Professional Documents
Culture Documents
Amit Sharma,
Asst. Professor,
School of Information Technology,
Apeejay Institute of Management Technical Campus,
Jalandhar, Punjab, India
Abstract: The current era is surrounded with enormous devices and gadgets connected with each other using high performance technologies.
Such type of technology loaded object communication is treated under the aegis of Internet of Things (IoT). A number of applications are using
IoT based communication whether it is related to defense equipments, smart cities, smart offices, highway patrolling, smart toll collections,
business communications, satellite televisions, traffic systems or interconnected web cams for social security. IoT is also known and associated
with other terms including Ubiquitous Computing (UbiComp), Pervasive Computing or Ambient Computing in which number of devices and
objects are virtually connected for remote monitoring and decision making. This manuscript underlines the security and power aware
programming in IoT for higher performance in Cooja.
__________________________________________________*****_________________________________________________
1132
IJRITCC | May 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 5 1132 1136
_______________________________________________________________________________________________
traffic lane can be broadcasted as Congestion Free Lane. of Destination-Oriented Directed Acyclic Graph (DODAG)
With this approach, the upcoming congestion can be very having unidirectional as well as bi-directional
high on that lane which can result in the disasters. communication. It is having multiple instances with the
localized behavior for higher optimization. RPL enables
Importance of IPv6 in Internet of Things (IoT) each node in the framework to pick if packets are to be sent
Security and integrity is the main issue in IoT based network upwards to their root or downwards to their child nodes.
environment in which interception free secured
communication is required. To enforce and integrate the Programming RPL with IPv6 in Cooja
higher degree of security, there is need to implement IPv6 Contiki is one of the widely used IoT enabled operating
for IoT scenarios with dynamic hybrid cryptography in the system under free and open source distribution available on
keys generation and authentication. The IPv6 based (http://www.contiki-os.org). Contiki is equipped with Cooja
approach can be enabled with fully secured algorithms and Simulator that is used for the simulation as well as
non vulnerable towards the interceptions. With the programming for sensor devices having enormous options to
increasing implementations of IoT in diversified domains, it program the IoT nodes for real life implementations. Contiki
becomes necessary to work out the security aspects of IoT is having an excellent and powerful IoT simulator Cooja
with the secured routing of packets so that the intrusion which enable the programmer to import and program
cannot take place and all the transmission can be fully enormous types of IoT motes and get the results from
secured. different algorithms. To program, control and monitor the
remote IoT devices, the back-end C programs and related
RPL (Routing Protocol for Low-Power and Lossy header files can be customized and recompiled to get the
Networks) desired results. Contiki works on IPv4 as well as IPv6
RPL is the IPv6 Based Protocol for IoT. It is primarily networking with the integration of lightweight protocols so
integrated for IPv6 over Low power Wireless Personal Area that low power chips and radio frequency chips can be
Networks (6LowPAN). It works with the dynamic creation connected without performance issues.
Figure 1 depicts the simulation of multiple IoT motes in Once the simulation is complete, the network log files are
Cooja Simulator with the integration of dynamic analyzed which includes the source and destination motes,
cryptography. The simulation results can be analyzed from time and overall activities performed during simulation. In
Mote Output in which there is option to fetch the execution the Mote Output Window, the log data can be copied and
logs. All the data communication and signals are logged in further analyzed using data mining and machine learning
Mote Output which can be further investigated using tools for predictive analytics.
different types of graphs.
1133
IJRITCC | May 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 5 1132 1136
_______________________________________________________________________________________________
Figure 2 represents the Collect View in Cooja Simulator. It IoT motes can be analyzed on multiple parameters including
is the tool available with Cooja IoT Simulator to analyze the Latency, Temperature, Time and other important parameters
individual IoT mote. The IoT mote analytics can be viewed which contribute to the performance evaluation.
from Tools menu of Cooja. From Collect View, any of the
1134
IJRITCC | May 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 5 1132 1136
_______________________________________________________________________________________________
Figure 3 depicts the different options by which IoT View of Cooja enable the researcher to view the dynamic
Simulation can be analyzed and prediction on various topology and connections of sensor nodes as shown in
parameters can be done. The network graph tab in Collect Figure 4.
As depicted in Figure 5, there are enormous parameters cited graph are consistent and low power mode is in the
including LPM, CPU, Radio Listen and Radio Transmit integrity mode. In addition, the radio listen the having the
during the IoT simulation. The graphical results in the above consistency.
1135
IJRITCC | May 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 5 1132 1136
_______________________________________________________________________________________________
II. Conclusion
Internet of Things is one of emerging domain of research at
various academic as well as corporate establishments.
Because of increasing number of devices, there are so many
segments for research in this area. Following are some of the
approaches on which the novel and effectual algorithms can
be devised and implemented using Cooja
Interoperability and Cross-Protocol Compatibility
Development of Energy Aware IoT Scenarios
Power Aware Scheduling and Routing
Prediction and Avoidance of Energy Consumption
Attacks
Lifetime Analytics for Robustness of IoT
Environment
Reproducible and Multi-Interface Implementations
o and many others
REFERENCES
[1] Chan H., & Perrig A. Security and privacy in sensor
networks, Computer Networks, 36(10), pp. 103-105, Oct.
2003.
[2] Huang Q., Cukier J., Kobayashi H., Liu B., & Zhang J.,
Fast authenticated key establishment protocols for self-
organizing sensor networks, In Proceedings of the 2nd
ACM international conference on Wireless sensor
networks and applications, pp. 141-150, ACM, Feb. 2003.
[3] Gura N., Patel A., Wander A., Eberle H., & Shantz S.,
Comparing elliptic curve cryptography and RSA on 8-bit
CPUs, In International Workshop on Cryptographic
Hardware and Embedded Systems, pp. 119-132, Springer
Berlin Heidelberg, 2004.
[4] Watro R., Kong D., Cuti S. F., Gardiner C., Lynn C., &
Kruus P., TinyPK: securing sensor networks with public
key technology, In proceedings of the 2nd ACM workshop
on Security of ad hoc and sensor networks, pp. 59-64,
ACM, 2004.
[5] Liao W.H., & Huang C. C., SF-MAC: A spatially fair MAC
protocol for underwater acoustic sensor networks, IEEE
Sensors Journal, 12(6), pp. 1686-1694, Jan. 2012.
[6] Rodrguez-Colina E., Multiple attribute dynamic spectrum
decision making for cognitive radio networks, In 2011
Eighth International Conference on Wireless and Optical
Communications Networks, pp. 1-5, IEEE July 2011.
[7] Ioannis K., Dimitriou T., & Freiling F. C., Towards
intrusion detection in wireless sensor networks, In Proc. of
the 13th European Wireless Conference, pp. 1-10, 2007.
[8] Sung W. T., Multi-sensors data fusion system for wireless
sensors networks of factory monitoring via BPN
technology, Expert Systems with Applications, 37(3), pp.
2124-2131, 2010.
1136
IJRITCC | May 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________