & Innovation Group. In addition to IoT, he has strong exposure to Enterprise Mobility, J2EE and EAI tools. He is active in providing technology consulting services and has been involved in defining and identifying technology standards and frameworks in the Enterprise Mobility and J2EE for top Fortune 500 companies. At iGATE’s Research & Innovation Group, he is involved in building hands-on experience on emerging technologies through the creation of prototype applications, proof-of-concepts, thought papers etc.

Shreyas Bhargave (Technology Consultant, iGATE): With over 14 years of experience in IT industry, Shreyas is a technical architect and technology evangelist at the Technology Centre of Excellence in iGATE’s Research and Innovation group. His current focus is on exploring emerging technologies such as IoT, Wearables, Augmented Reality, Speech Recognition, Gamification, etc. and their adoption in businesses and software service companies. Prior to this, he had been active in the Enterprise Mobility and technology consulting. He holds a Bachelor of Engineering degree from Mumbai University and is pursuing Master of Science from BITS Pilani.

Bipin Patwardhan (Sr. Technical Architect, iGATE): Bipin has over 15 years of experience in the IT industry. At iGATE, he is part of the Future and Emerging Technologies group. The group explores new and emerging technologies including wearable computing, analytics and augmented reality, to name a few. Technology exploration is supported by the development of concept solutions to demonstrate suitability across various domains. About the Authors

CSI Communications | April 2014 | 35 Tapalina Bhattasali*, Dr. Rituparna Chaki** and Dr. Nabendu Chaki*** Security Corner *Ph.D Scholar, Department of CSE, University of Calcutta **Associate Professor, AKCSIT, University of Calcutta ***Associate Professor, Department of CSE, University of Calcutta Information Security » Security Aspects in Internet of Things Domain Advances in wireless technology permit furniture, paper documents and many to support high volume network traffic real-time acquisition, transmission and more by the year 2025. being driven by an alarming number of processing of huge amount of critical data. heterogeneous devices. Major benefits It has been seen that number of devices of cloud-based intelligent IoT framework connected to Internet exceeds number implementation can be summarized as of human beings around the world. follows. According to Libelium report, number of • No requirement of huge disk storage, devices connected to Internet will reach memory and resources during to more than 50 billion around the year execution of any application. 2020. There will be urgent requirement • Used by different users from different of huge data around bronto-byte (280 KB) locations using different devices at in near future, which enhances demand the same time. for M2M communication. To connect to • Support heterogeneous platforms Internet, each device must have unique and operating systems. identity such as IP address. IPv4 protocol • Different versions of the application is not capable to handle huge number of can be applied without upgrading Fig. 1: Internet of Things devices, due to its limited address space user’s machine or software. (232). Beside this, IPv4 address space has been exhausted in February 2010. For this It creates heterogeneous environment Technical Aspects of Internet of reason, IPv6 steps in. IPv6 address space by integrating Internet oriented features Things of 2128 (approximately 340 undecillion (middleware), things oriented features Technology is a decisive factor for or 3.4×1038) is equivalent to assigning (sensors), semantic oriented features enabling the realization of the IoT 100 address to each atom on the surface (knowledge). “5A” that is based on “Any” concept. Following issues are going to of the world! Internet of Things (IoT) paradigm such as Anything, Anyone, build up IoT. According to Cisco, there is a has its roots in these. It is an emerging Anywhere, Anyhow, Anytime can be easily difference between Internet of Things and concept which has the potential to make implemented by using the concept of IoT. Internet of Everything (IoE); where IoT is life more comfortable, with the vision It is a major step towards the evolution of made up of billions of connected objects of reducing human intervention. “IoT” next generation network. According to ITU and IoE is the smart network that are term was introduced by Kevin Ashton of Internet Reports 2005, four dimensions of required to support all the data generated MIT Auto-ID Centre in 1999. The term IoT have been presented in Fig. 2. and transmitted by these objects. IoT “Internet of Things” composed of two In order to make critical decisions focuses mainly on objects or things, words and concepts namely, “Internet” and provide quick response to the users, whereas IoE brings together people, and “Thing”, where “Internet” can be IoT based applications involve real time process, data and things to make network defined as world-wide network of decision making, which in turn needs connection more relevant and valuable. interconnected computer networks, based on a standard communication protocol TCP/IP protocol, while “Thing” is an object having independent existence, but not precisely identifiable. Therefore, “Internet of Things” means a world-wide network of uniquely addressable, interconnected objects, communicating with each other over hybrid network to built Internet like structure based on standard. Pervasive environment provides better service by hiding underlying technologies to adapt IoT. IoT incorporates concepts from pervasive, ubiquitous, and ambient computing. IoT device can be a sensor node, a light bulb, a microwave oven, a smart phone, a tablet, a PC or a , a powerful server or a cloud. According to NIC, Internet nodes may reside in Fig. 2: Four dimensions of IoT everyday things such as food packages,

CSI Communications | April 2014 | 36 www.csi-india.org Four dimensions of IoT are- Process (delivering right information to right place at right time); People (connecting people in valuable ways); Data (convert data into intelligence for better decision making); Things (Internet of Things). IoE is the integration of Machine to Machine (M2M), Machine to People (M2P), People to People (P2P) communications. Example includes SCADA (Supervisory Control and Data Acquisition), smart grid, smart building, (M2M); remote patient monitoring, smart parking (M2P); e-commerce site (P2P). Internet of Things includes M2M communication, Intranet of Things, Web of Things, Cloud of Things. M2M communication refers to the technologies that allow both wireless and wired systems to communicate with other devices. Intranet of Things refers to the network, where all the devices should be within local area network, hidden behind Fig. 3: Cloud based intelligent IoT framework a firewall and locally controlled without supporting interoperability. Web of Things is an evolution of Internet of Things where management of end devices. It enables the adoption and interoperability, a family everyday objects are connected by fully use of IPv6 in low-power, low-bandwidth of 802.11 standards can be considered. integrating them to the Web. It is about wireless networks with constrained Although it is feasible for personal reusing the Web standard (such as URI, processing capabilities. The focus must computers, smart phones and other HTTP, etc.) to access the functionality of be on lightweight communications, since handheld devices, but relatively high the smart objects. Auto-ID Lab recently end devices are extremely resource- power consumption has prevented it from used the term “Cloud of Things” (CoT) to constrained in terms of computing, energy, adoption into the world of embedded connect physical objects to the cloud. and memory. Interconnection of such communication. It has been claimed that Unique addressing schemes for resource-constrained devices develops the low-power versions of this popular objects, their representation, and storage the front-end of an IoT system as opposed standard have emerged recently thus of the exchanged information and to the back-end supporting background paving the way for its integration into interoperability are surely going to be processes like heavy computation, global the environment of resource-constrained main challenges. It is very likely that IPv6, interconnection via Internet etc. Most of devices. Another wireless technology namely the IPv6 over Low-Power Wireless the wireless communications between which can be seen as the enabler of IoT Personal Area Networks (6LoWPAN), end devices in the IoT environments is bluetooth, particularly bluetooth low is going to be the main candidate for take place over unreliable channels. High energy. Most of the emerging mobile interconnecting intelligent things since level of interference could occur from phones are going to be equipped with low- other radio devices situated in close it has a potential of leveraging the two energy bluetooth technology very soon, proximity to IoT. In this context, wireless basic concepts which brought success to which is likely to provide for a sufficient personal area networks (WPAN) may be basis to make it truly ubiquitous. the conventional Internet, namely packet of interest as they consider low- power switching and the "end-to end" principle. communication for resource-constrained Security Issues The adaptation between full IPv6 and Increase in number of devices and amount devices. For instance, IEEE 802.15.4 the specific 6LowPAN format can be of data to support “Any” paradigm, raise standard introduces a radio technology performed by 6LowPAN routers, which security concern. One of the major for low-power, low-data-rate applications. are situated at the edge of 6LowPAN challenges that must be overcome in It has become a basis for a number of islands delimiting the constrained IoT order to push Internet of Things into the low-power radio stacks, such as ZigBee, environment from the conventional real world is security. IoT is forecast to 6LoWPAN, due to its wide adoption and Internet. This greatly facilitates become a major security risk in 2014 ubiquity. When it comes to widespread interoperability, optimization and security as more products are connected to Internet, according to predictions report IoT is forecast to become a major security risk in 2014 as more products are by the Information Security Forum (ISF). connected to Internet, according to predictions report by the Information The security threats are potentially Security Forum (ISF). devastating, so organisations must ensure that technology for both consumers and

CSI Communications | April 2014 | 37 the two have led to some new security Major threats related to IP enabled domain (IPv6 / IPv4/ 6LoWPAN) are vulnerabilities. In the transition period, Protocol transition attack, Reconnaissance attack, Fragmentation attack, coexistence of IPv4 and IPv6 especially ICMPv6 misuse attack, Routing header misuse attack. 6LoWPAN threats creates problem regarding security. Major include both IPv6 and WSN specific threats. threats related to IP enabled domain (IPv6 / IPv4/ 6LoWPAN) are Protocol companies adhere to high standards of data integrity mechanism is sometimes transition attack, Reconnaissance attack, safety and security. From the year 2014 very dangerous. Data loss can also Fragmentation attack, ICMPv6 misuse onwards, attacks will continue to become occur due to improper communication attack, Routing header misuse attack. more innovative and sophisticated. environment. Apart from modifying the 6LoWPAN threats include both IPv6 and Therefore efficient security solutions data packets, the adversary can also WSN specific threats. must be prepared to tolerate unknown, change a packet stream by integrating Threats related to sensor-cloud unexpected, high impact security events. fabricated packets. The system should be environment include SPAM over Internet Security loopholes can occur at multiple capable to verify the original source of data. Telephony (SPIT), Denial of Service (DoS), places in an IoT environment. Following Adversary may sometimes capture data Service theft. are the main issues which can determine in transit and replay them later to create It is almost impossible to isolate the security vulnerabilities that may arise in confusion. Most applications require components of the IoT network physically this type of environment. accurate estimation of source of the from the possible attackers and restrict •• Heterogeneous environment event. Lack of smart tracking mechanisms physical access to them. This in turn and mobility of objects result in allow an attacker to send incorrect reports endangers the integrity and confidentiality inconsistent interpretation of about the location. Adversary may target of information stored on end devices and collected data. They have great availability of critical data by capturing may cause availability violation. influence over the protocol and or disabling a particular node, which may A wireless nature of communication network security service. sometimes result in serious damage. greatly facilitates eavesdropping and •• Large volume of data transmission Secure management of key distribution is a number of other attacks on wireless gives rise to scarcity of bandwidth another challenging task. interface, such as Jamming, DoS, Relay which results in denial of service. Major attacks on IoT Devices could be attack etc. •• It is open to several unique summarized as follows. Bluetooth communication mainly vulnerabilities because of its •• Physical Attacks - example: micro faces threats like Bluejacking, OBEX Push, distributed and ad-hoc nature. probing. Bluesnarfing, HeloMoto, Bluebugging, •• Burden of traditional security features •• Network Attacks – example: denial of DoS attacks. may be too large for limited resource Service attack, routing attack. Constrained computational and objects. •• Software Attacks- example: virus, energy resources do not allow for utilization •• Tracking of interacting objects may worm, logic bomb. of complex security mechanisms, which become difficult in shared, unreliable •• Environmental Attacks. can ensure confidentiality and integrity wireless medium. •• Side Channel Attacks – example: of data residing in end devices and •• Data shared with unknown objects, timing analysis, power analysis. transmitted over an inherently insecure stored in third party domain, where •• Cryptanalysis Attacks-example: wireless channel. probability of data security decreases. cipher text only attack, man-in-the- Communication with smart objects •• Smart applications such as smart middle attack. in resource-constrained environments healthcare, smart home, smart In completely automated must necessarily take into account transport, and smart city may need mechanisms, there is usually no prior the limitations, especially in scenarios to deal with user’s personal data that knowledge about each other and cannot where security is a crucial aspect and may lead to serious threats to privacy always be able to identify intruder. During conventional cryptographic primitives are of the users. transmission between smart objects inadequate. Major threats include Privacy It poses enormous security and in a network, it may be susceptible to threat, Firmware Replacement Attack, privacy risks. Data confidentiality is eavesdropping, either for insufficient Cloning of smart objects by untrusted considered to be the most important issue protection of communication medium manufacturer. in this type of framework. This is required or for use of compromised session key. Cloud computing is an on-demand to protect the data from disclosure, Routing information in IoT can be spoofed, self-service model, where resources and should not leak vital information altered, or replayed. Other known relevant are shared and pooled to serve multiple to external or neighboring networks. routing attacks include Sinkhole attack customers using a multi-tenant model. Keeping the data confidential does not or Blackhole attack, Selective forwarding, In cloud environment main concern protect it from external modifications. An Wormhole attack, Sybil attack. is lack of trust. In this, single physical adversary can alter the data by adding There are several existing threats in medium is shared among multiple virtual some fragments or by manipulating the IP-enabled environment. Security in IPv6 is machines (VM). Therefore integrity and data within a packet. This packet can later almost same as IPv4 security in many ways. availability are two major requirements be forwarded towards destination. Lack of However, there basic differences between in this scenario. Most of the threats are

CSI Communications | April 2014 | 38 www.csi-india.org domain may exist, but no integrated Different projects impose security in different ways. Even though, most projects security framework has been considered. succeeded in implementing their proposed security frameworks, it is not easy to Two most sensitive security concerns provide a fully-secured IoT system in heterogeneous domain that can combine all are transmission and storage of critical security components in a single solution. There is no single security framework data. Therefore, main focus should be that could claim full protection for cloud based IoT environment. given to two of these major security requirements to make the system more caused due to poor management and •• Decentralized trust model for objects efficient. One technique is to develop access control of VM. Session hijacking/ within network. low overhead cryptography for securing overriding, Virtual machine escape, SQL •• Dual stack security model at data transmission and other is to build injection attack, Cross-site scripting 6LoWPAN router/gateway. secure trust model to store data in third attack are the major threats. Multi- •• Use of lightweight cryptography party environment. Without proper tenancy in cloud can expose customers’ requires minimum amount of security framework, intelligence in IoT VM that may lead to information leakage. essential resources of target objects. may lead to major catastrophe. There As customer does not have direct access •• Maximum security can be achieved is no suitable standard defined till date. to physical storage of data, there is a by designing effective IDS. In So more research works are needed on possibility that unauthorized copy of data heterogeneous domain it acts as security for Internet of Things. is misused later for malicious purpose. second line of defence. Design of References There is no assurance that data will be effective IDS capable to work on [1] ITU Internet Reports 2005: The Internet of physically deleted from all places of heterogeneous environment of IoT Things, Executive Summary, http://www. third party environment when data are (IPv4-IPv6-6LoWPAN enabled IDS). itu.int/wsis/tunis/newsroom/stats/The- no longer required. Protection of stored •• Proper integration of all security Internet-of-Things-2005.pdf. sensitive data is dependent on security features of heterogeneous domains. [2] Libelium Unveils the Top 50 Internet of Things Applications, http://www. controls provided by service provider. Conclusion itwire.com/opinion-and-analysis/ Trust, security and privacy issues are Researchers have been working for beerfiles/54432-libelium-unveils-the-top- major roadblocks in cloud computing quite some time in designing ubiquitous 50-internet-of-things-applications. adoption. Cloud characteristics bring in a [3] Internet of Things in 2020: A roadmap framework for smart applications. set of risks and enhanced security controls for the future, Workshop report by EPoSS Different projects impose security are required to mitigate those risks. (EuropeanTechnology Platform on Smart in different ways. Even though, most Therefore, intelligent framework Systems Integration), http://www.iot- projects succeeded in implementing visitthefuture.eu/fileadmin/ documents/ should be considered in such a way so that their proposed security frameworks, it is researchforeurope270808_IoT_in_2020_ it can analyze the above mentioned issues not easy to provide a fully-secured IoT Workshop_Report_V1_1.pdf. and to adapt dynamic mechanism. [4] T Bhattasali, R Chaki, and N Chaki, “Study system in heterogeneous domain that of Security Issues in Pervasive Environment Security Requirements can combine all security components of Next Generation Internet of Things”, In •• Accurate implementation in a single solution. There is no single Proceedings of CISIM 2013, 2013, Springer, of confidentiality, integrity, security framework that could claim LNCS. authentication, non-repudiation, full protection for cloud based IoT [5] T Bhattasali, R Chaki, and N Chaki, “Secure access control. environment. As IoT covers different and Trusted Cloud of Things”, INDICON •• Privacy preserving technology. type of domains, security for individual 2013,IEEE Xplore. n

Tapalina Bhattasali is at present doing her PhD in Computer Science & Engineering from University of Calcutta. She has a few years of working experience in academic field. She has number of international publications to her credit. She is a member of various professional organizations like CSI, ACM. Her primary research area includes Security in wireless domain, Internet of Things and Cloud Computing. She can be reached at [email protected].

Dr. Rituparna Chaki is an Associate Professor in AKCSIT, University of Calcutta. Her primary areas of research are Wireless Mobile Ad-hoc Networks and Wireless Sensor Networks. She has also served as a Systems Manager for Joint Plant Committee, Government of India for several years before she switched to Academia. Dr. Chaki has number of international publications to her credit. Dr. Chaki has also served in the committees of several international conferences.

Dr. Nabendu Chaki is an Associate Professor in the Department Computer Science & Engineering, University of Calcutta. Besides editing several volumes in Springer proceedings, he has authored several text books and several refereed research papers in reputed Journals and International conferences. His areas of research interests include distributed systems and software engineering. Besides being in the editorial board for several International Journals, he has also served as program chair of several international conferences. About the Authors

CSI Communications | April 2014 | 39 Dr. Debasish Jana Brain Teaser Editor, CSI Communications

Crossword » Test your Knowledge on Internet of Things (IoT) Solution to the crossword with name of first all correct solution provider(s) will appear in the next issue. Send your answers to CSI Communications at email address [email protected] with subject: Crossword Solution - CSIC April 2014

1 2 3 Clues 4 Across 5 6 7 1. A system that can enable machines to respond to human requests based on meaning (8, 3) 7. The first publicly used version of the Internet Protocol (4) 8. Global network connecting any smart object (8, 2, 6) 10. Portable data terminal (3) 8 11. Wireless non-contact use of RF electromagnetic fields to transfer data (4) 12. The person who envisioned Device to Device communication (4, 3) 14. Proximity based standards for devices to establish radio communication (3) 16. A universal unique electronic identifier used to identity for every physical object (3) 18. A device that senses measurable information and then reacts to it (6) 9 10 11 21. Data about data (8) 22. A forwarding element that enables various local networks to be connected (7) 24. Properties of an entity that makes it definable and recognizable (8) 25. Intel system on chip (SoC) platform designed for smartphones and tablets (4) 26. The transmission of a packet to multiple destinations in a single send 12 13 14 operation (12) 28. Internet Engineering Task Force (4) 15 16 17 29. An on-line database service allowing developers to connect sensor-derived data (6) 18 19 Down 2. Media access control (3) 20 3. A wireless technology standard for exchanging data over short distances (9) 4. A method of communications between two electronic devices over the 21 22 World Wide Web (3, 7) 5. Authentication information required to connect to a resource (10) 6. An optical machine-readable representation of data (7) 7. Named set of operations that characterizes the behavior of an entity (9) 23 24 8. Ability of making systems and organizations to inter operate (16) 9. Extensible Markup Language (3) 25 13. A componentized version of the Windows XP Professional edition (3) 15. Standardized connection of computer peripherals (3) 17. A platform to connect the ideas, people and companies creating the Internet 26 27 of Things (10) 18. Service oriented architecture (3) 28 19. Framework for resource description (3) 20. A communications protocol for message-oriented middleware based on 29 XML (4) 23. Language for describing web ontology (3) 27. The communications protocol that promises to connect every device on the Internet (4)

Solution to March 2014 crossword

1 2 Did you hear about Internet of Things? T H E S A U R U S 3 4 B Z U 5 Although IoT research and availability are not in full O C H I T R A N K A N 6 7 scale, back in July 2009, Kevin Ashton commented in B L A I G 8 9 "That 'Internet of Things' Thing" published in RFID P H O N E M E G I S C I I 10 11 Journal, “...We would know when things needed A A I T R A N S O S 12 S G I D D T replacing, repairing or recalling, and whether they 13 14 A R I N D L I N U X E P were fresh or past their best. The Internet of Things 15 16 I I S L G Q H has the potential to change the world, just as the 17 18 N S C L T U O 19 Internet did. Maybe even more so.” D W T R A N S L I T E R A T I O N 20 P I N A A K I X M L E 21 22 A M P H O N E I I L T 23 24 M I A S T B C L P I We are overwhelmed by the responses and solutions received from our enthusiastic readers 25 A N S K O L A C 26 Congratulations to D A K A R T I K A N O D S H T R L C Dr. Madhu S Nair (Dept. of Computer Science, University of Kerala, 27 Y H U I S A R O V A R 28 Kariavattom, Thiruvananthapuram, Kerala) B A R A H A I M E N M N G 29 for ALL correct answers to March 2014 month’s crossword. F O N T A

CSI Communications | April 2014 | 40 www.csi-india.org Dr. Debasish Jana Ask an Expert Editor, CSI Communications

Your Question, Our Answer "Try not to become a man of success. Rather become a man of value.” ~ Albert Einstein

On Android: x and y coordinates of GestureOverlayView public class GestureSample extends Activity implements OnGesturePerformedListener { From: Rashmi Trivedi private GstrLrary gstrL; @Override public void onCreate (Bundle savedInst) { Hello Sir / Madam super.onCreate(savedInst); I have a class which extends Fragments. I have a GestureOverlayView, GestureOverlayView gstrOvrlyVw = set as KeyStrokeType = MULTIPLE, in the fragment xml. I want to new GestureOverlayView(this); extract the coordinate values of the stroke as and when i write on the View infl = getLayoutInflater().inflate (R.layout.main, null); GestureOverlay. gstrOvrlyVw.addView(infl); I am new to Android and Java programming. Please help. gstrOvrlyVw.addOnGesturePerformedListener(this); Thank you. gstrL = GstrLraries.fromRawResource(this, R.raw.gestures); In Android development framework, the Fragment class if (!gstrL.load()) { A finish(); helps to create applications that could span the available } width of the device and supports layouts that span multiple setContentView(gstrOvrlyVw); panes (suitable for tablets) or could be confined to single } pane (mobile handset) as well. On mobile handsets, you @Override public void require separate Activity that could host a Fragment and to onGesturePerformed(GestureOverlayView overlay, accommodate space, you switch between Activities. Gesture gesture) { ArrayList predictions = Using GestureOverlayView, drawing free hand becomes gstrL.recognize(gesture); convenient. A transparent overlay for gesture input can be for (Prediction prediction : predictions) { placed on top of other widgets and may contain other widgets. if (prediction.score > 1.0) { Toast.makeText(this, prediction.name, Presume that you extend Fragment and have Toast.LENGTH_SHORT).show(); GestureOverlayView, so your class should like the following: } } public class MyFragment extends Fragment implements } OnGesturePerformedListener { } . . . } In Android, Toast is a notification message that pops up, stays displayed for a certain amount of time, and automatically fades in Using GestureOverlayView, you need to call the method and out. This is used mostly for debugging purpose. addOnGesturePerformedListener to add the listener and must Also, the following code fragment shows use of OnGestureStarted implement the interface OnGesturePerformedListener. That’s that gets called when a manipulation starts. From the MotionEvent why, you need to use implements OnGesturePerformedListener. Thereafter, whenever a gesture is detected, the method argument, we may get the values of x and y coordinates as shown onGesturePerformedListener gets called. below: public void onGestureStarted If you have a method onTouchEvent, then within that method, (GestureOverlayView ovrl, MotionEvent evt) you get a MotionEvent as argument to the listener. From that { argument, say, called as touchevt, you may query the x and y co- if (mGestureType == MULTIPLE_STROKE) { ordinates by calling getX() and get(Y) respectively for the event. ovrl.cancelFadingOut(); } For example, float mX = evt.getX(); public boolean onTouchEvent(MotionEvent touchevt) { float mY = evt.getY(); float x = touchevt.getX(); . . . . float y = touchevt.getY(); } . . . . For more info on GestureOverlayView, you may refer: } http://developer.android.com/reference/android/gesture/ Another sample program segment that extends an Activity and GestureOverlayView.html implements OnGesturePerformedListener is given below. n

Do you have something to ask? Send your questions to CSI Communications with subject line ‘Ask an Expert’ at email address [email protected]

CSI Communications | April 2014 | 41 CSI Reports

From CSI SIGs / Divisions / Regions and Other News » Please check detailed reports and news at: http://www.csi-india.org/web/guest/csic-reports

Speaker(s) Topic and Gist Division IV Communications Dr. A Basu, Dr. AK Nayak, Dr. Suvendu Rup, Dr. Anjali Mohapatra, 21-22 February 2014: National Seminar on “Recent Advancement in Dr. Debasish Jana, and Dr. Rachita Mishra Information Technology (NSRAIT – 2014)” Dr. Basu talked on Cloud Computing & Big Data and emergence of Cloud as information technology designed for availability of computing resources to users “on demand”. Dr. Nayak talked on Emerging Trends in ICT for National Development. Dr. Rup highlighted Recent Advances in Intra-Key-Frame Coding and Side Information Generation Schemes in Distributed Video Coding. Dr. Mohapatra spoke on bio-informatics & described Motif Search in DNA Sequences using Generalized Suffix Tree. Dr. Jana spoke on Novel ECDLP-based Blind Signature scheme based on Elliptic Curve Discrete Logarithm Problem. Dr. Rachita focused on General-Purpose computing on Graphics Processing Units (GPGPU), which is utilization of graphics processing unit (GPU) as multiple processors, to perform computation in applications traditionally handled by CPU. Dr. Prasad spoke on Model Based Testing of Object-Oriented Programs. Dr. Pattnaik spoke about computational intelligence. Dr. Samal focused on real time operating system& spoke about key characteristic of RTOS, level of its consistency concerning time it takes to accept and complete application task. Dr. Pattnaik delivered session on Cloud Computing, its application area and implementation. Guests on stage Dr. Das talked on Delay-Tolerant Network. He described how applications are expected to tolerate much longer delays using DTN. Division I & IV & Region-1 in collaboration with IEEE UP Section and CSI Mathura Chapter Sanjeev Nikore, Prof. Rajeev Tripathi, Prof. Krishna Kant, 1-2 March 2014: International Conference on “Information Systems and Prof. Nishchal Verma and Prof. Ekram Khan Computer Networks: ISCON-2014” Prof. Kant introduced Conference theme. Mr. Nikore addressed topic of employee relationship management which focused on set up of do-it-yourself knowledge exploration. Prof. Tripathi focused on Adaptive Modulation and Coding Schemes as promising technique to support demands for high data rates and wideband proposed for 4G mobile communication. Prof. Verma delivered key note speech on Intelligent Informatics. This deals with interdisciplinary research on artificial intelligence, cognitive science, knowledge engineering, information technology and engineering management. Prof. Khan spoke on designing wireless video communication system which is a challenging task due to high error rates of wireless channels, limited and dynamically varying bandwidth availability and low energy and complexity requirements of portable multimedia devices. Inaugural Session Division-II (Software), CSI Allahabad Chapter, IEEE CSI Council and IFIP-TC9 ICT & Society Prof. GC Nandi, Prof. Greg Adamson, Prof. MGPL 9 March 2014: Seminar on “Norbert Weiner, Cybernetics, Humanity & Narayana, Supriya Kummamuru, Prof. OP Vyas, Technology” Prof. Anupam Agarwal, Prof. MM Gore and Prof. Nandi inaugurated Seminar and emphasized that researchers must focus Prof. TV Gopal on issues relating to Social Cybernetics. Prof. Adamson gave enlightening talk through SKYPE about the Norbert Weiner & his wide ranging contributions to Science of Automation. Prof. Narayana gave presentations on Cybernetic approach for Business Solution Design. Ms. Kummamuru gave presentation on Evolution of Cybernetic Model: Outcome of TCS consulting practice through SKYPE. Prof. Vyas explained Mobile Software Engineering-Opportunities and Challenges. Prof. Agarwal spoke on Human Computer Interaction. Prof. Gore talked about Ethics & Cybernetics. Prof. TV Gopal gave presentation about what impacts Progress of Cybernetics. L-R: Prof JN Tripathi; DK Dwivedi; Prof. KK Bhutani, Prof. GC Nandi; Prof. TV Gopal; and Prof. Greg Adamson (on the screen through SKYPE)

CSI Communications | April 2014 | 42 www.csi-india.org CSI National Young IT Professional Awards Prof Bipin Mehta, Prof. RP Soni, Mr. Naishadh Diwanji, 6 March 2014: CSI National YITP Finals and Award Ceremony Dr. Nityesh Bhatt, Mr. Vijay Shah and Dr. Harshal Arolkar After short listing nominations, 35 teams comprising of professionals from IT companies, technical institutes, entrepreneurs and researchers participated at Regional Level. Evaluation process had 2-tier selection to select Winner, Runner-up & Special Mention. Regional round was conducted at Allahabad, Kolkata, Ahmedabad, Bhubneswar, Aurangabad and Thiruchirappally Chapter. Most outstanding technology project of any kind, completed during the year 2012-13 where project duration could be of 2-3 years from the start date, were judged. The selection committee considered factors like criticality of IT usage, improvement of customer service, innovation, quality of management and impact on organization and society to judge each project. Winners were Centre for Development of Advance Computing, Kolkata Team Amritasu Das, Ravi Sankar and Surya Kant. Project was Handheld Electronic Nose - YITP-2013-National Round Participants-Jury and Chapter OB An Embedded Application for quality assessment of tea. Division III & IV and CSI Indore Chapter in association with IEEE and Sri Aurobindo Institute of Technology, Indore Prof. Aynur Unal, Anadi Upadhyay, Prof. P Trimurthi, 8-9 March 2014: International Conference on “IT in Business, Industries Dr. AK Nayak, Anurag Mandloi, Kinshuk Trivedi, and Government” Dr. Sudhakar Bharti, Dr. CK Jain, Dr. Aaquil Bunglowala Prof. Unal said that Technology has brought revolution in Medical Sciences. She and Dr. Durgesh Kumar Mishra shared her Research work on Big Data in field of Medical Sciences. Mr. Upadhyay discussed issues related to Big Data & Analytics. He also discussed details related to Data mining, Data analysis and Online Recommendation Angle. Prof. Trimurthi said that Data Analytics prevailed even in ancient times. The need is to have Data and analyze it correctly. Data & Research will always help for better future. With examples he said – Data & proper analytical system gives momentum and right direction to your career. Mr Mandloi was connected via Online Lecture from USA. He informed that his company Early Warning Services provides Online Data Security for 5 reputed multi-national banks. They identity defaulters of these banks. They also provide the online data security via social security numbers. 32 subject experts (National & Guests and dignitaries on stage International) shared their experience in this event. CSI National Headquarters, Taramani, Chennai CSI Staff members 6 March 2014: CSI Day Celebrations To commemorate the beginning of CSI Golden Jubilee Celebrations, CSI Flag was hoisted by Mr. Rajan T Joseph, Director (Education). All staff members Mr. S Ramasamy, Mr. Y Kathiresan, Mr. Gnanasekaran, Mr. Natarajan, Mr. Mythreyan, Ms. Miraclin, Ms. Manjusha, Ms. Srividya and Ms. Chithra took pledge to serve for the CSI Community with vigour. Director of Education remembered CSI stalwarts during his speech after hoisting the flag. The meeting came to an end after cutting a cake. Organizers and participants of the CSIDay Celebrations CSI Best PhD Thesis Award –2013 Chennai S Ramanathan, Sanjay Mohapatra, Dr. B Poorna, 22 March 2014: PhD Thesis Award Presenting Ceremony Rajan T Joseph, S Ramasamy and Prof. P Kumar The Best PhD Thesis Awards for the year 2013 were presented at a ceremony. The Awards, Certificates and Cash Prize were distributed by Mr S Ramanathan, Hon. Secretary & Chief Guest, Mr Sanjay Mohapatra and Dr B Poorna. The event was held concurrently with the valedictory function of “National Conference on Recent Advances in Computing and Communications” organized by CSI Chennai Chapter and the CSI SB Shri Shankarlal Sundarbai Shasun Jain College for Women, Chennai. The Awards were presented to Dr. P N Jebarani Sargunar, Dr. S Malathi and to Dr. R Shreelekshmi respectively. Ph.D award winners with CSI OBs CSI-Education Directorate, MIT Pune Mr. Shekhar Sahasrabudhe, RVP-VI 22 March 2014: National Student Project Contest and Expo Objective was to encourage students from CSI student branches to design innovative projects, improve their skill set and become market ready. The contest aimed at involving young students all over India in the quest of innovation in IT and provided them an opportunity to demonstrate their projects with strong social relevance. The Contest was open to students across India, who formed teams of 2 within their respective colleges and participated in rounds at various levels. The Contest aimed to identify students who can develop solutions for real time problems and scenarios with a focus on societal benefit. This competition was held at various regional centres and Finals was conducted at MIT, Pune .

Mr. Sahasrabudhe presenting trophy to winners

CSI Communications | April 2014 | 43 CSI News

From CSI Chapters » Please check detailed news at: http://www.csi-india.org/web/guest/csic-chapters-sbs-news

Speaker(s) Topic and Gist Ghaziabad (Region i) Mr. R K Vyas, Dr. Laxman Prasad, Prof. Y K Mittal, Ms. 22 February 2014: Regional Finals of “4th CSI Discover Thinking School Quiz Kavita Saxena, Mr. Saurabh Agrawal and Mr. Anilji Garg Contest” Six teams who came after winning chapter rounds represented Haryana, Delhi and Uttar Pradesh. After enthralling five rounds of quizzing, teams from DPS Indirapuram and DPS Sonepat were in tie for First position. After nail biting tie breaker, team from DPS Indirapuram consisting of Shivam Bhatia and Sidharth Bhat emerged as Winners. Team from DPS Sonepat consisting of Pavitra Mohan Singh and Neena Gulati was the Runners Up. Winning team will represent Region I in National Finals.

ç Final winners of QUIZ with Guests Ahmedabad (Region Iii) Mr. S Mahalingam, Former CFO & Executive Director, 20 February 2014: Public Lecture “Making of a vibrant society- some ideas” TCS and Fellow & Past President Mr. Mahalingam shared his expertise, ideas and thoughts on making of a Vibrant Society and suggested to implement innovative and creative work for larger interest of society. More than 50 participants attended this public lecture including Fellow, Patron, Senior Members of CSI and Faculty Members.

ç Mr. S Mahalingam delivering his lecture Coimbatore (Region vii) Mr. A Bharani Dharan, Dr. R Joseph Xavier, Dr. K Sanakara 31 January - 1 February 2014: Two days workshop on “Hadoop Eco-System Narayanan and Dr. R Udaya Chandran A Practitioner Approach” Mr. Dharan spoke about benefits of Hadoop. Second issue of SRIT CSI MESSENGER magazine was released. First session involved explanation of cloud working architecture and benefits of virtual installation. Participants were provided hands on working of opennebulla. Second session involved single node configuration of Hadoop open source and were provided with another software ONE to be installed using VirtualBox. Later participants were provided with training on ONE with new configurations for multi node configuration. ç Dignitaries on dais for inauguration L-R: S Pravinthraja, Dr. R Udaychandran, Dr. R Joseph Xavier and A Bharanidharan Mr. Rajesh Kumar, Founder & Managing Director, Aaum 14 February 2014: Lecture on “Analytics for Business success and Excellence” Research and Analytics Private Limited Mr. Kumar spoke and motivated participants who are already in business and or about to start business and enlighten them about stepping in to world of business. He suggested an analytical approach at its very simplicity thereby helping listeners to accept the ideas presented and interacted with them during the session.

ç Faculty member and participants during lecture

CSI Communications | April 2014 | 44 www.csi-india.org Speaker(s) Topic and Gist Coimbatore (Region vii) Chief guest Dr. S Gunasekaran, Dr. Vasantha 15 February 2014: Workshop on “Cloud Computing Tool” Sudhanandhen and Principal Dr. S Shanmugasundaram Dr. Gunasekaran spoke about the benefits of Cloud Computing Tool. The first session involved explanation of cloud working architecture and benefits of Cloud Computing Tool. Participants were provided hands on working of Cloud Sim Tool which involved the configuration of cloud analyst & Reporting tool.

ç Felicitation by Principal Dr. S Shanmugasundaram Vellore (Region vII) P Srinivasa Rao, Dr. G Viswanathan, Summet Verma, 21-22 November 2013: International Conference on “Computing, Sankar Viswanathan, GV Selvam, Prof. V Raj and Cybernetics and Intelligent Information System, CCIIS2013” Prof. S Narayanan About 250 delegates attended the conference. Major topics for technical paper presentations and deliberation included: Next-generation Computing and Communications Systems, Human Computer Interactions, Information Modeling, Tools and Applications. Four pre-conference workshops on Cloud Computing, Windows 8 Applications Development, Business Intelligence and Design Thinking were also organized with support and resource persons with support from VMWare, Microsoft, Accenture and SAP Lab respectively.

ç Inaugural session

From Student Branches » http://www.csi-india.org/web/guest/csic-chapters-sbs-news Speaker(s) Topic and Gist AES Institute of Computer Studies (AESICS), Ahmedabad (Region-III) Dr. Sudipto Das and Dr. Pamela Bhattacharya 21 December 2013: Expert talk on “New Research Trends in Management of Data” The expert talk provided new ideas and directions for research and innovative projects in database management related areas.

ç Dr. Sudipto Das during the talk B.N.M. Institute of Technology, Bangalore (Region-v) Mr. Suman Kumar from Inforce Computing 15 February 2014: Workshop on “Android” Mr. Suman began with an introduction to Android Programming and covered architecture of Android and provided some examples. Students also had a hands-on session.

ç Mr. Suman Kumar conducting the session

CSI Communications | April 2014 | 45 Speaker(s) Topic and Gist East Point College of Engineering and Technology, Bangalore (Region-v) Mr. Pramod Gowda, Dr. Subhash Kulkarni, 10-12 December 2013: Students Internet World 2013 Mr. Anjinappa, Dr. Satish B M and Dr. Prakash S Around 1500 students from different Govt. and Private High Schools of Bangalore Rural District, Karnataka participated. Students Internet World is being organized since last 5 years to give exposure about internet to Govt. and Private High Schools students. The event was sponsored by Govt. of Karnataka, Pearson and Intel. ç Dr. Prakash S, Anjinappa, Dr. BM Satish, Pramod Gowda and Dr. BM Girish on the dais Nalla Malla Reddy Engineering College, Hyderabad (Region-v) KC Arun, M Akhila, S Lakshmi Sahiti, P Sowmya and 9 October 2013: Workshop on “Networking Fundamentals” V Maithri Resource persons delivered knowledge about the importance and overview of networking fundamentals and demonstrated how to build Ethernet LAN using Cross over and Patch Cable. This workshop was coordinated by Mr. Avinash, T Mahendar, N Abhinay, Md. Nisar Ahmed and G Kalyan Kumar. ç (From left) G Kalyan Kumar, Md Nisar, N Abhinay, T Mahendar, K C Arun, V Maithri, S Lakshmi Sahiti, P Sowmya and M Akhila SRKR Engineering College, Bhimavaram, Andhra Pradesh (Region-v) Dr. G P Saradhi Varma, S V Ranga Raju, Prof. P Srinivas 8-9 March 2014: National level Technical Symposium on “Current Trends Rao, G Murali Ranga Raju, and Dr. D Ranga Raju of Information Technology TECHFLEET’14” The conference includes technical Paper Presentations, Idea and Project Presentations, Coding Contest, Technical Quiz & workshop on . The purpose of the conference was to encourage students in learning current technical concepts and to improve presentation skills. The workshop provided exposure to various topics required for developing android applications. ç Dr. G P Saradhi Varma, S V Ranga Raju, Prof. P Srinivas Rao, G Murali Ranga Raju, and Dr. D Ranga Raju during release of proceedings G.H.Raisoni College of Engineering, Nagpur (Region-vi) Mr. Pafulla Das, Dr. P R Bajaj, Dr. P B Nagarnaik, 22 January 2014: National Conference on “Recent Trends in Information Dr. A Y Deshmukh, Dr. Jaju, Mrs. Thomas, Mrs. Shweta Security’2014” Tayade, Mr. Gopal Sakarkar and MCA dept Technical paper presentation was organized at National conference and papers from all over India namely Gujarat, Pune, Nanded, Amravti, etc. which were based on either mini or major projects or research papers were presented in 3 sessions. Out of 41 papers received 39 were presented during the two days. Selected papers will be published in International Journal of Computer Journal, New York, USA.

ç Inauguration of Conference Proceeding Marathwada Institute of Technology, Aurangabad (Region-vi) Mr. Arun Kadekodi, Mr. Satish Sangameswaran, 28 February 2014: Conference on “Recent Trends in IT” Mr. Bharat Kumar Dasa and Mr. Mayur Wakde Tendulkar Mr. Kadekodi spoke on Project-x: A student-centric social network. Mr. Sangameswaran talked on Microsoft MEC: Massively Empowered Classrooms: A “blended” model to engage with students, teachers, and institution simultaneously. Mr. Dasa spoke about Big Data: Big Data Introduction, Definition and Importance, NOSQL – A brief introduction, Distributed Computing – Importance, Hadoop – Overview. Mr Tendulkar spoke on Windows 8 Phone App Development: Modern Smartphone Development, Getting started with WP8 app development and Using the Windows Phone developer tools.

ç Speaker during lecture

CSI Communications | April 2014 | 46 www.csi-india.org Speaker(s) Topic and Gist Prof. Ram Meghe Institute of Technology & Research, Badnera (Region-vI) Dr. DT Ingole, Dr. GR Bamnote, Dr. CA Dhote, 21-22 February 2014: Workshop on “PYTHON language” Dr. A S Alvi, Prof. MA Pund and Kunal Singh Workshop was inaugurated by Hon’ble Principal Dr. DT Ingole. Kunal Singh, Research Engineer, SparkLab Engineering Systems Pvt. Ltd. gave detailed training to students on PYTHON with basics and programming concepts. 85 participants from different colleges participated in the workshop.

ç Hon’ble Principal Dr. D T Ingole at Inauguration Speech Adhiyamaan College of Engineering, Hosur (Region-vIi) Mr. Saravanan 12 February 2014: Industrial Visit to C-DAC Knowledge Park, Bangalore One day Industrial Visit to C-DAC Knowledge Park, Bangalore was arranged for student members. In C-DAC, they attended a Seminar on “Information Security” given by Mr. Saravanan, Administrative Officer, C-DAC. Students also visited data management centres and Super Computer.

ç CSI Members of College Industrial Visit to C-DAC Knowledge Park, Bangalore Amal Jyothi College, Kanjirappally (Region-vIi) Mr. Manu Zacharia, Creator & Chief Architect of Matriux 18-19 March 2014: Workshop on “Ethical Hacking & Cyber Security” and Information Security evangelist, Microsoft MVP & Vulnerability Assessment and Penetration Testing (VAPT) is an integral Information Security evangelist part of every critical network. Organizations are required to carry out frequent and period assessment of their networks to ascertain the security posture of their information systems. Course aimed at providing required technical skillsets to carry out penetration testing and document detailed findings.

ç Mr. Manu Zacharia interacting with students

Dr.Sivanthi Aditanar College of Engineering, Tiruchendur (Region-vIi) Mr. E Arun, BeMITSS, Tirunelveli 4 January 2014: One-day Workshop on “Dot Net” Mr. E Arun gave effective hands-on-training in dot net. He focused on the building blocks of C#.NET, VB .NET, database connectivity, User Interface and applications.

ç Mr. E Arun, speaker at the event Easwari Engineering College, Chennai (Region-vIi) Chief guest Mr. V Srinivasan and Dr. M Sekar, Principal 17 February 2014: Technical Contest “MINDBEND” Dr. Sekar spoke on advancement of computer technology and shared his experience about working on a project during his college days. Mr. Srinivasan explained important qualities and competencies, students should have when they attend their placements. MINDBEND had two events “Inquizitive”(Technical Quiz) and “Google It”, and each event had two rounds. Winners were awarded with cash prizes and certificates.

ç L-R: Dr. D Sivakumar, V Srinivasan, Dr. M Sekar, Prof. S Kayalvizhi, and Mrs. T M Navamani

CSI Communications | April 2014 | 47 Speaker(s) Topic and Gist Einstein College of Engineering, Tirunelveli (Region-vIi) Mr. M Murali, Mrs. Beena baskaran & 14-15 February 2014: National level Workshop on “Advanced Cloud Mr. Khasim mohammed Computing on Research Project” Mr. Murali & his team explained the application development of cloud computing with various services. He also spoke about visual studio code development in social network clouds. Various research aspects related to cloud computing environment were also explored.

ç L to R: Prof. M Gomathynayagam, Dr. K Ramar, Prof. Ezhilvanan, Mr. Murali, Dr. R Velayutham, Mr. Khasim mohammed, and Mrs. Beena baskaran Er.Perumal Manimekalai College of Engineering- Hosur, Tamilnadu (Region-vIi) Dr. S Appan 3 February 2014: One-day Seminar on “Emerging Trends and opportunities in Cloud Computing” Dr. Appan gave inspiring speech on cloud computing and utility computing. He also motivated students to enroll in certification courses like oracle, Cisco, PMI.

ç Dr. Appan addressing students Jeppiaar Institute of Technology, Chennai (Region-vIi) Mr. Roy Arnold and Ms. Kalpana Balaraman 28 February 2014: National Level Technical Symposium “Techisetz’14” Mr. Arnold and Ms. Balaraman from Infosys, ETA, gave a lot of useful inputs to students for their better future and released Techisetz magazine which contains technical articles from JIT students. More than 300 Students from various Engineering colleges enthusiastically participated and won cash prizes in 9 events.

ç L-R : Ms. Kalpana Balaraman, Mr. Roy Arnold and Dr. N Marie Wilson releasing the Techisetz’14 magazine

Malabar College of Engineering and Technology, Kerala (Region-vIi) Dr. S Babusundar, Dr. R Vijaya Kumar, Dr. K A Navas, 6-7 March 2014: National Conference “NCRACEE-2014” and work shop on Dr. B Kannan, Dr. A Sreekumar and Mr. Diljith “Information Security” Objective was to provide interdisciplinary forum to bring together engineers, academicians, scientists, industry researchers and research scholars on common platform to present, discuss and share their experience and research innovations. Several tutorial sessions were organized where experts discussed current trends in information technology and digital communication. The workshop provided hands on training on information security and hacking and it was informative. The technical fest was enriched with many events like IT Quiz, Code Debugging, Web Designing etc.

ç Inauguration Ceremony Oxford Engineering College, Trichy (Region-vIi) Mr. B Santhosh, Dr. G Kumaravelan, Ms. R Sumathi, 21 February 2014: One Day National Level Seminar on “Data Warehousing Ms. N Shanmugapriya and Mr. P Sudhakaran and Data Mining” Mr. B Santhosh delivered lecture on “Introduction to Data Warehousing and Data Mining”. Dr. G Kumaravelan delivered lecture on “Business Analysis, Association Rule Mining and Classification”. Ms. R Sumathi delivered the lecture on “Clustering and Data mining Applications & Tools”.

ç L-R: Mrs. N Shanmugapriya, B Santhosh, P Sudhakaran, and Mr. C Selvakumar

CSI Communications | April 2014 | 48 www.csi-india.org Speaker(s) Topic and Gist Velammal Engineering College, Chennai (Region-vIi) Dr. V Masilamani 17 March 2014: Guest Lecture on “NP-hard and NP-Complete problems” Participants were given introduction about NP-hard problems. NP hard problems are of three types viz, decision problems, search problems or optimization problems. Moreover decision problem Pi is said to be NP- complete if it is NP-hard and it is also in the class NP itself. NP-hard problems are often tackled with rule-based languages, in the areas of Data mining, Selection, Diagnosis; Process monitoring, Control and Scheduling.

ç Dr. Masilamani, Professor, IIITDM, distributing certificates to the winners

Following new Student Branches Were Opened as Detailed Below –

Region III ƒƒ Institute of Technology & Management Universe (ITMU), Vadodara The inaugural ceremony of CSI Student Branch in Institute of Technology & Management Universe Vadodara was held on 10th September 2013. Dr. DB Choksi, Prof. Bhuvan Parikh & Mr. Pravin Jain were invited as guests of honor. Dr. K Baba Pai, Director ITMU welcomed all dignitaries & Dr. SK Vij gave introduction of all guests. It was followed by a Guest Lecture by Dr. D.B. Choksi on “Distributed Computing”.

CSI Membership = 360° Knowledge WE INVITE YOU TO JOIN Your membership in CSI provides instant Computer Society of India access to key career / business building India's largest technical resources - Knowledge, Networking, Join us professional association Opportunities. and CSI provides you with 360° become a member coverage for your Technology goals Learn more at www.csi-india.org

I am interested in the work of CSI . Please send me information on how to become an individual/institutional* member Name ______Position held______Address______City ______Postal Code ______Telephone: ______Mobile:______Fax:______Email:______*[Delete whichever is not applicable]

Interested in joining CSI? Please send your details in the above format on the following email address. [email protected]

Please send your student branch news to Education Director at [email protected]. News sent to any other email id will not be considered. Low- resolution photos and news without gist will not be published. Please send only 1 photo per event, not more.

CSI Communications | April 2014 | 49 CSI Executive Committee 2013-2014/2015

EXECUTIVE COMMITTEE

President (2014-15) Mr. H R Mohan Associate Vice President (Systems) The Hindu, 859 Anna Salai, Chennai - 600002 Phone : 044-28576411, (O) : 044-22313738(R) (M) : 98414 32179 email : [email protected]

Vice President (2014-15) Hon. Secretary (2014-16) Prof. Bipin V. Mehta Mr. Sanjay Mohapatra Director, School of Computer Studies, Duplex 26, Plot 1565 (p), Ahmedabad University, Sector-VI, CDA, AG Teachers College Campus, Cuttack-14, Orissa. Navrangpura, (M) : 91-9861010656 Ahmedabad - 3800009 email: [email protected] Email : [email protected] Phone : (079)-2656-8750 Hon. Treasurer (2013-15) Immd Past President (2014-15) Mr. Ranga Rajagopal Prof. S. V Raghavan Acenet Technologies India P. Ltd. 324 A, Maulana Azad Road, 1084/4 Trichy Road, Sungam, Vigyan Bhavan Annexe, Coimbatore 641 018 New Delhi : 110011 (M) : 09442631004 Phone : (O) 011 23022115, email : [email protected] (F) 011 23022116 email : [email protected]

REGIONAL VICE PRESIDENTS Region-I (2013-15) Region-II (2014-16) Mr. R K Vyas Mr Devaprasanna Sinha 70, Sanskant Nagar Society, 73B Ekdalia Road, Plot No.3, Sector-14, Rohini, Kolkata - 700 019 New Delhi: 110085 Phone : (033)24408849 Phone: 011-27866259 Mobile : 91 9830129551 (M) 91-9810592760 Email : [email protected] email: [email protected]

Region-III (2013-15) Region-IV (2014-16) Prof. R P Soni Mr. Hari Shankar Mishra (O) Campus Director (Computer Education) Command Care, Opp. GLS Institute of Computer Technology Loreto Convent School, Opp Law Garden, Ellisbridge, Ahmedabad 380006 A.G. Office Road, R)61/343, Saraswatinagar, Ambawadi, Ahmedabad 380015 Doranda, Ranchi – 834002, Jharkhand Phone : (R) 079-26746902 Phone : 0651-2411318 (R) (M) : 093761 80747 Mobile : 9431361450 email : [email protected] Email : [email protected]

CSI Communications | April 2014 | 50 www.csi-india.org REGIONAL VICE PRESIDENTS

Region-V (2013-15) Region-VI (2014-16) Mr. Raju L kanchibhotla Dr. Shirish S. Sane Aashirvad, 42/260/1/2, Dattaprasad, Plot No. 19, Shramik nagar, Kulkarni Colony, Moulali Hyderabad-500046, India Sadhu Waswani Road, Nashik 422 002 (M) : 91 9000555202, Phone : 0253-2313607(R) 94 40 32914192 Mobile : 09890014942 Email : [email protected] email : [email protected] Region-VII (2013-14) S P Soman Chief Executive Officer, Skiltek Computers (Pvt.) Ltd., P. B. No. 4234, Kochi – 682 017, Kerala Phone : (0484) 2349494/2339233 91 (484) 2402527 / 2347473 (M) : 098460 65365/98460 65765 email : [email protected]

DIVISION CHAIRPERSONS Division-I: (2013-15) Division-II (2014-16) Prof. M N Hoda Dr. R Nadarajan Director, BVICAM, Professor and Head, A-4, Paschim Vihar, Department of Applied Mathematics and Computational Sciences, PSG College of Rohtak Road, Technology, Coimbatore - 641 004 New Delhi – 110063. Phone : (O) 2572177 Phone: 011- 25275055 Mobile : 9952427229 (M) : 09212022066 Email : [email protected] email : [email protected]

Division-III: (2013-15) Division-IV (2014-16) Dr. A K Nayak Dr. Durgesh Kumar Mishra Director, Indian Institute of H-123-B, Vigyan Nagar, Business Management Annapurna Road, Indore BudhMarg, Patna-800 001 Mobile : 9826047547 Phone : 0612 3269704/5(0), Email : [email protected] 0612 2538809(R) Mobile : 09431018581 email : [email protected]

Division-V: (2013-15) Dr. Anirban Basu Flat #309, Ansal Forte, 16/2A Rupena Agrahara, Hosur Road, Bangalore 560068 Phone : 080 25731706 (M) : 09448121434 email : [email protected] Registered with Registrar of News Papers for India - RNI 31668/78 If undelivered return to : Regd. No. MH/MR/N/222/MBI/12-14 Samruddhi Venture Park, Unit No.3, Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I 4th floor, MIDC, Andheri (E). Mumbai-400 093 Date of Publication: 10 & 11 every month

Prof. Bipin V Mehta CSI Calendar Vice President, CSI & Chairman, Conf. Committee 2014 Email: [email protected] Date Event Details & Organizers Contact Information April 2014 events

8-9 Apr 2014 TITCON-2014: First International Conference on Trends in Technology for Convergence Dr. H Abdul Shabeer At Salem. Organised by the CSI SB of AVS Engineering College, Salem [email protected] http://www.avsenggcollege.ac.in/titcon/ 10 Apr 2014 NCRTIT-14: 3rd National Conference on Recent Trends in Information Technology Dr. Latha TamitseIvan At Chennai. Organised by Dept. of IT, B.S. Abdur Rahman University in association with CSI [email protected] Chennai& IEEE CS Madras http://ncrtit2014.weebly.com/ 11-13 Apr 2014 TAMC-2014: 11th Annual Conference on Theory and Applications of Models of Computation Dr. T V Gopal At Chennai, Organised by CSI Div II & Anna University [email protected] http://www.annauniv.edu/tamc2014/ 19 Apr 2014 SACTA-2014: 9th National Conference on "Smarter Approaches in Computing Technologies Dr. Rabins Porwal & Applications. [email protected] At Ghaziabad. Organised by Institute of Technology & Science with CSI Div 1 and Region 1. http://www.its.edu.in/IT/Conference/SACTA-2014.html 24-25 Apr 2014 AOSMT-2014: 2nd National Seminar and Workshop on Advances in Open Source Mobile Dr. Dharm Singh Technologies [email protected] At Ahmedabad. Organized by SIG-WNs, CSI Ahmedabad Chapter Dr. Nilesh Modi http://www.sabareducation.org/conference/aosmt/ [email protected] Amit Joshi [email protected] May 2014 events

8-9 May 2014 ICASG 2014: International Conference on Architecture Software systems and Green computing 2014 Mr. M Ramasubramaniam At Chennai. Organised by Dept. of CSE & IT, Aarupadai Veedu Inst. of Technology in association [email protected] with CSI Chennai & IEEE CS Madras http://www.avit.ac.in/icasg2014.php 17 May 2014 WTISD 2014:Broadband for Sustainable Development Dr. Dharm Singh At Udaipur. Organised by SIG-WNs- CSI and IEI ULC [email protected] 31 May-7 Jun 2014 ICSE 2014: 36th International Conference on Software Engineering Sharon Neetal At Hyderabad. Organised by CSI SIGSE [email protected] http://2014.icse-conferences.org/ June 2014 events

2–4 Jun 2014 IFIP Networking 2014 Conference Prof. S V Raghavan At Trondheim, Norway, http://networking2014.item.ntnu.no/ [email protected] July 2014 events

4-5 Jul 2014 ICIS-14: International Conference on Information Science Ms. Sony P At Cochin. Organized by the Dept. of CSE, College of Engineering Cherthala in association [email protected] with CSI Cochin Chapter & Div III, IV & V and sponsored by Technical Education Quality Improvement Programme (TEQIP II). http://www.iciscec.in/ August 2014 events

8–9 Aug 2014 ICICSE: II International Conference on Innovations in Dr. H S Saini Computer Science and Engineering [email protected] At Hyderabad. Organized by Guru Nanak Institutions, Ibrahimpatnam, Hyderabad in Dr. D D Sarma association with CSI Div IV [email protected] 20 Aug 2014 Workshop on "Ethernet LAN Construction using Crossover and Patch Cable" Mr. K C Arun At Hyderabad. Organized by CSI SB and Dept. of IT, Nalla Malla Reddy Engineering College, [email protected] Hyderabad December 2014 events

19-21 Dec 2014 EAIT-2014: Fourth International Conference on Emerging Applications of Information Technology Prof. Aditya Bagchi At Kolkta. Organized by CSI Kolkata Chapter at Indian Statistical Institute, Kolkata Dr. Debasish Jana https://sites.google.com/site/csieait/ For paper ssubmission visit Prof. Pinakpani Pal https://cmt.research.microsoft.com/EAIT2014 Prof. R T Goswami, [email protected]