Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342474
Medha Khurana, Neetu Faujdar, Shipra Saraswat
Spreading elements in the designed buckets is one of the major issue of bucket sort. It is a non-comparison sorting algorithm in which different elements are spread over several buckets. It is necessary because sometimes the distribution of elements are not done on equal basis over the buckets. To avoid this problem, In this paper we have proposed a hybrid sort algorithm which is a combination of merge and count sort. Although many researchers are using insertion sort within buckets. But in this paper, we have focused on using insertion sort which is preferable in sorting of low volume of data. The main objective of this work is to use the merge, count, insertion and hybrid sort individually over the buckets and then comparing their results on the basis of sorting benchmark. The threshold (x) value has been set in order to save the time and space of proposed algorithm. Experimental results shown that count sort is very efficient on every dataset in comparison to other algorithms.
{"title":"Hybrid bucket sort switching internal sorting based on the data inside the bucket","authors":"Medha Khurana, Neetu Faujdar, Shipra Saraswat","doi":"10.1109/ICRITO.2017.8342474","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342474","url":null,"abstract":"Spreading elements in the designed buckets is one of the major issue of bucket sort. It is a non-comparison sorting algorithm in which different elements are spread over several buckets. It is necessary because sometimes the distribution of elements are not done on equal basis over the buckets. To avoid this problem, In this paper we have proposed a hybrid sort algorithm which is a combination of merge and count sort. Although many researchers are using insertion sort within buckets. But in this paper, we have focused on using insertion sort which is preferable in sorting of low volume of data. The main objective of this work is to use the merge, count, insertion and hybrid sort individually over the buckets and then comparing their results on the basis of sorting benchmark. The threshold (x) value has been set in order to save the time and space of proposed algorithm. Experimental results shown that count sort is very efficient on every dataset in comparison to other algorithms.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129305950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342515
N. Khera, Divya Shukla, Jagjot Singh Khokhar, Vipul Kumar
Milk is an important part of the balance diet. It has valuable essential nutrients which are important for both human and animal health. The aim of this paper is to show some aspects of quality estimation of milk with the help of various parameters which includes CLR (Corrected Lactometer Reading), SNF (Solid but Not Fat) and Fat percentage. A simple and low cost microcontroller based test bed is developed for measuring the milk parameters and displaying these values on LCD. In order to facilitate the web based parameter monitoring the microcontroller is programmed for sending the data values on the cloud network using Ethernet shield. This project aims to test the quality of milk before supplying it for consumption in the market.
{"title":"Development of web based parameter monitoring of milk","authors":"N. Khera, Divya Shukla, Jagjot Singh Khokhar, Vipul Kumar","doi":"10.1109/ICRITO.2017.8342515","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342515","url":null,"abstract":"Milk is an important part of the balance diet. It has valuable essential nutrients which are important for both human and animal health. The aim of this paper is to show some aspects of quality estimation of milk with the help of various parameters which includes CLR (Corrected Lactometer Reading), SNF (Solid but Not Fat) and Fat percentage. A simple and low cost microcontroller based test bed is developed for measuring the milk parameters and displaying these values on LCD. In order to facilitate the web based parameter monitoring the microcontroller is programmed for sending the data values on the cloud network using Ethernet shield. This project aims to test the quality of milk before supplying it for consumption in the market.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117226412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342511
A. S. Omar, S. M. Hussain, A. Singh
This paper exhibits the effective impact of students' networking capabilities on their performance through social media e-tools [1] which has been studied in a quasi-experimental design among 12 students out of 23 of International management module (BUSS 1006) over spring 2017. The results were statistically analyzed with the help of SPSS. Experimental group achievement has been noticed in terms of performance measured by consolidated mean established at 11 percentage points higher as compared to the control group, and a much better standard deviation (2.81 versus 9.83). The concept of students' networking through social media is widely used in HE [2] at different levels to better raise awareness on the closer ties between academia and industry. It enhances students' motivation, thanks to the extra skills they are expected to gain and perform, ultimately leading to entrepreneurship and/or internship and employability. This is also consistent with the strategic plan of Middle East College (MEC) in Muscat, Sultanate of Oman, which aims at achieving 80% employability within one year of graduation as well as attain alumni satisfaction score of 4 out of 5 in terms of employability. Students' networking is therefore a powerful concept to reach these objectives.
{"title":"The power of networking: Bridging the gap between HE students and enterpreneurs in Oman","authors":"A. S. Omar, S. M. Hussain, A. Singh","doi":"10.1109/ICRITO.2017.8342511","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342511","url":null,"abstract":"This paper exhibits the effective impact of students' networking capabilities on their performance through social media e-tools [1] which has been studied in a quasi-experimental design among 12 students out of 23 of International management module (BUSS 1006) over spring 2017. The results were statistically analyzed with the help of SPSS. Experimental group achievement has been noticed in terms of performance measured by consolidated mean established at 11 percentage points higher as compared to the control group, and a much better standard deviation (2.81 versus 9.83). The concept of students' networking through social media is widely used in HE [2] at different levels to better raise awareness on the closer ties between academia and industry. It enhances students' motivation, thanks to the extra skills they are expected to gain and perform, ultimately leading to entrepreneurship and/or internship and employability. This is also consistent with the strategic plan of Middle East College (MEC) in Muscat, Sultanate of Oman, which aims at achieving 80% employability within one year of graduation as well as attain alumni satisfaction score of 4 out of 5 in terms of employability. Students' networking is therefore a powerful concept to reach these objectives.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132001137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342475
Vasu Sharma, V. K. Tayal
The Solar panel consists of a number of Solar cells transforms sun's energy into electrical energy. If the solar panel is continuously aligned along with Sun rotation, higher efficiency may be obtained. In this paper, a solar tracking hardware implementation is proposed which tracks the Sun's movement throughout the day. The affordable solar panel design is based on using 8051 micro-controller, dc motor and light sensor aligned in a simple circuit. The main aim is to enhance the existing solar panel output. The output of the proposed solar tracking panel is found to be 32.17% higher as compared to the static Flat solar panel.
{"title":"Hardware implementation of sun tracking solar panel using 8051 micro-controller","authors":"Vasu Sharma, V. K. Tayal","doi":"10.1109/ICRITO.2017.8342475","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342475","url":null,"abstract":"The Solar panel consists of a number of Solar cells transforms sun's energy into electrical energy. If the solar panel is continuously aligned along with Sun rotation, higher efficiency may be obtained. In this paper, a solar tracking hardware implementation is proposed which tracks the Sun's movement throughout the day. The affordable solar panel design is based on using 8051 micro-controller, dc motor and light sensor aligned in a simple circuit. The main aim is to enhance the existing solar panel output. The output of the proposed solar tracking panel is found to be 32.17% higher as compared to the static Flat solar panel.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131080768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342461
S. Khade, Pallavi Dhanendra Bire
In this paper, a compact single-element fractal antenna system measuring 20×15 mm2 is proposed. The ring resonator increased the number of resonances which make antenna multiband. The reflection coefficient of antenna is found to be below −10dB in the range of 5.1–6.3 GHz and 7.5–8.8 GHz. The performance of the antenna is studied in terms of mutual coupling, pattern of radiation, realized peak gain, directivity and VSWR. The maximum gain of antenna found to be 2.14dB.
{"title":"Fractal antenna for wireless applications","authors":"S. Khade, Pallavi Dhanendra Bire","doi":"10.1109/ICRITO.2017.8342461","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342461","url":null,"abstract":"In this paper, a compact single-element fractal antenna system measuring 20×15 mm2 is proposed. The ring resonator increased the number of resonances which make antenna multiband. The reflection coefficient of antenna is found to be below −10dB in the range of 5.1–6.3 GHz and 7.5–8.8 GHz. The performance of the antenna is studied in terms of mutual coupling, pattern of radiation, realized peak gain, directivity and VSWR. The maximum gain of antenna found to be 2.14dB.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114080664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342417
Priyanka Wadhawan, M. Kumar, A. Mayya, P. P. Marathe
Electromagnetic relays are widely used to communicate safety signals in critical applications, where the failure of the relay leads to risk. Traditionally, there are various techniques for relay health monitoring, that is, finite impulse test (FIT), read back and spare contact reading. These techniques are either intrusive (e.g. FIT and spare contact reading) or does not test the relay completely (e.g. read back). Recently it has been shown that current signature of energizing/de-energizing relay can be used to estimate health of relay contacts. The relays used in safety applications are normally kept energized to ensure fail-safeness. So, of all prominent failure modes of electromagnetic relay, welded contact (i.e. no changeover on relay de-energization) is the most critical one. The current signature of de-energizing relay is employed to detect welded contacts. The paper compares three diverse relay health monitoring schemes and one scheme is analysed for effect of component failure using FMEA (Failure Mode and Effects Analysis).
电磁继电器在关键应用中广泛用于传递安全信号,在这些应用中,继电器的故障会导致危险。传统的继电器健康监测技术有有限脉冲测试(FIT)、回读和备用触点读取。这些技术要么是侵入式的(例如FIT和备用触点读取),要么不完全测试继电器(例如回读)。近年来已有研究表明,可以利用励磁/励磁继电器的电流特征来估计继电器触点的健康状况。安全应用中使用的继电器通常保持通电,以确保故障安全。因此,在电磁继电器所有突出的失效模式中,焊接触点(即继电器断电时不换电)是最关键的失效模式。利用断电继电器的电流特征对焊接触点进行检测。本文对三种不同的继电器健康监测方案进行了比较,并利用失效模式与影响分析(failure Mode and Effects Analysis, FMEA)分析了其中一种方案对元件故障的影响。
{"title":"Comparison and failure mode analysis of current signature based relay health monitoring schemes","authors":"Priyanka Wadhawan, M. Kumar, A. Mayya, P. P. Marathe","doi":"10.1109/ICRITO.2017.8342417","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342417","url":null,"abstract":"Electromagnetic relays are widely used to communicate safety signals in critical applications, where the failure of the relay leads to risk. Traditionally, there are various techniques for relay health monitoring, that is, finite impulse test (FIT), read back and spare contact reading. These techniques are either intrusive (e.g. FIT and spare contact reading) or does not test the relay completely (e.g. read back). Recently it has been shown that current signature of energizing/de-energizing relay can be used to estimate health of relay contacts. The relays used in safety applications are normally kept energized to ensure fail-safeness. So, of all prominent failure modes of electromagnetic relay, welded contact (i.e. no changeover on relay de-energization) is the most critical one. The current signature of de-energizing relay is employed to detect welded contacts. The paper compares three diverse relay health monitoring schemes and one scheme is analysed for effect of component failure using FMEA (Failure Mode and Effects Analysis).","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342486
Anjum Zameer Bhat, Baldev Singh, A. Singh
Cloud computing more commonly known as on demand computing has hugely impacted every field and changed the perception of how future IT services could be provided to organizations of discrete scale and requirements. Providing organizations with more robust, reliable and available infrastructure with literally no administrative overhead and much lesser cost, cloud computing has been a revolution in the recent history of Information and Communications Technology. Cloud Computing has benefitted organizations literally in every field of expertise irrespective of their size. Higher Education Institutions are certainly not an exception and many of the higher education institutions have successfully implemented cloud and are hugely benefitting from it. This research paper studies the common IT infrastructure of Higher Education Institutions in Sultanate of Oman and articulates how cloud computing can prove to be beneficial for higher education institutions in Sultanate of Oman.
{"title":"Learning resources as a service (LraaS) for Higher Education Institutions in Sultanate of Oman","authors":"Anjum Zameer Bhat, Baldev Singh, A. Singh","doi":"10.1109/ICRITO.2017.8342486","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342486","url":null,"abstract":"Cloud computing more commonly known as on demand computing has hugely impacted every field and changed the perception of how future IT services could be provided to organizations of discrete scale and requirements. Providing organizations with more robust, reliable and available infrastructure with literally no administrative overhead and much lesser cost, cloud computing has been a revolution in the recent history of Information and Communications Technology. Cloud Computing has benefitted organizations literally in every field of expertise irrespective of their size. Higher Education Institutions are certainly not an exception and many of the higher education institutions have successfully implemented cloud and are hugely benefitting from it. This research paper studies the common IT infrastructure of Higher Education Institutions in Sultanate of Oman and articulates how cloud computing can prove to be beneficial for higher education institutions in Sultanate of Oman.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129116365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342427
Sumit Diware, S. B. Krishna
Sorting is an important computational task needed in almost all the modern data processing applications. Insertion sort is one of the simplest algorithms used for sorting. However, implementation of insertion sort in sequential execution leads to a time complexity O(n2) making it less efficient. This often leads to not preferring this sorting algorithm for many applications. This paper explores the insertion sort implementation in VHDL using parallel shift sort technique which results in linear time complexity O(n). The designed model is further optimized for operation at higher data rates. An iterative design using the optimized model is then implemented on Xilinx Spartan-6 FPGA which uses in-place computations and allows processing of large data with less hardware resources. This makes the iterative design ideal for area constrained applications which operate in a dynamic input environment with fixed hardware such as real time sensor data processing.
{"title":"Iterative parallel shift sort : Optimization and design for area constrained applications","authors":"Sumit Diware, S. B. Krishna","doi":"10.1109/ICRITO.2017.8342427","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342427","url":null,"abstract":"Sorting is an important computational task needed in almost all the modern data processing applications. Insertion sort is one of the simplest algorithms used for sorting. However, implementation of insertion sort in sequential execution leads to a time complexity O(n2) making it less efficient. This often leads to not preferring this sorting algorithm for many applications. This paper explores the insertion sort implementation in VHDL using parallel shift sort technique which results in linear time complexity O(n). The designed model is further optimized for operation at higher data rates. An iterative design using the optimized model is then implemented on Xilinx Spartan-6 FPGA which uses in-place computations and allows processing of large data with less hardware resources. This makes the iterative design ideal for area constrained applications which operate in a dynamic input environment with fixed hardware such as real time sensor data processing.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133273538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342457
G. Wadhwani, S. Khatri, S. K. Muttoo
Mobile ad-hoc network can be established without any predefined infrastructure and nodes in it communicate with each other in an arbitrary way. All the nodes are expected to have routing capabilities to facilitate communication in the network. The arbitrary movement of nodes and presence of compromised nodes renders the requirement of a route discovery method which can suggest a trustworthy route. In this paper a route discovery technique is suggested based on trust and hop count to find the most trustworthy and optimal path between a pair of communicating nodes. In the proposed method trust is calculated on the basis of direct observation and recommendations from other trustworthy nodes. The impact of recommendations on aggregated trust depends upon the number of interactions between recommender and recommended node. The nodes which are forwarding more number of packets with lesser delay are said to be trustworthy.
{"title":"Trust modeling for secure route discovery in mobile ad-hoc networks","authors":"G. Wadhwani, S. Khatri, S. K. Muttoo","doi":"10.1109/ICRITO.2017.8342457","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342457","url":null,"abstract":"Mobile ad-hoc network can be established without any predefined infrastructure and nodes in it communicate with each other in an arbitrary way. All the nodes are expected to have routing capabilities to facilitate communication in the network. The arbitrary movement of nodes and presence of compromised nodes renders the requirement of a route discovery method which can suggest a trustworthy route. In this paper a route discovery technique is suggested based on trust and hop count to find the most trustworthy and optimal path between a pair of communicating nodes. In the proposed method trust is calculated on the basis of direct observation and recommendations from other trustworthy nodes. The impact of recommendations on aggregated trust depends upon the number of interactions between recommender and recommended node. The nodes which are forwarding more number of packets with lesser delay are said to be trustworthy.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121277662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICRITO.2017.8342495
Rahul Sharma, Nitin Pandey, S. Khatri
The new future for the connectivity to the world are the IoT devices which interconnect heterogeneous object with each other. These IoT devices will make an autonomous world which will have the ability to exchange information and make decisions at the real time. But since these devices are very small therefore they have constrained to memory, processing, battery powered and resources due to which chances of an attack on IoT devices are more than normal devices. To overcome this these IoT devices use lightweight protocols and standards at each layer. At the network layer, 6LoWPAN and RPL are the two main protocols which transfer the data from one device to another. This paper focuses on analyzing different types of attack on the 6LoWPAN and RPL and a new solution for the increased rank attack which helps to stop the loop and resource depletion.
{"title":"Analysis of IoT security at network layer","authors":"Rahul Sharma, Nitin Pandey, S. Khatri","doi":"10.1109/ICRITO.2017.8342495","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342495","url":null,"abstract":"The new future for the connectivity to the world are the IoT devices which interconnect heterogeneous object with each other. These IoT devices will make an autonomous world which will have the ability to exchange information and make decisions at the real time. But since these devices are very small therefore they have constrained to memory, processing, battery powered and resources due to which chances of an attack on IoT devices are more than normal devices. To overcome this these IoT devices use lightweight protocols and standards at each layer. At the network layer, 6LoWPAN and RPL are the two main protocols which transfer the data from one device to another. This paper focuses on analyzing different types of attack on the 6LoWPAN and RPL and a new solution for the increased rank attack which helps to stop the loop and resource depletion.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116049795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}