• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 573
  • 127
  • 42
  • 32
  • 14
  • 12
  • 9
  • 7
  • 7
  • 6
  • 4
  • 3
  • 2
  • 1
  • Tagged with
  • 923
  • 389
  • 368
  • 280
  • 259
  • 218
  • 196
  • 177
  • 169
  • 150
  • 148
  • 126
  • 99
  • 81
  • 81
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Raytelligent Cloud

Axelsson, Markus, Lundgren, Oskar January 2017 (has links)
I dagens samhälle blir fler och fler enheter uppkopplade mot Internet vilket kan ge en annars begränsad hårdvara möjlighet att genomföra större beräkningar. Detta projekt avser att skapa ett system som hanterar en användares radarenheter i ett molnbaserat system. Systemet erbjuder även möjligheten att ladda upp användarens egna applikationer vilka använder data från radarenheten, körs på virtuella maskiner och vid behov har möjlighet att skicka notiser till användarens mobila applikationer. För att underlätta utveckling har systemet delats upp i tre delsystem. Dessa är radarenhet, molntjänst och mobilapplikation. Projektet resulterade i ett komplett system med en webbapplikation som erbjuder användaren möjlighet att registrera sina radarenheter, ladda upp källkod som kompileras och körs på en molntjänst samt möjlighet att skicka notiser till en mobilapplikation. / Todays age sees more and more devices connected to the internet providing otherwise quite limited hardware with the ability to perform more complex calculations. This project aims to create a system for managing a users radar devices using a cloud platform. The system also provides the ability for the user to upload their own custom applications which can make use of data provided by the radar device, run on virtual machines and if required have the ability to push notifications to the users mobile applications. To simplify the system development, it has been divided into three separate subsystems, specifically the radar device, the cloud service and the mobile application. The result of the project is a complete system with a web application which provides the user with the ability to register their radar device(s), upload source code which is compiled and run on the cloud platform and the ability to send push notices to a mobile application.
42

How Internet of Things changes business model of Microsoft OEM team / How IOT changes business model of Microsoft

Hruška, Jan January 2017 (has links)
The main goal of this thesis is to discover how an emerging technological megatrend, the Internet of Things, changes the business model of the Microsoft OEM team. OEM business is fully dependent on sales of Windows licenses; however, the PC market is declining and whole Microsoft is shifting into offering of cloud services while being financed by the OEM revenues. Nevertheless, the strategy of how the OEM team fits into the future of cloud offerings is clearly missing. To discover what changes should be made inside the current business model, 13 interviews with managers across Microsoft were conducted and analyzed. Identified themes were assigned to business model building blocks, ranked by the importance, and supported by relevant quotes from interviews as well as the theoretical background. The most important subjects of changes were identified as partners, activities and value proposition; however, changes will be seen in every aspect of the OEM business. As a result, specific changes in building blocks are described and the first steps towards the Internet of Things strategy suggested. That will ensure the relevance of the conservative OEM team in the connected future.
43

Performance Analysis of end-to-end DTLS and IPsec based communication in IoT systems : Security and Privacy ~ Distributed Systems Security

Kuna, Vignesh January 2017 (has links)
No description available.
44

Performance Analysis of Proxy based Encrypted communication in IoT environments : Security and Privacy ~ Distributed Systems Security

Budda, Shiva Tarun January 2017 (has links)
No description available.
45

Resource management in dense wireless networks

Mosavat-Jahromi, Seyed Hamed 22 December 2020 (has links)
Recently, the wide range of communication applications has greatly increased the number of connected devices, and this trend continues by emerging new technologies such as Internet-of-Things (IoT) and vehicular ad hoc networks (VANETs). The increase in the number of devices may sooner or later cause wireless spectrum shortage. Furthermore, with the limited wireless spectrum, transmission efficiency degrades when the network faces a super-dense situation. In IEEE 802.11ah-based networks whose channel access protocol is basically a contention-based one, the protocol loses its efficiency when the total number of contending users grows. VANETs suffer from the same problem, where broadcasting and receiving safety messages, i.e., beacons, are critical. An inefficient medium access control (MAC) can negatively impact the network's reliability. Effective resource management solutions are needed to improve the network's reliability and scalability considering the features of different types of networks. In this work, we address the resource management problem in dense wireless networks in vehicle-to-everything (V2X) systems and IoT networks. For IoT networks, e.g., sensor networks, in which the network topology is quite stable, the grouping technique is exploited to make the stations (STAs) compete in a group to mitigate the contention and improve the channel access quality. While, in VANETs, devices are mobile and the network topology changes over time. In VANETs, beacons should be broadcast periodically by each vehicle reliably to improve road safety. Therefore, how to share the wireless resources to ensure reliability and scalability for these dense static and mobile wireless networks is still a difficult and open problem. In static IoT networks, we apply the Max-Min fairness criterion to the STAs' throughput to group the STAs to ensure network performance and fairness. Formulation of the problem results in a non-convex integer programming optimization problem which avoids hidden terminals opportunistically. As solving the optimization problem has a high time complexity, the Ant Colony Optimization (ACO) method is applied to the problem to find the sub-optimal solution. To support reliable and efficient broadcasting in VANET, wireless resources are divided into basic resource units in the time and frequency domains, and a distributed and adaptive reservation-based MAC protocol (DARP) is proposed. For decentralized control in VANETs, each vehicle's channel access is coordinated with its neighbors to solve the hidden terminal problem. To ensure the reliability of beacon broadcasting, different kinds of preambles are applied in DARP to support distributed reservation, detect beacon collisions, and resolve the collisions. Once a vehicle reserves a resource unit successfully, it will not release it until a collision occurs due to topology change. Protocol parameters, including transmission power and time slots duration, can be adjusted to reduce collision probability and enhance reliability and scalability. Simulation of urban mobility (SUMO) is used to generated two different city traces to assess the DARP's performance. Then, a distributed network coding-based MAC protocol (NC-MAC) is proposed to support reliable single-hop vehicle-to-vehicle (V2V) beacon broadcasting. We combine the preamble-based feedback mechanism, retransmissions, and network coding together to enhance broadcasting reliability. We deploy the preamble mechanism to facilitate the negative acknowledgment (NACK) and retransmission request procedures. Moreover, linear combinations of missed beacons are generated according to the network coding (NC) principles. We also use SUMO to evaluate the NC-MAC's performance in highway and urban scenarios. Group-casting and applying multi-hop communication can ensure reliability in V2X systems. As an extension of the proposed NC-MAC, a distributed grouping and network coding-assisted MAC protocol (GNC-MAC) is proposed to support reliable group-casting and multi-hop communication, which can address blockchain protocols' requirements. We propose a new grouping protocol by combining preamble-based feedback mechanism, multi-hop communication, and network coding to improve group-casting reliability. The preamble mechanism is responsible for reporting a NACK and requesting retransmission due to beacon missing. The missed beacons are combined according to the NC principles and sent on a resource block. / Graduate
46

New Frameworks for Secure Image Communication in the Internet of Things (IoT)

Albalawi, Umar Abdalah S 08 1900 (has links)
The continuous expansion of technology, broadband connectivity and the wide range of new devices in the IoT cause serious concerns regarding privacy and security. In addition, in the IoT a key challenge is the storage and management of massive data streams. For example, there is always the demand for acceptable size with the highest quality possible for images to meet the rapidly increasing number of multimedia applications. The effort in this dissertation contributes to the resolution of concerns related to the security and compression functions in image communications in the Internet of Thing (IoT), due to the fast of evolution of IoT. This dissertation proposes frameworks for a secure digital camera in the IoT. The objectives of this dissertation are twofold. On the one hand, the proposed framework architecture offers a double-layer of protection: encryption and watermarking that will address all issues related to security, privacy, and digital rights management (DRM) by applying a hardware architecture of the state-of-the-art image compression technique Better Portable Graphics (BPG), which achieves high compression ratio with small size. On the other hand, the proposed framework of SBPG is integrated with the Digital Camera. Thus, the proposed framework of SBPG integrated with SDC is suitable for high performance imaging in the IoT, such as Intelligent Traffic Surveillance (ITS) and Telemedicine. Due to power consumption, which has become a major concern in any portable application, a low-power design of SBPG is proposed to achieve an energy- efficient SBPG design. As the visual quality of the watermarked and compressed images improves with larger values of PSNR, the results show that the proposed SBPG substantially increases the quality of the watermarked compressed images. Higher value of PSNR also shows how robust the algorithm is to different types of attack. From the results obtained for the energy- efficient SBPG design, it can be observed that the power consumption is substantially reduced, up to 19%.
47

IoTA: Internet of Things Assistant

Okumura, Brandon M 01 July 2017 (has links)
The Internet of Things is the networking of electronic devices, or “Things”, that enables them to collect and share data, as well as interact with their physical surround- ings. Analyzing this collected data allows us to make smarter economic decisions. These interconnected networks are usually driven by low-powered micro-controllers or cheap CPUs that are designed to function optimally with very little hardware. As scale and computational requirements increase, these micro-controllers are unable to grow without being physically replaced. This thesis proposes a system, IoTA, that assists the Internet of Things by pro- viding a shared computational resource for endpoint devices. This solution extends the functionality of endpoint devices without the need of physical replacement. The IoTA system is designed to be easily integrable to any existing IoT network. This system presents a model that allows for seamless processing of jobs submitted by endpoint devices while keeping scalability and flexibility in mind. Additionally, IoTA is built on top of existing IoT protocols. Evaluation shows there is a significant performance benefit in processing computationally heavy algorithms on the IoTA system as compared to processing them locally on the endpoint devices themselves.
48

Bluetooth vs RFID in Time Tracking

Berndtsson, Fredrik January 2017 (has links)
Bluetooth and Radio Frequency Identification (RFID) are two technologies which are used in lots of contexts today, for example Bluetooth is used for communication between devices and RFID as identification of items at storehouses. This work contains a comparison between those two technologies in a time tracking environment for sports events. To compare the two technologies, a Bluetooth time tracking prototype based on Raspberry Pi 3 and Android Sony Xperia M5 were developed to be compared with a preexisting RFID timing system. The work has been done at Blekinge Institute of Technology in Karlskrona. An agile project form has been used in the work containing a prestudy, development, verification, experimentation and survey phase. The survey focused on smartphones for timing, and the experiments were qualitative. Three of the questions that have been answered during the work are, if Bluetooth could be used in a timing context, what are the difference in reading performance at different speeds and distances. In both unobstructed and blocked Bluetooth can be read at longer distances. Both systems can read tags at 30 kilometers an hour close to the readers. / Bluetooth och Radio Frequency Identification (RFID) är två vanliga teknologier som användsi stor utsträckning idag, till exempel Bluetooth används för bland annat kommunikation mellan enheter, medans RFID används bland anatt för identifiering av objekt i lagerlokaler. Detta arbetet jämför teknologierna utifrån ett tidtagnings perspektiv för olika idrottslopp. För jämförelsen mellan teknologierna utvecklades en Bluetooth tidtagnings prototyp baserat på en Raspberry Pi 3 och en smartphone applikation, och för RFID användes ett redan utvecklat tidtagningssystem. Arbetet har utförts på Blekinge Tekniska Högskola i Karlskrona. Ett iterativt arbetssätt hara nvänts under arbetes gång innefattande en förstudie, utveckling, verifikation, experiment ochen enkätfas. Enkäten fokuserade på smartphones för tidtagning och experimenten som utfördes var av kvalitativ karaktär. Två av forskningsfrågorna som blivit besvarade under arbetet är om Bluetooth kan användas för tidtagning och om det går, vad är skillnaden på prestandan i låga respektive höga hastigheter på olika avstånd? Några av resultaten från arbetet är att i fri sikt kan Bluetooth bli läst på längre avstånd än RFID. Båda systemen kan läsa av taggar upp till 30 kilometer i timmen nära läsaren.
49

Säkerhetsmedvetenhet och integration av IoT : En kvantitativ studie på konsumenters säkerhetsmedvetenhet och syn på integration av IoT / Security awareness and integration of IoT : A quantitative study of consumers safety awareness and views on the integration of IoT

Lindström, Oskar, Magnusson, August January 2021 (has links)
Internetuppkopplade apparater blir allt vanligare att se i våra hem. Samlingsordet för dessa enheter är Internet of Things (IOT). Med införande av IoT i våra hem skapas fler accesspunkter till internet, vilket även skapar en större attackyta. I kombinationmed den ständigt växande cyberkriminalliteten och införandet av IoT i våra hem ökar risken för att utsättas för en attack. Tidigare forskning inom området gällande konsumenters informationssäkerhetsmedvetenhet visar att konsumenterna har låg medvetenhet och bristande kunskaper för de hot som tillkommer vid integrationen av en IoT-enhet ihemmet. Det finns även tidigare forskning som undersökt vilka faktorer som påverkar individernas inställning till att anta ny teknologi. Mycket av den tidigare forskningen inom området har fokuserat på de tekniska aspekterna och fokuset har inte varit på konsumenternas informationssäkerhetsmedvetenhet och deras inställning till den ökande integrationen av IoT. Den här studien syftade till att undersöka svenska konsumenters informationssäkerhetsmedvetenhet och deras inställning till den ökande integrationen av IoT. Studien avsåg att undersöka hur medvetna konsumenterna är för de informationssäkerhetsrisker som tillkommer vid integreringen av IoT i hemmet i kombination med att undersöka deras syn på den ökade integrationen av IoT ivardagen. Studien har fokuserat på två olika enheter. Dessa enheter genererar data via ljudupptagning samt videoinspelning. En kvantitativ metod med en enkätundersökning tillämpades för att se ifall den låga kunskapen hos respondenter fanns, men även för att lättare nå ut till fler respondenter. För att förstå konsumenternas beteende utformades enkätfrågorna utifrån den allmänt tillämpade beteendemodellen Theory of planned behavior (TPB). Studien fann att majoriteten av respondenterna hade en låg medvetenhet för de risker som tillkommer med integreringen av IoT-enheter, samt låga kunskap för de säkerhetsåtgärder som går att implementera. Trots den låga medvetenheten för riskerna visade det sig att respondenterna hade en mycket positiv inställning till den ökade integrationen av IoT och att de funderar på att införskaffa fler IoT-enheter. / Internet-connected devices are becoming more common to see in our homes. The collective word for these devices is Internet of Things (IoT). With the introduction of IoT in our homes, more access points to the internet are created, which also creates alarger attack area. Combined with the ever-growing cybercrime and the introduction of IoT in our homes, the risk of being attacked increases. Previous research in the field of consumer information security awareness shows that consumers have low awareness, and lack of knowledge about the threats posed by the integration of an IoT device in the home. Previous research has examined the factors that influence individuals attitudes towards adopting new technology. Much of the previous research in the field has focused on the technical aspects and the focus has not been on consumers information security awareness and their attitude to the increasing integration of IoT. This study aimed to examine Swedish consumers' information security awareness and their attitude towards the increasing integration of IoT. The study aimed to examine how aware consumers are of the information security risks that arise from the integration of IoT in the home in combination with examining their stand on the increased integration of IoT in their everyday life. The study has focused on two specific IoT-devices. These devices generate data via audio recording and video recording. A quantitative method with a survey was applied to examine how aware the consumers where of the information security risks, but also to be able to include more respondents in the study. To understand consumer behavior, the questionnaires were designed based on the generally applied behavioral model Theory of plannedbehavior (TPB).The study found that the majority of respondents had a low awareness of the risks involved with the integration of IoT devices, as well as low knowledge of the security measures that can be implemented. Despite the low awareness of the risks, it turnedout that the respondents had a very positive attitude towards the increased integrationof IoT, and that they also are considering acquiring more IoT devices.
50

A study into scalable transport networks for IoT deployment

Sizamo, Yandisa 14 March 2022 (has links)
The growth of the internet towards the Internet of Things (IoT) has impacted the way we live. Intelligent (smart) devices which can act autonomously has resulted in new applications for example industrial automation, smart healthcare systems, autonomous transportation to name just a few. These applications have dramatically improved the way we live as citizens. While the internet is continuing to grow at an unprecedented rate, this has also been coupled with the growing demands for new services e.g. machine-to machine (M2M) communications, smart metering etc. Transmission Control Protocol/Internet Protocol (TCP/IP) architecture was developed decades ago and was not prepared nor designed to meet these exponential demands. This has led to the complexity of the internet coupled with its inflexible and a rigid state. The challenges of reliability, scalability, interoperability, inflexibility and vendor lock-in amongst the many challenges still remain a concern over the existing (traditional) networks. In this study, an evolutionary approach into implementing a "Scalable IoT Data Transmission Network" (S-IoT-N) is proposed while leveraging on existing transport networks. Most Importantly, the proposed evolutionary approach attempts to address the above challenges by using open (existing) standards and by leveraging on the (traditional/existing) transport networks. The Proof-of-Concept (PoC) of the proposed S-IoT-N is attempted on a physical network testbed and is demonstrated along with basic network connectivity services over it. Finally, the results are validated by an experimental performance evaluation of the PoC physical network testbed along with the recommendations for improvement and future work.

Page generated in 0.0182 seconds