Jinesh MK | Amrita Vishwa Vidyapeetham (original) (raw)

Papers by Jinesh MK

Research paper thumbnail of Security, Trust and Implementation Limitations of Prominent IoT Platforms

Internet of Things (IoT) is indeed a novel technology wave that is bound to make its mark, where ... more Internet of Things (IoT) is indeed a novel technology wave that is bound to make its mark, where anything and everything (Physical objects) is able to communicate over an extended network using both wired and wireless protocols. The term " physical objects " means that any hardware device that can sense a real world parameter and can push the output based on that reading. Considering the number of such devices, volume of data they generate and the security concerns , not only from a communication perspective but also from its mere physical presence outside a secure/monitored vault demands innovative architectural approaches , applications and end user systems. A middleware platform/framework for IoT should be able to handle communication between these heterogeneous devices, their discoveries and services it offers in real time. A move from internet of computers to internet of anything and everything is increasing the span of security threats and risks. A comparative study of existing prominent IoT platforms will help in identifying the limitations and gaps thereby acting as the benchmark in building an efficient solution.

incollections by Jinesh MK

Research paper thumbnail of Sybil Attack Detection in Vehicular Networks

In this chapter, we consider safety issues arising in vehicular ad hoc networks (VANETs). Althoug... more In this chapter, we consider safety issues arising in vehicular ad hoc networks
(VANETs). Although vehicular networks originated in the infotainment domain,
today they are also used in many safety-critical systems such as in an emer-
gency vehicle grid. Due to the open nature of vehicular networks, they are more
amenable to malicious attacks; and, due to their high mobility and dynamic
topology, the detection and prevention of such attacks is also more difficult.
We consider one such attack in this chapter, the Sybil attack, in which an attacker
tries to violate the unique vehicular ID property by forging or fabricating it and
presenting multiple identities. A Sybil attack is a serious threat because it can
result in large-scale denial of service or other security risks in the network. This
chapter presents a new method to prevent Sybil attacks in a vehicular network
based on the traditional cryptographic techniques, as well as the unique features
of the network. A key feature of the methodology is the use of fixed roadside
units and a central authority. This chapter presents a formal model of the system
using the Promela language and shows how the safety property can be verified
using the SPIN model checker.

Research paper thumbnail of Dynamic constrained objects for vehicular system modeling.

We present a programming paradigm called dynamic con- strained objects for a declarative approach... more We present a programming paradigm called dynamic con-
strained objects for a declarative approach to modeling complex systems
with time-varying behavior. In the basic paradigm of constrained ob-
jects, the structure of a complex system is specified through objects (as
in object-oriented languages), while the behavior of a complex system is
specified declaratively through constraints (as in constraint languages).
The emergent behavior of such a complex system is deduced through a
process of constraint satisfaction. Our focus in this paper is on systems
whose states change with time. Such time-varying behaviors are funda-
mental in many domains, especially in mission and safety-critical applica-
tions. We present an extension of constrained objects with special metric
temporal operators over time-series data, and we discuss their proper-
ties. We refer to the resulting paradigm as dynamic constrained objects
and we illustrate their use for vehicular network modeling. Here, the
network of roads and the road-side infrastructure are specified through
objects, and the movement of vehicles and associated safety and liveness
conditions are specified through time-series variables and metric tempo-
ral operators. The paper presents a language called DCOB, for dynamic
constrained objects, and examples of its use for vehicular network mod-
eling.

Research paper thumbnail of Customizing EPCglobal to Fit Local ONS Requirements

articles by Jinesh MK

Research paper thumbnail of Temporal Constrained Objects: Application and Implementation

We present a novel programming concept called temporal constrained objects for modeling of dynami... more We present a novel programming concept called temporal constrained objects for modeling of dynamic systems. It is an extension of the paradigm of constrained objects which provides a principled approach to modeling complex engineering systems based upon two main principles: a compositional specification of the structure of the system, using objects, and a declarative specification of its behavior, using constraints. A novel feature of temporal constrained objects is the series variable, the sequence of whose values is determined by constraints that include metric temporal operators. The emergent behavior of a dynamic system is determined through a process of time-based simulation and constraint satisfaction at each step. Each class definition for a temporal constrained object is translated into a Prolog rule with constraint-solving capability. In order to improve the performance for long simulations, a partial evaluation technique is adopted for optimized code generation. This paper describes the syntax of a language called TCOB along with several examples, our objective being to demonstrate the benefits of the programming paradigm. TCOB has been implemented and all examples presented in this paper were tested using this implementation. An overview of the translation as well as partial execution and its performance improvements are presented in the paper.

Research paper thumbnail of Implementation of Scatternet in an Intelligent IoT Gateway

inproceedings by Jinesh MK

Research paper thumbnail of Secure IoT: An Improbable Reality

Internet of Things(IoT) has been the buzzword for the past decade. Apart from its hype over oppor... more Internet of Things(IoT) has been the buzzword for the past decade. Apart from its hype over opportunities, the security implications of IoT are unsolvable with current technologies. There is a wide range of security challenges in each layer of IoT conceptual model. We discuss the security challenges caused by the complex structures and integration of different techniques from diverse domains. By analysing attacks at the various layers we argue that the current standards are not enough to provide a secure framework for IoT. The economical and practical reasons make it impossible to puzzle out the various security challenges in IoT stack. From this perspective, we should think twice before connecting a device to the network of things.

miscs by Jinesh MK

Research paper thumbnail of Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products

Research paper thumbnail of Security, Trust and Implementation Limitations of Prominent IoT Platforms

Internet of Things (IoT) is indeed a novel technology wave that is bound to make its mark, where ... more Internet of Things (IoT) is indeed a novel technology wave that is bound to make its mark, where anything and everything (Physical objects) is able to communicate over an extended network using both wired and wireless protocols. The term " physical objects " means that any hardware device that can sense a real world parameter and can push the output based on that reading. Considering the number of such devices, volume of data they generate and the security concerns , not only from a communication perspective but also from its mere physical presence outside a secure/monitored vault demands innovative architectural approaches , applications and end user systems. A middleware platform/framework for IoT should be able to handle communication between these heterogeneous devices, their discoveries and services it offers in real time. A move from internet of computers to internet of anything and everything is increasing the span of security threats and risks. A comparative study of existing prominent IoT platforms will help in identifying the limitations and gaps thereby acting as the benchmark in building an efficient solution.

Research paper thumbnail of Sybil Attack Detection in Vehicular Networks

In this chapter, we consider safety issues arising in vehicular ad hoc networks (VANETs). Althoug... more In this chapter, we consider safety issues arising in vehicular ad hoc networks
(VANETs). Although vehicular networks originated in the infotainment domain,
today they are also used in many safety-critical systems such as in an emer-
gency vehicle grid. Due to the open nature of vehicular networks, they are more
amenable to malicious attacks; and, due to their high mobility and dynamic
topology, the detection and prevention of such attacks is also more difficult.
We consider one such attack in this chapter, the Sybil attack, in which an attacker
tries to violate the unique vehicular ID property by forging or fabricating it and
presenting multiple identities. A Sybil attack is a serious threat because it can
result in large-scale denial of service or other security risks in the network. This
chapter presents a new method to prevent Sybil attacks in a vehicular network
based on the traditional cryptographic techniques, as well as the unique features
of the network. A key feature of the methodology is the use of fixed roadside
units and a central authority. This chapter presents a formal model of the system
using the Promela language and shows how the safety property can be verified
using the SPIN model checker.

Research paper thumbnail of Dynamic constrained objects for vehicular system modeling.

We present a programming paradigm called dynamic con- strained objects for a declarative approach... more We present a programming paradigm called dynamic con-
strained objects for a declarative approach to modeling complex systems
with time-varying behavior. In the basic paradigm of constrained ob-
jects, the structure of a complex system is specified through objects (as
in object-oriented languages), while the behavior of a complex system is
specified declaratively through constraints (as in constraint languages).
The emergent behavior of such a complex system is deduced through a
process of constraint satisfaction. Our focus in this paper is on systems
whose states change with time. Such time-varying behaviors are funda-
mental in many domains, especially in mission and safety-critical applica-
tions. We present an extension of constrained objects with special metric
temporal operators over time-series data, and we discuss their proper-
ties. We refer to the resulting paradigm as dynamic constrained objects
and we illustrate their use for vehicular network modeling. Here, the
network of roads and the road-side infrastructure are specified through
objects, and the movement of vehicles and associated safety and liveness
conditions are specified through time-series variables and metric tempo-
ral operators. The paper presents a language called DCOB, for dynamic
constrained objects, and examples of its use for vehicular network mod-
eling.

Research paper thumbnail of Customizing EPCglobal to Fit Local ONS Requirements

Research paper thumbnail of Temporal Constrained Objects: Application and Implementation

We present a novel programming concept called temporal constrained objects for modeling of dynami... more We present a novel programming concept called temporal constrained objects for modeling of dynamic systems. It is an extension of the paradigm of constrained objects which provides a principled approach to modeling complex engineering systems based upon two main principles: a compositional specification of the structure of the system, using objects, and a declarative specification of its behavior, using constraints. A novel feature of temporal constrained objects is the series variable, the sequence of whose values is determined by constraints that include metric temporal operators. The emergent behavior of a dynamic system is determined through a process of time-based simulation and constraint satisfaction at each step. Each class definition for a temporal constrained object is translated into a Prolog rule with constraint-solving capability. In order to improve the performance for long simulations, a partial evaluation technique is adopted for optimized code generation. This paper describes the syntax of a language called TCOB along with several examples, our objective being to demonstrate the benefits of the programming paradigm. TCOB has been implemented and all examples presented in this paper were tested using this implementation. An overview of the translation as well as partial execution and its performance improvements are presented in the paper.

Research paper thumbnail of Implementation of Scatternet in an Intelligent IoT Gateway

Research paper thumbnail of Secure IoT: An Improbable Reality

Internet of Things(IoT) has been the buzzword for the past decade. Apart from its hype over oppor... more Internet of Things(IoT) has been the buzzword for the past decade. Apart from its hype over opportunities, the security implications of IoT are unsolvable with current technologies. There is a wide range of security challenges in each layer of IoT conceptual model. We discuss the security challenges caused by the complex structures and integration of different techniques from diverse domains. By analysing attacks at the various layers we argue that the current standards are not enough to provide a secure framework for IoT. The economical and practical reasons make it impossible to puzzle out the various security challenges in IoT stack. From this perspective, we should think twice before connecting a device to the network of things.

Research paper thumbnail of Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products