Learn More
Establishing end-to-end authentication between devices and applications in Internet of Things (IoT) is a challenging task. Due to heterogeneity in terms of devices, topology, communication and different security protocols used in IoT, existing authentication mechanisms are vulnerable to security threats and can disrupt the progress of IoT in realizing Smart(More)
The Internet of Things (IoT) is the paradigm of inter connecting heterogeneous devices which are distributed globally and will be a part of the future Internet. Wireless Sensor Networks (WSN) are one of the integral classes of networks in the IoT. One of the major challenges to achieve IoT is to integrate and manage large heterogeneous networks. Autonomic(More)
Rapid innovations in the area of digital things and Information Communication Technology are driving rapid deployment of Internet of Things (IoT) around the globe. Device to Device communications (D2D) in IoT are envisaged through various protocols such as Constrained Access Protocol (CoAP), Message Queue Telemetry Transport (MQTT) and MQTT-SN (for sensor(More)
In this paper we discuss the suitability of Identity Based (IDB) Cryptosystems to solve privacy and security issues in Machine to Machine (M2M) communications for Internet of Things (IoT) applications. Present day Information and Communication Technology is driven by smart digital devices connected to each other via Internet. The purpose of IoT is to(More)
Application of cryptography for secure Wireless Sensor Networks poses challenging problems because all the cryptographic algorithms are computationally intensive and wireless nodes have limited resources. In this paper, we describe an Identity Based Elliptic Curve Cryptosystem (IBE-ECC) based on Tate pairing which is lightweight without any Public Key(More)
This paper provides an overview of the activities of Internet of Things (IoT) work group in Global ICT Standardisation Forum for India (GISFI). Objective of this IoT WG is to identify potential standardization areas that can help proliferating the IoT technology and its applications that are relevant to India for the benefit of the society and businesses.(More)
In recent times, sketch based techniques are emerging as useful data stream computation techniques towards processing massive data. In many applications, finding heavy hitters and heavy changers is essential and this task demands reversibility property of sketches. Continuing the trend of arriving at newer reversible sketch, this paper presents a scheme(More)
The resilience of cyberphysical systems (CPS) to denial of service (DoS) and integrity attacks is studied. The CPS is modeled as a linear structured system, and its resilience to various attack scenarios is interpreted in a graph theoretical framework. The structural resilience of the CPS to DoS and integrity attacks is characterized in terms of unmatched(More)
In this paper, we propose a Monotonic Signed Graph (MSG)-based cross-layer congestion control technique for wireless ad-hoc networks. This is a practically implementable self re-configurable distributed solution which runs independently on each wireless nodes. Moreover, it is an alternative approach to Joint Optimal Congestion control and Power control(More)
Topology control in wireless sensor networks helps to lower node energy consumption by reducing transmission power and by confining interference, collisions and consequently retransmissions. Decrease in node energy consumption implies probability of increasing network lifetime. In this paper, firs popular topology control algorithms are used for analyzing(More)