IIREF

List of Expert Meetings/Brainstorming Sessions


Impact of 5G on Internet

Date :29th August, 2019

Location :The Chancery Pavilion,Bengaluru

Abstract :

The world is moving towards the 5th Generation of the communication network, which offers tremendously high speeds of connectivity. (5G is expected to be of 100 times faster than the current levels.) The high speed connectivity of 5G is expected to open up a new gamut of Internet applications, including Healthcare, Manufacturing, operating large / complex machinery remotely, and the potential to play a significant role in Smart Cities etc.. However these applications would require new protocols and algorithms. Considering 5G in conjunction with the growing number of IoT devices in the communication ecosystem, this discussion looks at the following pointers.





Re-de-centralization of Internet

Date :6th June, 2019

Location :Hotel Radisson ,Hitec City(Hyderabad)

Abstract :

The core technologies powering the Internet were all designed to operate in a distributed and decentralized manner. As the Internet grew with applications, devices and users over time, things tend to become centralized. The emergence of Blockchain has spawned out a new era of decentralization and will surely have its impact on the Internet. The emerging trends of DAPPS (Distributed Applications) coupled with the need for privacy and security would drive the future architectural evolution of Internet. The demand to get control of your own data, and the ability to move it swiftly from one application (platform) to another of your choice would usher in the re-decentralization of Internet. Following are some of the lead points in which the discussion would be structured.

Proceedings

  • Mr. Vineet Shukla
    "Regulations alone can help to keep the user data safe from the tech giants; Blockchain will require expensive setup and energy"
  • Mr. Kumar Ashutosh
    "Decentralization is a key to blockchain technology."
  • Prof. Ashutosh Saxena
    "Sanity checks for making the standards should have the comfort level for the Decentralization."
  • Mr. Samiran Gupta
    "Blockchain is truly an exciting & emerging technology for Decentralization of the Internet space."
  • Mr. Adarsh B U
    "The Emerging Internet Protocol Stack for Decentralization will open up interesting applications ."
  • Mr. A P Raju
    "An additional security layer should be created to protect the data that produced in a decentralized application."
  • Mr. C Subbarayudu
    "DNS is a very critical infrastructure requiring re-decentralization."
  • Mr. K Mohan Raidu
    "Blockchain has created a huge requirement for re-architecting the application infrastructure ."
  • Dr. Balaji Rajendran
    "Trade-off for decentralization (vs Centralization) needs to be valued in terms of security and Privacy."
  • Mr. Anoop Kumar Pandey
    "A decentralized Internet just requires depolarization of app providers."
  • Mr. Jitendra Kumar
    "Blockchain based decentralization is energy hungry and do have security issues."






Next Generation Internet Protocols

Date :18th September, 2018

Location :The Emerald Hotel & Suites,Mumbai

Abstract :

Internet has been the catalyst for ushering in the digital revolution, since it was opened up for wide-scale public use in the early 90s. Its impact can just be highlighted by the fact, that it has reshaped the economy of many nations, both small and big, developed and developing worlds.

Decades later, Internet is still running strong largely with the same set of core protocols, that were originally designed and implemented at its beginning. This speaks volumes about the design principles behind those protocols.

Currently we are at an interesting phase, where billions of devices are expected to be on the Internet along with couple of more billions of users to be added - all within a decade. As the 'net' expands its obvious that crimes too - minor to major - get shifted to the new connected world, paving the way for regulations and governance as the norm.

It is at this juncture, that we need to thoughtfully look at how the next generation protocols are shaping up, echoing the same design principles that brought us here, and taking into consideration of safety and freedom of our next generation.

Following is the illustration of the legacy vs current Internet protocols, leading us to discuss about the next-generation. Few questions that emerge are:

Proceedings

  • Mr. Anil Garg
    "Identity is critical for establishing trustable devices."
  • Mr. Anil Gupta
    "Procedures for collecting information, and monitoring them for certain variables can go a long way for assuring trust"
  • Prof. Manjunath
    "A technical framework for testing and evaluation of IoT devices should be in place."
  • Mr. Ronak Sutaria
    "Maximization of performance and facilities of technology will adversely affect the Security."
  • Mr. Shailesh Gupta
    "Rigorous testing of Embedded systems should be carried out."
  • Mr. Subhankar Mishra
    "The product should be certified under the common criteria like Security, Trust by the third party vendors, before it's going to be used."
  • Mr. Vikas C. Roy
    "Security in layers is the way to go! The entire flow from Bootstrapping to UICC to device to service management should be secured"
  • Dr. Zia Saquib
    "Privacy and Security can assure Trust"
  • Mr. Dittin Andrews
    "Bugs create vulnerabilities and are responsible for attacks. Security also depends on how a product is being used, and for what?"
  • Dr. Kumari Roshni
    "Mathematics is the root of everything, it can do a lot in the field of Security and Trust."
  • Dr. Balaji Rajendran
    "Social engineering is a popular tactic to exploit users' weaknesses than it is to find a network or software vulnerability."






Security for Billions: Users and their Devices

Date :21st May, 2018

Location :Hotel Ramada Egmore, Chennai

Abstract :

As the devices and users operate over the Internet, the security standards evolved should be global and scalable to billions. As a nation of billion people and having a significant lead in IT space, it is time to ponder over the large looming security threats, and join the world forums in bringing out the desired level of assurance of security. These standards need to be evolved with all aspects in mind - technical, legal, and ofcourse ethical. The objective of this session is to brainstorm for ideas and solutions to the following challenges:

As a step towards achieving wider participation from the Indian community, C-DAC Bangalore is organizing this forum, for experts from various domains of Internet Security to discuss and debate and take forward the process of protocol development, and also to serve as an initiator to the interested participants.

Proceedings

  • Prof. R Ramanujam (Professor, IMSC)
    "Identity is critical for establishing trustable devices."
  • Mr. Neelanarayanan V (Associate Professor, VIT Chennai)
    "Procedures for collecting information, and monitoring them for certain variables can go a long way for assuring trust"
  • Mr. Venkatesh (Professor, MIIT (IIIT B))
    "A technical framework for testing and evaluation of IoT devices should be in place."
  • Prof. Chitra Babu (Professor, SSN College of Engineering, Chennai)
    "Maximization of performance and facilities of technology will adversely affect the Security."
  • Mr. Jambulingam (Scientist 'C', CFR, STQC)
    "Rigorous testing of Embedded systems should be carried out."
  • Mr. K. SankaraSubramanian (Scientist 'F', STQC, Chennai)
    "The product should be certified under the common criteria like Security, Trust by the third party vendors, before it's going to be use."
  • Mr. Padmakumar Subramani (Principal Product Manager, Nokia India)
    "Security in layers is the way to go! The entire flow from Bootstrapping to UICC to device to service management should be secured"
  • Mr. Samiran Gupta (ICANN)
    "Privacy and Security can assure Trust"
  • Mr. Kaarthik Sivakumar (Principal Engineer, CISCO)
    "Bugs create vulnerabilities and are responsible for attacks. Security also depends on how a product is being used, and for what?"
  • Dr. Kumari Roshni (Senior Director, C-DAC)
    "Mathematics is the root of everything, it can do a lot in the field of Security and Trust."
  • Mr. Sankalp Bagaria (Senior Tech. Officer, C-DAC)
    "Social engineering is a popular tactic to exploit users' weaknesses than it is to find a network or software vulnerability."
  • Mr. Anoop Kumar Pandey (Senior Tech. Officer, C-DAC)
    "In the era of IoT, devices should be systematically updated and patched regularly. Awareness should be created on this front."






Security Protocols for Smart Devices

Date :30th Januray, 2017

Location :C-DAC, Electronic City Bangalore

Abstract :

In the recent times, the Internet world has seen a huge transition from closed networks to enterprise networks to the open Internet at an alarming pace but not without raising alarms about security. As the users become increasingly reliant on smart, interconnected devices in every aspect of their lives, protecting potentially billions of them from cyber attacks and threats that could compromise privacy or threaten public safety has become a challenge.

Protection of data has been an issue ever since the first two computers were connected to each other. With the commercialization of the Internet, security concerns expanded to cover privacy, financial transactions, and the threat of cyber theft. In smart devices, security is inseparable from safety. Whether accidental or malicious, interference with the controls of a pacemaker, a car, or a nuclear reactor poses a threat to human life. The existing threats and attacks on networks may have been addressed by way of various security solutions but the same practices or variants of them in the smart devices world requires substantial reengineering to address device constraints. Smart devices are designed for low power consumption, with a small silicon form factor, and often have limited connectivity. They typically have only as much processing capacity and memory as needed for their tasks.

Security at both the device and network levels is critical to the operation of smart devices. The same intelligence that enables devices to perform their tasks must also enable them to recognize and counteract threats. Fortunately, this does not require a revolutionary approach, but rather an evolution of measures that have proven successful in IT networks, adapted to the challenges of these constrained connected devices. Instead of searching for a solution that does not yet exist, or proposing a revolutionary approach to security, focus should be on the current state-of-the-art IT security controls, optimized for the new and extremely complex embedded applications driving the connected devices.







Internet Standard Development in India

Date :29th March, 2016

Location :C-DAC, VV Towers, Bangalore

Abstract :

Internet has evolved as an essential utility in today's environment. Technically Internet is run by the protocols developed by the Internet Engineering Task Force - IETF - a global body under the Internet Society. IETF is a free and open forum, wherein contributions from everybody is welcome, and functions as communities centered around various topics.


In this context, to enhance and enrich the contributions from India, DeitY - Department of Electronics and Information Technology, under the Ministry of Communications and Information Technology, Government of India has given the mandate to C-DAC Bangalore in the form of a project to take relevant initiatives.


C-DAC Bangalore therefore seeks to engage participants from various forums, including academics, industry , & research to contribute to the development of standards for the Internet, through IETF, especially in the area of Internet Security.


As a step towards achieving wider participation from the Indian community, C-DAC Bangalore is organizing this forum, for experts from various domains of Internet Security to discuss and debate and take forward the process of protocol development, and also to serve as an initiator to the interested participants.