• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 678
  • 143
  • 109
  • 36
  • 34
  • 26
  • 16
  • 10
  • 9
  • 8
  • 7
  • 5
  • 5
  • 5
  • 2
  • Tagged with
  • 1200
  • 1200
  • 372
  • 279
  • 276
  • 257
  • 245
  • 217
  • 207
  • 163
  • 159
  • 139
  • 137
  • 126
  • 122
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
341

Evaluation and Implementation for Pushing Automatic Updates to IoT Devices

Min, Menglei January 2017 (has links)
In recent years, Internet of Things has developed rapidly, and now has penetrated into human life and industrial production. It is speculated that the internet of things will become ubiquitous in the future, which will bring a series of problems. First, the large number of things will lead to operated system and software updates consuming a lot of manpower and resources. Another problem is the Internet of things facing security issues, in recent years for the means of Internet of things and tools have been increasing largely. Therefore, to achieve a secure automatic update on the Internet of Things is essential. This report will follow such an automatic update system based on Internet of things to expand. First it elaborated on the main motive of this problem, found three existing related works and three security methods for communication to analyze. Then combined results of analysis, put forward own a secure automatic update solution: manager and devices connect and mutual authentication in real time, at the same time, the manager will regularly check the database to see if there is new version application. When the administrator uploads a new version, the manager will download the version and then sends to all devices, then device installs and finally restart itself. Next, the report described how to implement this system in detail and evaluated it. In the end, this report summarized and introduces the future work.
342

REST/HTTP Access to the SensibleThings Platform

Liu, Ying January 2017 (has links)
The Internet of Things (IoT), also called the Internet of Everything or the Industrial Internet, is a new technology paradigm regarded as a global network of machine and devices capable of interacting with each other. Internet of things (IoT) is closely related to numerous fields. The IoT platform is a suite of components that enable deployment of applications, independent and secure connectivity between devices, device/sensor management and integration with 3rd party systems. With increased demand of utilize the platform by web access, the task of this thesis is to develop a RESTful web service for specific IoT platform – SensibleThings platform using Jersey framework. Then measuring the web server under two scenarios and evaluating. Finally, I present the future work for the RESTful web service to improve its functions.
343

Perceived and Identified Security Risks in Smart Home Technology : A case study of three Chinese companies

Hasl, Caroline January 2017 (has links)
The interest and demand for smart home technologies has increased rapidly during the past few years. Due to factors such as convenience, innovation, flexibility, and security, these products are becoming a bigger part of our everyday life. With the increased demand and need for this technology, companies are working quickly to try to meet this demand and need of their customers. The development is becoming faster and faster, and therefore the risk of security being overlooked has increased. Companies want to meet the demand, and by trying to get the products on the market faster, other aspects might be compromised. A country which is often looked to for development and production of products is China. China is believed to be one of the countries with the most promising future for smart technologies and Internet of Things due to the immense investment put into telecommunications, development of technologies, and supporting infrastructure. The research of this thesis sought to investigate what effects the increased interest and demand for smart technologies has had on companies who are working with smart home technology by conducting a multiple case study on three companies in China which are in the smart home technology industry. With this case study, the perspective from the three companies has been gathered and analyzed. The research resulted in finding out the perception which these three companies have on the rapid development of smart home technologies, and the firsthand effects it has had on their individual company.
344

Connecting Arduino Sensors to SensibleThings

Guan, Xiao January 2016 (has links)
The Internet of Things is going to bring the Internet into every objectsaround us. To enable this ambitious idea, tiny devices have to be connected within the global Internet. Such devices are extreme small so it’sbecoming a challenge to connect it to the Internet via TCP/IP. The thesispresents a way of connecting microcontrollers with other devices to jointlyform a distributed network.The thesis investigates and takes advantage of Internet of Things platform to implement the connection. SensibleThings is used as the platform. Limited by the hardware, microcontroller can’t run such a bloatedplatform. The thesis investigates different microcontrollers characteristics and chooses Arduino as a representative in the work. Then it realizes a bridge connection between Arduino and SensibleThings. Arduinois connected with a single-board computer, Raspberry Pi by a USB cable.SensibleThings is running on Raspberry Pi to process the network messages. The channel throughput, latency and general usability are measured and interoperated. As a result, the data indicates this is a promising, flexible, cost effective network topology. Microcontroller can join adistributed network by the bridge. Comparing to dedicate hardware solution, the bridge connection cuts down the implementation difficultiesand cost. The thesis also covers possible problems in such connection andproposes future work.
345

Attribute-Based Encryption in Systems with Resource Constrained Devices in an Information Centric Networking Context

Borgh, Joakim January 2016 (has links)
An extensive analysis of attribute-based encryption (ABE) in systems with resource constrained devices is performed. Two system solutions of how ABE can be performed in such systems are proposed, one where the ABE operations are performed at the resource constrained devices and one where ABE is performed at a powerful server. The system solutions are discussed with three different ABE schemes. Two of the schemes are the traditional key policy ABE (KP-ABE) and ciphertext policy ABE (CP-ABE). The third scheme is using KP-ABE to simulate CP-ABE, in an attempt to benefit from KP-ABE being computationally cheaper than CP-ABE while maintaining the intuitive way of using CP-ABE. ABE is a computationally expensive encryption method which might not be feasible to perform at the resource constrained sensors, depending on the hardware. An implementation of a CP-ABE scheme with a 128 bit security level was written and used to evaluate the feasibility of ABE on a sensor equipped with an ARM Cortex-M3 processor having 32 kB RAM and 256 kB flash. It is possible to perform CP-ABE on the sensor used in this project. The limiting factor of feasibility of ABE on the sensor is the RAM size. In this case policy sizes up to 12 attributes can be performed on the sensor. The results give an idea of the feasibility of encryption with ABE on sensors. In addition to the results several ways of improving performance of ABE on the sensor are discussed.
346

Sakernas internet: Digitalisering inom den digitala sfären : En undersökning av integritet, personlig data och tjänsteutveckling i ett framtidssamhälle

Johansson Stålnacke, Ludvig, Pettersson, Fredrik January 2016 (has links)
With the invention and rise of the Internet of Things, a technology that facilitates the gathering and use of personal data, the importance of the security and the integrity of the user has increased. The purpose of this study is to investigate the different outlooks of two different target groups, professional developers and users, on the subject of integrity and personalization in the digital sphere of systems development. A qualitative approach was used for this study. Interviews were conducted with 6 different professionals in the field of development and design. To gather data from the nonprofessionals a survey was used. The data was then analyzed using qualitative content analysis. The result implies that users are more concerned with the impact Internet of Things have on their privacy and integrity than the producers. We conclude that this stems from not enough awareness from the consumers of the actual risks and benefits of personalization. From our analysis we then developed a model to aid developers in working with consumers. This framework allows the user to divulge only the data they are comfortable with, while also giving them the opportunity to receive a more tailored service if they choose to share more.
347

Audio streaming on top of 802.11n in an IoT context : An implementation along with a literature study of wireless IoT standards / Ljudströmning över 802.11n i en IoT-kontext : En implementation samt en litteraturstudie kring trådlösa IoT-standarder

Uttermalm, Johan January 2016 (has links)
The Internet of Things (IoT) is a concept that revolves around ordinary devices that are connected to the internet for extended control and ease of use. Altran, a company dealing in high technology and innovation consultancy, predicts a large growth in business opportunities in the IoT area in the coming years, and therefore wants to invest in knowledge about the Internet of Things. Altran wanted a report that described popular wireless IoT communication technologies along with a proposal for a general IoT communication platform or base that could be used to implement many of these technologies. Additionally, an audio streaming application were to be implemented on the proposed platform to validate its credibility. The project resulted in a report on 6 different wireless IoT technologies: Z-wave, ZigBee, Thread, Bluetooth, 802.11n, and 802.11ah. A hardware and software base was proposed that could implement 4 of 6 of these technologies. This base was the Raspberry Pi 2 along with the Raspbian Jessie operating system. Finally an audio streaming system that could stream data to a set of smart Speaker nodes over wireless links based on IEEE 802.11n was implemented on the proposed base.
348

Systèmes mobiles émergents dans l’IoT : de l’interopérabilité au niveau middleware de communication à l’analyse de la qualité de service associée / Enabling emergent mobile systems in the IoT : from middleware-layer communication interoperability to associated QoS analysis

Bouloukakis, Georgios 01 August 2017 (has links)
Les applications de l'Internet des objets (IdO/IoT) se composent de divers objets en grande partie mobiles et avec des ressources limitées ou riches. Des tels dispositifs exigent des interactions légères et faiblement couplées en termes de temps, d'espace et de synchronisation. Les protocoles au niveau middleware de l'IoT prennent en charge un ou plusieurs types d'interaction assurant la communication entre objets. De plus, ils supportent différents niveaux de Qualité de service (QDS) pour cette communication par rapport aux ressources disponibles sur les dispositifs et les réseaux. Les dispositifs utilisant le même protocole middleware interagissent de manière homogène, car ils exploitent les mêmes caractéristiques fonctionnelles et de QDS. Cependant, la profusion de protocoles middleware pour l'IoT se traduit par des objets très hétérogènes. Cela nécessite des solutions d'interopérabilité avancées intégrées à des techniques de modélisation et d'évaluation de la QDS. La principale contribution de cette thèse est d'introduire une approche et de fournir une plate-forme pour la synthèse automatique des artefacts logiciels permettant l'interopérabilité. De tels artefacts permettent l'interconnexion entre des objets mobiles qui utilisent des protocoles hétérogènes au niveau middleware. Notre plate-forme prend en charge l'évaluation de l'effectivité de l'interconnexion en termes de la QDS de bout en bout. Plus précisément, nous dérivons des conditions formelles pour des interactions réussies, et nous permettons la modélisation et l'analyse des performances ainsi que le réglage du système de bout en bout, tout en considérant plusieurs paramètres système pour l'IoT mobile. / Internet of Things (IoT) applications consist of diverse Things including both resource-constrained/rich devices with a considerable portion being mobile. Such devices demand lightweight, loosely coupled interactions in terms of time, space, and synchronization. IoT middleware protocols support one or more interaction types (e.g., asynchronous messaging, streaming) ensuring Thing communication. Additionally, they introduce different Quality of Service (QoS) features for this communication with respect to available device and network resources. Things employing the same middleware protocol interact homogeneously, since they exploit the same functional and QoS features. However, the profusion of developed IoT middleware protocols introduces technology diversity which results in highly heterogeneous Things. Interconnecting heterogeneous Things requires mapping both their functional and QoS features. This calls for advanced interoperability solutions integrated with QoS modeling and evaluation techniques. The main contribution of this thesis is to introduce an approach and provide a supporting platform for the automated synthesis of interoperability software artifacts. Such artifacts enable the interconnection between mobile Things that employ heterogeneous middleware protocols. Our platform further supports evaluating the effectiveness of the interconnection in terms of end-to-end QoS. More specifically, we derive formal conditions for successful interactions, and we enable performance modeling and analysis as well as end-to-end system tuning, while considering several system parameters related to the mobile IoT.
349

A study of application layer protocols within the Internet of Things

Sohlman, Patrik January 2018 (has links)
The Internet of Things market grows at an extreme rate each passing year. Devices will gather more data, which puts a lot of pressure on the communication between the devices and the cloud. The protocols used needs to be fast, secure, reliable and send any type of content. This thesis work conducts a research of the three most popular application level protocols ; MQTT, HTTP and AMQP, to examine which is best suited in an Internet of Things environment. The project is made with Axians AB to provide insight regarding the protocols, so that the company can decide which protocol will be best suited for their projects. A theoretical study of the performance was made, followed by case studies on different aspects of the protocol. The case studies were made using a Dell gateway and a 4G connection to mimic a real world project. Scripts were developed to measure different performance attributes of the protocols. The analysis and discussion of the results proved that MQTT or AMQP is the best protocols, depending on the project.
350

Privacy preservation in internet of things : a game theory based approach / Protection de la vie privée dans internet des objets : une approche basée théorie des jeux

Riahi Sfar, Arbia 16 November 2017 (has links)
La question de sécurité a toujours constitué un défi pour les chercheurs dans le domaine des réseaux de communication. L’apparition de nouveaux paradigmes, applications et des technologies d’un côté ; l’ubiquité et l’hétérogénéité des entités communicantes d’un autre côté, ont induit des problèmes de sécurité très complexes. Les préjudices engendrés sur la vie privée des utilisateurs peuvent être irréparables. D’abord, nous avons proposé une approche systémique et cognitive permettant d’inclure les aspects de sécurité d’Internet des Objets (IdO) dans un cadre cohérent. Comparé à l’approche analytique, elle peut manquer de rigueur théorique, mais reste flexible et utilisable dans la prise de décision dans l’environnement ubiquitaire d’IdO. Ensuite, nous avons défini des questions liées aux menaces accidentelles ou intentionnelles, pouvant arriver en cas de compromission de données privées échangées. La caractérisation du problème a eu lieu en étudiant les concepts fondamentaux dans IdO et les travaux de recherche effectués dans le contexte de la sécurité. En examinant les différents travaux de recherche, nous avons constaté que plusieurs solutions classiques restent applicables de point de vue sécurité mais sont limitées par des contraintes d’énergie, de mémoire et de capacité de calcul. Pour y remédier, nous avons visé à construire une réponse pragmatique en utilisant la théorie des jeux. L’avantage de cette approche réside dans ses bases mathématiques et formelles solides permettant d’atteindre les meilleurs équilibres. Après, nous avons justifié analytiquement nos choix portant sur des éléments essentiels de notre système, leurs interactions et leurs objectifs. Nous avons utilisé un calcul probabiliste basé sur un processus Markovien. Dans notre approche, nous avons défini trois scénarios différents (e-santé, commerce et transport intelligent), deux acteurs principaux (DH : Data Holder, et DR : Data Requester), ayant des comportements de types différents (trusted-regular, trusted-curious, untrusted-curious et untrusted-malicious), et un ensemble de stratégies dépendant de quatre paramètres (moyens de communication, détection d’attaque, motivation financière, et concession sur les données privées). Enfin, nous avons montré l’existence d’un équilibre du jeu avec une valeur de motivation financière et un niveau de protection des données privées satisfaisants, et en calculant les probabilités correspondantes. Nous avons validé notre modèle en obtenant des résultats numériques conformes à ceux tirés du modèle théorique. / Security questions have always constituted a research challenge in the field of communication networks. The appearance of new paradigms, concepts, applications and technologies from one hand, and the ubiquity and the heterogeneity of the communicating entities from another hand, led to new complex problems of security. In some cases, the damages caused to the private life of every user can be irreparable. First, we propose a systemic and cognitive approach to include all Internet of Things (henceforth IoT) security aspects in a coherent framework. Compared to the analytic approach, our vision may lack theoretical rigor, but remains a flexible approach that may be required during decision making in ubiquitous environment. Next, we identify precise questions related to accidental or intentional threats, which may lead to private data breach during their exchange over networks. Then, we characterize the privacy problem by studying the fundamental concepts of IoT and the research activities related to security. By examining the related research work, it has been noticed that several classical solutions remain applicable but are limited by energy constraints, memory space, and calculation capacities. To overcome this problem, we propose a logical and controllable solution based on game theory approach. The advantage of this choice resides in its solid mathematical and formal basis. Then, we analytically explain the choice of the main system components, their interactions and their objectives. We used a probabilistic approach using a Markovian process, where we define three different application scenarios (e-health, trade and intelligent transport), two main actors (private data owner and requester) with different player’s types (trusted-regular, trusted-curious, untrusted-curious and untrusted-malicious), and a set of strategies depending on communication facilities, attack detection, incentive motivation and privacy concession. Finally, we evaluate the model by demonstrating the existence of an equilibrium solution with a satisfactory value of incentive motivation and data privacy concession, and by calculating the final state probabilities. We validate the proposed model through numerical results obtained from the theoretical model.

Page generated in 0.0878 seconds