• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 680
  • 143
  • 109
  • 36
  • 34
  • 26
  • 16
  • 10
  • 9
  • 8
  • 7
  • 6
  • 5
  • 5
  • 2
  • Tagged with
  • 1204
  • 1204
  • 375
  • 279
  • 278
  • 257
  • 245
  • 218
  • 207
  • 164
  • 160
  • 139
  • 138
  • 126
  • 122
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Wireless Solutions and Authentication Mechanisms for Contiki Based Internet of Things Networks

KALYONCU, Samet January 2013 (has links)
Internet of Things, is a new expression described as the future of the internet, promises a new world surrounded by tiny smart objects interacting with the environment, communicating with each other, and controlled over internet. Investigating which low power wireless solution and authentication mechanism fits best for IoT networks, and applying these technologies on simulator and real hardware is the main task of this project. Bluetooth Low Energy, ANT, 6LoWPAN and ZigBee are investigated low power wireless technologies which might be used to create an IoT network. Yet, BLTE and ANT have narrower application areas compared to the others, therefore ZigBee and 6LoWPAN technologies are investigated in depth and compared as the 2 promising solutions for implementation and integration of Internet of things concept. SPINS, TinySec, TinyECC, SenSec, MiniSec, ContikiSec and AES CCM are the main security frameworks especially designed for wireless sensor networks providing confidentiality, authentication and integrity. These frameworks were described and compared to find out most suitable authentication mechanism for IoT networks. Contiki OS is used as the operating system of nodes during the implementation of network both on simulator Cooja and real hardware. ZigBee and 6LoWPAN were compared considering interoperability, packet overhead, security and availability. As a result 6LoWPAN came forward due to providing high interoperability and slightly less packet overhead features. ZigBee devices require extra hardware to operate with different technologies. Among the discussed security frameworks, ContikiSec and AES CCM were highlighted because of flexibility, providing different levels of security. Resource limited characteristic and diversity of IoT applications make flexibility a very useful feature while implementing a security framework. Experiments committed to implement a working IoT network were not hundred percent successful. 6LoWPAN was successfully implemented but implementation of the security framework was failed due to compatibility issues between the sensor and the router node. Firmware of the sensor node is not designed to provide any kind of security, therefore security features of the router node is also disabled.
2

Embedded Sensor System mit EtherCAT für Messungen des Raumklimas

Püschel, M., Crämer, P., Kipfelsberger, S., Versen, M. 13 February 2024 (has links)
No description available.
3

AI Planning-Based Service Modeling for the Internet of Things

Bahers, Quentin January 2015 (has links)
It is estimated that by 2020, more than 50 billion devices will be interconnected, to form what is called the Internet of Things. Those devices range from consumer electronics to utility meters, including vehicles. Provided with sensory capabilities, those objects will be able to transmit valuable information about their environment, not only to humans, but even more importantly to other machines, which should ultimately be able to interpret and take decisions based on the information received. This “smartness” implies gifting those devices with a certain degree of automation. This Master’s Thesis investigates how recent advances in artificial intelligence planning can be helpful in building such systems. In particular, an artificial intelligence planner able to generate workflows for most of IoT-related use cases has been connected to an IoT platform. A performance study of a state-of-the planner, Fast Downward, on one of the most challenging IoT application, Smart Garbage Collection (which is similar to the Traveling Salesman Problem) has also been carried out. Eventually, different pre-processing and clustering techniques are suggested to tackle the latest AI planners’ inefficiency on quickly finding plans for the most difficult tasks.
4

Autonomic Approach based on Semantics and Checkpointing for IoT System Management / Approche autonomique basée sur la sémantique et le checkpointing pour la gestion des systèmes de l'internet des objets

Aïssaoui, François 28 November 2018 (has links)
Le résumé en français n'a pas été communiqué par l'auteur. / Le résumé en anglais n'a pas été communiqué par l'auteur.
5

Three Essays on Internet of Things Adoption and Use

Aldossari, Mobark 05 1900 (has links)
Internet of Things (IoT) is a promising technology with great potential for individuals, society, governments, and the economy. IoT is expected to become ubiquitous and influence every aspect of everyday experience. Thus, IoT represents an important phenomena for both organizational and behavioral information system (IS) researchers. This dissertation seeks to contribute to IS research by studying the aspects that influence IoT adoption and use at both consumer and organizational levels. This dissertation achieves this purpose in a series of three essays. The first essay focuses on IoT acceptance in the context of smart home. The second essay focuses on examining the effect of artificial intelligence (AI) capabilities on consumers' IoT perceptions and intentions. Finally, the third essay focuses on the organizational investment and adoption of IoT technologies.
6

Resource constrained Industrial IoT device

Wernersson, Henrik Wernersson, Atwa, Yassin January 2016 (has links)
I dagens läge är industriella nätverk inte anpassade för att koppla upp resursbegränsade enheter pga av att industriella nätverks-protokollen som används är mer anpassade för real time applikationer. Det skulle vara ett stort steg för de industriella nätverken att kunna koppla upp resursbegränsade enheter för enkel övervakning samt analysering av data. Efter en undersökningsperiod av ett flertal olika IoT-protokoll, gjordes valet att implementera CoAP på en Anybus CompactCom-modul för testning. Under projektets gång användes det en del white-box testning i början vid implementationen av libCoAP. Efter att en fungerande implementation var gjord, påbörjades testning av input och output överensstämmelser med hjälp av black-box testning istället. Resultatet jämfördes i slutändan med den existerande lösningen att skicka parameterdata med hjälp av TCP. Resultatet hade en responstidsskillnad som var 92,3 % snabbare. Samtidigt tog det sammanlagt 24,2 % mindre plats i minnet (FLASH och RAM) för implementationen på Anybus CompactCom-modulen.
7

Privacy issues of the Internet of Things / Privacy issues of the Internet of Things

Mašek, Martin January 2016 (has links)
More and more devices and sensors are around us in today's world. There is an increasing tendency to connect devices and sensors to the Internet. We call such network the Internet of Things. As the cost of computing power continues to decrease, data collection and analysis becomes cheaper. Thus, we are able to get much better insight into different domains. This could be a problem in commercial sector, where we do not want to compromise proprietary know how or data. Especially big concerns are around personal data. We can now analyse behavior of people or get access to personal information such as health or spending patterns. This thesis addresses these privacy issues. Powered by TCPDF (www.tcpdf.org)
8

A Network Telescope Approach for Inferring and Characterizing IoT Exploitations

Unknown Date (has links)
While the seamless interconnection of IoT devices with the physical realm is envisioned to bring a plethora of critical improvements on many aspects and in diverse domains, it will undoubtedly pave the way for attackers that will target and exploit such devices, threatening the integrity of their data and the reliability of critical infrastructure. The aim of this thesis is to generate cyber threat intelligence related to Internet-scale inference and evaluation of malicious activities generated by compromised IoT devices to facilitate prompt detection, mitigation and prevention of IoT exploitation. In this context, we initially provide a unique taxonomy, which sheds the light on IoT vulnerabilities from five di↵erent perspectives. Subsequently, we address the task of inference and characterization of IoT maliciousness by leveraging active and passive measurements. To support large-scale empirical data analytics in the context of IoT, we made available corresponding raw data through an authenticated platform. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2018. / FAU Electronic Theses and Dissertations Collection
9

Internet of Things ur ett säkerhets- och personligt integritetsperspektiv : En studie om utmaningar vid utveckling av IoT-lösningar

Hortell, Erik, Wendel, Angelica January 2016 (has links)
Our everyday lives are getting more and more connected with the web, and with that emerges the so called Internet of Things paradigm. The main objective of digitalizing the physical environment is to streamline everyday tasks whether it is on an individual basis or on an industrial basis. The purpose of this study is to examine the security and privacy issues related to the Internet of Things and the challenges the industry faces when developing IoT-solutions. We carried out interviews with four respondents whom all were active in the IoT-industry. The result of our study shows that the ubiquitous nature of technology put more at stake, resulting in the industry having to responsibly handle security and privacy related issues in a different way than before. Also, because of the Internet of Things still being in such an early developmental stage, there are standardization issues at hand that complicates the development of IoT-solutions.
10

Internet to WSN configuration and access using 6LoWPAN

Firouzbakhsh, Navid, Mokhtari Karchegani, Arash January 2014 (has links)
The Internet of Things mission is to connect any objects to the Internet, in order to provide the ability to access everything, everywhere. It will enable people to control and monitor their environment in a very convenient way. In order to fulfill the Internet of Things mission, one idea is to wrap a non-IP based protocol stack in the objects equipped with sensors, actuators and computing resources to enable them to be connected to the Internet through a protocol translation gateway. An alternative and competing idea, is to embed the TCP/IP stack into such smart objects, enabling them to interact with the Internet seamlessly. However, in order to satisfy the Internet of Things needs such as scalability, interoperability and simplicity of configuration and management, the use of IP architecture for smart objects is of interest, since it has proven itself a highly scalable, interoperable and simple communication technology. In particular, the new optimized Internet Protocol, IPv6, which is capable of providing any single object with a unique address, accompanied by many other great features such as plug-and-play and a real end-to-end connectivity, can offer great benefits to the Internet of Things. Nevertheless, most of the smart objects specially deployed in Wireless Sensor Networks a subset of Internet of Things, are not able to adapt the large IPv6 packet because of their Link- Layer limitations. Hence, it is a quite challenging task for these devices to transmit an IPv6 packet. For this reason, the Internet Engineering Task Force organization has offered an IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) solution in order to solve the IPv6 adaptability problem. This thesis presents the design and deployment of an IPv6-based WSN using this solution. The result of this work is building a 6LoWPAN based on the Contiki OS. This WSN is able to send the measured environment temperature to a web server and control the status of a light through the Internet in a standard, scalable, and seamless way.

Page generated in 0.1134 seconds