SlideShare a Scribd company logo
1 of 5
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 5 Pages: 2479-2483 (2015) ISSN: 0975-0290
2479
Survey of Operating Systems for the IoT Environment
Tuhin Borgohain*
Department of Instrumentation Engineering, Assam Engineering College, Guwahati, India
Email: borgohain.tuhin@gmail.com
Uday Kumar
Tech Mahindra Limited, Chennai, India
Email: udaykumar@techmahindra.com
Sugata Sanyal
Corporate Technology Office, Tata Consultancy Services, Mumbai, India
Email: sugata.sanyal@tcs.com
*Corresponding Author
----------------------------------------------------------------------ABSTRACT----------------------------------------------------------
This paper is a comprehensive survey of the various operating systems available for the Internet of Things
environment. At first the paper introduces the various aspects of the operating systems designed for the IoT
environment where resource constraint poses a huge problem for the operation of the general OS designed for the
various computing devices. The latter part of the paper describes the various OS available for the resource
constraint IoT environment along with the various platforms each OS supports, the software development kits
available for the development of applications in the respective OS’es along with the various protocols
implemented in these OS’es for the purpose of communication and networking.
Keywords –IDE, IP, SDK, WSN, IoT.
-----------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: April 10, 2015 Date of Acceptance: April 11, 2015
-----------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
he whole Internet of Things environment is based on
the application of microprocessors and wireless
sensors. The resource constraint environment of these
microprocessors and sensors makes the use of regular
OS’es meaningless due to their high resource and
computing power requirement. Thus, in such a situation,
the development of OS’es meeting the resource constraint
demand of the IoT environment becomes necessary.
II. OVERVIEW
In section III the paper introduces the various
aspects of an OS designed for the IoT environment. In
section IV, the various OS’es available for running in the
IoT environment along with a list of the supporting
platforms, SDKs and the various networking and
communication protocols implemented are surveyed. The
paper is concluded in section V.
III. INTRODUCTION TO OS FOR THE IOT
ENVIRONMENT
The whole integration of the various IoT devices to
the various objects is made possible through the interaction
of software at a dynamic level along with the use of
wireless sensor network and RFID technologies using the
internet infrastructure ([1], [6]). This software interaction
is made possible through the operating system running
behind the scene within each IoT device without which an
IoT device would be nothing more than a non-functioning
device. The flexible features of the various operating
systems of an IoT device has facilitated some interesting
integration of electronic products and technologies to the
daily processes of an individual thus making the processes
a whole lot easier to use and access. Some out of the
multitudes of IoT technology integration and innovations
are smart light bulb ([28]), implementation of real time
passenger information system ([22]), smart tags/NFC tags
([17]) etc.
The OS’es developed for the IoT environment
require very few kilobytes of RAM as well as operate with
low power consumption. Moreover they are specifically
designed and optimized for a particular set of
microprocessor-based platforms beyond which such OS’es
becomes irrelevant in its application ([38]). These OS’es
do not compromise in terms of features relating to
communication, networking, security etc. as compared to
the regular OS’es like Windows OS, Mac OS etc. but
comes built-in with a number of pre-installed, pre-
integrated applications, drivers and other network
protocols. Moreover these OS’es employ a number of
unique security measures for enhancing the IoT
T
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 5 Pages: 2479-2483 (2015) ISSN: 0975-0290
2480
infrastructure as a whole and to avoid the compromise of
the stability and usability of the OS.
Though the security issues of the OS’es for the IoT
environment are quite different in comparison to the
security issues of a regular operating system, yet it still
retains the standard security protocols for protecting itself
against unwanted attacks. Now the IoT environment is
made in such a way so as to carry out information
exchange between the various electronic devices over the
internet in the most efficient way possible using the lowest
amount of resources. As such the whole IoT environment
along with its OS becomes prone to malicious attack from
the third party intruders. So the successful implementation
of various encryption and data hiding techniques ([4], [5],
[12], [15], [39]), intrusion detection systems ([16], [33])
etc. in the IoT infrastructure takes a paramount
importance.
[45] takes care of sleep deprivation attack blockage on IoT
elements, to preserve their already fragile power resources.
IV. OS’ES
i. mbed: Developed by ARM in collaboration with
its technological partners, mbed OS is developed for 32-bit
ARM Cortex-M microcontrollers ([29]). The whole OS is
written using C and C++ language. This open source OS is
licensed under Apache License 2.0.
The software development kit (SDK) for mbed OS
provides the software framework for the developers to
develop various microcontroller firmwares to be run on
IoT devices. These SDK is comprised of core libraries
which consist of the following components given in Table
1:
Networ
king
Test
scripts
Microcontroller
peripheral
drivers
RTOS
and
runtime
environm
ent
Build
Tools
Debug
Scripts
Table 1: Core libraries in mbed OS
The applications for mbed OS can only be
developed online using its native online code editor cum
compiler known as mbed online integrated development
environments (IDEs). While writing of code can only be
done through a web browser, its compilation is done by the
ARMCC C/C++ compiler in the cloud.
In the connectivity front, the mbed OS support the
following connectivity technologies given in Table 2:
Bluetooth
Low Energy
Wi-fi Zigbee IP Zigbee
LAN
Cellular Ethernet 6LoWPAN
Table 2: Connectivity technologies in mbed OS
mbed OS integrates end-to-end IP security (IPv4
and IPv6) through TLS and DTLS in its comm. channels
for increased security of the whole OS environment.
Moreover for management of various devices in its
environment, mbed OS uses OMA Lightweight M2M
protocol.
ii. RIOT: Developed by INRIA, HAW Hamburg
and FU Berlin initially, RIOT OS is compatible with ARM
Cortex-M3, ARM Cortex-M4, ARM7, AVR Atmega and
TI MSP430 devices ([8], [24], [31]). Developed using C
and C++, this open source OS is licensed under LGPL
v2.1.
The SDKs available for development of
applications in RIOT OS are gcc, valgrind and gdb.
Moreover the SDK framework supports application
programming in C and C++.
RIOT OS supports all the major communication
and networking protocols which are tabulated in Table 3:
IPv6 6LoWPAN RPL CoAP
UDP TCP CBOR CCN-lite
OpenWSN UBJSON
Table 3: Networking protocols in RIOT OS
iii.Contiki: Created by Adam Dunkels and further
developed by people from various organisations and
institutions like Atmel, Cisco, ENEA, SAP, Sensinode,
Oxford University etc. ([3], [19], [35]), the Contiki OS is
aimed to be used in various microcontroller devices which
are tabulated in Table 4:
Atmel
ARM
Atmel
AVR
STM32w TI MSP430
TI
CC2430
TI
CC2538
TI CC2630 TI CC2650
LPC2103 Freescale
MC1322
4
Microchip
dsPIC
Microchip
PIC32
Table 4: Microcontroller devices running on Contiki OS
This open source OS is licensed under BSD
License.
The programming model of the Contiki OS is
based on protothreads for efficient operation in resource-
constrained environment.
The Contiki OS features Cooja, a network simulator
which simulates Contiki nodes ([18]). These Contiki nodes
are of three types:
a. Emulated nodes
b. Cooja nodes
c. Java nodes
The various networking protocols supported by
Contiki OS are given in Table 5:
CoAP 6LoWPAN RPL
Table 5: Networking protocols in Contiki OS
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 5 Pages: 2479-2483 (2015) ISSN: 0975-0290
2481
The Contiki environment is generally made secure
through the implementation of ContikiSec ([21]) and
through the implementation of TLS/DTLS ([9]).
iv. TinyOS: Developed by TinyOS Alliance, this
open source OS is mainly developed for wireless sensor
networks ([2], [7]). It is written in nesC and is licensed
under BSD License.
The SDK for application development for TinyOS
is comprised of the following three IDEs:
a. TinyDT
b. TinyOS Eclipse Plugin “YETI 2”
c. TinyOS Eclipse Editor Plugin
The various communications and network protocols
implemented in the TinyOS are given in Table 5:
Broadcast based
Routing
Probabilistic
Routing
Multi-Path
Routing
Geographical
Routing
Reliability based
Routing
TDMA based
Routing
Directed Diffusion
Table 5: Communication and networking protocols in
TinyOS
The whole architecture of the TinyOS has been
made secure over the years with the implementation of
TinySec ([44]) and various types of embedded security
layers ([13], [14], [30], [40]).
v. Nano-RK: Developed at Carnegie Mellon
University by Alexei Colin, Christopher Palmer and Artur
Balanuta, Nano-RK is specifically targeted for running in
microcontrollers (presently runs on MicaZ motes and
FireFly Sensor Networking Platform) to be used in
wireless sensor networks. Nano-RK OS is written in C
language and is open source ([10], [43]).
The application development of Nano-RK OS is
supported by the Eclipse IDE.
The communications within the OS is carried out
with the help of the following protocols given in Table 6:
RT-
Link
PCF
TDMA
b-mac U-Connect WiDom
Table 6: Communication protocols implemented in
Nano-RK
vi. FreeRTOS: Developed by Real Time Engineers
Ltd., the FreeRTOS is developed for platforms listed in
Table 7:
ARM7 ARM9 ARM
Cortex-
M3
ARM
Cortex-M4
ARM
Cortex-A
RM4x TMS57
0
Cortex-R4
Atmel
AVR
AVR32 HCS12 Altera Nios
II
MicroBlaze Cortus
APS1
Cortus
APS3
Cortus
APS3R
Cortus
APS5
Cortus
FPF3
Cortus
FPS6
Cortus FPS8
Fujitsu
MB91460
series
Fujitsu
MB9634
0 series
Coldfire V850
78K0R Renesas
H8/S
MSP430 8052
X86 RX SuperH PIC
Atmel
SAM3
Atmel
SAM4
Atmel
SAM7
Atmel
SAM9
Table 7: Platforms supporting FreeRTOS
Written mostly in C with the addition of a few
assembly functions, this open source OS is licensed under
Modified GPL ([25], [26]).
The application development part for FreeRTOS is
handled through multiple threads, software timers and
semaphores along with a tick-less mode for low
consumption of resources by the running of the various
applications.
V. CONCLUSION
From the above survey it can be seen that all the OS’es
for the IoT environment are well equipped with all the
major networking and communication protocols, security
features as well as optimized for efficient usage of
computing power in a resource constraint environment.
Yet the additional implementation of counter measures to
online dictionary attacks ([11], [20], [32]) in the internet
infrastructure used by the IoT environment with the
additional emphasis on developing a more robust wireless
sensor network ([27], [34], [37], [41]) will contribute to
the protection of user’s credentials during online
transactions ([23], [36], [42]) logging inside one’s
personal account in the cloudand will make the whole IoT
environment much secure and more reliable.
REFERENCES
[1] Hermann Kopetz. "Internet of things." In Real-time
systems, pp. 307-323. Springer US, 2011.
[2] http://en.wikipedia.org/wiki/TinyOS
[3] Adam Dunkels, Oliver Schmidt, Niclas Finne, Joakim
Eriksson, Fredrik Österlind, Nicolas Tsiftesand Mathilde
Durvy. "The Contiki OS: The Operating System for the
Internet of Things." (2011).
[4] Sandipan Dey, Ajith Abraham, and Sugata Sanyal.
"An LSB Data Hiding Technique Using Natural Number
Decomposition." In Intelligent Information Hiding and
Multimedia Signal Processing, 2007. IIHMSP 2007. Third
International Conference on, vol. 2, pp. 473-476. IEEE,
2007.
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 5 Pages: 2479-2483 (2015) ISSN: 0975-0290
2482
[5] Philip P. Dang, Paul M. Chau. "Image encryption for
secure internet multimedia applications." Consumer
Electronics, IEEE Transactions on 46, no. 3 (2000): 395-
403.
[6] Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic
and Marimuthu Palaniswami. "Internet of Things (IoT): A
vision, architectural elements, and future
directions." Future Generation Computer Systems 29, no.
7 (2013): 1645-1660.
[7] Philip Levis, Sam Madden, Joseph Polastre, Robert
Szewczyk, Kamin Whitehouse, Alec Woo, David Gay,
Jason Hill, Matt Welsh, Eric Brewer and David Culler.
"TinyOS: An operating system for sensor networks."
In Ambient intelligence, pp. 115-148. Springer Berlin
Heidelberg, 2005.
[8] https://github.com/RIOT-OS/RIOT
[9] Vladislav Perelman. "Security in IPv6-enabled wireless
sensor networks: An implementation of TLS/DTLS for the
Contiki operating system." PhD diss., MSc Thesis, Jacobs
University Bremen, 2012.
[10] http://www.nanork.org/projects/nanork/wiki
[11] Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith
Abraham, and Sugata Sanyal. "A new protocol to counter
online dictionary attacks” Computers &Security, 25, no. 2
(2006): 114-120.
[12] Chi-Kwong Chan, Lee-Ming Cheng. "Hiding data in
images by simple LSB substitution." Pattern
recognition 37, no. 3 (2004): 469-474.
[13] David J. Malan, Matt Welsh, and Michael D. Smith.
"A public-key infrastructure for key distribution in TinyOS
based on elliptic curve cryptography." In Sensor and Ad
Hoc Communications and Networks, 2004. IEEE SECON
2004. 2004 First Annual IEEE Communications Society
Conference on, pp. 71-80. IEEE, 2004.
[14] Arijit Ukil, Jaydip Sen, and Sripad Koilakonda.
"Embedded security for Internet of Things." In Emerging
Trends and Applications in Computer Science
(NCETACS), 2011 2nd National Conference on, pp. 1-6.
IEEE, 2011.
[15] A. V. N. Krishna, S. N. N. Pandit, and A. Vinaya
Babu. "A generalized scheme for data encryption
technique using a randomized matrix key." Journal of
Discrete Mathematical Sciences and Cryptography 10, no.
1 (2007): 73-81.
[16] Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor,
Sudip Sanyal, and Sugata Sanyal. "A Semi-distributed
Reputation Based Intrusion Detection System for Mobile
Adhoc Networks." arXiv preprint arXiv:
1006.1956 (2010).
[17] Jeffrey C. Reynar, and Ziyi Wang. "System and
method for incorporating smart tags in online content."
U.S. Patent 7,003,522, issued February 21, 2006.
[18] Anuj Sehgal. "Using the Contiki Cooja Simulator."
(2013).
[19] Adam Dunkels, Bjorn Gronvall, and Thiemo Voigt.
"Contiki-a lightweight and flexible operating system for
tiny networked sensors." In Local Computer Networks,
2004. 29th Annual IEEE International Conference on, pp.
455-462. IEEE, 2004.
[20] Benny Pinkas, and Tomas Sander. "Securing
passwords against dictionary attacks." In Proceedings of
the 9th ACM conference on Computer and
communications security, pp. 161-170. ACM, 2002.
[21] Lander Casado, and Philippas Tsigas. "Contikisec: A
secure network layer for wireless sensor networks under
the contiki operating system." In Identity and Privacy in
the Internet Age, pp. 133-147. Springer Berlin Heidelberg,
2009.
[22] K. Ganesh, M. Thrivikraman, Joy Kuri, Haresh
Dagale, G. Sudhakar, and Sugata Sanyal. "Implementation
of a real time passenger information system." arXiv
preprint arXiv: 1206.0447 (2012).
[23] Alain Hiltgen, Thorsten Kramp, and Thomas
Weigold. "Secure internet banking
authentication." Security & Privacy, IEEE 4, no. 2 (2006):
21-29.
[24] Emmanuel Baccelli, Oliver Hahm, M. Gunes, M.
Wahlisch, and Thomas C. Schmidt. "RIOT OS: Towards
an OS for the Internet of Things." In Computer
Communications Workshops (INFOCOM WKSHPS), 2013
IEEE Conference on, pp. 79-80. IEEE, 2013.
[25] http://en.wikipedia.org/wiki/FreeRTOS
[26] http://www.freertos.org/
[27] Koustubh Kulkarni, Sudip Sanyal, Hameed Al-
Qaheri, and Sugata Sanyal. "Dynamic Reconfiguration of
Wireless Sensor Networks." IJCSA 6, no. 4 (2009): 16-42.
[28] Ihor Lys, and George G. Mueller. "Smart light bulb."
U.S. Patent 6,528,954, issued March 4, 2003.
[29] https://mbed.org/technology/os/
[30] Sachin Babar, Antonietta Stango, Neeli Prasad,
Jaydip Sen, and Ramjee Prasad. "Proposed embedded
security framework for internet of things (IoT)." In
Wireless Communication, Vehicular Technology,
Information Theory and Aerospace & Electronic Systems
Technology (Wireless VITAE), 2011 2nd International
Conference on, pp. 1-5. IEEE, 2011.
[31] http://www.riot-os.org/
[32] Yongzhong He, and Zhen Han. "User authentication
with provable security against online dictionary
attacks." Journal of Networks 4, no. 3 (2009): 200-207.
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 5 Pages: 2479-2483 (2015) ISSN: 0975-0290
2483
[33] Manoj Rameshchandra Thakur, and Sugata Sanyal.
"A Multi-Dimensional approach towards Intrusion
Detection System." arXiv preprint arXiv:
1205.2340(2012).
[34] Javier López, and Jianying Zhou, eds. Wireless sensor
network security. Vol. 1. IOS Press, 2008.
[35] http://www.contiki-os.org/
[36] Yuri Khidekel, Alex Balashov, and Vladimir
Bashmakov. "Secure transaction system." U.S. Patent
Application 09/792,391, filed February 23, 2001.
[37] Mingbo Xiao, Xudong Wang, and Guangsong Yang.
"Cross-layer design for the security of wireless sensor
networks." In Intelligent Control and Automation, 2006.
WCICA 2006. The Sixth World Congress on, vol. 1, pp.
104-108. IEEE, 2006. Liu, An, Mihui Kim, Leonardo B.
Oliveira, and Hailun Tan. "Wireless Sensor Network
Security." International Journal of Distributed Sensor
Networks 2013 (2013).
[38] http://micrium.com/iot/iot-rtos/
[39] Harshavardhan Kayarkar, and Sugata Sanyal. "A
survey on various data hiding techniques and their
comparative analysis." arXiv preprint arXiv:
1206.1957(2012).
[40] Kresimir Grgic, Drago Zagar, and Visnja Krizanovic.
"Security in IPv6-based wireless sensor network—
Precision agriculture example." In Telecommunications
(ConTEL), 2013 12th International Conference on, pp. 79-
86. IEEE, 2013.
[41] Adrian Perrig, John Stankovic, and David Wagner.
"Security in wireless sensor networks." Communications of
the ACM 47, no. 6 (2004): 53-57.
[42] Sugata Sanyal, Ayu Tiwari, and Sudip Sanyal. "A
multifactor secure authentication system for wireless
payment." In Emergent Web Intelligence: Advanced
Information Retrieval, pp. 341-369. Springer London,
2010.
[43] Anand Eswaran, Anthony Rowe, and Raj Rajkumar.
"Nano-rk: an energy-aware resource-centric rtos for sensor
networks." In Real-Time Systems Symposium, 2005. RTSS
2005. 26th IEEE International, pp. 10-pp. IEEE, 2005.
[44] Chris Karlof, Naveen Sastry, and David Wagner.
"TinySec: a link layer security architecture for wireless
sensor networks." In Proceedings of the 2nd international
conference on Embedded networked sensor systems, pp.
162-175. ACM, 2004.
[45] Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal;
“Sleep Deprivation Attack in Wireless Sensor Network”:
International Journal of Computer Applications, Volume
40,Number 15, pp.19-25, February 2012, ISBN: 978-93-
80866-55-8, Published by Foundation of Computer
Science, New York, USA, DOI: 10.5120/5056-7374.
Biographies and Photographs
Tuhin Borgohain is a 3rd
Year student of
Assam Engineering College, Guwahati. He
is presently pursuing his Bachelor of
Engineering degree in the department of
Instrumentation Engineering.
Uday Kumar is working as Delivery
Manager at Tech Mahindra Ltd, India. He
has 17 years of experience in engineering
large complex software system for
customers like Citibank, FIFA, Apple
Smart objects and AT&T. He has developed products in
BI, performance testing, compilers. And have successfully
led projects in finance, content management and
ecommerce domain. He has participated in many campus
connect program and conducted workshop on software
security, skills improvement for industrial strength
programming, evangelizing tools and methodology for
secure and high end programming.
Sugata Sanyal is presently acting as a
Research Advisor to the Corporate
Technology Office, Tata Consultancy
Services, India. He was with the Tata
Institute of Fundamental Research till
July, 2012. Prof. Sanyal is a:
Distinguished Scientific Consultant to
the International Research Group: Study of Intelligence of
Biological and Artificial Complex System, Bucharest,
Romania; Member, "Brain Trust," an advisory group to
faculty members at the School of Computing and
Informatics, University of Louisiana at Lafayette's Ray P.
Authement College of Sciences, USA; an honorary
professor in IIT Guwahati and Member, Senate, Indian
Institute of Guwahati, India. Prof. Sanyal has published
many research papers in international journals and in
International Conferences worldwide: topics ranging from
network security to intrusion detection system and more.

More Related Content

What's hot

Mainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT PlatformMainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT PlatformSasa Klopanovic
 
Embedded system & IoT Course | certification Program | Learn and Build
Embedded system & IoT Course | certification Program | Learn and BuildEmbedded system & IoT Course | certification Program | Learn and Build
Embedded system & IoT Course | certification Program | Learn and BuildLearn and Build
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]Ian Skerrett
 
Null mumbai-iot-workshop
Null mumbai-iot-workshopNull mumbai-iot-workshop
Null mumbai-iot-workshopNitesh Malviya
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemKaspersky Lab
 
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh OjhaKazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh OjhaYogesh Ojha
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveChuck Petras
 
An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systemsAugusto Ciuffoletti
 
Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologiesusman sarwar
 
3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions3 Software Stacks for IoT Solutions
3 Software Stacks for IoT SolutionsIan Skerrett
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSanjayKumarYadav58
 
Using FIWARE and Microsoft Azure for the development of IoT solutions
Using FIWARE and Microsoft Azure for the development of IoT solutionsUsing FIWARE and Microsoft Azure for the development of IoT solutions
Using FIWARE and Microsoft Azure for the development of IoT solutionsDunavNET
 
Intel IPSO/6LoWPAN solution for general wireless sensor network
Intel IPSO/6LoWPAN solution for general wireless sensor network Intel IPSO/6LoWPAN solution for general wireless sensor network
Intel IPSO/6LoWPAN solution for general wireless sensor network usman sarwar
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesThe IOT Academy
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of ThingsRishabh Sharma
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Thingsrjain51
 
Internet of things - The Present & The Future
Internet of things - The Present & The FutureInternet of things - The Present & The Future
Internet of things - The Present & The Futureiotians
 

What's hot (20)

Mainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT PlatformMainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT Platform
 
Embedded system & IoT Course | certification Program | Learn and Build
Embedded system & IoT Course | certification Program | Learn and BuildEmbedded system & IoT Course | certification Program | Learn and Build
Embedded system & IoT Course | certification Program | Learn and Build
 
IOT beginnners
IOT beginnnersIOT beginnners
IOT beginnners
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]
 
Null mumbai-iot-workshop
Null mumbai-iot-workshopNull mumbai-iot-workshop
Null mumbai-iot-workshop
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh OjhaKazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
 
An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systems
 
Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologies
 
3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 
IoT : Whats in it for me?
IoT : Whats in it for me? IoT : Whats in it for me?
IoT : Whats in it for me?
 
Using FIWARE and Microsoft Azure for the development of IoT solutions
Using FIWARE and Microsoft Azure for the development of IoT solutionsUsing FIWARE and Microsoft Azure for the development of IoT solutions
Using FIWARE and Microsoft Azure for the development of IoT solutions
 
Intel IPSO/6LoWPAN solution for general wireless sensor network
Intel IPSO/6LoWPAN solution for general wireless sensor network Intel IPSO/6LoWPAN solution for general wireless sensor network
Intel IPSO/6LoWPAN solution for general wireless sensor network
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
 
Internet of things - The Present & The Future
Internet of things - The Present & The FutureInternet of things - The Present & The Future
Internet of things - The Present & The Future
 

Viewers also liked

Power Aware Routing in Adhoc Networks
Power Aware Routing in Adhoc NetworksPower Aware Routing in Adhoc Networks
Power Aware Routing in Adhoc NetworksPradeep Kumar TS
 
Evaluation in higher education
Evaluation in higher educationEvaluation in higher education
Evaluation in higher educationPradeep Kumar TS
 
Software Defined Networking - 3
Software Defined Networking - 3Software Defined Networking - 3
Software Defined Networking - 3Pradeep Kumar TS
 
Energy efficient multicasting protocol
Energy efficient multicasting protocolEnergy efficient multicasting protocol
Energy efficient multicasting protocolPradeep Kumar TS
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
 
issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocolsPradeep Kumar TS
 
Software Defined Networking - 1
Software Defined Networking - 1Software Defined Networking - 1
Software Defined Networking - 1Pradeep Kumar TS
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksPradeep Kumar TS
 
Software Defined Networking - 2
Software Defined Networking - 2Software Defined Networking - 2
Software Defined Networking - 2Pradeep Kumar TS
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksPradeep Kumar TS
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Challenges in Embedded Computing
Challenges in Embedded ComputingChallenges in Embedded Computing
Challenges in Embedded ComputingPradeep Kumar TS
 
Virtual classrooms and labs using Big Blue Button
Virtual classrooms and labs using Big Blue ButtonVirtual classrooms and labs using Big Blue Button
Virtual classrooms and labs using Big Blue ButtonPradeep Kumar TS
 
MicroEJ OS and Edje: the software foundation for IoT devices
MicroEJ OS and Edje: the software foundation for IoT devicesMicroEJ OS and Edje: the software foundation for IoT devices
MicroEJ OS and Edje: the software foundation for IoT devicesMicroEJ
 
Why the Need for Special Operating Systems for IoT and Wearable Devices?
Why the Need for Special Operating Systems for IoT and Wearable Devices?Why the Need for Special Operating Systems for IoT and Wearable Devices?
Why the Need for Special Operating Systems for IoT and Wearable Devices?MicroEJ
 

Viewers also liked (20)

Operating System fo IoT
Operating System fo IoTOperating System fo IoT
Operating System fo IoT
 
packet radio networks
packet radio networkspacket radio networks
packet radio networks
 
Power Aware Routing in Adhoc Networks
Power Aware Routing in Adhoc NetworksPower Aware Routing in Adhoc Networks
Power Aware Routing in Adhoc Networks
 
Evaluation in higher education
Evaluation in higher educationEvaluation in higher education
Evaluation in higher education
 
Software Defined Networking - 3
Software Defined Networking - 3Software Defined Networking - 3
Software Defined Networking - 3
 
Energy efficient multicasting protocol
Energy efficient multicasting protocolEnergy efficient multicasting protocol
Energy efficient multicasting protocol
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 
issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocols
 
Software Defined Networking - 1
Software Defined Networking - 1Software Defined Networking - 1
Software Defined Networking - 1
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
Introduction to MANETs
Introduction to MANETsIntroduction to MANETs
Introduction to MANETs
 
Software Defined Networking - 2
Software Defined Networking - 2Software Defined Networking - 2
Software Defined Networking - 2
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Challenges in Embedded Computing
Challenges in Embedded ComputingChallenges in Embedded Computing
Challenges in Embedded Computing
 
Virtual classrooms and labs using Big Blue Button
Virtual classrooms and labs using Big Blue ButtonVirtual classrooms and labs using Big Blue Button
Virtual classrooms and labs using Big Blue Button
 
MicroEJ OS and Edje: the software foundation for IoT devices
MicroEJ OS and Edje: the software foundation for IoT devicesMicroEJ OS and Edje: the software foundation for IoT devices
MicroEJ OS and Edje: the software foundation for IoT devices
 
Why the Need for Special Operating Systems for IoT and Wearable Devices?
Why the Need for Special Operating Systems for IoT and Wearable Devices?Why the Need for Special Operating Systems for IoT and Wearable Devices?
Why the Need for Special Operating Systems for IoT and Wearable Devices?
 
Tracing and awk in ns2
Tracing and awk in ns2Tracing and awk in ns2
Tracing and awk in ns2
 

Similar to Survey of Operating Systems for the IoT Environment

IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
 
IRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET Journal
 
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...IRJET Journal
 
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET Journal
 
IRJET- IoT Based Swachch Bharat Abhiyan
IRJET-	 IoT Based Swachch Bharat AbhiyanIRJET-	 IoT Based Swachch Bharat Abhiyan
IRJET- IoT Based Swachch Bharat AbhiyanIRJET Journal
 
Review on Smart Manufacturing Based on IoT: An Industrial Application
Review on Smart Manufacturing Based on IoT: An Industrial ApplicationReview on Smart Manufacturing Based on IoT: An Industrial Application
Review on Smart Manufacturing Based on IoT: An Industrial ApplicationIRJET Journal
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
A Survey Embedded Systems Supporting By Different Operating Systems.pdf
A Survey   Embedded Systems Supporting By Different Operating Systems.pdfA Survey   Embedded Systems Supporting By Different Operating Systems.pdf
A Survey Embedded Systems Supporting By Different Operating Systems.pdfFiona Phillips
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTForescout Technologies Inc
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMS
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMSSTUDY OF VARIOUS INTERNET OF THINGS PLATFORMS
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMSIJCSES Journal
 
Internet Of Things: Architecture,Issues and Applications
Internet Of Things: Architecture,Issues and ApplicationsInternet Of Things: Architecture,Issues and Applications
Internet Of Things: Architecture,Issues and ApplicationsIJERA Editor
 
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...Springer
 
Architectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platformArchitectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platformTELKOMNIKA JOURNAL
 
IRJET - Mirroring of Source and Sink Devices in Android Screen Casting
IRJET - Mirroring of Source and Sink Devices in Android Screen CastingIRJET - Mirroring of Source and Sink Devices in Android Screen Casting
IRJET - Mirroring of Source and Sink Devices in Android Screen CastingIRJET Journal
 
Iot presentation
Iot presentationIot presentation
Iot presentationhuma742446
 
Controlling Home Appliances by using Universal Remote Control System (IoT and...
Controlling Home Appliances by using Universal Remote Control System (IoT and...Controlling Home Appliances by using Universal Remote Control System (IoT and...
Controlling Home Appliances by using Universal Remote Control System (IoT and...IRJET Journal
 

Similar to Survey of Operating Systems for the IoT Environment (20)

IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
 
IRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of Things
 
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...
DEVELOPMENT AND IMPLEMENTATION OF LOW COST IIOT GATEWAY WITH EDGE COMPUTING F...
 
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
 
IRJET- IoT Based Swachch Bharat Abhiyan
IRJET-	 IoT Based Swachch Bharat AbhiyanIRJET-	 IoT Based Swachch Bharat Abhiyan
IRJET- IoT Based Swachch Bharat Abhiyan
 
Review on Smart Manufacturing Based on IoT: An Industrial Application
Review on Smart Manufacturing Based on IoT: An Industrial ApplicationReview on Smart Manufacturing Based on IoT: An Industrial Application
Review on Smart Manufacturing Based on IoT: An Industrial Application
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
A Survey Embedded Systems Supporting By Different Operating Systems.pdf
A Survey   Embedded Systems Supporting By Different Operating Systems.pdfA Survey   Embedded Systems Supporting By Different Operating Systems.pdf
A Survey Embedded Systems Supporting By Different Operating Systems.pdf
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMS
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMSSTUDY OF VARIOUS INTERNET OF THINGS PLATFORMS
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMS
 
Internet Of Things: Architecture,Issues and Applications
Internet Of Things: Architecture,Issues and ApplicationsInternet Of Things: Architecture,Issues and Applications
Internet Of Things: Architecture,Issues and Applications
 
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
 
Architectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platformArchitectural design of IoT-cloud computing integration platform
Architectural design of IoT-cloud computing integration platform
 
IRJET - Mirroring of Source and Sink Devices in Android Screen Casting
IRJET - Mirroring of Source and Sink Devices in Android Screen CastingIRJET - Mirroring of Source and Sink Devices in Android Screen Casting
IRJET - Mirroring of Source and Sink Devices in Android Screen Casting
 
Iot presentation
Iot presentationIot presentation
Iot presentation
 
Controlling Home Appliances by using Universal Remote Control System (IoT and...
Controlling Home Appliances by using Universal Remote Control System (IoT and...Controlling Home Appliances by using Universal Remote Control System (IoT and...
Controlling Home Appliances by using Universal Remote Control System (IoT and...
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Survey of Operating Systems for the IoT Environment

  • 1. Int. J. Advanced Networking and Applications Volume: 6 Issue: 5 Pages: 2479-2483 (2015) ISSN: 0975-0290 2479 Survey of Operating Systems for the IoT Environment Tuhin Borgohain* Department of Instrumentation Engineering, Assam Engineering College, Guwahati, India Email: borgohain.tuhin@gmail.com Uday Kumar Tech Mahindra Limited, Chennai, India Email: udaykumar@techmahindra.com Sugata Sanyal Corporate Technology Office, Tata Consultancy Services, Mumbai, India Email: sugata.sanyal@tcs.com *Corresponding Author ----------------------------------------------------------------------ABSTRACT---------------------------------------------------------- This paper is a comprehensive survey of the various operating systems available for the Internet of Things environment. At first the paper introduces the various aspects of the operating systems designed for the IoT environment where resource constraint poses a huge problem for the operation of the general OS designed for the various computing devices. The latter part of the paper describes the various OS available for the resource constraint IoT environment along with the various platforms each OS supports, the software development kits available for the development of applications in the respective OS’es along with the various protocols implemented in these OS’es for the purpose of communication and networking. Keywords –IDE, IP, SDK, WSN, IoT. ----------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: April 10, 2015 Date of Acceptance: April 11, 2015 ----------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION he whole Internet of Things environment is based on the application of microprocessors and wireless sensors. The resource constraint environment of these microprocessors and sensors makes the use of regular OS’es meaningless due to their high resource and computing power requirement. Thus, in such a situation, the development of OS’es meeting the resource constraint demand of the IoT environment becomes necessary. II. OVERVIEW In section III the paper introduces the various aspects of an OS designed for the IoT environment. In section IV, the various OS’es available for running in the IoT environment along with a list of the supporting platforms, SDKs and the various networking and communication protocols implemented are surveyed. The paper is concluded in section V. III. INTRODUCTION TO OS FOR THE IOT ENVIRONMENT The whole integration of the various IoT devices to the various objects is made possible through the interaction of software at a dynamic level along with the use of wireless sensor network and RFID technologies using the internet infrastructure ([1], [6]). This software interaction is made possible through the operating system running behind the scene within each IoT device without which an IoT device would be nothing more than a non-functioning device. The flexible features of the various operating systems of an IoT device has facilitated some interesting integration of electronic products and technologies to the daily processes of an individual thus making the processes a whole lot easier to use and access. Some out of the multitudes of IoT technology integration and innovations are smart light bulb ([28]), implementation of real time passenger information system ([22]), smart tags/NFC tags ([17]) etc. The OS’es developed for the IoT environment require very few kilobytes of RAM as well as operate with low power consumption. Moreover they are specifically designed and optimized for a particular set of microprocessor-based platforms beyond which such OS’es becomes irrelevant in its application ([38]). These OS’es do not compromise in terms of features relating to communication, networking, security etc. as compared to the regular OS’es like Windows OS, Mac OS etc. but comes built-in with a number of pre-installed, pre- integrated applications, drivers and other network protocols. Moreover these OS’es employ a number of unique security measures for enhancing the IoT T
  • 2. Int. J. Advanced Networking and Applications Volume: 6 Issue: 5 Pages: 2479-2483 (2015) ISSN: 0975-0290 2480 infrastructure as a whole and to avoid the compromise of the stability and usability of the OS. Though the security issues of the OS’es for the IoT environment are quite different in comparison to the security issues of a regular operating system, yet it still retains the standard security protocols for protecting itself against unwanted attacks. Now the IoT environment is made in such a way so as to carry out information exchange between the various electronic devices over the internet in the most efficient way possible using the lowest amount of resources. As such the whole IoT environment along with its OS becomes prone to malicious attack from the third party intruders. So the successful implementation of various encryption and data hiding techniques ([4], [5], [12], [15], [39]), intrusion detection systems ([16], [33]) etc. in the IoT infrastructure takes a paramount importance. [45] takes care of sleep deprivation attack blockage on IoT elements, to preserve their already fragile power resources. IV. OS’ES i. mbed: Developed by ARM in collaboration with its technological partners, mbed OS is developed for 32-bit ARM Cortex-M microcontrollers ([29]). The whole OS is written using C and C++ language. This open source OS is licensed under Apache License 2.0. The software development kit (SDK) for mbed OS provides the software framework for the developers to develop various microcontroller firmwares to be run on IoT devices. These SDK is comprised of core libraries which consist of the following components given in Table 1: Networ king Test scripts Microcontroller peripheral drivers RTOS and runtime environm ent Build Tools Debug Scripts Table 1: Core libraries in mbed OS The applications for mbed OS can only be developed online using its native online code editor cum compiler known as mbed online integrated development environments (IDEs). While writing of code can only be done through a web browser, its compilation is done by the ARMCC C/C++ compiler in the cloud. In the connectivity front, the mbed OS support the following connectivity technologies given in Table 2: Bluetooth Low Energy Wi-fi Zigbee IP Zigbee LAN Cellular Ethernet 6LoWPAN Table 2: Connectivity technologies in mbed OS mbed OS integrates end-to-end IP security (IPv4 and IPv6) through TLS and DTLS in its comm. channels for increased security of the whole OS environment. Moreover for management of various devices in its environment, mbed OS uses OMA Lightweight M2M protocol. ii. RIOT: Developed by INRIA, HAW Hamburg and FU Berlin initially, RIOT OS is compatible with ARM Cortex-M3, ARM Cortex-M4, ARM7, AVR Atmega and TI MSP430 devices ([8], [24], [31]). Developed using C and C++, this open source OS is licensed under LGPL v2.1. The SDKs available for development of applications in RIOT OS are gcc, valgrind and gdb. Moreover the SDK framework supports application programming in C and C++. RIOT OS supports all the major communication and networking protocols which are tabulated in Table 3: IPv6 6LoWPAN RPL CoAP UDP TCP CBOR CCN-lite OpenWSN UBJSON Table 3: Networking protocols in RIOT OS iii.Contiki: Created by Adam Dunkels and further developed by people from various organisations and institutions like Atmel, Cisco, ENEA, SAP, Sensinode, Oxford University etc. ([3], [19], [35]), the Contiki OS is aimed to be used in various microcontroller devices which are tabulated in Table 4: Atmel ARM Atmel AVR STM32w TI MSP430 TI CC2430 TI CC2538 TI CC2630 TI CC2650 LPC2103 Freescale MC1322 4 Microchip dsPIC Microchip PIC32 Table 4: Microcontroller devices running on Contiki OS This open source OS is licensed under BSD License. The programming model of the Contiki OS is based on protothreads for efficient operation in resource- constrained environment. The Contiki OS features Cooja, a network simulator which simulates Contiki nodes ([18]). These Contiki nodes are of three types: a. Emulated nodes b. Cooja nodes c. Java nodes The various networking protocols supported by Contiki OS are given in Table 5: CoAP 6LoWPAN RPL Table 5: Networking protocols in Contiki OS
  • 3. Int. J. Advanced Networking and Applications Volume: 6 Issue: 5 Pages: 2479-2483 (2015) ISSN: 0975-0290 2481 The Contiki environment is generally made secure through the implementation of ContikiSec ([21]) and through the implementation of TLS/DTLS ([9]). iv. TinyOS: Developed by TinyOS Alliance, this open source OS is mainly developed for wireless sensor networks ([2], [7]). It is written in nesC and is licensed under BSD License. The SDK for application development for TinyOS is comprised of the following three IDEs: a. TinyDT b. TinyOS Eclipse Plugin “YETI 2” c. TinyOS Eclipse Editor Plugin The various communications and network protocols implemented in the TinyOS are given in Table 5: Broadcast based Routing Probabilistic Routing Multi-Path Routing Geographical Routing Reliability based Routing TDMA based Routing Directed Diffusion Table 5: Communication and networking protocols in TinyOS The whole architecture of the TinyOS has been made secure over the years with the implementation of TinySec ([44]) and various types of embedded security layers ([13], [14], [30], [40]). v. Nano-RK: Developed at Carnegie Mellon University by Alexei Colin, Christopher Palmer and Artur Balanuta, Nano-RK is specifically targeted for running in microcontrollers (presently runs on MicaZ motes and FireFly Sensor Networking Platform) to be used in wireless sensor networks. Nano-RK OS is written in C language and is open source ([10], [43]). The application development of Nano-RK OS is supported by the Eclipse IDE. The communications within the OS is carried out with the help of the following protocols given in Table 6: RT- Link PCF TDMA b-mac U-Connect WiDom Table 6: Communication protocols implemented in Nano-RK vi. FreeRTOS: Developed by Real Time Engineers Ltd., the FreeRTOS is developed for platforms listed in Table 7: ARM7 ARM9 ARM Cortex- M3 ARM Cortex-M4 ARM Cortex-A RM4x TMS57 0 Cortex-R4 Atmel AVR AVR32 HCS12 Altera Nios II MicroBlaze Cortus APS1 Cortus APS3 Cortus APS3R Cortus APS5 Cortus FPF3 Cortus FPS6 Cortus FPS8 Fujitsu MB91460 series Fujitsu MB9634 0 series Coldfire V850 78K0R Renesas H8/S MSP430 8052 X86 RX SuperH PIC Atmel SAM3 Atmel SAM4 Atmel SAM7 Atmel SAM9 Table 7: Platforms supporting FreeRTOS Written mostly in C with the addition of a few assembly functions, this open source OS is licensed under Modified GPL ([25], [26]). The application development part for FreeRTOS is handled through multiple threads, software timers and semaphores along with a tick-less mode for low consumption of resources by the running of the various applications. V. CONCLUSION From the above survey it can be seen that all the OS’es for the IoT environment are well equipped with all the major networking and communication protocols, security features as well as optimized for efficient usage of computing power in a resource constraint environment. Yet the additional implementation of counter measures to online dictionary attacks ([11], [20], [32]) in the internet infrastructure used by the IoT environment with the additional emphasis on developing a more robust wireless sensor network ([27], [34], [37], [41]) will contribute to the protection of user’s credentials during online transactions ([23], [36], [42]) logging inside one’s personal account in the cloudand will make the whole IoT environment much secure and more reliable. REFERENCES [1] Hermann Kopetz. "Internet of things." In Real-time systems, pp. 307-323. Springer US, 2011. [2] http://en.wikipedia.org/wiki/TinyOS [3] Adam Dunkels, Oliver Schmidt, Niclas Finne, Joakim Eriksson, Fredrik Österlind, Nicolas Tsiftesand Mathilde Durvy. "The Contiki OS: The Operating System for the Internet of Things." (2011). [4] Sandipan Dey, Ajith Abraham, and Sugata Sanyal. "An LSB Data Hiding Technique Using Natural Number Decomposition." In Intelligent Information Hiding and Multimedia Signal Processing, 2007. IIHMSP 2007. Third International Conference on, vol. 2, pp. 473-476. IEEE, 2007.
  • 4. Int. J. Advanced Networking and Applications Volume: 6 Issue: 5 Pages: 2479-2483 (2015) ISSN: 0975-0290 2482 [5] Philip P. Dang, Paul M. Chau. "Image encryption for secure internet multimedia applications." Consumer Electronics, IEEE Transactions on 46, no. 3 (2000): 395- 403. [6] Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic and Marimuthu Palaniswami. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future Generation Computer Systems 29, no. 7 (2013): 1645-1660. [7] Philip Levis, Sam Madden, Joseph Polastre, Robert Szewczyk, Kamin Whitehouse, Alec Woo, David Gay, Jason Hill, Matt Welsh, Eric Brewer and David Culler. "TinyOS: An operating system for sensor networks." In Ambient intelligence, pp. 115-148. Springer Berlin Heidelberg, 2005. [8] https://github.com/RIOT-OS/RIOT [9] Vladislav Perelman. "Security in IPv6-enabled wireless sensor networks: An implementation of TLS/DTLS for the Contiki operating system." PhD diss., MSc Thesis, Jacobs University Bremen, 2012. [10] http://www.nanork.org/projects/nanork/wiki [11] Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, and Sugata Sanyal. "A new protocol to counter online dictionary attacks” Computers &Security, 25, no. 2 (2006): 114-120. [12] Chi-Kwong Chan, Lee-Ming Cheng. "Hiding data in images by simple LSB substitution." Pattern recognition 37, no. 3 (2004): 469-474. [13] David J. Malan, Matt Welsh, and Michael D. Smith. "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography." In Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004. 2004 First Annual IEEE Communications Society Conference on, pp. 71-80. IEEE, 2004. [14] Arijit Ukil, Jaydip Sen, and Sripad Koilakonda. "Embedded security for Internet of Things." In Emerging Trends and Applications in Computer Science (NCETACS), 2011 2nd National Conference on, pp. 1-6. IEEE, 2011. [15] A. V. N. Krishna, S. N. N. Pandit, and A. Vinaya Babu. "A generalized scheme for data encryption technique using a randomized matrix key." Journal of Discrete Mathematical Sciences and Cryptography 10, no. 1 (2007): 73-81. [16] Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sudip Sanyal, and Sugata Sanyal. "A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks." arXiv preprint arXiv: 1006.1956 (2010). [17] Jeffrey C. Reynar, and Ziyi Wang. "System and method for incorporating smart tags in online content." U.S. Patent 7,003,522, issued February 21, 2006. [18] Anuj Sehgal. "Using the Contiki Cooja Simulator." (2013). [19] Adam Dunkels, Bjorn Gronvall, and Thiemo Voigt. "Contiki-a lightweight and flexible operating system for tiny networked sensors." In Local Computer Networks, 2004. 29th Annual IEEE International Conference on, pp. 455-462. IEEE, 2004. [20] Benny Pinkas, and Tomas Sander. "Securing passwords against dictionary attacks." In Proceedings of the 9th ACM conference on Computer and communications security, pp. 161-170. ACM, 2002. [21] Lander Casado, and Philippas Tsigas. "Contikisec: A secure network layer for wireless sensor networks under the contiki operating system." In Identity and Privacy in the Internet Age, pp. 133-147. Springer Berlin Heidelberg, 2009. [22] K. Ganesh, M. Thrivikraman, Joy Kuri, Haresh Dagale, G. Sudhakar, and Sugata Sanyal. "Implementation of a real time passenger information system." arXiv preprint arXiv: 1206.0447 (2012). [23] Alain Hiltgen, Thorsten Kramp, and Thomas Weigold. "Secure internet banking authentication." Security & Privacy, IEEE 4, no. 2 (2006): 21-29. [24] Emmanuel Baccelli, Oliver Hahm, M. Gunes, M. Wahlisch, and Thomas C. Schmidt. "RIOT OS: Towards an OS for the Internet of Things." In Computer Communications Workshops (INFOCOM WKSHPS), 2013 IEEE Conference on, pp. 79-80. IEEE, 2013. [25] http://en.wikipedia.org/wiki/FreeRTOS [26] http://www.freertos.org/ [27] Koustubh Kulkarni, Sudip Sanyal, Hameed Al- Qaheri, and Sugata Sanyal. "Dynamic Reconfiguration of Wireless Sensor Networks." IJCSA 6, no. 4 (2009): 16-42. [28] Ihor Lys, and George G. Mueller. "Smart light bulb." U.S. Patent 6,528,954, issued March 4, 2003. [29] https://mbed.org/technology/os/ [30] Sachin Babar, Antonietta Stango, Neeli Prasad, Jaydip Sen, and Ramjee Prasad. "Proposed embedded security framework for internet of things (IoT)." In Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on, pp. 1-5. IEEE, 2011. [31] http://www.riot-os.org/ [32] Yongzhong He, and Zhen Han. "User authentication with provable security against online dictionary attacks." Journal of Networks 4, no. 3 (2009): 200-207.
  • 5. Int. J. Advanced Networking and Applications Volume: 6 Issue: 5 Pages: 2479-2483 (2015) ISSN: 0975-0290 2483 [33] Manoj Rameshchandra Thakur, and Sugata Sanyal. "A Multi-Dimensional approach towards Intrusion Detection System." arXiv preprint arXiv: 1205.2340(2012). [34] Javier López, and Jianying Zhou, eds. Wireless sensor network security. Vol. 1. IOS Press, 2008. [35] http://www.contiki-os.org/ [36] Yuri Khidekel, Alex Balashov, and Vladimir Bashmakov. "Secure transaction system." U.S. Patent Application 09/792,391, filed February 23, 2001. [37] Mingbo Xiao, Xudong Wang, and Guangsong Yang. "Cross-layer design for the security of wireless sensor networks." In Intelligent Control and Automation, 2006. WCICA 2006. The Sixth World Congress on, vol. 1, pp. 104-108. IEEE, 2006. Liu, An, Mihui Kim, Leonardo B. Oliveira, and Hailun Tan. "Wireless Sensor Network Security." International Journal of Distributed Sensor Networks 2013 (2013). [38] http://micrium.com/iot/iot-rtos/ [39] Harshavardhan Kayarkar, and Sugata Sanyal. "A survey on various data hiding techniques and their comparative analysis." arXiv preprint arXiv: 1206.1957(2012). [40] Kresimir Grgic, Drago Zagar, and Visnja Krizanovic. "Security in IPv6-based wireless sensor network— Precision agriculture example." In Telecommunications (ConTEL), 2013 12th International Conference on, pp. 79- 86. IEEE, 2013. [41] Adrian Perrig, John Stankovic, and David Wagner. "Security in wireless sensor networks." Communications of the ACM 47, no. 6 (2004): 53-57. [42] Sugata Sanyal, Ayu Tiwari, and Sudip Sanyal. "A multifactor secure authentication system for wireless payment." In Emergent Web Intelligence: Advanced Information Retrieval, pp. 341-369. Springer London, 2010. [43] Anand Eswaran, Anthony Rowe, and Raj Rajkumar. "Nano-rk: an energy-aware resource-centric rtos for sensor networks." In Real-Time Systems Symposium, 2005. RTSS 2005. 26th IEEE International, pp. 10-pp. IEEE, 2005. [44] Chris Karlof, Naveen Sastry, and David Wagner. "TinySec: a link layer security architecture for wireless sensor networks." In Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 162-175. ACM, 2004. [45] Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal; “Sleep Deprivation Attack in Wireless Sensor Network”: International Journal of Computer Applications, Volume 40,Number 15, pp.19-25, February 2012, ISBN: 978-93- 80866-55-8, Published by Foundation of Computer Science, New York, USA, DOI: 10.5120/5056-7374. Biographies and Photographs Tuhin Borgohain is a 3rd Year student of Assam Engineering College, Guwahati. He is presently pursuing his Bachelor of Engineering degree in the department of Instrumentation Engineering. Uday Kumar is working as Delivery Manager at Tech Mahindra Ltd, India. He has 17 years of experience in engineering large complex software system for customers like Citibank, FIFA, Apple Smart objects and AT&T. He has developed products in BI, performance testing, compilers. And have successfully led projects in finance, content management and ecommerce domain. He has participated in many campus connect program and conducted workshop on software security, skills improvement for industrial strength programming, evangelizing tools and methodology for secure and high end programming. Sugata Sanyal is presently acting as a Research Advisor to the Corporate Technology Office, Tata Consultancy Services, India. He was with the Tata Institute of Fundamental Research till July, 2012. Prof. Sanyal is a: Distinguished Scientific Consultant to the International Research Group: Study of Intelligence of Biological and Artificial Complex System, Bucharest, Romania; Member, "Brain Trust," an advisory group to faculty members at the School of Computing and Informatics, University of Louisiana at Lafayette's Ray P. Authement College of Sciences, USA; an honorary professor in IIT Guwahati and Member, Senate, Indian Institute of Guwahati, India. Prof. Sanyal has published many research papers in international journals and in International Conferences worldwide: topics ranging from network security to intrusion detection system and more.