• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 573
  • 127
  • 42
  • 32
  • 14
  • 12
  • 9
  • 7
  • 7
  • 6
  • 4
  • 3
  • 2
  • 1
  • Tagged with
  • 923
  • 389
  • 368
  • 280
  • 259
  • 218
  • 196
  • 177
  • 169
  • 150
  • 148
  • 126
  • 99
  • 81
  • 81
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Design and Development of an Internet-Of-Things (IoT) Gateway for Smart Building Applications

Nugur, Aditya 02 November 2017 (has links)
With growing concerns on global energy demand and climate change, it is important to focus on efficient utilization of electricity in commercial buildings, which contribute significantly to the overall electricity consumption. Accordingly, there has been a number of Building Energy Management (BEM) software/hardware solutions to monitor energy consumption and other measurements of individual building loads. BEM software serves as a platform to implement smart control strategies and stores historical data. Although BEM software provides such lucrative benefits to building operators, in terms of energy savings and personalized control, these benefits are not harnessed by most small to mid-sized buildings due to a high cost of deployment and maintenance. A cloud-based BEM system can offer a low-cost solution to promote ease of use and support a maintenance-free installation. In a typical building, a conventional router has a public address and assigns private addresses to all devices connected to it. This led to a network topology, where the router is the only device in the Internet space with all other devices forming an isolated local area network behind the router. Due to this scenario, a cloud-based BEM software needs to pass through the router to access devices in a local area network. To address this issue, some devices, during operation, make an outbound connection to traverse through the router and provide an interface to itself on the Internet. Hence, based on their capability to traverse through the router, devices in a local area network can be distinguished as cloud and non-cloud devices. Cloud-based BEM software with sufficient authorization can access cloud devices. In order to access devices adhering to non-cloud protocols, cloud-based BEM software requires a device in the local area network which can perform traversal through the router on behalf of all non-cloud devices. Such a device acts as an IoT gateway, to securely interconnect devices in a local area network with cloud-based BEM software. This thesis focuses towards architecting, designing and prototyping an Internet-of-Things (IoT) gateway which can perform traversal on behalf of non-cloud devices. This IoT gateway enables cloud-based BEM software to have a comprehensive access to supported non-cloud devices. The IoT gateway has been designed to support BACnet, Modbus and HTTP RESTful, which are the three widely adopted communication protocols in the building automation and control domain. The developed software executes these three communication protocols concurrently to address requests from cloud-based BEM system. The performance of the designed architecture is independent of the number of devices supported by the IoT gateway software. / Master of Science
12

iSEE:A Semantic Sensors Selection System for Healthcare

Jean Paul, Bambanza January 2016 (has links)
The massive use of Internet-based connectivity of devices such as smartphones and sensors has led to the emergence of Internet of Things(IoT). Healthcare is one of the areas that IoT-based applications deployment is becoming more successful. However, the deployment of IoT in healthcare faces one major challenge, the selection of IoT devices by stakeholders (for example, patients, caregivers, health professionals and other government agencies) given an amount of available IoT devices based on a disease(for ex-ample, Asthma) or various healthcare scenarios (for example, disease management, prevention and rehabilitation). Since healthcare stakeholders currently do not have enough knowledge about IoT, the IoT devices selection process has to proceed in a way that it allows users to have more detailed information about IoT devices for example, Quality of Service (QoS) parameters, cost, availability(manufacturer), device placement and associated disease. To address this challenge, this thesis work proposes, develops and validates a novel Semantic sEnsor sElection system(iSEE) for healthcare. This thesis also develops iSEE system prototype and Smart Healthcare Ontology(SHO). A Java application is built to allow users for querying our developed SHO in an efficient way.The iSEE system is evaluated based on query response time and the result-set for the queries. Further, we evaluate SHO using Competency Questions(CQs). The conducted evaluations show that our iSEE system can be used efficiently to support stakeholders within the healthcare domain.
13

Understanding and Countermeasures against IoT Physical Side Channel Leakage

Moukarzel, Michael Antoine 24 April 2019 (has links)
With the proliferation of cheap bulk SSD storage and better batteries in the last few years we are experiencing an explosion in the number of Internet of Things (IoT) devices flooding the market, smartphone connected point-of-sale devices (e.g. Square), home monitoring devices (e.g. NEST), fitness monitoring devices (e.g. Fitbit), and smart-watches. With new IoT devices come new security threats that have yet to be adequately evaluated. We propose uLeech, a new embedded trusted platform module for next-generation power scavenging devices. Such power scavenging devices are already widely deployed. For instance, the Square point-of-sale reader uses the microphone/speaker interface of a smartphone for communications and as a power supply. Such devices are being used as trusted devices in security-critical applications, without having been adequately evaluated. uLeech can securely store keys and provide cryptographic services to any connected smartphone. Our design also facilitates physical side-channel security analysis by providing interfaces to facilitate the acquisition of power traces and clock manipulation attacks. Thus uLeech empowers security researchers to analyze leakage in next- generation embedded and IoT devices and to evaluate countermeasures before deployment. Even the most secure systems reveal their secrets through secret-dependent computation. Secret- dependent computation is detectable by monitoring a system’s time, power, or outputs. Common defenses to side-channel emanations include adding noise to the channel or making algorithmic changes to mitigate specific side-channels. Unfortunately, existing solutions are not automatic, not comprehensive, or not practical. We propose an isolation-based approach for eliminating power and timing side-channels that is automatic, comprehensive, and practical. Our approach eliminates side-channels by leveraging integrated decoupling capacitors to electrically isolate trusted computation from the adversary. Software has the ability to request a fixed- power/time quantum of isolated computation. By discretizing power and time, our approach controls the granularity of side-channel leakage; the only burden on programmers is to ensure that all secret-dependent execution differences converge within a power/time quantum. We design and implement three approaches to power/time-based quantization and isolation: a wholly-digital version, a hybrid version that uses capacitors for time tracking, and a full- custom version. We evaluate the overheads of our proposed controllers with respect to software implementations of AES and RSA running on an ARM- based microcontroller and hardware implementations AES and RSA using a 22nm process technology. We also validate the effectiveness and real-world efficiency of our approach by building a prototype consisting of an ARM microcontroller, an FPGA, and discrete circuit components. Lastly, we examine the root cause of Electromagnetic (EM) side-channel attacks on Integrated Circuits (ICs) to augment the Quantized Computing design to mitigate EM leakage. By leveraging the isolation nature of our Quantized Computing design, we can effectively reduce the length and power of the unintended EM antennas created by the wire layers in an IC.
14

Seeking opportunities in the Internet of Things (IoT): : A Study of IT values co-creation in the IoT ecosystem while considering the potential impacts of the EU General Data Protection Regulations (GDPR).

Ford, David Thomas, Qamar, Sreman January 2017 (has links)
In this thesis, we have studied the phenomena of value co-creation in IoT ecosystem, while considering the potential impacts of GDPR on IT value co-creation in the IoT ecosystem. IT firms’ ability to create value is an important aspect of their existence and growth in which case they pursuit different and several means to accomplish this task. IT firms that operate within the IoT ecosystem are categorised as Enablers, Engagers, and Enhancers who interact, work together to provide the technology and services needed to both market the IoT and to deploy it for their own business operations. These actors usually deem it necessary to create value through a co-creation process with customers in order to create well needed, tailored and up-to-date IoT solutions. In such case, customers’ data play a significant role in the development process. Through computer analysis, these data can reveal insightful information that can lead to the creation of relevant and appropriate IT solutions. However, the EU new and upcoming General Data Protection Regulation stand to have some impacts on this creative process, by regulating data practices in technological activities, thereby, creating several concerns among the IT community.
15

IoT - an internet of threats? : Identifying the dangers of an IoT-connection

Larsson, Victor January 2017 (has links)
No description available.
16

Praktické využití BI a IoT v prostředí výrobních společností / Practical use of BI and IoT in the manufacturing environment

Kožár, Ondrej January 2017 (has links)
This thesis is oriented on data usage from manufacturing IoT devices. The main goal is to propose comprehensive concept of data usage from manufacturing IoT devices in BI, based on available literature and user requirements from manufacturing companies. First part of thesis deals with relationship between IoT and BI, based on available literature and current researches aimed on IoT data usage. Following part is about requirement analysis aimed on manufacturing IoT data usage. The requirements were determined with help of non-structured interviews with managers of selected departments in manufacturing companies, mainly oriented on production quality, maintenance and production efficiency. Based on mentioned requirements were determined appropriate metrics that are primarily based on data from manufacturing IoT devices. The last part is practical demonstration of the tech-nological concept which is focused on data presentation.
17

Toward IoT : Implementation of WSN based MQTT Data Protocol

Fakhraddin, Haider January 2019 (has links)
Human seeks the maximum profits with least efforts in each and every single life aspect. The development of technology starting with the machine-to-machine concept to reduce human interface with manufacturing processes, hence reducing errors, cost and time. The development enters a new era of connecting those machines and devices to internet, and furthermore make part of data processing and analysis at those machine or devices parts. This concept is what is known nowadays as the Internet of Things (IoT). In this thesis, design for a proposed system is introduced. MQTT messaging protocol used as the data exchange protocol to aggregate the data from WSN that incorporated local and remote sensor. ATmega 328 microcontroller unit, NodeMCU development board, SIM800L GSM module and DHT11 sensor modules where used to implement the nodes while Raspberry Pi 3B was used to implement a gateway that acts as the MQTT broker in order to aggregate the data. The proposed system has been implemented and tested successfully. The power consumption for the remote sensor nodes consumed only 20 mWh and the response time for the data transferred within the system’s network from the remote sensor node to the server is about 7 milliseconds with a total error of 0.11%. The system shows an excellent performance and provide a simple solution to link remote sensors which are out of the gateway’s local network coverage.
18

Ethical Hacking of an IoT camera / Etisk hackning av en IoT-kamera

Hellesnes, Nicolai January 2021 (has links)
With the fast growing popularity of IoT devices, a new entry point for cyber attacks is emerging. As IoT devices such as security cameras become more widely used in settings where security and privacy can be considered a key concern, more research about these devices must be done to ensure that the security requirements are met. In this thesis the home security camera Reolink E1 Zoom has been evaluated. The security of the device was evaluated with a 7 step method which consisted of pre-engagement, information gathering, threat modeling, vulnerability analysis, exploitation, post exploitation, and reporting. The threat modeling and penetration testing was conducted on the IoT device with a focus on the web application. The result of the penetration testing was that one vulnerability was discovered, an XSS attack, with many other security issues not directly leading to an exploit also being discovered. The vulnerability discovered was reported to the manufacturer as detailed in the thesis. The conclusion is that the security of the IoT device was lacking in certain areas. / IoT har med en snabbt växande popularitet öppnat för nya potentiella problem med cyberattacker. Då IoT-enheter som säkerhetskameror börjar användas i en större utsträckning i sammanhang där säkerhet och integritet har högsta prioritet, måste mer forskning kring säkerheten av dessa enheter utföras. Detta för att kunna säkerställa att säkerhetskraven är uppnådda. I denna avhandlingen har säkerheten av IoT-enheten Reolink E1 Zoom analyserats. Säkerheten av enheten hara analyserats med hjälp av en 7-stegsmetod som bestod av förberedning, informationssökning, hotmodellering, säkerhetsanalys, efter-exploatering, samt rapportering. hotmodelleringen samt penetrationstestningen som genomfördes på enheten fokuserade på webbapplikationen. Resultatet av penetrationstestningen var att en sårbarhet hittades, en XSS-attack, ett flertal andra säkerhetsproblem som inte direkt ledde till en sårbarhet identifierades också. Sårbarheten som identifierades blev rapporterad till företaget enligt beskrivelsen i rapporten. Slutsaten är att säkerheten av IoT-enheten har brister inom vissa områden.
19

An Evaluation of IoT Protocol Efficiency and suitability : For smart vehicles, smart homes & industrial scenarios

Pettersson, William January 2021 (has links)
Internet of things (IoT) är det överläggande området i denna rapport. IoT är ett väldigt intressant I nuläget och är snabbt växande. IoT kan beskrivas som ett nätverk av kommunicerande enheter som delar information och automatiserar eller försimplar uppgifter och därav ökar effektivitet och säkerhet. Området växer så pass fort att det förväntas vara 24 miljarder anslutna enheter vid år 2050, denna utökning leder i sin tur till ett ökat behov av förståelse för IoT protokollen som hanterar kommunikationen emellan enheterna. Detta för att kunna välja det mest optimala protokollet för ett givet scenario. Detta arbete kommer att välja ett lovande protokoll för undersökning samt evaluering gällande dess prestation berörande fördröjning, dataöverföringshastighet och skalbarhet.  Protokollet som valdes var MQTT (Message Queuing Telemetry Transport). Baserat på dessa evaluerade värden föra en diskussion gällande protokollets lämplighet inom scenariona. Värdena kommer att tas fram via tidmätningar start till slut för kommunikationen samt tid för att skicka en mängd meddelanden, båda i respekt till antalet samtidigt kommunicerande program. Testen körs med en lokal PC som agerar Broker och en Raspberry Pi som kör samtliga programmen i individuella terminaler. Resultaten var att fördröjningen verkar ha en näst intill linjär relation och dataöverföringshastighet ett exponentiellt avtagande beteende i respekt till samtidigt kommunicerande enheter. Dem mätta resultaten analyseras och diskuteras, och kommer till slutsatsen att protokollet är en lämplig kandidat för de flesta scenarion, så som smarta bilar, smarta hem och till viss del industriell användning. Den största nackdelen med protokollet var dess höga standardavvikelse gällande individuella meddelandens fördröjning. / Internet of things (IoT) is the base topic of this thesis, and it is a rapidly growing area, it can be described  as a network of communicating devices sharing information and streamlining tasks in addition to increasing efficiency and security. It is expected to be 24 billion connected devices by year 2050 and with this growth comes an increased demand on understanding the IoT protocols to be able to choose a suitable protocol for a given scenario. This thesis will discuss this area and pick one protocol to evaluate specifically regarding latency, throughput, and scalability. The protocol chosen were MQTT (Message Queuing Telemetry Transport). Based on these values then discuss whether the protocol is a suitable candidate for the scenarios. The data to evaluate this will be gathered by measuring the end-to-end time of the protocol in respect to the number of communicating programs, and to measure the time it takes to communicate a number of messages with respect to the number of programs handling the communication. These tests are performed with a local PC acting as the broker and a Raspberry pi running each of the communicating programs on individual terminals. The results were that latency seem to have a close to liner relation, and that throughput seem to have an exponentially decreasing relation with respect to number of clients cooperating. The measured results are analyzed and discussed and concluded that the protocol is a fitting candidate for most scenarios such as smart cars, smart homes and to some extent industry. The biggest flawed concluded was the protocols high standard deviation for individual messages latency. The outcome of the benchmarks measurement showed that increasing the number of nodes would not result in superior performance. It was noted that an optimal number of nodes was found to be between 1 and 20 for all the tests performed. The study showed that no load balancer could be considered a clear winner, instead, different configurations of load balancers performed varyingly well at different tests.
20

Internet de la cosas (IoT)

Dirección de Innovación y Transformación 08 1900 (has links)
Es la internonexiòn digital y la comunicaciòn de objetios fìsicos de uso cotidiano con el Internet.

Page generated in 0.0265 seconds