• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 754
  • 158
  • 140
  • 54
  • 49
  • 27
  • 23
  • 22
  • 13
  • 10
  • 9
  • 7
  • 6
  • 6
  • 5
  • Tagged with
  • 1415
  • 1218
  • 380
  • 291
  • 291
  • 265
  • 251
  • 225
  • 212
  • 167
  • 165
  • 144
  • 144
  • 131
  • 126
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
271

The umbrella term Industry 4.0 and the digitization of the industry : A qualitative study on the progress of Swedish companies

Hellberg, Tim, Ström, Filip January 2021 (has links)
The umbrella term industry 4.0 stands for the ongoing integration of modern smart technologies in industrial settings. The implementation of the technologies it covers has been an ongoing process for a decade. However, there is a huge variation in companies adaptation of these technologies and progress is slow. This master’s thesis is conducted in collaboration with Cybercom Group and aims to investigate what is keeping the adaptation of Industry 4.0 technologies from taking of. This study was mainly tackled through qualitative interviews with nine different Swedish industry companies. In these interviews their opinions and thoughts on the current state of their factory in contrast to the industry 4.0 vision were discussed. This study reveals that limitations such as high costs on IoT sensors, unsure return of investment, battery constraints on IoT devices, unstable availability on IoT devices connected to the cloud and a general lack of knowledge hampers the adaptation of Industry 4.0 technologies. Finally we provide a price approximation for the monthly cost of streaming data to the three biggest cloud providers (AWS, Microsoft Azure and Google Cloud) for a use case of 8 sensors monitoring a blasting machine. This case shows that the price models of AWS and Google cloud is better suited for smaller cases than Azures while both AWS and Azures price models outperforms Google clouds price model at larger scales.
272

Exploring Physical Unclonable Functions for Efficient Hardware Assisted Security in the IoT

Yanambaka, Venkata Prasanth 05 1900 (has links)
Modern cities are undergoing rapid expansion. The number of connected devices in the networks in and around these cities is increasing every day and will exponentially increase in the next few years. At home, the number of connected devices is also increasing with the introduction of home automation appliances and applications. Many of these appliances are becoming smart devices which can track our daily routines. It is imperative that all these devices should be secure. When cryptographic keys used for encryption and decryption are stored on memory present on these devices, they can be retrieved by attackers or adversaries to gain control of the system. For this purpose, Physical Unclonable Functions (PUFs) were proposed to generate the keys required for encryption and decryption of the data or the communication channel, as required by the application. PUF modules take advantage of the manufacturing variations that are introduced in the Integrated Circuits (ICs) during the fabrication process. These are used to generate the cryptographic keys which reduces the use of a separate memory module to store the encryption and decryption keys. A PUF module can also be recon gurable such that the number of input output pairs or Challenge Response Pairs (CRPs) generated can be increased exponentially. This dissertation proposes three designs of PUFs, two of which are recon gurable to increase the robustness of the system.
273

Säkerhetsmedvetenhet och integration av IoT : En kvantitativ studie på konsumenters säkerhetsmedvetenhet och syn på integration av IoT / Security awareness and integration of IoT : A quantitative study of consumers safety awareness and views on the integration of IoT

Lindström, Oskar, Magnusson, August January 2021 (has links)
Internetuppkopplade apparater blir allt vanligare att se i våra hem. Samlingsordet för dessa enheter är Internet of Things (IOT). Med införande av IoT i våra hem skapas fler accesspunkter till internet, vilket även skapar en större attackyta. I kombinationmed den ständigt växande cyberkriminalliteten och införandet av IoT i våra hem ökar risken för att utsättas för en attack. Tidigare forskning inom området gällande konsumenters informationssäkerhetsmedvetenhet visar att konsumenterna har låg medvetenhet och bristande kunskaper för de hot som tillkommer vid integrationen av en IoT-enhet ihemmet. Det finns även tidigare forskning som undersökt vilka faktorer som påverkar individernas inställning till att anta ny teknologi. Mycket av den tidigare forskningen inom området har fokuserat på de tekniska aspekterna och fokuset har inte varit på konsumenternas informationssäkerhetsmedvetenhet och deras inställning till den ökande integrationen av IoT. Den här studien syftade till att undersöka svenska konsumenters informationssäkerhetsmedvetenhet och deras inställning till den ökande integrationen av IoT. Studien avsåg att undersöka hur medvetna konsumenterna är för de informationssäkerhetsrisker som tillkommer vid integreringen av IoT i hemmet i kombination med att undersöka deras syn på den ökade integrationen av IoT ivardagen. Studien har fokuserat på två olika enheter. Dessa enheter genererar data via ljudupptagning samt videoinspelning. En kvantitativ metod med en enkätundersökning tillämpades för att se ifall den låga kunskapen hos respondenter fanns, men även för att lättare nå ut till fler respondenter. För att förstå konsumenternas beteende utformades enkätfrågorna utifrån den allmänt tillämpade beteendemodellen Theory of planned behavior (TPB). Studien fann att majoriteten av respondenterna hade en låg medvetenhet för de risker som tillkommer med integreringen av IoT-enheter, samt låga kunskap för de säkerhetsåtgärder som går att implementera. Trots den låga medvetenheten för riskerna visade det sig att respondenterna hade en mycket positiv inställning till den ökade integrationen av IoT och att de funderar på att införskaffa fler IoT-enheter. / Internet-connected devices are becoming more common to see in our homes. The collective word for these devices is Internet of Things (IoT). With the introduction of IoT in our homes, more access points to the internet are created, which also creates alarger attack area. Combined with the ever-growing cybercrime and the introduction of IoT in our homes, the risk of being attacked increases. Previous research in the field of consumer information security awareness shows that consumers have low awareness, and lack of knowledge about the threats posed by the integration of an IoT device in the home. Previous research has examined the factors that influence individuals attitudes towards adopting new technology. Much of the previous research in the field has focused on the technical aspects and the focus has not been on consumers information security awareness and their attitude to the increasing integration of IoT. This study aimed to examine Swedish consumers' information security awareness and their attitude towards the increasing integration of IoT. The study aimed to examine how aware consumers are of the information security risks that arise from the integration of IoT in the home in combination with examining their stand on the increased integration of IoT in their everyday life. The study has focused on two specific IoT-devices. These devices generate data via audio recording and video recording. A quantitative method with a survey was applied to examine how aware the consumers where of the information security risks, but also to be able to include more respondents in the study. To understand consumer behavior, the questionnaires were designed based on the generally applied behavioral model Theory of plannedbehavior (TPB).The study found that the majority of respondents had a low awareness of the risks involved with the integration of IoT devices, as well as low knowledge of the security measures that can be implemented. Despite the low awareness of the risks, it turnedout that the respondents had a very positive attitude towards the increased integrationof IoT, and that they also are considering acquiring more IoT devices.
274

Design and Implementation of Energy Usage Monitoring and Control Systems Using Modular IIOT Framework

Chheta, Monil Vallabhbhai 05 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / This project aims to develop a cloud-based platform that integrates sensors with business intelligence for real-time energy management at the plant level. It provides facility managers, an energy management platform that allows them to monitor equipment and plant-level energy consumption remotely, receive a warning, identify energy loss due to malfunction, present options with quantifiable effects for decision-making, and take actions, and assess the outcomes. The objectives consist of: 1. Developing a generic platform for the monitoring energy consumption of industrial equipment using sensors 2. Control the connected equipment using an actuator 3. Integrating hardware, cloud, and application algorithms into the platform 4. Validating the system using an Energy Consumption Forecast scenario A Demo station was created for testing the system. The demo station consists of equip- ment such as air compressor, motor and light bulb. The current usage of these equipment is measured using current sensors. Apart from current sensors, temperature sensor, pres- sure sensor and CO2 sensor were also used. Current consumption of these equipment was measured over a couple of days. The control system was tested randomly by turning on equipment at random times. Turning on the equipment resulted in current consumption which ensured that the system is running. Thus, the system worked as expected and user could monitor and control the connected equipment remotely.
275

Evaluación y selección de proyectos para próximas tendencias en smart clothing / Evaluation and selection of projects for upcoming trends in smart clothing

Sánchez Chipana , Graciela Briggite, Castro Cabanillas, Cristian Jesús 16 March 2021 (has links)
En los últimos años se han generado avances significativos en la tecnología, esto se puede evidenciar en la modificación de los wearables, los cuales cada vez son más pequeños e imperceptibles [1]. El uso de estos dispositivos es relevante en la creación de ropa inteligente debido a que pueden recopilar información del usuario en tiempo real, siendo utilizados para el monitoreo de signos vitales o una herramienta adicional para mejorar el estilo de vida o entretenimiento. El presente trabajo tiene como objetivo presentar un Roadmap de proyectos para el desarrollo de prendas de vestir con tecnología wearable en 4 sectores: entretenimiento, deporte, salud y militar. Para la elaboración del diseño se propone un método de 5 fases y 16 pasos que permite la construcción de un Roadmap de forma simple, considerando las dimensiones: diseño, viabilidad, innovación y rentabilidad. Su aplicación dió como resultado los 11 prototipos mostrados en este proyecto, cada uno con los sensores relacionados en su arquitectura. En total, se consideró la evaluación de 30 especialistas, quienes brindaron una calificación entre alta y muy alta; confirmando y resaltando la probabilidad exitosa de su implementación en los años considerados. / In recent years there have been significant advances in technology, this can be evidenced in the modification of wearables, which are becoming smaller and more imperceptible [1]. The use of these devices is relevant in the creation of smart clothing because they can collect information from the user in real time, being used for monitoring vital signs or an additional tool to improve lifestyle or entertainment. The present work aims to present a Roadmap of projects for the development of clothing with wearable technology in 4 sectors: entertainment, sports, health and military. For the elaboration of the design, a method of 5 phases and 16 steps is proposed that allows the construction of a Roadmap in a simple way, considering the dimensions: design, feasibility, innovation and profitability. Its application resulted in the 11 prototypes shown in this project, each with related sensors in its architecture. In total, the evaluation of 30 specialists was considered, who gave a rating between high and very high; confirming and highlighting the successful probability of its implementation in the years considered. / Trabajo de investigación
276

Designkoncept för ett innovativt IoT-system : Framtagning av förslag på systemets kapsling med hjälp av datorstödd design

Pantzare, Susanna, Granbom, Klara January 2022 (has links)
Forskningsinstitutet RISE, Research Institutes of Sweden, har ettprojekt som kallas IoT Low Energy och syftar till att utvecklalågenergisensorer i kombination med artificiell intelligens. Måletmed detta kandidatarbete var att ta fram digitala designunderlagpå en kapsling av elektronik åt ett system bestående av ensensornod och en central enhet. Sensornoden kopplas sammanmed en kraftmätande skosula, där registrerade data sedan skickastrådlöst till den centrala enheten som i sin tur är sammankoppladmed en smarttelefon där uppmätt data kan avläsas. Detta hargenomförts via metoder såsom riskanalys, funktionsanalys,kravspecifikation samt urval från en klassisk designprocess i formav handgjorda skisser, brainstorming, omvärldsanalys och digitalaskisser. Processen har skett parallellt med framtagningen avelektroniken hos RISE, vilket har gett frihet i hur systemet harkunnat designats. Givna mått på elektroniken tillhandahölls medmöjlighet att utforma den efter designen på kapslingen. Arbetetsyftade ej till att ta fram en färdig produkt, utan de slutgiltigadigitala designunderlagen består av renderade CAD-modeller istudiomiljö samt foton på systemet i verklig miljö. / RISE, the Research Institutes of Sweden, has a project called IoTLow Energy which aims to develop low energy sensors incombination with artificial intelligence. The aim of this thesis wasto produce a digital design for an encapsulation of electronics for asystem consisting of a sensor node and a central unit. The sensornode is connected to a force measuring shoe sole, where registereddata can be sent wirelessly to the central unit, which is connectedto a smartphone where measured data can be read. This has beendone through methods such as risk analysis, function analysis,technical specification and a selection from a classic design processas handmade sketches, brainstorming, analysis of the surroundingworld and digital sketches. The process has taken place in parallelwith the project at RISE, which has offered freedom in how thesystem could be designed. The dimensions of the electronic wereprovided by RISE, with the possibility to construct it according tothe design of the encapsulations. The work did not aim to producea finished product, but the final digital design documents consistof rendered CAD models in a studio environment and photos ofthe system in a real environment.
277

Topology-based Device Self-identification in Wireless Mesh Networks

Quan, Yongyun January 2019 (has links)
In the context of the Internet of Things (IoT), commissioning is the process of securely adding a new device to a network. It covers many different tasks, including the physical deployment of devices and configuration of parameters. It is network installers who need to manually commission each device one by one with the help of commissioning tools. In practice, the first task for a network installer is to identify each device correctly before configuring it with proper parameters. Individually identifying each device, especially in a large network, is a very time-consuming process. This is also known as the identification problem. This project is going to address the problem.A novel device identification approach is presented in the thesis, and there is no human intervention involved in the identification process. Devices are trying to identify themselves based on predefined rules and given information. The approach is therefore called device self-identification, and it is implemented in two different algorithms. One is the centralized device selfidentification, and the other is the distributed device self-identification. In short, only one device participates in the device identification process in the centralized approach, and in the distributed counterpart, every device is part of the identification process.The results of the implementations show the potential of the new way to identify devices in IoT. Devices in both the centralized approach and the distributed approach are able to identify themselves given necessary information about the network. A detailed discussion regarding the two proposed algorithms and the network information is presented in the thesis. / I samband med Internet of Things (IoT) är igångkörning processen att säkert lägga till en ny enhet i ett nätverk. Den täcker många olika uppgifter, inklusive fysisk distribution av enheter och konfigurering av parametrar. Det är nätverksinstallatörer som måste manuellt beställa varje enhet en efter en med hjälp av installationsverktyg. I praktiken är den första uppgiften för en nätverksinstallatör att korrekt identifiera varje enhet innan den konfigureras med lämpliga parametrar. Att identifiera varje enhet speciellt i ett stort nätverk är en mycket tidskrävande process. Detta är också känt som identifieringsproblemet. Detta projekt kommer att ta itu med problemet.En nyhetsidentifieringsmetod presenteras i avhandlingen och det finns ingen mänsklig intervention involverad i identifieringsprocessen. Enheter försöker identifiera sig baserat på fördefinierade regler och information. Tillvägagångssättet kallas därför enhetens självidentifiering och det implementeras i två olika algoritmer, en är centraliserad enhetens självidentifiering och den andra är distribuerad enhetens självidentifiering. Kort sagt, endast en enhet deltar i enhetsidentifieringsprocessen i centraliserat tillvägagångssätt, och i distribuerad motsvarighet är varje enhet en del av identifieringsprocessen.Resultaten av implementationerna visar potentialen för det nya sättet att identifiera enheter i IoT. Enheter i både centraliserat tillvägagångssätt och distribuerat tillvägagångssätt kan identifiera sig med den information som krävs för nätverket. En detaljerad diskussion om de två föreslagna algoritmerna och nätverksinformationen presenteras i avhandlingen.
278

Ethical Hacking of a Smart Plug

Achkoudir, Rami, Alsaadi, Zainab January 2021 (has links)
The number of Internet of Things (IoT) devices is growing rapidly which introduces plenty of new challenges concerning the security of these devices. This thesis aims to contribute to a more sustainable IoT environment by evaluating the security of a smart plug. The DREAD and STRIDE methods were used to assess the potential threats and the threats with the highest potential impact were penetration tested in order to test if there were any security preventions in place. The results from the penetration tests presented no major vulnerabilities which bring us to the conclusion that the Nedis Smart Plug has implemented enough security measures. / Antalet Internet of Things (IoT) -enheter växer snabbt vilket medför många nya utmaningar när det gäller säkerheten för dessa enheter. Denna avhandling syftar till att bidra till en mer hållbar IoT-miljö genom att utvärdera säkerheten för en smart plug. Metoderna DREAD och STRIDE användes för att bedöma de potentiella hoten och hoten med störst potentiell påverkan penetrerades för att testa om det fanns några säkerhetsförebyggande åtgärder. Resultaten från penetrationstesterna presenterade inga större sårbarheter som ledde oss till slutsatsen att Nedis Smart Plug har genomfört tillräckliga säkerhetsåtgärder.
279

Ethical hacking of Sennheiser smart headphones / Etiskt hackande av Sennheiser smarta hörlurar

Huang, Fuhao January 2022 (has links)
The proliferation of IoT devices has brought our world closer than ever. However, because these devices can connect to the internet, they are also vulnerable to cyberattacks. IoT devices collect our personal information, so we must take IoT security seriously to protect our privacy. In this master thesis, an assessment of the security of Sennheiser smart headphones Momentum 3 wireless was conducted to demonstrate whether the smart headphones are secure or not. This pair of headphones were chosen because Sennheiser is a well-known brand and the headphones are one of its high-end headphones, they should be expected to be more secure. Previous academic papers related to the security of Bluetooth headphones were not found, because the security of headphones is generally considered to be less important. For the above reasons, this paper conducts security assessment on this pair of smart headphones. The thesis begins with gathering information of the smart headphones from a black-box perspective. Then threat modeling is used to list and select the attacks to be performed during penetration testing. Finally, the penetration testing is conducted. The result of the penetration testing shows that the headphones are secure enough with no serious vulnerabilities found but a few minor flaws. As this thesis is not in cooperation with Sennheiser, some tests were not performed due to Swedish law. Meanwhile, due to time constraints, some of the identified threats were not attempted in the penetration testing phase and require further investigation. / Spridningen av IoT-enheter har fört vår värld närmare än någonsin. Men eftersom dessa enheter kan ansluta till internet är de också sårbara för cyberattacker. IoT-enheter samlar in vår personliga information, så vi måste ta IoT-säkerhet på allvar för att skydda vår integritet. I denna masteruppsats genomfördes en bedömning av säkerheten hos Sennheiser smarta hörlurar Momentum 3 wireless för att visa om de smarta hörlurarna är säkra eller inte. Detta par hörlurar valdes för att Sennheiser är ett välkänt varumärke och hörlurarna är en av dess avancerade hörlurar, de bör förväntas vara säkrare. Tidigare akademiska artiklar relaterade till säkerheten för Bluetooth-hörlurar hittades inte, eftersom säkerheten för hörlurar generellt anses vara mindre viktig. Av ovanstående skäl genomför detta dokument en säkerhetsbedömning av detta par smarta hörlurar. Examensarbetet börjar med att samla information om de smarta hörlurarna ur ett black-box-perspektiv. Sedan används hotmodellering för att lista och välja de attacker som ska utföras under penetrationstestning. Slutligen genomförs penetrationsprovningen. Resultatet av penetrationstestet visar att hörlurarna är tillräckligt säkra utan några allvarliga sårbarheter men några mindre brister. Eftersom detta examensarbete inte är i samarbete med Sennheiser har vissa tester inte utförts på grund av svensk lag. Under tiden, på grund av tidsbrist, försökte inte några av de identifierade hoten under penetrationstestfasen och kräver ytterligare undersökning.
280

Internet of Things i smarta hemmet : En systematisk litteraturstudie för att kartlägga attackmetoder och verktyg / Internet of Things in the smart home : A systematic litterature study to map attack methods and tools

Nylén, Tommy January 2023 (has links)
Senaste åren har Internet of Things (IoT) haft en explosionsartad utveckling. En underkategori till IoT är det smarta hemmet, där smarta enheter kopplas samman med ett nätverk. Flera exempel på smarta enheter är smarta lampor, termostater, dörrlås, säkerhetskameror, smarta kylskåp och smarta tvättmaskiner. IoT i det smarta hemmet förbättrar både komforten och effektiviserar energiförbrukningen. Det är således en teknik som ökar användarnas livskvalitet. I takt med att IoT-enheter ökar i antal för det även med sig säkerhetsrisker. Cyberbrottslingar ser IoT-enheter som ett lukrativt mål och menar att de är enkla att attackera. Den systematiska litteraturstudien hade som mål att identifiera och kartlägga vilka metoder samt verktyg som används i samband med en attack mot IoT-nätverk i hemmet. Ämnesspecifika sökord användes för att söka i vetenskapliga databaser. Artiklar som bedömdes uppfylla de fördefinierade urvalskriterierna lades till i en bibliografi. Omvänd snöbollsmetod användes för att hitta ytterligare artiklar. Artiklar genomgick en tematisk analys för att kartlägga vilka metoder och verktyg som förekom i litteraturen. Studiens resultat visade att det förekom flera typer av metoder som kan riktas mot IoT-nätverk i hemmet. De flest omnämnda attackerna var Denial of Service (DoS), malware och Man-in-the-Middle (MitM). Resultatet visade även att det förekom många verktyg, där mångsidigheten gör att de kan användas till flera olika typer av attacker. De flest omnämnda verktygen var Hping3, Nmap och Wireshark. / In recent years, the Internet of Things (IoT) has experienced an uprising in the market. A subcategory of the IoT is the smart home, where smart devices are connected by a network. Several examples of smart devices are smart lights, thermostats, door locks, security cameras, smart refrigerators and smart washing machines. IoT in the smart home improves both comfort and makes energy consumption more efficient. Thus, it is a technology that increases the user’s quality of life. As IoT devices increase in number, so does the security risks that come along with it. Cybercriminals see IoT as a lucrative target and find them easy to attack. The aim of the systematic literature study was to identify and map which methods and tools are used in connection with an attack against IoT networks in the home. Subject-specific keywords were used to search in scientific databases. Articles judged to meet the predefined selection criteria were added to a bibliography. Reverse snowballing was used to find additional articles. Articles underwent a thematic analysis to map which methods and tools appeared in the literature. The study’s results showed that were several types of methods that can be targeted against IoT networks at home. The most mentioned attacks were Denial of Service (DoS), malware and Man-in-the-Middle (MitM). The result also showed that there were many tools, where the versatility allows them to be used for several different types of attacks. The most mentioned tools were Hping3, Nmap and Wireshark.

Page generated in 0.0493 seconds