Spelling suggestions: "subject:"1nternet off chings (IoT),"" "subject:"1nternet off bushings (IoT),""
71 |
Self-adaptation for Internet of things applications / Auto-adaptation pour les applications de l’Internet des objetsAcosta Padilla, Francisco Javier 12 December 2016 (has links)
L'Internet des Objets (IdO) couvre peu à peu tous les aspects de notre vie. À mesure que ces systèmes deviennent plus répandus, le besoin de gérer cette infrastructure complexe comporte plusieurs défis. En effet, beaucoup de petits appareils interconnectés fournissent maintenant plus d'un service dans plusieurs aspects de notre vie quotidienne, qui doivent être adaptés à de nouveaux contextes sans l'interruption de tels services. Cependant, ce nouveau système informatique diffère des systèmes classiques principalement sur le type, la taille physique et l'accès des nœuds. Ainsi, des méthodes typiques pour gérer la couche logicielle sur de grands systèmes distribués comme on fait traditionnellement ne peuvent pas être employées dans ce contexte. En effet, cela est dû aux capacités très différentes dans la puissance de calcul et la connectivité réseau, qui sont très contraintes pour les appareils de l'IdO. De plus, la complexité qui était auparavant gérée par des experts de plusieurs domaines, tels que les systèmes embarqués et les réseaux de capteurs sans fil (WSN), est maintenant accrue par la plus grande quantité et hétérogénéité des logiciels et du matériel des nœuds. Par conséquent, nous avons besoin de méthodes efficaces pour gérer la couche logicielle de ces systèmes, en tenant compte les ressources très limitées. Cette infrastructure matérielle sous-jacente pose de nouveaux défis dans la manière dont nous administrons la couche logicielle de ces systèmes. Ces défis peuvent entre divisés en : Intra-nœud, sur lequel nous faisons face à la mémoire limitée et à la puissance de calcul des nœuds IdO, afin de gérer les mises à jour sur ces appareils ; Inter-noeud, sur lequel une nouvelle façon de distribuer les mises à jour est nécessaire, en raison de la topologie réseau différente et le coût en énergie pour les appareils alimentés par batterie ; En effet, la puissance de calcul limitée et la durée de vie de chaque nœud combiné à la nature très distribuée de ces systèmes, ajoute de la complexité à la gestion de la couche logicielle distribuée. La reconfiguration logicielle des nœuds dans l'Internet des objets est une préoccupation majeure dans plusieurs domaines d'application. En particulier, la distribution du code pour fournir des nouvelles fonctionnalités ou mettre à jour le logiciel déjà installé afin de l'adapter aux nouvelles exigences, a un impact énorme sur la consommation d'énergie. La plupart des algorithmes actuels de diffusion du code sur l'air (OTA) sont destinés à diffuser un microprogramme complet à travers de petits fragments, et sont souvent mis en œuvre dans la couche réseau, ignorant ainsi toutes les informations de guidage de la couche applicative. Première contribution : Un moteur de modèles en temps d'exécution représentant une application de l'IdO en cours d'exécution sur les nœuds à ressources limitées. La transformation du méta-modèle Kevoree en code C pour répondre aux contraintes de mémoire spécifiques d'un dispositif IdO a été réalisée, ainsi que la proposition des outils de modélisation pour manipuler un modèle en temps d'exécution. Deuxième contribution : découplage en composants d'un système IdO ainsi qu'un algorithme de distribution de composants efficace. Le découplage en composants d'une application dans le contexte de l'IdO facilite sa représentation sur le modèle en temps d'exécution, alors qu'il fournit un moyen de changer facilement son comportement en ajoutant/supprimant des composants et de modifier leurs paramètres. En outre, un mécanisme pour distribuer ces composants en utilisant un nouvel algorithme appelé Calpulli est proposé. / The Internet of Things (IoT) is covering little by little every aspect on our lives. As these systems become more pervasive, the need of managing this complex infrastructure comes with several challenges. Indeed, plenty of small interconnected devices are now providing more than a service in several aspects of our everyday life, which need to be adapted to new contexts without the interruption of such services. However, this new computing system differs from classical Internet systems mainly on the type, physical size and access of the nodes. Thus, typical methods to manage the distributed software layer on large distributed systems as usual cannot be employed on this context. Indeed, this is due to the very different capacities on computing power and network connectivity, which are very constrained for IoT devices. Moreover, the complexity which was before managed by experts on several fields, such as embedded systems and Wireless Sensor Networks (WSN), is now increased by the larger quantity and heterogeneity of the node’s software and hardware. Therefore, we need efficient methods to manage the software layer of these systems, taking into account the very limited resources. This underlying hardware infrastructure raises new challenges in the way we administrate the software layer of these systems. These challenges can be divided into: intra-node, on which we face the limited memory and CPU of IoT nodes, in order to manage the software layer and ; inter-node, on which a new way to distribute the updates is needed, due to the different network topology and cost in energy for battery powered devices. Indeed, the limited computing power and battery life of each node combined with the very distributed nature of these systems, greatly adds complexity to the distributed software layer management. Software reconfiguration of nodes in the Internet of Things is a major concern for various application fields. In particular, distributing the code of updated or new software features to their final node destination in order to adapt it to new requirements, has a huge impact on energy consumption. Most current algorithms for disseminating code over the air (OTA) are meant to disseminate a complete firmware through small chunks and are often implemented at the network layer, thus ignoring all guiding information from the application layer. First contribution: A models@runtime engine able to represent an IoT running application on resource constrained nodes. The transformation of the Kevoree meta-model into C code to meet the specific memory constraints of an IoT device was performed, as well as the proposition of modelling tools to manipulate a model@runtime. Second contribution: Component decoupling of an IoT system as well as an efficient component distribution algorithm. Components decoupling of an application in the context of the IoT facilitates its representation on the model@runtime, while it provides a way to easily change its behaviour by adding/removing components and changing their parameters. In addition, a mechanism to distribute such components using a new algorithm, called Calpulli is proposed.
|
72 |
Design and Implementation of an IoT Solution for Vehicle Access Control in Residential EnvironmentAkinola, Paul January 2019 (has links)
To overcome the hurdles associated with space management and security controls in a housing system, research was projected to study and analyze the necessary factors of accomplishment. Over time, different processes were observed and reviewed to make this a possible deal. Various residents were interviewed on the daily constraints in parking and managing their vehicles within their housing premises. The reported daunting concern was majorly the gate access and personal hunts for the space to keep the individual resident’s cars. Every resident would always have to stop and hoot at the housing gate for the assigned personnel to check and open the gate. While this would waste every resident’s time, the visitors even face more delay often time. Hitherto, car access and parking constraint become a thing of worry that no one would want to engage the housing service anymore. The interest has got dwindled. And to re-awaken the high patronage of the housing system, a gap must be bridged with an immediate solution to space management with a gating system. These were subsequently given a classical thought, while a prototype solution was demonstrated and reviewed with the various residents of some selected housing. This received a high welcoming embracement and was beckoned to be made real by the logical heuristic. At this point, nothing was further considered than using the Internet of things (IoT) technology to implement Vehicular Access Management for the control and integration of intended space provisioning in any housings. Consequently, the number plate of every vehicle becomes the automatic access tag and would be used for security control within the housing location. Vehicles’ numbers would be captured and used to manage the residents passing through the automated gating system. With it, records would be made for all permitted residents and the visitors that own a car. Thus, a proper arrangement would be allotted accordingly, as provisioned by the gating system administrator. However, to allegories the above-proffered solution, this project work is divided into six sections. The introductory section introduces the project rationale, lists the objectives, explores related works, and introduces how IoT and vehicular systems can be merged. The second section delves into these vehicular systems. It introduces the Automatic License Plate Recognition System (ALRP) and the Raspberry Pi and highlights the merits of the Integrated Vehicular Access Security System. Open-CV and machine learning are also introduced. Section three covers the solution design, while section four is the implementation phase. Section five covers the testing and implementation of the solution. The final section summarizes the project. The project successfully models an automated solution for the security of tenants and vehicle users against unauthorized access to residential estates and buildings.
|
73 |
THE ECO-SMART CAN V2.0Nanto, Darack B 05 April 2018 (has links)
I noticed that the workers had the same itinerary when emptying trashcans, meanwhile trashcans needed urgently to be emptied. Traditionally, ETSU maintenance operate on daily routes to pick trash on designated time, regardless the level of the containers. This leads to overflown trashcan in busy areas or during rush hours in certain areas. This overflown trashcan result in an unclean environment for the community and an unpleasant look of our beautiful campus. The time, resources and labor invested in collecting the trash could be saved. Therefore, I decided to use the Internet of Things (IoT) to create a device that will optimize trash collection, to reduce costs and pollution. The Eco-Smart Can will contain a renewable source of energy such as the solar panel. Furthermore, it will have a compactor as well to decrease the trash volume. The system in the Eco-Smart can will give prior information of the trash level to maintenance facility so that they can empty the trash in a timely manner and preserve the environment.
|
74 |
The Privacy Paradox: Factors influencing information disclosure in the use of the Internet of Things (IoT) in South AfricaDavids, Natheer 21 January 2021 (has links)
The Internet of Things (IoT) has been acknowledged as one of the most innovative forms of technology since the computer, because of the influence it can have on multiple sectors of physical and virtual environments. The growth of IoT is expected to continue, by 2020 the number of connected devices is estimated to reach 50 billion. Recent developments in IoT provide an unprecedented opportunity for personalised services and other benefits. To exploit these potential benefits as best as possible, individuals are willing to provide their personal information despite potential privacy breaches. Therefore, this paper examines factors that influence the willingness to disclose personal information in the use of IoT in South Africa (SA) with the use of the privacy calculus as the theoretical underpinnings of this research. The privacy calculus accentuates that a risk-benefit trade off occurs when an individual decides to disclose their personal information, however, it is assumed that there are more factors than perceived risks and perceived benefits that influence information disclosure. After analysing previous literature, this study identified the following factors; information sensitivity, privacy concerns, social influence, perceived benefits, (perceived) privacy risks and privacy knowledge as possible key tenants in relation to willingness to disclose personal information. This research took on an objective ontological view, with the underlying epistemological stance being positivistic. The research incorporated a deductive approach, employing the use of a conceptual model which was constructed from a combination of studies orientated around privacy, the privacy calculus and the privacy paradox. Data for this research was collected using the quantitative research approach, through the use of an anonymous online questionnaire, where the targeted population was narrowed down to the general public residing within SA that make use of IoT devices and/or services. Data was collected using Qualtrics and analysed using SmartPLS 3. SmartPLS 3 was used to test for correlations between the factors which influence information disclosure in the use of IoT by utilising the complete bootstrapping method. A key finding was that the privacy paradox is apparent within SA, where individuals pursue enjoyment and predominantly use IoT for leisure purposes, while individuals are more likely to adopt self-withdrawal tendencies when faced with heightened privacy concerns or potential risks.
|
75 |
A realistic named data networking architecture for the Internet of things / Une Architecture NDN realiste pour l'Internet des ObjetsAbane, Amar 02 December 2019 (has links)
L’Internet des objets (IdO) utilise l’interconnexion de milliards de petits appareils informatiques, appelés «Objets», pour fournir un accès à des services et à des informations partout dans le monde. Cependant, la suite de protocoles IP a été conçue il y a plusieurs décennies dans un but totalement différent, et les fonctionnalités de l’IoT soulignent désormais les limites de l’IP. En parallèle aux efforts d’adaptation de l’IP à l’IdO, des architectures alternatives basées sur les réseaux orientés information promettent de satisfaire nativement les applications Internet émergentes. L’une de ces architectures est appelée réseau de données nommées (NDN). Nos objectifs à travers le travail rapporté dans ce manuscrit peuvent êtrerésumés en deux aspects. Le premier objectif est de montrer que NDN est adapté à la prise en charge des systèmes IdO. Le deuxième objectif est la conception de deux solutions de communication légères pour les réseaux sans fil contraints avec NDN. / The Internet of Things (IoT) uses the interconnection of billions of small computing devices, called “Things”, to provide access to services and information all over the world. However, the IP protocol suite has been designed decades ago for a completely different purpose, and IoT features now highlight the limitations of IP. While adapting IP for the IoT might be seen as cutting corners, alternative architectures based on the Information Centric Networking (ICN) paradigm promise to natively satisfy emerging Internet applications. One of these architectures is Named Data Networking (NDN). Our objectives through the work reported in this manuscript can be summarized in two aspects. The first objective is to show that NDN is suitable to support IoT networking. The second objective is the design of two solutions for lightweight forwarding in constrained wireless networks.
|
76 |
[en] FIOT: AN AGENT-BASED FRAMEWORK FOR SELF-ADAPTIVE AND SELF-ORGANIZING INTERNET OF THINGS APPLICATIONS / [pt] FIOT: UM FRAMEWORK BASEADO EM AGENTES PARA APLICAÇÕES AUTO-ORGANIZÁVEIS E AUTOADAPTATIVAS DE INTERNET DAS COISASNATHALIA MORAES DO NASCIMENTO 01 June 2016 (has links)
[pt] A ideia principal da Internet das Coisas (IoT) é conectar bilhões de
coisas à Internet nos próximos anos, a exemplo de carros, roupas e comidas.
Entretanto, muitos problemas precisam ser resolvidos antes que essa
ideia possa ser concretizada. Alguns desses problemas estão relacionados à
necessidade de construir sistemas para IoT que sejam auto-organizáveis e
autoadaptativos. Este trabalho, portanto, apresenta a elaboração do Framework
para Internet das Coisas (FIoT), que oferece suporte ao desenvolvimento
de aplicações para IoT com essas características. Ele é baseado nos
paradigmas de Sistemas Multiagente (SMA) e algumas técnicas abordadas
em Aprendizado de Máquina, a exemplo de redes neurais e algoritmos evolutivos.
Um agente pode ter algumas características, como autonomia e
sociabilidade, que tornam SMAs compatíveis com sistemas que requerem
auto-organização. Redes neurais e algoritmos de evolução vêm sendo comumente
usados nos estudos de robótica, no intuito de prover autonomia e
adaptação à agentes físicos (ex.: robôs, sensores). Para demonstrar o uso
do FIoT, dois grupos de problemas em IoT serão instanciados: (i) Cidades
Inteligentes e (ii) Quantificação de Coisas. / [en] The agreed fact about the Internet of Things (IoT) is that, within
the coming years, billions of resources, such as cars, clothes and foods will
be connected to the Internet. However, several challenging issues need to
be addressed before the IoT vision becomes a reality. Some open problems
are related to the need of building self-organizing and self-adaptive IoT
systems. To create IoT applications with these features, this work presents a
Framework for Internet of Things (FIoT). Our approach is based on concepts
from Multi-Agent Systems (MAS) and Machine Learning Techniques, such
as a neural network and evolutionary algorithms. An agent could have
characteristics, such as autonomy and social ability, which makes MAS
suitable for systems requiring self-organization (SO). Neural networks and
algorithms of evolution have been commonly used in robotic studies to
provide embodied agents (as robots and sensors) with autonomy and
adaptive capabilities. To illustrate the use of FIoT, we derived two different
instances from IoT applications: (i) Quantified Things and (ii) Smart Cities.
We show how exible points of our framework are instantiated to generate
an application.
|
77 |
Wireless Beehive Monitoring : Using edge computing and TinyML to classify soundsHolmgren, Mattias, Holmér, Elias January 2022 (has links)
As an essential and indispensable contributor to pollinating the world's crops and plants, the honey bee is key to the sustainability of humans' and our ecosystems' continued survival. Following in the footsteps of the companies TietoEvry and Beelabs project, this report also works towards monitoring bees during their daily activities. This project aims to investigate the feasibility of using wireless, battery-driven devices inside beehives to detect the sound of bees using machine learning for edge devices. Beelab has focused on measurements in and around the beehive regarding weight, temperature, barometric pressure and humidity. Sound analysis is still in its infancy with few finished working alternatives; therefore, this project will focus on the sound attribute by implementing machine learning and classification algorithms and applying it to a prototype—the progress is thoroughly documented in this report. The device records a snippet of sound and prepares to send it over a wireless transmission medium. By streamlining the code and optimizing the hardware, the device runs continuously for a month using a small, cheap battery.
|
78 |
PAN-Analys av IKEA TRÅDFRI. : En fördjupning av säkerhetsrisker kopplade till OTA-uppdateringar inom IKEA TRÅDFRI:s PAN.Jönsson, Linus, Schenström, Oscar January 2020 (has links)
Purpose – The purpose of this study is to elaborate security risks with OTA updates within TRÅDFRI:s PAN. To ensure that today’s IoT devices maintains a high and robust standard to protect end-user’s integrity. Method – To answer the questions and to provide research-based evidence the study was carried out as a case study and two methods were applied in the study. An initial literature review in which the Zigbee protocol and it´s process for certification as well as OTA updates was studied. The literature review was followed by a qualitative experiment with focus on how IKEA implemented the PAN-security in practice. Findings – The findings show reduced security within the TRÅDFRI:s PAN when a third party device performs the OTA update. The experiments also questions parts of the certificate issued by Zigbee Alliance. Implications - Due to the increasing popularity of IoT devices, requirements are increasing from a data security perspective. The data security perspective is more important than ever and take up significantly more space during the development process as well as during the life cycle. This study discusses the OTA updates impact on integrity as well as how an established IoT company, such as IKEA, has implemented this necessary feature to maintain its products during the products life cycle. Limitations – Data gathered from the experiment was limited to TRÅDFRI E27 LED Bulb and therefore the result cannot be seen as a generalization of all TRÅDFRI products.
|
79 |
Where Did The Car Go? : Smart cities, calm technology and the future of autonomous carsMasséus, Jonatan January 2020 (has links)
Urbanization has been a growing trend in the past fifty years. Cities are now transforming into smart cities, spaces whose infrastructure comprises an embedded digital layer. Hardware collects real-time data in the urban environment and software elaborates it to improve all types of services, from traffic to waste management to well-being. One technology that is expected to use this digital layer to further change the urban environment is the autonomous car. The purpose of this dissertation is to explore what key design attributes future autonomous cars should possess if they have not only to co-exist with and be accepted by people in the landscape of tomorrow’s smart cities, but also what they should not possess in order not to cause any harm. In this sense, the dissertation recognizes calm technology to be necessary in the design of a future autonomous car to support a human-centered, as opposed to a car- or technology-centered, environment. A socio-technical and systemic lens is applied to the phenomenological investigation of nine companies carried out by means of twelve in-depth semi-structured interviews with experts working within the automotive sector, the smart city industry, and calm technology. Eight attributes (safety, on-demand, geo-tracking, sharing, multiple purposes, communication through smart devices, electrical care and IoT/connectedness) are identified as necessary for future autonomous cars to implement in order to take advantage of the smart city infrastructure and provide a human-centered experience. Additionally, six out of the eight calm technology principles recognized in literature are considered necessary when designing future autonomous cars.
|
80 |
Sécurisation de l'Internet des objets / Securing the Internet of thingsHammi, Mohamed Tahar 17 September 2018 (has links)
L'Internet des Objets ou en anglais the Internet of Things (IoT) représente aujourd'hui une partie majeure de notre vie quotidienne. Des milliards d'objets intelligents et autonomes, à travers le monde sont connectés et communiquent entre eux. Ce paradigme révolutionnaire crée une nouvelle dimension qui enlèveles frontières entre le monde réel et le monde virtuel. Son succès est dû à l’évolution des équipements matériels et des technologies de communication notamment sans fil. L’IoT est le fruit du développement et de la combinaison de différentes technologies. Il englobe presque tous les domaines de la technologie d’information (Information Technology (IT)) actuels.Les réseaux de capteurs sans fil représentent une pièce maîtresse du succès de l'IoT. Car en utilisant des petits objets qui sont généralement limités en terme de capacité de calcul, de mémorisation et en énergie, des environnements industriels, médicaux, agricoles, et autres peuvent être couverts et gérés automatiquement.La grande puissance de l’IoT repose sur le fait que ses objets communiquent, analysent, traitent et gèrent des données d’une manière autonome et sans aucune intervention humaine. Cependant, les problèmes liés à la sécurité freinent considérablement l’évolution et le déploiement rapide de cette haute echnologie. L'usurpation d’identité, le vols d’information et la modification des données représentent un vrai danger pour ce système des systèmes.Le sujet de ma thèse consiste en la création d'un système de sécurité permettant d’assurer les services d’authentification des objets connectés, d’intégrité des données échangées entres ces derniers et de confidentialité des informations. Cette approche doit prendre en considération les contraintes des objets et des technologies de communication utilisées. / Internet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints.
|
Page generated in 0.1004 seconds