• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 593
  • 135
  • 42
  • 32
  • 14
  • 12
  • 9
  • 7
  • 7
  • 6
  • 4
  • 3
  • 2
  • 1
  • Tagged with
  • 953
  • 397
  • 376
  • 289
  • 268
  • 226
  • 204
  • 181
  • 180
  • 156
  • 155
  • 129
  • 103
  • 84
  • 84
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

Implementace komunikačního scénáře využívajícího Data distribution service a hodnocení bezpečnosti / Communication model using Data distribution service and communication security assessment

Frollo, Martin January 2019 (has links)
The diploma thesis is focusing on middleware layer in distributed systems. It introduces typically used communication protocols and standards operating on this layer. In theoretical part it brings closer look at OMG DDS specification. This part contains fundamental functionalities of this specification along with its architecture blocks. Thesis also describes the RTPS protocol functionality. Existing implementations of OMG DDS standard are described at the end of theoretical part. OpenDDS 3.13 implementation is used in practical part of thesis. It is deployed and tested on various platforms. Next part verifies option of securing RTPS data stream using beta version of OMG DDS Security, which OpenDDS 3.13 implementation contains. Secured and unsecured data flows are being compared. Latency of data stream is also important, especially in distributed systems. DDS system, which measures latency of RTPS stream is created in practical part. Latency of this DDS system can be measured in various configurations. Difference of devices’ performance used in measurements can be clearly seen in latency results where the size of data samples is increasing. Differences of measured latency are also recognizable between reliable and unreliable and secure and unsecure RTPS stream. Part of measurements is made between 2 physical devices with and without an attacker. Type of attack is MITM and it captures RTPS flow, which does not belong to attacking machine.
162

Ovladač a hardwarový modul protokolu MiWi pro Linux / Driver and Hardware Module of MiWi Protocol for Linux

Hala, Martin January 2014 (has links)
The master's thesis is about a communication element - a hardware module, its design and implementation. The communication is to be maintained between a Linux embedded device and the sensors elements, using the MiWi protocol. The task is part of the IoT project, developed at FIT BUT. Furthermore, the paper describes design of a driver for the module, its likely solution, as well as the very implementation. Finally, the obtained experience is discussed in a summary, along the next step options on how to proceed further with the driver development.
163

Univerzální měřicí zařízení pro mobilní sítě LTE / Universal Metering Device for LTE Mobile Networks

de Groot, Štefan January 2016 (has links)
Predmetom diplomovej práce je skúmanie možností realizácie univerzálneho meracieho zariadenia v sieti LTE. Sú popísané základy M2M komunikácie a trendy v IoT. Cieľom práce je nájsť optimálny hardvérový základ, na ktorom následne bude možné konfigurovať LTE modem a získať údaje o stave a kvalite pripojenia k sieti. Následne bude vykonaná séria testov za účelom zmerania parametrov siete a výsledky budú spracované k prezentácii na webovom serveri vo forme grafov.
164

Performance Evaluation of IoT Platforms in Green ICT Applications

Qureshi, Daniyal Akhtar January 2018 (has links)
With the advent of the Internet of Things (IoT), its deployment and applications have grown exponentially in the past decade. This growth has had led scientists and stakeholders to the prediction that about 30 billion of things (IoT) will be connected by 2020 in diverse applications such as transport, healthcare, utility, education, and home automation. Large data streams generated by sensors; it can be data acquisition, storage, or processing, derived the development of cloud-based middleware (or otherwise known as IoT Platform) for IoT. To date, hundreds of IoT platforms fluxing the market (both open-source and commercial) with various complexities, pricing, and services. In this thesis, we proposed an IoT Platform Benchmarking Methodology comprised of four different evaluations namely; Technical, Usability, Sustainability, and Market Competency. We discussed in detail Technical Evaluation based on TPC-IoT benchmarking to evaluate the performance of any IoT platform. The main objective of this research is to provide insight into key parameters in each layer of the platform affecting the overall performance. A preliminary evaluation of data ingestion of open-source IoT platform will be presented based on benchmarking methodology (TPC-IoT).
165

Lightweight & Efficient Authentication for Continuous Static and Dynamic Patient Monitoring in Wireless Body Sensor Networks

Radwan Mohsen, Nada Ashraf 11 December 2019 (has links)
The emergence of the Internet of Things (IoT) brought about the widespread of Body Sensor Networks (BSN) that continuously monitor patients using a collection of tiny-powered and lightweight bio-sensors offering convenience to both physicians and patients in the modern health care environment. Unfortunately, the deployment of bio-sensors in public hacker-prone settings means that they are vulnerable to various security threats exposing the security and privacy of patient information. This thesis presents an authentication scheme for each of two applications of medical sensor networks. The first is an ECC based authentication scheme suitable for a hospital-like setting whereby the patient is hooked up to sensors connected to a medical device such as an ECG monitor while the doctor needs real-time access to continuous sensor readings. The second protocol is a Chebyshev chaotic map-based authentication scheme suitable for deployment on wearable sensors allowing readings from the lightweight sensors connected to patients to be sent and stored on a trusted server while the patient is on the move. We formally and informally proved the security of both schemes. We also simulated both of them on AVISPA to prove their resistance to active and passive attacks. Moreover, we analyzed their performance to show their competitiveness against similar schemes and their suitability for deployment in each of the intended scenarios.
166

Secure and lightweight authentication schemes for Internet of Things (IoT)

Alshahrani, Mohammed M. 04 December 2019 (has links)
IoT platforms face huge challenges in deploying robust authentication mechanisms due to the fact that edge devices and resource-constrained devices may not have enough compute and storage capabilities to deploy and run existing mechanisms, which involve in general complex computations. Moreover, establishing end-to-end device authentication in the Internet of Things (IoT) networks is challenging because of the heterogeneous nature of IoT devices. One of the well-known challenges confronting the IoT infrastructure is related to authentication. Many IoT devices rely on weak authentication schemes, which has led in the last few years to several successful and widely publicized hacking incidents. According to the ISO/IEC 27002 standard, authentication is the process of determining whether something is, in fact, what it is declared to be. Authentication is considered the main gate to protect IoT networks from various security threats; determining who the entity is (authentication) is of high importance to establish a secure session between IoT devices. This dissertation identifies gaps in the literature and presents new authentication schemes and security mechanisms to improve IoT security and privacy against common attacks such as replay and impersonation. This research enhances IoT security and privacy by introducing a new lightweight mutual authentication and key exchange protocol for IoT based on dynamic identity and cumulative chained-hash. Nodes can anonymously and mutually authenticate and establish a session with the controller node using dynamic identities and temporary symmetric keys in an unlinkable and untraceable manner. Moreover, the enforcement of security policies between nodes is guaranteed by setting up virtual domain segregation and restricting node capabilities of sending and receiving data to or from other nodes. The Cumulative chained-hash technique is introduced as a way to ensure the identity of the sender (through challenge-response). Additionally, we introduce a new anonymous device- to-device mutual authentication and key exchange protocol based on the ZigBee technique. The proposed protocol relies on symmetric encryption and counter and enables IoT devices to authenticate in the network and agree on a shared secret session key when communicating with each other via a trusted intermediary (home controller). To achieve forward secrecy, the session keys are changed frequently after every communication session. The proposed scheme achieves secure, anonymous authentication with the unlinkability and untraceability of IoT device transactions. The security of the protocols is evaluated and simulated using three different methods: informal analysis, formal analysis using the Burrows–Abadi–Needham logic (BAN), and model-checking using the automated validation of Internet security protocols and applica- tions (AVISPA) toolkit. The overhead and efficiency of the proposed schemes are analyzed and compared with other related schemes. The results showed that our protocols are in general more efficient. / Graduate
167

Autonomic Zero Trust Framework for Network Protection

Durflinger, James 05 1900 (has links)
With the technological improvements, the number of Internet connected devices is increasing tremendously. We also observe an increase in cyberattacks since the attackers want to use all these interconnected devices for malicious intention. Even though there exist many proactive security solutions, it is not practical to run all the security solutions on them as they have limited computational resources and even battery operated. As an alternative, Zero Trust Architecture (ZTA) has become popular is because it defines boundaries and requires to monitor all events, configurations, and connections and evaluate them to enforce rejecting by default and accepting only if they are known and accepted as well as applies a continuous trust evaluation. In addition, we need to be able to respond as quickly as possible, which cannot be managed by human interaction but through autonomous computing paradigm. Therefore, in this work, we propose a framework that would implement ZTA using autonomous computing paradigm. The proposed solution, Autonomic ZTA Management Engine (AZME) framework, focusing on enforcing ZTA on network, uses a set of sensors to monitor a network, a set of user-defined policies to define which actions to be taken (through controller). We have implemented a Python prototype as a proof-of-concept that checks network packets and enforce ZTA by checking the individual source and destination based on the given policies and continuously evaluate the trust of connections. If an unaccepted connection is made, it can block the connection by creating firewall rule at runtime.
168

IoT för äldre : Att förenkla vardagen för äldre och dess anhöriga medhjälp av teknik och smarta hem

Rönnberg, Olle January 2022 (has links)
The elderly population is incresasing, and because of that, the need for technology that simplifies everyday life for the elderly is also increasing. This work focuses on building a system, a smart home with IoT devices wich goal is to do just that: Simplify the everyday life for the elderly. It does so by first creating two surveys, one for the elderly and one for their relatives to get information about what technological solutions that needs to be met in order to simplify everyday life. A system built on a Raspberry Pi 4 with Home Assistant as the operating system is then installed and configured at a test persons house along with the collected technological solutions. This system is tested for one week and then evaluated by the elderly test person and his relative. The elderly reported that his everyday day life indeed was simplified. The relative did feel a little calmer in regards to the health of the elderly but wanted more functions in order to feel that the everyday life was simplified. / Den äldre populationen ökar, och på grund av det ökar också behovet av teknologi som förenkar vardagen för de äldre. Detta arbete bygger ett system, ett smart hem med IoT-enheter med målet att göra just det: Förenkla vardagen för de äldre och dess anhöriga. Två enkäter skapas för att ta reda vilka tekniska behov som finns för att de äldre och dess anhöriga ska uppleva att deras vardag förenklats. Ett system byggs med operativsystemet Home Assistant som installeras på en Raspberry Pi 4. Detta system testas i en vecka hemma hos en äldre person och utvärderas sedan av den äldre och en anhörig. Resultatet visar att den äldre personens vardag förenklades på många sätt. Den anhöriga kände viss trygghet kring den äldres hälsa och välmående men ville ha fler funktioner för att känna att vardagen förenklades.
169

Security for the Internet of Things

Cooper, Ke'ahi January 2015 (has links)
The Internet of Things (IoT) is an emerging paradigm that will change theway we interact with objects and computers in the future. It envisions a globalnetwork of devices interacting with each other, over the Internet, to perform auseful action. As such, quite a number of useful and benecial applications ofthis technology have been proposed.Although a convenient technology, the use of IoT technology will add additionalrisks to our lives that the traditional Internet did not have. This is primarilybecause IoT technology allows the virtual world to directly aect the physicalworld.Therefore, ensuring security is of paramount importance for IoT technology. Assuch, this thesis has two aims. First, we will identify the security issues for IoTtechnology as well as highlight what approaches academia has developed to resolvethem. This will allow us to see the state of this technology along with whatstill needs to be done in the future. Secondly, we will analyze some security protocolsproposed by academia and evaluate whether they ensure condentialityand authenticity.A literature survey is used to achieve the rst goal and the results show thatalthough a lot of research has been performed regarding security for IoT environments.We still have quite a way to go before a full holistic system isdeveloped which ensures all the security requirements for IoT.The results for the security protocol analysis shows that less than half of theprotocols proposed ensured authenticity and condentiality; despite the factthat their respective papers claim that they did. Therefore, we emphasize thefact that good peer reviews need to be enforced and that protocols need to bevalidated to ensure what is proposed performs as described.
170

Privacy in the Age of Autonomous Systems

Khan, Md Sakib Nizam January 2020 (has links)
Autonomous systems have progressed from theory to application especially in the last decade, thanks to the recent technological evolution. The number of autonomous systems in our surroundings is increasing rapidly. Since these systems in most cases handle privacy-sensitive data, the privacy concerns are also increasing at a similar rate. However, privacy research has not been in sync with these developments. Moreover, the systems are heterogeneous in nature and continuously evolving which makes the privacy problem even more challenging. The domain poses some unique privacy challenges which are not always possible to solve using existing solutions from other related fields. In this thesis, we identify open privacy challenges of autonomous systems and later propose solutions to some of the most prominent challenges. We investigate the privacy challenges in the context of smart home-based systems including Ambient Assisted Living (AAL) systems as well as autonomous vehicles. In the case of smart home, we propose a framework to enhance the privacy of owners during ownership change of IoT devices and conduct a systematic literature review to identify the privacy challenges of home-based health monitoring systems. For autonomous vehicles, we quantify, improve, and tune the privacy utility trade-off of the image de-identification process. Our investigation reveals that there is a lack of consideration when it comes to the privacy of autonomous systems and there are several open research questions in the domain regarding, for instance, privacy-preserving data management, quantification of privacy utility trade-off, and compliance with privacy laws. Since the field is evolving, this work can be seen as a step towards privacy preserving autonomous systems. The identified privacy concerns and their corresponding solutions presented in this thesis will help the research community to identify and address existing privacy concerns of autonomous systems. Solving the concerns will encourage the end-users to adopt the systems and enjoy the benefits without bothering about privacy. / <p>QC 20201116</p>

Page generated in 0.0157 seconds