• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 668
  • 136
  • 109
  • 36
  • 34
  • 26
  • 16
  • 10
  • 9
  • 8
  • 7
  • 5
  • 5
  • 5
  • 2
  • Tagged with
  • 1179
  • 1179
  • 365
  • 277
  • 266
  • 253
  • 234
  • 210
  • 205
  • 160
  • 158
  • 137
  • 135
  • 124
  • 121
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

An investigation of lightweight cryptography and using the key derivation function for a hybrid scheme for security in IoT

Khomlyak, Olha January 2017 (has links)
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "things" in IoT are embedded computing devices it is appropriate to talk about cryptography in embedded of systems. This kind of devices is based on microcontrollers, which have limited resources (processing power, memory, storage, and energy). Therefore, we can apply only lightweight cryptography. The goal of this work is to find the optimal cryptographic solution for IoT devices. It is expected that perception of this solution would be useful for implementation on “limited” devices. In this study, we investigate which lightweight algorithm is better to implement. Also, how we can combine two different algorithms in a hybrid scheme and modify this scheme due to data sending scenario. Compendex, Inspec, IEEE Xplore, ACM Digital Library, and Springer Link databases are used to conduct a comprehensive literature review. Experimental work adopted in this study involves implementations, measurements, and observations from the results. The experimental research covers implementations of different algorithms and experimental hybrid scheme, which includes additional function. Results show the performance of the considered algorithms and proposed hybrid scheme. According to our results, security solutions for IoT have to utilize algorithms, which have good performance. The combination of symmetric and asymmetric algorithms in the hybrid scheme can be a solution, which provides the main security requirements: confidentiality, integrity, and authenticity. Adaptation of this scheme to the possible IoT scenarios shows the results acceptable for implementation due to limited resources of hardware.
102

Indoor Localization Using Augmented UHF RFID System for the Internet-of-Things

Wang, Jing January 2017 (has links)
Indoor localization with proximity information in ultra-high-frequency (UHF) radio-frequency-identification (RFID) is widely considered as a potential candidate of locating items in Internet-of-Things (IoT) paradigm. First, the proximity-based methods are less affected by multi-path distortion and dynamic changes of the indoor environment compared to the traditional range-based localization methods. The objective of this dissertation is to use tag-to-tag backscattering communication link in augmented UHF RFID system (AURIS) for proximity-based indoor localization solution. Tag-to-tag backscattering communication in AURIS has an obvious advantage over the conventional reader-to-tag link for proximity-based indoor localization by keeping both landmark and mobile tags simple and inexpensive. This work is the very first thesis evaluating proximity-based localization solution using tag-to-tag backscattering communication.Our research makes the contributions in terms of phase cancellation effect, the improved mathematical models and localization algorithm. First, we investigate the phase cancellation effect in the tag-to-tag backscattering communication, which has a significant effect on proximity-based localization. We then present a solution to counter such destructive effect by exploiting the spatial diversity of dual antennas. Second, a novel and realistic detection probability model of ST-to-tag detection is proposed. In AURIS, a large set of passive tags are placed at known locations as landmarks, and STs are attached mobile targets of interest. We identify two technical roadblocks of AURIS and existing localization algorithms as false synchronous detection assumption and state evolution model constraints. With the new and more realistic detection probability model we explore the use of particle filtering methodology for localizing ST, which overcomes the aforementioned roadblocks. Last, we propose a landmark-based sequential localization and mapping framework (SQLAM) for AURIS to locate STs and passive tags with unknown locations, which leverages a set of passive landmark tags to localize ST, and sequentially constructs a geographical map of passive tags with unknown locations while ST is moving in the environment. Mapping passive tags with unknown locations accurately leads to practical advantages. First, the localization capability of AURIS is not confined to the objects carrying STs. Second, the problem of failed landmark tags is addressed by including passive tags with resolved locations into landmark set. Each of the contributions is supported by extensive computer simulation to demonstrate the performance of enhancements.
103

Supply Chain Discovery Services in an Internet of Things Environment

Dahbi, Abdelmounaim January 2017 (has links)
Electronic Product Code (EPC) refers to a numbering standard developed to uniquely identify physical objects, loads, locations, assets and other entities which are to be tracked or otherwise identified. The tracking technology consists of assigning Radio Frequency Identification (RFID) tags, holding universally unique EPC codes, to the entities to be identified. While the EPC-RFID technology is used to identify and capture data about the physical objects to be tracked in a supply chain, the EPCglobal Network ensures the exchange of the captured data between supply chain stakeholders. Such a real-time data exchange increases visibility and efficiency throughout the supply chain, and thus it increases both company profitability and customer satisfaction. The EPCglobal Network can be regarded as the backbone for the future Internet of Things (IoT). We focus our work in this thesis on Discovery Services (DS); a suite of network lookup services enabling users to retrieve all relevant information sources with regards to a given EPC. They can be viewed as search engines for the future business infrastructure deployed in the IoT. Motivated by the unprecedented and incessantly growing amount of EPC data, the expected epidemic growth in the solicitation frequency of the lookup service, and also the foreseen exceptionally large flow of highly sensitive EPC information, we focus on proposing solutions to problems pertaining to two main challenges; architecture design of Discovery Services and their security. On the architecture design level, we propose novel DS architectures with focus directed towards meeting four major requirements; network scalability, query responsiveness, service extensibility and acceptance. On the security level, we propose probabilistic security schemes aiming at securing even further Discovery Services in the IoT in general, and in the EPCglobal network in particular.
104

SITE: The Simple Internet of Things Enabler for Smart Homes

Hafidh, Basim January 2017 (has links)
This thesis presents the Simple Internet of Things Enabler (SITE), a smart home solution that allows users to specify and centrally control IoT smart objects. Unlike most existing systems, SITE supports End-User Development (EUD). It includes features that make the system accessible to users that do not possess a background in Information Technology (IT). Hence, it defines a simple language for the specification of control rules for smart objects. It also provides a user interface to graphically illustrate data received from smart objects. Furthermore, we present the SITE architecture and describe the components that enable users to define, register, and operate smart objects within a smart home environment. Since deploying applications on the cloud renders many advantages pertaining to data security, robustness, and elasticity of resources, we additionally propose a cloud-based architecture for SITE. In this case, SITE acts as a service hosted on a cloud platform that realizes monitoring and control of a smart home remotely. Moreover, since most of the objects in any environment are not inherently smart, we propose a framework that affords “everyday” objects the necessary modules to measure and report their state. Hence, users realize the smart objects using a transducer network framework that supports the amalgamation of multiple transducers into a single smart object. To make these objects easily reconfigurable, we apply a plug and play mechanism to enable the clustering of any number of transducers. We propose an algorithm that dynamically detects added and removed transducers from a smart object. To assess the usability of SITE, we conduct an empirical study involving 20 participants belonging to two user groups: users with technical training (IT users) and users without technical training (Non-IT users). We demonstrate that both user groups can satisfactorily build smart objects and define control rules in a smart home environment using SITE.
105

Potenciál IoT v Smart city / Potential of IoT in Smart City

Pavlíček, Tomáš January 2016 (has links)
The aim of this masters thesis is to identify, in which phase of adoption of Internet of Things (IoT) application areas of concept Smart City are nowadays Czech regional cities, what is their outlook to 2025 and also identify in which dimensions of concept Smart city, supported by IoT technologies, perceive Czech regional cities the greatest potential. Based on information obtained from the studied materials, the concept of Internet of Things (IoT) is described, along with a detailed description of one of its application area, namely Smart City. This area is further divided into specific dimensions, that cover specific application areas which can, through internet technology, support things in a special way. With these insights, the questionnaire (built on identified IoT application areas of smart city) was developed. Thesis should be beneficial for all towns in the Czech Republic, because it provides a comprehensive view of individual IoT application areas of concept Smart City including information on which of these IoT application areas are currently focusing regional cities, and on which they want to focus to the future. On the other hand, the survey results could also be beneficial for commercial entities, which focus on IoT implementation in cities. These entities will be able to recognise which IoT products are currently best for cities.
106

Sistema automatizado de despacho de ladrillos haciendo uso óptimo del transporte / Automated brick dispatch system making optimal use of transport

Quillatupa Amaya, Juan Angel, Ventura Navarro, Miguel 06 June 2019 (has links)
El presente trabajo de tesis es una propuesta de solución para una empresa enfocada en el proceso de planificación y distribución de producto terminado, quienes a diferencia de otras empresas donde se externaliza la operación logística de transporte, esta lo realiza con recursos propios. Además, las leyes nacionales actuales se vuelven cada vez más estrictas en cuanto al transporte. Es por esto que surge la necesidad de tener sistemas automatizados de planificación de distribución de despacho para hacer uso óptimo del transporte en función a la carga a entregar. Para esto, los algoritmos, las matemáticas y la implementación de hardware son importantes, pues son la base para plantear una solución que considere todas las variables posibles en el negocio. El documento está divido en ocho capítulos. El primero corresponde a los fundamentos teóricos, así como un análisis de la organización objetivo y la identificación de la situación problemática. El segundo capítulo establece los objetivos del proyecto, así como su fundamentación. También detalla los beneficios del proyecto y compara la solución con diferentes propuestas del mercado. El tercer capítulo modela el negocio bajo el proceso de desarrollo de software RUP. El cuarto capítulo define los requerimientos del sistema, bajo el mismo proceso de desarrollo de software que en el modelado de negocio. El quinto capítulo define la arquitectura del software, identifica las metas, restricciones y mecanismos arquitectónicos que van a restringir la construcción del producto. En el sexto capítulo se describen los patrones de sistema de la solución propuesta, el modelo de datos, y la construcción propiamente del sistema. En el séptimo capítulo se describe el plan de calidad y las pruebas del software. Finalmente, el octavo y último capítulo detalla la aplicación de gestión de proyectos bajo la metodología establecida por el PMI®. / This thesis work is a proposal for a solution for a company focused on the process of planning and distribution of finished product, who unlike other companies where the logistics operation of transportation is outsourced, this is done with own resources. In addition, current national laws are becoming stricter in terms of transport. That is why the need arises to have automated dispatch distribution planning systems to make optimal use of transport according to the load to be delivered. For this, the algorithms, the mathematics and the hardware implementation are important, because they are the basis to propose a solution that considers all the possible variables in the business. The document is divided into eight chapters. The first corresponds to the theoretical foundations, as well as an analysis of the objective organization and the identification of the problematic situation. The second chapter establishes the objectives of the project, as well as its foundation. It also details the benefits of the project and compares the solution with different market proposals. The third chapter models the business under the RUP software development process. The fourth chapter defines the requirements of the system, under the same software development process as in business modeling. The fifth chapter defines the architecture of the software, identifies the goals, restrictions and architectural mechanisms that will restrict the construction of the product. The sixth chapter describes the system patterns of the proposed solution, the data model, and the construction of the system itself. In the seventh chapter, the quality plan and the software tests are described. Finally, the eighth and last chapter details the application of project management under the methodology established by the PMI®. / Tesis
107

Latency based device fingerprinting in a low-power industrial wireless sensor network

Kruger, Carel Phillip January 2021 (has links)
Security is a key challenge for any IIoT network and more so for constrained IWSN deployments. Novel methods are thus required to enhance security, taking into consideration the lossy and low power nature of the IWSN. The use of ICMP packets is proposed as a method to generate fingerprinting information for IWSN devices. The ICMP based method uses the round-trip time information in the ICMP header as a fingerprinting metric. The results showed that the effect of the physical layer can be averaged out of the measurement if enough samples are available. A linear relationship was found between hop count and round-trip time for a static network which can be used in the design phase of the IWSN network or alternatively as a method to fingerprint routing anomalies in real-time. The ICMP method was able to differentiate between devices from different vendors, but unable to fingerprint devices from the same vendor due to physical layer interference. The work shows that fingerprinting in an IWSN using the ICMP method is possible if the timing delta under investigation is an order of magnitude larger than the timing variation introduced by the physical layer while maintaining a reasonable signal-to-noise ratio. / Dissertation (MEng (Computer Engineering))--University of Pretoria, 2021. / Electrical, Electronic and Computer Engineering / MEng (Computer Engineering) / Unrestricted
108

Tech. is More: Holistic Integration of Technology into Housing

Kennedy, Tyler Douglas 15 July 2021 (has links)
No description available.
109

Faktorer som möjliggör säkerhetsmedvetenhet inom smarta hem

Holmertz, Felix, Backlund, Marcus January 2021 (has links)
Syftet med denna studie är att utforska användares uppfattningar och åsikter kring säkerhetsmedvetenhet av IoT-artefakter. För att möjliggöra studien har förarbetet varit en viktig del. Förarbetet har skett genom att djupdyka inom ämnet IoT och säkerhet i olika vetenskapliga databaser. Utförandet av studien har skett genom en kvalitativ studie med en beskrivande och abduktiv ansats följt av en blandning datainsamlingsmetoder. Datainsamlingsmetoderna bestod av primärdata i form av en enkät och sekundärdata där faktorer har identifierats utifrån hemsidor och rapporter från företag och myndigheter. Materialet har identifierats utifrån sökningar via sökmotorn Google. Faktorerna som utvecklats från sekundärdata analyserades emot den teori kring IoT och säkerhet inom hem som tagits fram av tidigare forskning för att se likheter och skillnader kring säkerhetsmedvetenhetsfaktorerna. Vidare jämförs sekundärdata till de uppfattningar som primärdata samlat in för identifiera det viktigaste åtgärderna som användare kan vidta för att förbättra säkerheten. Dessa åtgärder sammanfattas i en tabell med riktlinjer. Studien har identifierat faktorer som möjliggör säkerhetsmedvetenhet och utifrån det har riktlinjer utvecklats för att öka medvetandet för säker användning av IoT enheter. Genom de riktlinjerna som tagits fram kan utvecklare se utifrån användarens perspektiv på säkerheten och de risker som finns. Följer användare de riktlinjer som tagits fram, till exempel att säkra sitt Wi-Fi nätverk, kan säkerheten förbättras och riskerna minskas vid användandet av IoT. / This study aims to explore user’s perceptions and opinions about security awareness of IoT artifacts. The study was carried out in a Facebook group for members that are interested in smart homes. To enable the study, a literature oversight was carried out with the focus on IoT and security, and using various scientific databases. The study was a qualitative study with a description and abductive approach followed by using different data collection methods. The data collection consisted of primary data in the form of a survey and secondary data consisting of reports and homepages from companies, authority and other organisations. This material was identified using the search engine Google. The factors identified from the secondary data collection were analyzed against the theory developed around IoT and security in homes from previous research to see similarities and differences. Furthermore, the factors about security awareness identified in the secondary data have been used to develop guidelines for increased security awareness for smart home users. The guidelines that have been developed can give developers insights about the security and its risks from the user’s perspective.
110

Vergleich und Bewertung von Kommunikationskonzepten für Microservices im Bereich des Internet of Things

Schmidt, Nico 17 August 2021 (has links)
Sowohl das Architekturmuster der Microservices als auch das „Internet of Things“ (IoT) folgen den Prinzipien verteilter Systeme. Eine Anwendung von Microservices im IoT ist daher naheliegend, allerdings stellt sich hierbei die Frage,welche Integrationsform dafürambesten geeignet ist. Aus diesem Grund besteht das Ziel dieser Arbeit darin, verschiedene Kommunikationskonzepte von Microservices auf ihre Eignung für den Bereich des IoTs zu überprüfen. In der Arbeit werden dafür verschiedene Kommunikationskonzepte vorgestellt und anhand von diversen Kriterien miteinander auf qualitative Weise verglichen. Die Kriterien setzen sich aus allgemeinen Herausforderungen im Umgang mit verteilten Systemen sowie aus kennzeichnenden Eigenschaften für IoT-Systeme, wie bspw. Skalierbarkeit, Erweiterbarkeit und Ressourcennutzung zusammen. Ergänzend dazu fließen weitere Aspekte der Softwareentwicklung in den Vergleich ein. Anhand der Vergleichsergebnisse wird schließlich eine Bewertung durchgeführt, welche als Grundlage für die Entwicklung von Microservices im Bereich IoT dienen kann. Zum Ende wird das Resultat durch die Konzeption einer eigenen Anwendung erprobt. Der Vergleich und die anschließende Bewertung zeigen, dass sich asynchrone Microservices aufgrund ihrer Eigenschaften am besten für den Einsatz im IoT eignen. Dabei wurde insbesondere auf die die Kommunikationsvariante des Messagings mittels des Protokolls MQTT eingegangen. Aufbauend auf den Ergebnissen dieser Arbeit könnten Forschungen im Bereich moderner IoT-Plattformen angestellt werden. Weiterhin würde sich die Erweiterung bestehender Microservice-Anwendungen durch zusätzliche Services für Datensammlung und intelligente Auswertung dieser als Forschungsthema anbieten.:1 Einleitung und Intention 1.1 MakroSolutions GmbH 1.2 Stand der Wissenschaft und Technik 1.3 Ziel der Arbeit 1.4 Aufbau der Arbeit 2 Definitionen und theoretische Grundlagen 2.1 Verteilte Systeme 2.1.1 Services 2.2 Internet of Things 2.2.1 Industrial Internet of Things 2.3 Microservices 2.3.1 Definition und Eigenschaften 2.3.2 Vorteile im Umgang mit Microservices 2.3.3 Herausforderungen im Umgang mit Microservices 2.3.4 Anwendungsgebiete 2.3.5 Abgrenzung zu monolithischer Architektur 2.3.6 Abgrenzung zu Service-Orientierter Architektur (SOA) 3 Kommunikation der Microservices 3.1 Mikro- und Makroarchitektur 3.2 Integrationsformen 3.3 Gemeinsame Datenbanknutzung und Datenreplikation 3.4 Synchrone Microservices 3.5 Asynchrone Microservices 4 Vergleich und Bewertung 4.1 Wahl der Vergleichskriterien 4.1.1 Fallacies of distributed computing 4.1.2 CAP-Theorem 4.1.3 Internet of Things 4.1.4 Weitere qualitative Kriterien 4.2 Vergleich der Kommunikationskonzepte 4.2.1 Fehlertoleranz und Resilienz 4.2.2 Performance und Ressourcennutzung 4.2.3 Datenkonsistenz und Verfügbarkeit 4.2.4 Skalierbarkeit und Erweiterbarkeit 4.2.5 Kopplung 4.2.6 Komplexität 4.2.7 Tests 4.2.8 Sicherheit 4.3 Bewertung in Bezug auf das Internet der Dinge (IoT) 5 Konzeption der Software 5.1 Ausgangspunkt 5.2 Anforderungen 5.3 Vorüberlegungen 5.4 Konzeption 6 Auswertung und Ausblick 6.1 Zusammenfassung und Interpretation der Ergebnisse 6.2 Beschränkungen und Ausblick für weitere Forschung

Page generated in 0.4091 seconds