Proceedings of the 10th INDIACom; INDIACom-2016; IEEE Conference ID: 37465 2016 3 International Conference on “Computing for Sustainable Global Development”, 16th - 18th March, 2016 Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA) rd
Internet of Things – Architecture, Applications, Security and other Major Challenges Litun Patra
Udai Pratap Rao
Computer Engineering Department,
Computer Engineering Department,
National Institute of Technology, Surat, INDIA Email ID:
[email protected]
National Institute of Technology, Surat, INDIA Email ID:
[email protected]
Abstract – The concept that helps to interconnect physical objects equipped with sensing, actuating, computing power and thus lends them the capability to collaborate on a task in unison remaining connected to the internet is termed as the “Internet of Things” (IoT). With the help of sensors, actuators and embedded microcontrollers the notion of smart object is realized. The use of smart objects of the IoT framework will soon be found in application areas like home automation, healthcare, transport etc. wherein these smart devices collect data from the environment of deployment, process them and initiate suitable actions. Thus the Internet of Things will bring hitherto unimaginable benefits and help humans in leading a smart and luxurious life. But these benefits are accompanied by various challenges and security threats that need to be addressed. This paper discusses about the building blocks of IoT, presents the architectural components of IoT, lists some potential application domains where IoT is applicable, explores the major challenges that have to be addressed along with the security challenges that need attention.
NOMENCLATURE CA HVAC IoT OCMS ONS RFID
Certifying Authority, Heating, Ventilating, and Air Conditioning, Internet of Things, Object Code Mapping Service, Object Name Service, Radio Frequency Identification. I. INTRODUCTION
The world of computing dominated by Internet is changing very fast. The age of ubiquitous computing has begun. The computing fraternity and researchers are taking a big leap towards the complete realization of a smart world wherein not only computers, but also all existing physical objects will be empowered with sensing, embedded intelligence and actuating capabilities and will be connected to the internet to address problems in unison. Future of computing is focusing on empowering the things surrounding us with computing power and embedded intelligence and not on traditional computers viz. PCs, PDAs and Smartphones. As a result voluminous data will be generated that needs to be stored for the purpose of processing, so that appropriate services can be rendered to the user in an efficient way. The term Internet of Things was first coined by Kevin Ashton in 1999 in the context of supply chain management [1][3]. However, in the present time the definition
Copy Right © INDIACom-2016; ISSN 0973-7529; ISBN 978-93-80544-20-5
of “thing” has become more elaborate including a wide range of applications like health monitoring, home automation, industrial automation, transport and logistics etc. [2][3]. But the main goal of making the ordinary objects around us smart by enabling them to gather, store and process information without any human aid remains unchanged and yet to be achieved fully. The current state of Internet is undergoing a revolution which will bring under its purview networks of interconnected smart objects each capable of mustering information and interacting with the real world and making use of existing internet standards for delivering various services. These smart things in order to render help demand huge amount of data pertaining to the user. Personal data gathered by these sensor enabled things due to continual monitoring of the environment of deployment can pose serious threats to the privacy and security of users. The presence of these vulnerabilities in the IoT calls for immediate attention of researchers in finding out methods for protecting the privacy of personal data. Also as these smart devices are seamlessly connected to the internet, so naturally all internet relevant security issues are carried forward into the IoT domain. Moreover these smart things are severely resource constrained, thus they are prone to attacks by malicious users that can paralyze the network of these objects. Section II explains the building blocks of IoT. Section III discusses the IoT architecture. Section IV deals with the various application scenarios. Section V presents the major challenges to be faced for the deployment of IoT. Section VI points out Security threats and challenges in the IoT framework, followed by the conclusion in Section VII. II. BUILDING BLOCKS OF IOT Broadly the IoT is composed of three components: (a) Hardware which includes - sensors, actuators and embedded transceivers for communication (b) Middleware made up of on demand storage and computing tools for data analytics and (c) Presentation tools - easy to understand novel visualization and interpretation tools that can be seamlessly accessed from various platforms and can be used in a wide range of applications [3]. The basic building blocks of IoT are briefly stated below.
1894
Proceedings of the 10th INDIACom; INDIACom-2016; IEEE Conference ID: 37465 2016 3 International Conference on “Computing for Sustainable Global Development”, 16th - 18th March, 2016 rd
A. Radio Frequency Identification (RFID) RFID systems are composed of one or more RFID reader(s) and several RFID tags. Tags are characterized by unique identifiers and are attached with objects/things. Readers trigger transmission to the tags by generating a proper signal, which represents a query meant for the possible presence of tags in the surrounding and for the reception of their IDs. RFID tag is a small transceiver which is used both for receiving the reader's query signals and transmitting the tag ID to the reader. It has dimensions similar to that of a little square sized adhesive sticker. Two types of RFID tags exist namely, the active RFID tags and the passive tags. Active RFID tags are battery powered while the passive ones derive power from the query signal sent to them by the RFID reader.
centralized architectural setting for the storage and analysis of data is needed.
B. Wireless Sensor Networks (WSN) Sensors are electronic chips used in remote sensing applications. Factors such as minimal cost, small size, high efficiency and ability to gather, process, analyze information from diverse environments and delegate this information collectively contribute towards building a global network of intelligent sensing devices that shall render unprecedented benefits to mankind [14]. Sensed data is shared between sensor nodes and is then sent for analytics to a centralized or, distributed system [3]. WSNs in cooperation with RFID systems can better track the environmental changes and status of things (such as their location, temperature, movements, etc.). Together they can bridge the gap between virtual and the physical world [4].
TABLE I. LAYERS IN IOT ARCHITECTURE
C. Addressing Schemes for unique identification of ‘things’ The IoT envisions to include all inter-networked day to day things into the internet. Now with the fast depleting addresses in IPv4 addressing scheme we cannot devise a scheme to uniquely identify each object in the vast global IoT network. Thus a new unique addressing scheme needs to be devised that would be reliable, persistent as well as scalable. IPv6 addressing can take the charge of device identification though; but the heterogeneity of the wireless sensor nodes, the variety of data gathered escalates the problem still needs to be dealt with [7]. D. Storage of Data and Data Analytics The deployment of huge number of objects with sensing and communication capabilities leads to the generation of voluminous data that needs to be carefully dealt with. Hence the IoT in a sense is closely related with big data which has already become a buzzword in the computer engineering jargon today. Secure transmission of the fetched data and its safe storage is a critical issue. Firstly, robust data storage methods are required for efficient data analytics followed by actuation. Novel machine learning tools based on genetic and evolutionary algorithms, neural networks and other state-ofthe-art artificial intelligence techniques are necessary for enabling the objects in the IoT framework in taking autonomous decisions without human intervention. Above all a
Copy Right © INDIACom-2016; ISSN 0973-7529; ISBN 978-93-80544-20-5
E. Visualization Techniques From IoT perspective visualization techniques are important as it facilitates the interactions between user and environment. New light weight data analysis tools are required for efficiently converting data into knowledge using which quick decisions can be taken and accordingly actuators can act. III. ARCHITECTURE OF IOT The basic architecture of IoT comprises of five layers as shown in Fig.1. Below given Table-I summarizes functions performed by each layer.
Layer’s Name
Functions
Technologies Used
1. Device layer
Unique identification of deployed objects, Digitization of sensed data by objects Secure transmission of sensor data to upper layer Service management, Stores data received from network layer in database, Achieves interoperability by Ubiquitous computing Facilitates global management of applications Processes results of the data collected from underlying layers
RFID Tags, Sensors
2. Network Layer/ Transmission Layer 3. Middleware Layer
4. Application Layer 5. Business Layer
3G, 4G LTE, Wi-Fi, Bluetooth, ZigBee etc. Middleware applications
Platforms for deployment of IoT applications Flow charts, Graphs
Fig. 1. Architecture of IoT [11]
1895
Internet of Things – Architecture, Applications, Security and other Major Challenges
IV. APPLICATION SCENARIOS IoT framework can be deployed in a wide range of application domains. Broadly the application scenarios are classified into four domains. A. Transportation and Logistics Domain • Driving Assistance- Vehicles, roads and railway lines when equipped with RFID tags, sensors and actuators with embedded intelligence can gather important information and send it to traffic control sites for better congestion control and efficient routing of the vehicles through alternate routes from the congested sites. The vehicles equipped with sensors and actuators can avoid collisions and thus prevent accidents. • Smart Logistics- Traffic congestion becomes the main reason for freight delays and failure of delivery of goods on time. Dynamically collected and processed traffic status and congestion information can help in better and quicker freight movement by finding less congested routes from Source to destination. Thus better route optimization can be done. Smart logistics also deals with monitoring of goods being transferred as well as efficient planning for their transportation. RFID tags and sensors embedded helps in real time monitoring of the quality of the cargo en route the destination. The logistics information can be associated with the warehouse status for automating the refilling of the stock so that the enterprise can operate with Zero Stock [8][9]. Edible items like fruits, vegetables, fresh harvested crops are perishable in nature. Their conservation status e.g. the temperature, humidity etc. can be monitored with suitable RFID tags and sensors that can sense the status of the freshness of these items so that they can quickly disbursed into markets and cold storage centers. Using these measures we can make the food supply chain smart and efficient [10][11]. B. Healthcare Domain With the help of Body Area Network concept patients can be provided with wearable devices powered with sensors such as gyroscope, accelerometer, proximity sensors etc. are used to gather data like; body temperature, blood pressure etc. for health monitoring of the patients. The collected information is transmitted to remote healthcare centers such as hospitals for analysis and in case of any medical emergency rapid actions are initiated. In the present day myriads of android applications are available that can help the sensor enabled smartphones to track their daily activities like monitoring the duration of jogging, workout, the number of calories burnt etc. C. Smart Environment Domain • Home Automation- With the advent of smart objects and deployment of sensors, various utilities inside a building can be managed. HVAC systems have already become popular along with smart lighting solutions. These are capable of adapting to the preferences of the users. The smart lighting systems can turn on and off automatically depending on the natural lighting conditions of the
Copy Right © INDIACom-2016; ISSN 0973-7529; ISBN 978-93-80544-20-5
surroundings. Fire detectors and Burglar alarm systems can be deployed to avoid fire and burglary respectively. • Industrial Automation- Massive deployment of sensors and RFID tags can enable automatic industrial monitoring. The machines can be equipped with sensors to sense the temperature, pressure, vibration of the machinery so that in case any abnormal reading is encountered, immediate actions can be launched via the actuators as instructed by the controlling center. • Environmental Monitoring- Sensors can be deployed in harsh unmanned environments like active volcanic sites, flood prone areas, earthquake prone areas, storm prone areas, dense forests, in sea beds and abysses of oceans for real time monitoring wherein the deployed sensors can transmit the sensed information to the central control station for the detection of anomalous situations, so that suitable measures can be taken to deal with the catastrophic situations. D. Personal and Social Domain Smart things can automatically trigger the transmission of messages on the basis of the gathered information to friends on social media to allow them to discover our activities. Sensors and RFID tags gather data pertaining to a user on daily basis and at regular intervals send the same to a central storage point. Doing so enables the user to study trends in his/her activities over time e.g. tracking the number of hours spent in malls, gym, office etc. A novel search engine for smart things can be built to find misplaced RFID enabled things. Thefts can be prevented by deploying RFID readers at the entrance of a building that can be equipped with capabilities to send SMSs to the owner when any objects is taken out of the building without proper authentication. V. MAJOR CHALLENGES IN IOT For the complete realization of the IoT framework there exist some serious issues that need urgent attention. The major challenges to be faced for the deployment of IoT are as follows. A. Extensive Deployment Smart nodes with embedded intelligence must be extensively deployed [17][18] for extraction of reliable information from the surroundings. Doing so helps the network to achieve a failsafe state i.e. the failure of a couple of nodes in the network does not hamper the overall efficiency of the system much. But deploying such huge number of devices incurs huge financial overhead. The proper placement of the nodes so as to achieve optimal network performance is a challenge that needs to be addressed. The efficient management of the voluminous data collected and its correct interpretation i.e. data semantics for application purposes is a critical issue. B. Interoperability and Standardization The manufacturers of smart devices tend to use their in-house or, proprietary technologies on these devices. This trend makes similar devices from different vendors non-interoperable. This calls for the standardization of RFID and sensor technologies,
1896
Proceedings of the 10th INDIACom; INDIACom-2016; IEEE Conference ID: 37465 2016 3 International Conference on “Computing for Sustainable Global Development”, 16th - 18th March, 2016 rd
communication protocols and innovation of efficient middlewares. With the help of standardized communication protocols and middleware technologies the various devices in the IoT framework can be made interoperable. Moreover the middleware along with a standardized application layer for the IoT architecture can help the nodes to communicate with the internet seamlessly [11][18]. C. Unique Identification Since IoT includes a huge number of internetworked devices in its framework that will be connected to the internet, an efficient identification mechanism needs to be in place that can uniquely identify each and every object in the framework [17]. Fast depleting IPv4 addresses can no longer be a viable option in addressing the objects, however the 128 bit IPv6 can mitigate the problem by granting unique addresses (out of a total of 1038 possible addresses) to each of the huge number of objects to be included in the global IoT framework [12]. As in the internet a host’s IP address is found by firing a query to the DNS. The domain name of the desired host is fed to the DNS, which in turn replies with the host's IP. In IoT to facilitate communication among objects the concept of Object Name Service (ONS) needs to be introduced. ONS associates a query about a particular object with the description and the RFID tag identifier information of that desired object. The tag identifier is mapped to a URL pointing to the information about the object queried. ONS should be able to map the details of an object to the RFID tag identifier and vice-versa. Making the working of ONS bidirectional is difficult, thus a service called Object Code Mapping Service (OCMS) is used for this purpose [4]. D. Security of the Data Gathered Applications of IoT like home automation systems, healthcare automation systems etc. deal with huge amount of private data that should be kept confidential. But due to the use of wireless communication media that is prone to inherent security problems this data is vulnerable to snooping attacks, man-inthe-middle attack etc. So appropriate security and authentication, authorization, access control measures need to be in place. One solution to the various attacks is the use of cryptographic techniques. But the various techniques available are very computation intensive, reason why they cannot be adopted straight away by IoT where nodes are battery powered mostly. Hence lightweight yet powerful cryptographic schemes need to be developed to ensure confidentiality and integrity of the data received at the information processing centers [5][6]. E. Objects Safety and Security Physical security of the devices in the IoT is important. Suitable measures should be taken to prevent intruder attempts to dismantle the objects in the framework and defeat the very motive of IoT [12].
Copy Right © INDIACom-2016; ISSN 0973-7529; ISBN 978-93-80544-20-5
F. Energy Consumption Continuous monitoring and data collection by the devices demands large amount of power. Fulfilling the above demand is a serious challenge for the low energy battery powered nodes. Moreover the transmission of collected data by these devices to the controlling point through wireless medium requires more power as compared to wired transmission. So energy efficient solutions and green technology [11] are required to be adopted for making the nodes work on low power, and harvest energy from sun, wind etc. through the use of suitable techniques so that the lifetime of the devices can be prolonged without the need for frequent recharge. G. Efficient Spectrum Usage The radio channels need to be carefully and optimally utilized for avoiding interference and collision among the signal transmissions by the different objects pertaining to different systems deployed in the same area [11]. VI. SECURITY CHALLENGES IN IOT The emerging Internet of Things paradigm envisions to provide unprecedented benefits in near future upon its complete realization. These novel ideas brings along with it myriads of issues that need to be fixed. Among these issues the most important one is security and privacy which needs serious attention. Public will keep ignoring the benefits of IoT till there is a public consensus on the protection of privacy of information collected by the smart devices constituting the IoT framework. Mostly the data that the smart objects in IoT framework collect is private in nature. This calls for powerful security mechanisms for retaining the confidentiality and integrity of the collected data. A. Extensive Deployment IoT framework needs deployment of huge number of smart devices. With the adoption of IoT, many devices will join the framework everyday. Suitable measures are needed to prevent the introduction of malicious objects that can disrupt the whole system. Goal of authentication mechanisms is to establish correct identity. Thus prior to the communication between the devices in the network the parties have to be authenticated. Also to avoid threat from newly introduced objects which could possibly be malicious, each object joining the network must be properly authenticated and checked for authorizations. Presence of malicious devices in the network may seek access to the sensitive information collected by the various objects. Thus efficient access control strategies are required for preventing illegal access to the private and sensitive data by intruders. Public key cryptosystems can also be used for constructing authentication and authorization mechanisms but as they incur significant computational and transmission overheads, they are declared infeasible for IoT. Moreover the lack of a global root Certifying Authority makes the realization of many theoretically feasible schemes infeasible that require a global CA. Granting certificates to each of the numerous objects deployed in the IoT framework is infeasible too. Thus IoT 1897
Internet of Things – Architecture, Applications, Security and other Major Challenges
needs to implement the concept of delegated authorization and delegated authentication [13]. B. Privacy Information pertaining to the daily life of individuals is collected, stored and analyzed by the smart objects in order to provide personalized solutions as per the user’s preference. Disclosure of the same can lead to misuse of the personal data by the adversary. Hence privacy of these collected data needs to be preserved [5]. The two major challenges that must be addressed for a privacy preserving IoT framework are - data accumulation and data anonymization [13]. Data accumulation policy defines restrictions on the type of data collected. It also controls access of an object to the gathered data. Thus with data accumulation policy privacy can be ensured. Second challenge that has to be faced is data anonymization. Data can be anonymized by masking the direct relationship between data and its owner. Concealment of relationship between data and its generator can be achieved through encryption schemes too. The encrypted text being unreadable provides resistance against data analysis. Light weight cryptographic schemes need to be designed keeping an eye on the resource constrained devices deployed in IoT. As the gathered information after its encryption need to be shared among the objects in the IoT, suitable lightweight homomorphic encryption schemes need to be designed that can allow the devices to perform operations on the encrypted data itself. C. Lightweight Cryptographic Solutions & Security Protocols Public key cryptographic measures are more secure and powerful than the symmetric key measures but are more resource intensive too in terms of computation power than symmetric key techniques. For confidentiality, authenticity and integrity of data, the use of public key techniques is highly desired. Hence design of lightweight public key cryptographic scheme is a challenge that has to be dealt with. D. Software Vulnerability and Backdoor Analysis It is natural for bugs to creep into a software during its development. Bugs that might lead to breach in security are referred as Software vulnerabilities [13]. Enforcing security awareness is easy in the development of mainstream softwares. In IoT, because of the use of diverse hardware platforms and custom OS for driving them; developers find it extremely difficult to prevent vulnerabilities to creep into applications. IoT has vulnerabilities that can be exploited by attackers [14][15]. Presence of software vulnerabilities lead to backdoor problems. Adversaries utilize these vulnerabilities to execute malicious intends without being detected. Later the attacker can exploit an existing backdoor in a software to gain control rights over a device. A backdoor in a software is a hidden and undocumented portal which allows administrators to gain access to the software for troubleshooting and patching vulnerabilities [16]. But a backdoor can also be used as a secret portal for gaining remote access to a system and inject malicious codes and viruses. Backdoors in devices can also be utilized to access the data stored. Vulnerabilities in a software Copy Right © INDIACom-2016; ISSN 0973-7529; ISBN 978-93-80544-20-5
for IoT can pose serious threats. Hence rigorous dynamic analysis of applications needs to be carried out for discovering existing vulnerabilities and addressing them before their formal deployment. To mitigate the impact of the threats lightweight Intrusion Detection Systems and antivirus softwares are required to be designed. Software auditing and reverse engineering can also be performed for detection of backdoors. E. IoT Malware Symantec confirmed the detection of the first IoT malware referred as ‘Linux.Darlloz’ in November 2013 which marked the invasion of malwares into the IoT domain [13]. The interconnectivity of devices in the IoT can enable attackers to quickly propagate their carefully crafted malwares among the ‘things’ which can lead to threats like sensitive information disclosure, network throughput degradation etc. A single infected device can spread the malware all over the network. Malwares can also be planted in peripheral devices of a network that are often devoid of security for long term control of the IoT devices like security cameras. To deal with malwares in IoT energy efficient anti-malware technologies need to be designed. F. Security in popular platforms like Android Android by Google Inc. forms the basis for the development of many smart devices constituting the IoT apart from its counterparts like iOS by Apple, Windows Mobile OS by Microsoft etc. Use of android in IoT framework naturally carries forward all anomalies and security flaws like viruses, malwares etc. associated with Android into the IoT domain [13]. Android being an open-source OS is prone to security attacks. The available source code can be carefully analysed by a skillful attacker to discover and exploit vulnerabilities. Use of efficient access control mechanisms and good auditing can mitigate the flaws in Android platform. VII. CONCLUSION IoT is gaining rapid momentum due to advances in sensing, actuating and RFID technologies. It aims at blending the virtual world with the real world seamlessly. By empowering common objects with embedded intelligence, sensing, actuating and communication capabilities the envisioned dream of “anytime, anywhere, any media, anything” communication will be realized by IoT. IoT will hugely benefit mankind with the help of advanced Information and Communication Technologies. All these benefits come at the cost of a plethora of challenges and security issues that if not addressed can overshadow the numerous benefits offered by IoT. REFERENCES [1] [2]
[3]
K. Ashton, “That ‘Internet of Things’ thing”, RFiD Journal, Vol. 22, Issue 7, pp. 97-114, 2009. H. Sundmaeker, P. Guillemin, P. Friess, and S. Woelfflé, “Vision and challenges for realising the Internet of Things”, Cluster of European Research Projects on the Internet of Things-CERP IoT, 2010. Gubbi, Jayavardhana, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami, “Internet of Things (IoT): A vision, architectural elements,
1898
Proceedings of the 10th INDIACom; INDIACom-2016; IEEE Conference ID: 37465 2016 3 International Conference on “Computing for Sustainable Global Development”, 16th - 18th March, 2016 rd
[4]
[5]
[6]
[7]
[8] [9] [10]
[11]
[12]
[13]
[14]
[15]
[16] [17] [18]
and future directions”, Future Generation Computer Systems, Vol. 29, Issue 7, pp. 1645-1660, 2013. Atzori, Luigi, Antonio Iera, and Giacomo Morabito, “The internet of things: A survey”, Computer networks, Vol. 54, Issue 15, pp. 2787-2805, 2010. Akyildiz, Ian F., Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci, “Wireless sensor networks: a survey”, Computer Networks, Vol. 38, Issue 4, pp. 393-422, 2002. Miorandi, Daniele, Sabrina Sicari, Francesco De Pellegrini, and Imrich Chlamtac, “Internet of things: Vision, applications and research challenges”, Ad Hoc Networks, Vol. 10, Issue 7 pp. 1497-1516, 2012. Zorzi, Michele, Alexander Gluhak, Sebastian Lange, and Alessandro Bassi, “From today's intranet of things to a future internet of things: a wireless-and mobility-related view”, Wireless Communications, IEEE, Vol. 17, Issue 6, pp. 44-51, 2010. R. Yuan, L. Shumin, Y. Baogang, “Value Chain Oriented RFID System Framework and Enterprise Application”, Science Press, Beijing, 2007. “METRO Group Future Store Initiative”, Available at: . Yun, Miao, and Bu Yuxin, “Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid”, International Conference on Advances in Energy Engineering (ICAEE), IEEE, pp. 69-72, 2010. [11] Khan, Raees, Samee U. Khan, Rifaqat Zaheer, and Sharifullah Khan, “Future Internet: the Internet of Things architecture, possible applications and key challenges”, 10th International Conference on, Frontiers of Information Technology (FIT), IEEE, pp. 257-260, 2012. Billure, Rajendra, Varan M. Tayur, and V. Mahesh, “Internet of Things-a study on the security challenges”, Advance Computing Conference (IACC), 2015 IEEE International, pp. 247-252, 2015 Zhang, Zhi-Kai, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei Hsu, Chong-Kuan Chen, and Shiuhpyng Shieh, “IoT Security: Ongoing Challenges and Research Opportunities”, In Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on, pp. 230-234, 2014. A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti, “A Large Scale Analysis of the Security of Embedded Firmwares”, In USENIX Security Symposium, August 2014. D.Davidson, B.Moench, S.Jha, and T.Ristenpart, “FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution”, In USENIX Security Symposium, August 2013. “What is a Backdoor?”, Available at: “Overview of the Internet of things”, International Telecommunications Union, 2012 Deng, Na, “RFID Technology and Network Construction in the Internet of Things”, In Computer Science & Service System (CSSS), 2012 International Conference on, pp. 979-982. IEEE, 2012.
Copy Right © INDIACom-2016; ISSN 0973-7529; ISBN 978-93-80544-20-5
1899