• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 547
  • 122
  • 106
  • 36
  • 34
  • 21
  • 16
  • 9
  • 9
  • 8
  • 7
  • 5
  • 5
  • 4
  • 2
  • Tagged with
  • 1009
  • 1009
  • 301
  • 227
  • 213
  • 199
  • 190
  • 169
  • 169
  • 137
  • 124
  • 113
  • 110
  • 110
  • 109
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Wireless Solutions and Authentication Mechanisms for Contiki Based Internet of Things Networks

KALYONCU, Samet January 2013 (has links)
Internet of Things, is a new expression described as the future of the internet, promises a new world surrounded by tiny smart objects interacting with the environment, communicating with each other, and controlled over internet. Investigating which low power wireless solution and authentication mechanism fits best for IoT networks, and applying these technologies on simulator and real hardware is the main task of this project. Bluetooth Low Energy, ANT, 6LoWPAN and ZigBee are investigated low power wireless technologies which might be used to create an IoT network. Yet, BLTE and ANT have narrower application areas compared to the others, therefore ZigBee and 6LoWPAN technologies are investigated in depth and compared as the 2 promising solutions for implementation and integration of Internet of things concept. SPINS, TinySec, TinyECC, SenSec, MiniSec, ContikiSec and AES CCM are the main security frameworks especially designed for wireless sensor networks providing confidentiality, authentication and integrity. These frameworks were described and compared to find out most suitable authentication mechanism for IoT networks. Contiki OS is used as the operating system of nodes during the implementation of network both on simulator Cooja and real hardware. ZigBee and 6LoWPAN were compared considering interoperability, packet overhead, security and availability. As a result 6LoWPAN came forward due to providing high interoperability and slightly less packet overhead features. ZigBee devices require extra hardware to operate with different technologies. Among the discussed security frameworks, ContikiSec and AES CCM were highlighted because of flexibility, providing different levels of security. Resource limited characteristic and diversity of IoT applications make flexibility a very useful feature while implementing a security framework. Experiments committed to implement a working IoT network were not hundred percent successful. 6LoWPAN was successfully implemented but implementation of the security framework was failed due to compatibility issues between the sensor and the router node. Firmware of the sensor node is not designed to provide any kind of security, therefore security features of the router node is also disabled.
2

AI Planning-Based Service Modeling for the Internet of Things

Bahers, Quentin January 2015 (has links)
It is estimated that by 2020, more than 50 billion devices will be interconnected, to form what is called the Internet of Things. Those devices range from consumer electronics to utility meters, including vehicles. Provided with sensory capabilities, those objects will be able to transmit valuable information about their environment, not only to humans, but even more importantly to other machines, which should ultimately be able to interpret and take decisions based on the information received. This “smartness” implies gifting those devices with a certain degree of automation. This Master’s Thesis investigates how recent advances in artificial intelligence planning can be helpful in building such systems. In particular, an artificial intelligence planner able to generate workflows for most of IoT-related use cases has been connected to an IoT platform. A performance study of a state-of-the planner, Fast Downward, on one of the most challenging IoT application, Smart Garbage Collection (which is similar to the Traveling Salesman Problem) has also been carried out. Eventually, different pre-processing and clustering techniques are suggested to tackle the latest AI planners’ inefficiency on quickly finding plans for the most difficult tasks.
3

Autonomic Approach based on Semantics and Checkpointing for IoT System Management / Approche autonomique basée sur la sémantique et le checkpointing pour la gestion des systèmes de l'internet des objets

Aïssaoui, François 28 November 2018 (has links)
Le résumé en français n'a pas été communiqué par l'auteur. / Le résumé en anglais n'a pas été communiqué par l'auteur.
4

Three Essays on Internet of Things Adoption and Use

Aldossari, Mobark 05 1900 (has links)
Internet of Things (IoT) is a promising technology with great potential for individuals, society, governments, and the economy. IoT is expected to become ubiquitous and influence every aspect of everyday experience. Thus, IoT represents an important phenomena for both organizational and behavioral information system (IS) researchers. This dissertation seeks to contribute to IS research by studying the aspects that influence IoT adoption and use at both consumer and organizational levels. This dissertation achieves this purpose in a series of three essays. The first essay focuses on IoT acceptance in the context of smart home. The second essay focuses on examining the effect of artificial intelligence (AI) capabilities on consumers' IoT perceptions and intentions. Finally, the third essay focuses on the organizational investment and adoption of IoT technologies.
5

Privacy issues of the Internet of Things / Privacy issues of the Internet of Things

Mašek, Martin January 2016 (has links)
More and more devices and sensors are around us in today's world. There is an increasing tendency to connect devices and sensors to the Internet. We call such network the Internet of Things. As the cost of computing power continues to decrease, data collection and analysis becomes cheaper. Thus, we are able to get much better insight into different domains. This could be a problem in commercial sector, where we do not want to compromise proprietary know how or data. Especially big concerns are around personal data. We can now analyse behavior of people or get access to personal information such as health or spending patterns. This thesis addresses these privacy issues. Powered by TCPDF (www.tcpdf.org)
6

Resource constrained Industrial IoT device

Wernersson, Henrik Wernersson, Atwa, Yassin January 2016 (has links)
I dagens läge är industriella nätverk inte anpassade för att koppla upp resursbegränsade enheter pga av att industriella nätverks-protokollen som används är mer anpassade för real time applikationer. Det skulle vara ett stort steg för de industriella nätverken att kunna koppla upp resursbegränsade enheter för enkel övervakning samt analysering av data. Efter en undersökningsperiod av ett flertal olika IoT-protokoll, gjordes valet att implementera CoAP på en Anybus CompactCom-modul för testning. Under projektets gång användes det en del white-box testning i början vid implementationen av libCoAP. Efter att en fungerande implementation var gjord, påbörjades testning av input och output överensstämmelser med hjälp av black-box testning istället. Resultatet jämfördes i slutändan med den existerande lösningen att skicka parameterdata med hjälp av TCP. Resultatet hade en responstidsskillnad som var 92,3 % snabbare. Samtidigt tog det sammanlagt 24,2 % mindre plats i minnet (FLASH och RAM) för implementationen på Anybus CompactCom-modulen.
7

A Network Telescope Approach for Inferring and Characterizing IoT Exploitations

Unknown Date (has links)
While the seamless interconnection of IoT devices with the physical realm is envisioned to bring a plethora of critical improvements on many aspects and in diverse domains, it will undoubtedly pave the way for attackers that will target and exploit such devices, threatening the integrity of their data and the reliability of critical infrastructure. The aim of this thesis is to generate cyber threat intelligence related to Internet-scale inference and evaluation of malicious activities generated by compromised IoT devices to facilitate prompt detection, mitigation and prevention of IoT exploitation. In this context, we initially provide a unique taxonomy, which sheds the light on IoT vulnerabilities from five di↵erent perspectives. Subsequently, we address the task of inference and characterization of IoT maliciousness by leveraging active and passive measurements. To support large-scale empirical data analytics in the context of IoT, we made available corresponding raw data through an authenticated platform. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2018. / FAU Electronic Theses and Dissertations Collection
8

Internet to WSN configuration and access using 6LoWPAN

Firouzbakhsh, Navid, Mokhtari Karchegani, Arash January 2014 (has links)
The Internet of Things mission is to connect any objects to the Internet, in order to provide the ability to access everything, everywhere. It will enable people to control and monitor their environment in a very convenient way. In order to fulfill the Internet of Things mission, one idea is to wrap a non-IP based protocol stack in the objects equipped with sensors, actuators and computing resources to enable them to be connected to the Internet through a protocol translation gateway. An alternative and competing idea, is to embed the TCP/IP stack into such smart objects, enabling them to interact with the Internet seamlessly. However, in order to satisfy the Internet of Things needs such as scalability, interoperability and simplicity of configuration and management, the use of IP architecture for smart objects is of interest, since it has proven itself a highly scalable, interoperable and simple communication technology. In particular, the new optimized Internet Protocol, IPv6, which is capable of providing any single object with a unique address, accompanied by many other great features such as plug-and-play and a real end-to-end connectivity, can offer great benefits to the Internet of Things. Nevertheless, most of the smart objects specially deployed in Wireless Sensor Networks a subset of Internet of Things, are not able to adapt the large IPv6 packet because of their Link- Layer limitations. Hence, it is a quite challenging task for these devices to transmit an IPv6 packet. For this reason, the Internet Engineering Task Force organization has offered an IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) solution in order to solve the IPv6 adaptability problem. This thesis presents the design and deployment of an IPv6-based WSN using this solution. The result of this work is building a 6LoWPAN based on the Contiki OS. This WSN is able to send the measured environment temperature to a web server and control the status of a light through the Internet in a standard, scalable, and seamless way.
9

Ultrasonic Ranging and Indoor Localization for Mobile Devices

Lazik, Patrick J.E. 01 August 2017 (has links)
Location tracking on mobile devices like smartphones has already begun to revolutionize personal navigation. Unfortunately, these services perform poorly indoors when GPS signals are no longer available. Highly accurate indoor location tracking would enhance a wide variety of applications including: building navigation (malls, factories, airports), augmented reality, location-aware pervasive computing, targeted advertising, social networking, participatory sensing and could even support next generation beam forming MIMO wireless networks. Current indoor localization systems for smartphones often use RF signal strength from WiFi access points or Bluetooth Low Energy (BLE) beacons to fingerprint indoor locations. Such systems are sensitive to environmental changes and obstructions, require extensive training procedures and are limited in both absolute as well as semantic localization accuracy. We propose using audio signals in the ultrasound spectrum, just above the human hearing range, to provide ranging and localization for many off-the-shelf mobile devices that are equipped with microphones. Ultrasonic ranging provides several advantages over RF-based ranging and fingerprinting approaches, which make it attractive for indoor localization. A relatively low propagation speed and carrier frequency allow for precise propagation time measurements in software using commodity hardware. Acoustic signals also have a low penetration depth, which confines them to target areas for accurate semantic localization. In this dissertation we address several challenges related to acoustic localization, including system scalability, ranging and localization accuracy, energy efficiency, robustness to noise, elimination of human perceivable audio artifacts, efficient use of limited acoustic bandwidth and rapid deployment strategies.
10

Determination of Cycle Time Constraints in Case of Link Failure in Closed Loop Control in Internet of Things

Ainchwar, Arpit January 2017 (has links)
In today’s era of the Internet of Things, it is crucial to study the real-time dependencies of the web, its failures and time delays. Today, smart grids, sensible homes, wise water networks, intelligent transportation, infrastructure systems that connect our world over are developing fast. The shared vision of such systems is typically associated with one single conception Internet of Things (IoT), where through the deployment of sensors, the entire physical infrastructure is firmly fastened with information and communication technologies; where intelligent observation and management is achieved via the usage of networked embedded devices. The performance of a real-time control depends not only on the reliability of the hardware and software used but also on the time delay in estimating the output, because of the effects of computing time delay on the control system performance. For a given fixed sampling interval, the delay and loss issues are the consequences of computing time delay. The delay problem occurs when the computing time delay is non-zero but smaller than the sampling interval, while the loss problem occurs when the computing time delay is greater than, or equal to, the sampling interval, i.e., loss of the control output. These two queries are analyzed as a means of evaluating real-time control systems. First, a general analysis of the effects of computing time delay is presented along with necessary conditions for system stability. In this thesis, we will focus on the experimental study of the closed loop control system in the internet of things to determine the cycle time constraints in case of link failure.

Page generated in 0.1161 seconds