• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 668
  • 136
  • 109
  • 36
  • 34
  • 26
  • 16
  • 10
  • 9
  • 8
  • 7
  • 5
  • 5
  • 5
  • 2
  • Tagged with
  • 1179
  • 1179
  • 365
  • 277
  • 266
  • 253
  • 234
  • 210
  • 205
  • 160
  • 158
  • 137
  • 135
  • 124
  • 121
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Mobilní aplikace pro ovládání prvků chytré domácnosti / Mobile Application for Controlling Smart Home Devices

Masár, Andrej January 2021 (has links)
The objective of this thesis is the issue of the Internet of Things and its application as a Smart Home. The work describes the design and implementation of a native mobile application for Android to control the elements of a Smart Home. The application communicates with the Smart Home using the MQTT protocol. The resulting application demonstrates the control of devices in a Smart Home according to the MQTT2GO convention.
112

Performance Evaluation of IoT Platforms in Green ICT Applications

Qureshi, Daniyal Akhtar January 2018 (has links)
With the advent of the Internet of Things (IoT), its deployment and applications have grown exponentially in the past decade. This growth has had led scientists and stakeholders to the prediction that about 30 billion of things (IoT) will be connected by 2020 in diverse applications such as transport, healthcare, utility, education, and home automation. Large data streams generated by sensors; it can be data acquisition, storage, or processing, derived the development of cloud-based middleware (or otherwise known as IoT Platform) for IoT. To date, hundreds of IoT platforms fluxing the market (both open-source and commercial) with various complexities, pricing, and services. In this thesis, we proposed an IoT Platform Benchmarking Methodology comprised of four different evaluations namely; Technical, Usability, Sustainability, and Market Competency. We discussed in detail Technical Evaluation based on TPC-IoT benchmarking to evaluate the performance of any IoT platform. The main objective of this research is to provide insight into key parameters in each layer of the platform affecting the overall performance. A preliminary evaluation of data ingestion of open-source IoT platform will be presented based on benchmarking methodology (TPC-IoT).
113

NB-IoT and LoRaWAN Performance Testing in Urban and Rural Environment

Milos Stankovic (9741251) 15 December 2020 (has links)
With technology advancements and the prices of electronic components reducing over the last fifteen years, many devices and systems that would have been proprietary only for large companies or industry giants are becoming an everyday household item. Various areas of technology have been benefiting from this but one of the biggest is the Internet of Things (IoT).With the prevalence of IoT, it has been integrated into houses, small businesses, farms, agriculture, building automation, etc. and the user population is now a resource to the industry as they complete personal projects. Within any project there are always limitations, this might be a limited time, limited funds, limited distance, or limitations of the devices being used. This study proposes to evaluate two low-powered networks, Narrowband Internet of Things (NB-IoT)and Long-Range Wide-Area Network(LoRaWAN), in different environments with the goal of understanding where the signal propagation is better and what distances can be reached despite obstructions. Distances and signal propagations, when measured by the manufacturers are often evaluated in ideal conditions which is rarely the case when utilized in the field. This creates a gap in the deployment and the end-users are frequently faced with diminished performances. As IoT is predominantly employed in urban and rural areas this study will focus on those two settings by testing the Received Signal Strength Indicator (RSSI)at various distances. The evaluation testing of the two systems showed each system performing more consistently in rural areas but neither had 100% coverage at any locations.
114

Secure and lightweight authentication schemes for Internet of Things (IoT)

Alshahrani, Mohammed M. 04 December 2019 (has links)
IoT platforms face huge challenges in deploying robust authentication mechanisms due to the fact that edge devices and resource-constrained devices may not have enough compute and storage capabilities to deploy and run existing mechanisms, which involve in general complex computations. Moreover, establishing end-to-end device authentication in the Internet of Things (IoT) networks is challenging because of the heterogeneous nature of IoT devices. One of the well-known challenges confronting the IoT infrastructure is related to authentication. Many IoT devices rely on weak authentication schemes, which has led in the last few years to several successful and widely publicized hacking incidents. According to the ISO/IEC 27002 standard, authentication is the process of determining whether something is, in fact, what it is declared to be. Authentication is considered the main gate to protect IoT networks from various security threats; determining who the entity is (authentication) is of high importance to establish a secure session between IoT devices. This dissertation identifies gaps in the literature and presents new authentication schemes and security mechanisms to improve IoT security and privacy against common attacks such as replay and impersonation. This research enhances IoT security and privacy by introducing a new lightweight mutual authentication and key exchange protocol for IoT based on dynamic identity and cumulative chained-hash. Nodes can anonymously and mutually authenticate and establish a session with the controller node using dynamic identities and temporary symmetric keys in an unlinkable and untraceable manner. Moreover, the enforcement of security policies between nodes is guaranteed by setting up virtual domain segregation and restricting node capabilities of sending and receiving data to or from other nodes. The Cumulative chained-hash technique is introduced as a way to ensure the identity of the sender (through challenge-response). Additionally, we introduce a new anonymous device- to-device mutual authentication and key exchange protocol based on the ZigBee technique. The proposed protocol relies on symmetric encryption and counter and enables IoT devices to authenticate in the network and agree on a shared secret session key when communicating with each other via a trusted intermediary (home controller). To achieve forward secrecy, the session keys are changed frequently after every communication session. The proposed scheme achieves secure, anonymous authentication with the unlinkability and untraceability of IoT device transactions. The security of the protocols is evaluated and simulated using three different methods: informal analysis, formal analysis using the Burrows–Abadi–Needham logic (BAN), and model-checking using the automated validation of Internet security protocols and applica- tions (AVISPA) toolkit. The overhead and efficiency of the proposed schemes are analyzed and compared with other related schemes. The results showed that our protocols are in general more efficient. / Graduate
115

Att använda Azure som IoT plattform

Arvidsson, Moa January 2020 (has links)
Portability of the Internet of Things Solutions is important in today’s society. This is due to the rapid growth of smart devices. More and more companies are choosing to use cloud services for data storage and processing. Halmstad Stadsnät AB is developing and communicating the IoT-platform and using the current state of Nokia IMPACT. The problem with IMPACT is that it does not fully support End-toend solutions. Therefore, Halmstad Stadsnät AB explores other possibilities for IoT-solutions when it comes to software. Microsoft AZURE is a platform that Halmstad Kommun uses for IT-solutions. The overall goal of this project is to test the portability of Microsoft AZURE’s IoT-solutions on IMPACTplatforms. The methods used have created an End-to-end solution for AZURE and then step by step test to transfer it to IMPACT. The project concludes that portability between these two platforms is good, but it requires certain adjustments when transferring / Portabilitet av internet of things lösningar är i dagens samhälle nödvändig. Detta pågrund av den snabba tillväxten av bärbara datorenheter. Allt fler företag väljer att använda molntjänster för lagring och bearbetning av data. Halmstad Kommun håller på att utveckla en kommuntäckande IoT-plattform och använder sig i dagsläget av Nokia IMPACT. Problemet med IMPACT är att den inte har fullt stöd för End-to-end lösningar. Därför undersöker Stadsnätet andra möjligheter för IoT-lösning när det kommer till mjukvara. Microsoft AZURE är en plattform som Halmstad kommun använder för IT lösningar. De övergripande målet med det här projektet är att testa portabiliteten för Microsoft AZUREs IoTlösnignar på IMPACT-plattformen. De metoder som använts har varit att skapa en End-to-end lösning för AZURE och sedan steg för steg testa att överföra den till IMPACT. Slutsatsen av projektet är att portabilitet mellan dessa två plattformar är god, men dock krävs vissa åtgärder vid överföring.
116

What are the Problems with Implementing Blockchain Technology for Decentralized IoT Authentication : A Systematic Literature Review

Kortzon, Daniel January 2020 (has links)
The implementation of internet of things is plagued by problems such as security and scalability. It is a very heterogeneous environment and overcoming these hurdles is therefore not an easy feat. A concept of using the decentralized and secure nature of the blockchain technology to combat these problems have been identified. However the stark contrast of blockchain technology being resource hungry and internet of things devices being resource depraved is among other things a new hurdle that is introduced. This systematic literature study aimed to identify problems that a rose when trying to merge these technologies while focusing on the authentication aspect.Smart contracts play a huge role in making most of the identified solutions at least feasible to implement on a larger scale. While most systems have solved the authentication problem the major problems of the blockchain adaptation for internet of things remains unsolved. Three solutions were identified that really try to combat these problems by changing the blockchain technology at its core while the rest feel like they are trying to do the best with what is available and falls short in some major way.
117

DESIGN OF EMBEDDED POWER SIGNATURE GENERATION CIRCUITS FOR INTERNET OF THINGS SECURITY

Thompson, David 01 May 2020 (has links)
With the wide adoption of Internet of Things (IoT) in applications that involve sensitive information, the security of IoT devices is becoming an important concern. IoT devices face many challenges in securing information due to their low cost and computation constrains. To over come such challenges, different techniques have been developed. One such technique is power analysis. However, power analysis requires equipment that is often bulky, power hungry and expensive, making them unsuitable for many IoT applications. This thesis developed two energy signature capturing circuits that can be embedded into low dropout (LDO) voltage regulators. The first design targets analog LDO circuits and the second design is suitable for the newly emerged digital LDOs. Both circuits are designed and simulated using a commercial 130nm CMOS technology. To evaluate the effectiveness of the developed circuits, power traces collected from a wireless sensor device are used in circuit simulations. The results indicate that the developed circuits can detect different model wireless transmission as well as other abnormal operations.
118

IoT security and privacy assessment using software-defined radios

Becker, Johannes Karl 23 May 2022 (has links)
The Internet of Things (IoT) has seen exceptional adoption in recent years, resulting in an unprecedented level of connectivity in personal and industrial domains. In parallel, software-defined radio (SDR) technology has become increasingly powerful, making it a compelling tool for wireless security research across multiple communication protocols. Specifically, SDRs are capable of manipulating the physical layer of protocols in software, which would otherwise be implemented statically in hardware. This flexibility enables research that goes beyond the boundaries of protocol specifications. This dissertation pursues four research directions that are either enabled by software-defined radio technology, or advance its utility for security research. First, we investigate the anti-tracking mechanisms defined by the Bluetooth Low Energy (BLE) wireless protocol. This protocol, present in virtually all wearable smart devices, implements address randomization in order to prevent unwanted tracking of its users. By analyzing raw advertising data from BLE devices using SDRs, we identify a vulnerability that allows an attacker to track a BLE device beyond the address randomization defined by the protocol. Second, we implement a compact, SDR-based testbed for physical layer benchmarking of wireless devices. The testbed is capable of emulating multiple data transmissions and produce intentional signal corruption in very precisely defined ways in order to investigate receiver robustness and undefined device behavior in the presence of malformed packets. We subject a range of Wi-Fi and Zigbee devices to specifically crafted packet collisions and "truncated packets" as a way to fingerprinting wireless device chipsets. Third, we introduce a middleware framework, coined "Snout", to improves accessibility and usability of SDRs. The architecture provides standardized data pipelines as well as an abstraction layer to GNU Radio flowgraphs which power SDR signal processing. This abstraction layer improves usability and maintainability by providing a declarative experiment configuration format instead of requiring constant manipulation of the signal processing code during experimentation. We show that Snout does not result in significant computational overhead, and maintains a predictable and modest memory footprint. Finally, we address the visibility problem arising from the growing number of IoT protocols across large bands of radio spectrum. We model an SDR-based IoT monitor which is capable of scanning multiple channels (including across multiple protocols), and employs channel switching policies to maximize freshness of information obtained by transmitting devices. We present multiple policies and compare their performance against an optimal Markov Decision Process (MDP) model, as well as through event-based simulation using real-world device traffic. The results of this work demonstrate the use of SDR technology in privacy and security research of IoT device communication, and open up opportunities for further low-layer protocol discoveries that require the use of software-defined radio as a research tool.
119

Security for the Internet of Things

Cooper, Ke'ahi January 2015 (has links)
The Internet of Things (IoT) is an emerging paradigm that will change theway we interact with objects and computers in the future. It envisions a globalnetwork of devices interacting with each other, over the Internet, to perform auseful action. As such, quite a number of useful and benecial applications ofthis technology have been proposed.Although a convenient technology, the use of IoT technology will add additionalrisks to our lives that the traditional Internet did not have. This is primarilybecause IoT technology allows the virtual world to directly aect the physicalworld.Therefore, ensuring security is of paramount importance for IoT technology. Assuch, this thesis has two aims. First, we will identify the security issues for IoTtechnology as well as highlight what approaches academia has developed to resolvethem. This will allow us to see the state of this technology along with whatstill needs to be done in the future. Secondly, we will analyze some security protocolsproposed by academia and evaluate whether they ensure condentialityand authenticity.A literature survey is used to achieve the rst goal and the results show thatalthough a lot of research has been performed regarding security for IoT environments.We still have quite a way to go before a full holistic system isdeveloped which ensures all the security requirements for IoT.The results for the security protocol analysis shows that less than half of theprotocols proposed ensured authenticity and condentiality; despite the factthat their respective papers claim that they did. Therefore, we emphasize thefact that good peer reviews need to be enforced and that protocols need to bevalidated to ensure what is proposed performs as described.
120

More than downloading : Toward a scale with wireless connectivity

Ahmid, Abdel January 2012 (has links)
Sensors are light-weight, low powered devices that measure some aspect of a physical or virtual environment and transmit this information in some format. This thesis describes how to integrate a sensor onto devices to enable network connectivity. The phrase “internet of things” suggests that within a few years many devices will be connected to an internet. Devices, including common household appliances, will transmit and receive data over a network. The CEO of Ericsson has stated that there will be more than 50 billion connected devices by 2020[1]. These devices could be microwaves, fridges, lights, or temperature sensors. Devices that are usually not associated with internet connectivity will be integrated into networks and play a larger role in providing information and controlling other devices. Sensors will have a major role in “the internet of things”. These small computers could be integrated in any appliances and transmit data over the network. The sensors’ low power and low cost, as well as their light weight, makes them very attractive to integrate them into many devices. The goal of this thesis project is to build upon this trend toward “The internet of things” by integrating a sensor into a bathroom scale thus enabling the scale to have networking connectivity. The sensor will be low cost and simple. It should wirelessly or via USB transmit the current weight that it measures to a receiver (specifically a gateway). This gateway will forward the message over the network to a website or mobile phone for visual presentation of the data. This thesis describes different techniques and approaches toward developing this sensor. The thesis also evaluates these different choices in order to select one technique that will be implemented. This solution will be evaluated in terms of its cost and ease of integration into an existing commercially produced scale. / Sensorer är små, energieffektiva apparater som upptäcker variationer i förhållande till någon stimulans och skickar informationen i ett godtyckligt format. Den här uppsatsen beskriver hur man kan integrera en sensor med en apparat för att möjliggöra nätverksuppkoppling. Uttrycket ”The Internet of things”, översatt på svenska som ”Internet av saker”, konstaterar att inom några år så kommer den mesta av vardaglig elektronik vara uppkopplad mot Internet. Hemelektroniken kommer att skicka och ta emot data över ett nätverk. Ericsson tror att det kommer att vara över 50 miljarder uppkopplade apparater år 2020[1]. Sådana apparater kan vara mikrovågsugnar, frysar, lampor eller termometrar. Apparater som vanligtvis inte förväntas vara uppkopplade mot ett nätverk kommer att bli uppkopplade för att tillföra eller kontrollera information och andra apparater. Sensorer har en viktig roll i denna utveckling. De är små datorer som kan kopplas upp mot flertalet elektroniska apparater och förse dem med en nätverksuppkoppling för att skicka betydelsefull data över ett nätverk. Energieffektiviteten och de låga kostnaderna, så väl som deras små storlekar, gör dem dessutom väldigt attraktiva. Målet med den här uppsatsen är att påbygga ”The Internet of things” genom att tillförse en personvåg med en sensor för att möjliggöra nätverksuppkoppling. Sensor ska vara enkel och billig. Den kommer att trådlöst eller via USB skicka vikter till en mottagare som sedan skickar vidare informationen över nätverket till en hemsida eller mobiltelefon för en grafisk presentation av informationen. Den här rapporten beskriver dem olika teknikerna och approachen mot utvecklingen av sensorn.

Page generated in 0.2748 seconds