Spelling suggestions: "subject:"1nternet Of chings"" "subject:"1nternet Of bushings""
111 |
Vergleich und Bewertung von Kommunikationskonzepten für Microservices im Bereich des Internet of ThingsSchmidt, Nico 17 August 2021 (has links)
Sowohl das Architekturmuster der Microservices als auch das „Internet of Things“ (IoT) folgen den Prinzipien verteilter Systeme. Eine Anwendung von Microservices im IoT ist daher naheliegend, allerdings stellt sich hierbei die Frage,welche Integrationsform dafürambesten geeignet ist. Aus diesem Grund besteht das Ziel dieser Arbeit darin, verschiedene Kommunikationskonzepte von Microservices auf ihre Eignung für den Bereich des IoTs zu überprüfen. In der Arbeit werden dafür verschiedene Kommunikationskonzepte vorgestellt und anhand von diversen Kriterien miteinander auf qualitative Weise verglichen. Die Kriterien setzen sich
aus allgemeinen Herausforderungen im Umgang mit verteilten Systemen sowie aus kennzeichnenden Eigenschaften für IoT-Systeme, wie bspw. Skalierbarkeit, Erweiterbarkeit und Ressourcennutzung zusammen. Ergänzend dazu fließen weitere Aspekte der Softwareentwicklung in den Vergleich ein. Anhand der Vergleichsergebnisse wird schließlich eine Bewertung durchgeführt, welche als Grundlage für die Entwicklung von Microservices im Bereich IoT dienen kann. Zum Ende wird das Resultat durch die Konzeption einer eigenen Anwendung erprobt.
Der Vergleich und die anschließende Bewertung zeigen, dass sich asynchrone Microservices aufgrund ihrer Eigenschaften am besten für den Einsatz im IoT eignen. Dabei wurde insbesondere auf die die Kommunikationsvariante des Messagings mittels des Protokolls MQTT eingegangen. Aufbauend auf den Ergebnissen dieser Arbeit könnten Forschungen im Bereich moderner
IoT-Plattformen angestellt werden. Weiterhin würde sich die Erweiterung bestehender Microservice-Anwendungen durch zusätzliche Services für Datensammlung und intelligente Auswertung dieser als Forschungsthema anbieten.:1 Einleitung und Intention
1.1 MakroSolutions GmbH
1.2 Stand der Wissenschaft und Technik
1.3 Ziel der Arbeit
1.4 Aufbau der Arbeit
2 Definitionen und theoretische Grundlagen
2.1 Verteilte Systeme
2.1.1 Services
2.2 Internet of Things
2.2.1 Industrial Internet of Things
2.3 Microservices
2.3.1 Definition und Eigenschaften
2.3.2 Vorteile im Umgang mit Microservices
2.3.3 Herausforderungen im Umgang mit Microservices
2.3.4 Anwendungsgebiete
2.3.5 Abgrenzung zu monolithischer Architektur
2.3.6 Abgrenzung zu Service-Orientierter Architektur (SOA)
3 Kommunikation der Microservices
3.1 Mikro- und Makroarchitektur
3.2 Integrationsformen
3.3 Gemeinsame Datenbanknutzung und Datenreplikation
3.4 Synchrone Microservices
3.5 Asynchrone Microservices
4 Vergleich und Bewertung
4.1 Wahl der Vergleichskriterien
4.1.1 Fallacies of distributed computing
4.1.2 CAP-Theorem
4.1.3 Internet of Things
4.1.4 Weitere qualitative Kriterien
4.2 Vergleich der Kommunikationskonzepte
4.2.1 Fehlertoleranz und Resilienz
4.2.2 Performance und Ressourcennutzung
4.2.3 Datenkonsistenz und Verfügbarkeit
4.2.4 Skalierbarkeit und Erweiterbarkeit
4.2.5 Kopplung
4.2.6 Komplexität
4.2.7 Tests
4.2.8 Sicherheit
4.3 Bewertung in Bezug auf das Internet der Dinge (IoT)
5 Konzeption der Software
5.1 Ausgangspunkt
5.2 Anforderungen
5.3 Vorüberlegungen
5.4 Konzeption
6 Auswertung und Ausblick
6.1 Zusammenfassung und Interpretation der Ergebnisse
6.2 Beschränkungen und Ausblick für weitere Forschung
|
112 |
Mobilní aplikace pro ovládání prvků chytré domácnosti / Mobile Application for Controlling Smart Home DevicesMasár, Andrej January 2021 (has links)
The objective of this thesis is the issue of the Internet of Things and its application as a Smart Home. The work describes the design and implementation of a native mobile application for Android to control the elements of a Smart Home. The application communicates with the Smart Home using the MQTT protocol. The resulting application demonstrates the control of devices in a Smart Home according to the MQTT2GO convention.
|
113 |
Performance Evaluation of IoT Platforms in Green ICT ApplicationsQureshi, Daniyal Akhtar January 2018 (has links)
With the advent of the Internet of Things (IoT), its deployment and applications have grown exponentially in the past decade. This growth has had led scientists and stakeholders to the prediction that about 30 billion of things (IoT) will be connected by 2020 in diverse applications such as transport, healthcare, utility, education, and home automation. Large data streams generated by sensors; it can be data acquisition, storage, or processing, derived the development of cloud-based middleware (or otherwise known as IoT Platform) for IoT. To date, hundreds of IoT platforms fluxing the market (both open-source and commercial) with various complexities, pricing, and services. In this thesis, we proposed an IoT Platform Benchmarking Methodology comprised of four different evaluations namely; Technical, Usability, Sustainability, and Market Competency. We discussed in detail Technical Evaluation based on TPC-IoT benchmarking to evaluate the performance of any IoT platform. The main objective of this research is to provide insight into key parameters in each layer of the platform affecting the overall performance. A preliminary evaluation of data ingestion of open-source IoT platform will be presented based on benchmarking methodology (TPC-IoT).
|
114 |
NB-IoT and LoRaWAN Performance Testing in Urban and Rural EnvironmentMilos Stankovic (9741251) 15 December 2020 (has links)
With technology advancements and the prices of electronic components reducing over the last fifteen years, many devices and systems that would have been proprietary only for large companies or industry giants are becoming an everyday household item. Various areas of technology have been benefiting from this but one of the biggest is the Internet of Things (IoT).With the prevalence of IoT, it has been integrated into houses, small businesses, farms, agriculture, building automation, etc. and the user population is now a resource to the industry as they complete personal projects. Within any project there are always limitations, this might be a limited time, limited funds, limited distance, or limitations of the devices being used. This study proposes to evaluate two low-powered networks, Narrowband Internet of Things (NB-IoT)and Long-Range Wide-Area Network(LoRaWAN), in different environments with the goal of understanding where the signal propagation is better and what distances can be reached despite obstructions. Distances and signal propagations, when measured by the manufacturers are often evaluated in ideal conditions which is rarely the case when utilized in the field. This creates a gap in the deployment and the end-users are frequently faced with diminished performances. As IoT is predominantly employed in urban and rural areas this study will focus on those two settings by testing the Received Signal Strength Indicator (RSSI)at various distances. The evaluation testing of the two systems showed each system performing more consistently in rural areas but neither had 100% coverage at any locations.
|
115 |
Secure and lightweight authentication schemes for Internet of Things (IoT)Alshahrani, Mohammed M. 04 December 2019 (has links)
IoT platforms face huge challenges in deploying robust authentication mechanisms due to the fact that edge devices and resource-constrained devices may not have enough compute and storage capabilities to deploy and run existing mechanisms, which involve in general complex computations. Moreover, establishing end-to-end device authentication in the Internet of Things (IoT) networks is challenging because of the heterogeneous nature of IoT devices. One of the well-known challenges confronting the IoT infrastructure is related to authentication. Many IoT devices rely on weak authentication schemes, which has led in the last few years to several successful and widely publicized hacking incidents. According to the ISO/IEC 27002 standard, authentication is the process of determining whether something is, in fact, what it is declared to be. Authentication is considered the main gate to protect IoT networks from various security threats; determining who the entity is (authentication) is of high importance to establish a secure session between IoT devices. This dissertation identifies gaps in the literature and presents new authentication schemes and security mechanisms to improve IoT security and privacy against common attacks such as replay and impersonation. This research enhances IoT security and privacy by introducing a new lightweight mutual authentication and key exchange protocol for IoT based on dynamic identity and cumulative chained-hash. Nodes can anonymously and mutually authenticate and establish a session with the controller node using dynamic identities and temporary symmetric keys in an unlinkable and untraceable manner. Moreover, the enforcement of security policies between nodes is guaranteed by setting up virtual domain segregation and restricting node capabilities of sending and receiving data to or from other nodes. The Cumulative chained-hash technique is introduced as a way to ensure the identity of the sender (through challenge-response). Additionally, we introduce a new anonymous device- to-device mutual authentication and key exchange protocol based on the ZigBee technique. The proposed protocol relies on symmetric encryption and counter and enables IoT devices to authenticate in the network and agree on a shared secret session key when communicating with each other via a trusted intermediary (home controller). To achieve forward secrecy, the session keys are changed frequently after every communication session. The proposed scheme achieves secure, anonymous authentication with the unlinkability and untraceability of IoT device transactions.
The security of the protocols is evaluated and simulated using three different methods: informal analysis, formal analysis using the Burrows–Abadi–Needham logic (BAN), and model-checking using the automated validation of Internet security protocols and applica- tions (AVISPA) toolkit. The overhead and efficiency of the proposed schemes are analyzed and compared with other related schemes. The results showed that our protocols are in general more efficient. / Graduate
|
116 |
Att använda Azure som IoT plattformArvidsson, Moa January 2020 (has links)
Portability of the Internet of Things Solutions is important in today’s society. This is due to the rapid growth of smart devices. More and more companies are choosing to use cloud services for data storage and processing. Halmstad Stadsnät AB is developing and communicating the IoT-platform and using the current state of Nokia IMPACT. The problem with IMPACT is that it does not fully support End-toend solutions. Therefore, Halmstad Stadsnät AB explores other possibilities for IoT-solutions when it comes to software. Microsoft AZURE is a platform that Halmstad Kommun uses for IT-solutions. The overall goal of this project is to test the portability of Microsoft AZURE’s IoT-solutions on IMPACTplatforms. The methods used have created an End-to-end solution for AZURE and then step by step test to transfer it to IMPACT. The project concludes that portability between these two platforms is good, but it requires certain adjustments when transferring / Portabilitet av internet of things lösningar är i dagens samhälle nödvändig. Detta pågrund av den snabba tillväxten av bärbara datorenheter. Allt fler företag väljer att använda molntjänster för lagring och bearbetning av data. Halmstad Kommun håller på att utveckla en kommuntäckande IoT-plattform och använder sig i dagsläget av Nokia IMPACT. Problemet med IMPACT är att den inte har fullt stöd för End-to-end lösningar. Därför undersöker Stadsnätet andra möjligheter för IoT-lösning när det kommer till mjukvara. Microsoft AZURE är en plattform som Halmstad kommun använder för IT lösningar. De övergripande målet med det här projektet är att testa portabiliteten för Microsoft AZUREs IoTlösnignar på IMPACT-plattformen. De metoder som använts har varit att skapa en End-to-end lösning för AZURE och sedan steg för steg testa att överföra den till IMPACT. Slutsatsen av projektet är att portabilitet mellan dessa två plattformar är god, men dock krävs vissa åtgärder vid överföring.
|
117 |
What are the Problems with Implementing Blockchain Technology for Decentralized IoT Authentication : A Systematic Literature ReviewKortzon, Daniel January 2020 (has links)
The implementation of internet of things is plagued by problems such as security and scalability. It is a very heterogeneous environment and overcoming these hurdles is therefore not an easy feat. A concept of using the decentralized and secure nature of the blockchain technology to combat these problems have been identified. However the stark contrast of blockchain technology being resource hungry and internet of things devices being resource depraved is among other things a new hurdle that is introduced. This systematic literature study aimed to identify problems that a rose when trying to merge these technologies while focusing on the authentication aspect.Smart contracts play a huge role in making most of the identified solutions at least feasible to implement on a larger scale. While most systems have solved the authentication problem the major problems of the blockchain adaptation for internet of things remains unsolved. Three solutions were identified that really try to combat these problems by changing the blockchain technology at its core while the rest feel like they are trying to do the best with what is available and falls short in some major way.
|
118 |
DESIGN OF EMBEDDED POWER SIGNATURE GENERATION CIRCUITS FOR INTERNET OF THINGS SECURITYThompson, David 01 May 2020 (has links)
With the wide adoption of Internet of Things (IoT) in applications that involve sensitive information, the security of IoT devices is becoming an important concern. IoT devices face many challenges in securing information due to their low cost and computation constrains. To over come such challenges, different techniques have been developed. One such technique is power analysis. However, power analysis requires equipment that is often bulky, power hungry and expensive, making them unsuitable for many IoT applications. This thesis developed two energy signature capturing circuits that can be embedded into low dropout (LDO) voltage regulators. The first design targets analog LDO circuits and the second design is suitable for the newly emerged digital LDOs. Both circuits are designed and simulated using a commercial 130nm CMOS technology. To evaluate the effectiveness of the developed circuits, power traces collected from a wireless sensor device are used in circuit simulations. The results indicate that the developed circuits can detect different model wireless transmission as well as other abnormal operations.
|
119 |
IoT security and privacy assessment using software-defined radiosBecker, Johannes Karl 23 May 2022 (has links)
The Internet of Things (IoT) has seen exceptional adoption in recent years, resulting in an unprecedented level of connectivity in personal and industrial domains. In parallel, software-defined radio (SDR) technology has become increasingly powerful, making it a compelling tool for wireless security research across multiple communication protocols. Specifically, SDRs are capable of manipulating the physical layer of protocols in software, which would otherwise be implemented statically in hardware. This flexibility enables research that goes beyond the boundaries of protocol specifications. This dissertation pursues four research directions that are either enabled by software-defined radio technology, or advance its utility for security research.
First, we investigate the anti-tracking mechanisms defined by the Bluetooth Low Energy (BLE) wireless protocol. This protocol, present in virtually all wearable smart devices, implements address randomization in order to prevent unwanted tracking of its users. By analyzing raw advertising data from BLE devices using SDRs, we identify a vulnerability that allows an attacker to track a BLE device beyond the address randomization defined by the protocol.
Second, we implement a compact, SDR-based testbed for physical layer benchmarking of wireless devices. The testbed is capable of emulating multiple data transmissions and produce intentional signal corruption in very precisely defined ways in order to investigate receiver robustness and undefined device behavior in the presence of malformed packets. We subject a range of Wi-Fi and Zigbee devices to specifically crafted packet collisions and "truncated packets" as a way to fingerprinting wireless device chipsets.
Third, we introduce a middleware framework, coined "Snout", to improves accessibility and usability of SDRs. The architecture provides standardized data pipelines as well as an abstraction layer to GNU Radio flowgraphs which power SDR signal processing. This abstraction layer improves usability and maintainability by providing a declarative experiment configuration format instead of requiring constant manipulation of the signal processing code during experimentation. We show that Snout does not result in significant computational overhead, and maintains a predictable and modest memory footprint.
Finally, we address the visibility problem arising from the growing number of IoT protocols across large bands of radio spectrum. We model an SDR-based IoT monitor which is capable of scanning multiple channels (including across multiple protocols), and employs channel switching policies to maximize freshness of information obtained by transmitting devices. We present multiple policies and compare their performance against an optimal Markov Decision Process (MDP) model, as well as through event-based simulation using real-world device traffic.
The results of this work demonstrate the use of SDR technology in privacy and security research of IoT device communication, and open up opportunities for further low-layer protocol discoveries that require the use of software-defined radio as a research tool.
|
120 |
Security for the Internet of ThingsCooper, Ke'ahi January 2015 (has links)
The Internet of Things (IoT) is an emerging paradigm that will change theway we interact with objects and computers in the future. It envisions a globalnetwork of devices interacting with each other, over the Internet, to perform auseful action. As such, quite a number of useful and benecial applications ofthis technology have been proposed.Although a convenient technology, the use of IoT technology will add additionalrisks to our lives that the traditional Internet did not have. This is primarilybecause IoT technology allows the virtual world to directly aect the physicalworld.Therefore, ensuring security is of paramount importance for IoT technology. Assuch, this thesis has two aims. First, we will identify the security issues for IoTtechnology as well as highlight what approaches academia has developed to resolvethem. This will allow us to see the state of this technology along with whatstill needs to be done in the future. Secondly, we will analyze some security protocolsproposed by academia and evaluate whether they ensure condentialityand authenticity.A literature survey is used to achieve the rst goal and the results show thatalthough a lot of research has been performed regarding security for IoT environments.We still have quite a way to go before a full holistic system isdeveloped which ensures all the security requirements for IoT.The results for the security protocol analysis shows that less than half of theprotocols proposed ensured authenticity and condentiality; despite the factthat their respective papers claim that they did. Therefore, we emphasize thefact that good peer reviews need to be enforced and that protocols need to bevalidated to ensure what is proposed performs as described.
|
Page generated in 0.109 seconds