• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 584
  • 130
  • 42
  • 32
  • 14
  • 12
  • 9
  • 7
  • 7
  • 6
  • 4
  • 3
  • 2
  • 1
  • Tagged with
  • 937
  • 393
  • 372
  • 283
  • 266
  • 223
  • 199
  • 178
  • 178
  • 154
  • 152
  • 127
  • 100
  • 83
  • 83
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

A study into scalable transport networks for IoT deployment

Sizamo, Yandisa 14 March 2022 (has links)
The growth of the internet towards the Internet of Things (IoT) has impacted the way we live. Intelligent (smart) devices which can act autonomously has resulted in new applications for example industrial automation, smart healthcare systems, autonomous transportation to name just a few. These applications have dramatically improved the way we live as citizens. While the internet is continuing to grow at an unprecedented rate, this has also been coupled with the growing demands for new services e.g. machine-to machine (M2M) communications, smart metering etc. Transmission Control Protocol/Internet Protocol (TCP/IP) architecture was developed decades ago and was not prepared nor designed to meet these exponential demands. This has led to the complexity of the internet coupled with its inflexible and a rigid state. The challenges of reliability, scalability, interoperability, inflexibility and vendor lock-in amongst the many challenges still remain a concern over the existing (traditional) networks. In this study, an evolutionary approach into implementing a "Scalable IoT Data Transmission Network" (S-IoT-N) is proposed while leveraging on existing transport networks. Most Importantly, the proposed evolutionary approach attempts to address the above challenges by using open (existing) standards and by leveraging on the (traditional/existing) transport networks. The Proof-of-Concept (PoC) of the proposed S-IoT-N is attempted on a physical network testbed and is demonstrated along with basic network connectivity services over it. Finally, the results are validated by an experimental performance evaluation of the PoC physical network testbed along with the recommendations for improvement and future work.
52

SMARTMON: MONITORING SMART DEVICE STATUS THROUGH NETWORK TRAFFIC

Peng, Pengfei 07 September 2020 (has links)
No description available.
53

Ethical Hacking of a Smart Plug

Achkoudir, Rami, Alsaadi, Zainab January 2021 (has links)
The number of Internet of Things (IoT) devices is growing rapidly which introduces plenty of new challenges concerning the security of these devices. This thesis aims to contribute to a more sustainable IoT environment by evaluating the security of a smart plug. The DREAD and STRIDE methods were used to assess the potential threats and the threats with the highest potential impact were penetration tested in order to test if there were any security preventions in place. The results from the penetration tests presented no major vulnerabilities which bring us to the conclusion that the Nedis Smart Plug has implemented enough security measures. / Antalet Internet of Things (IoT) -enheter växer snabbt vilket medför många nya utmaningar när det gäller säkerheten för dessa enheter. Denna avhandling syftar till att bidra till en mer hållbar IoT-miljö genom att utvärdera säkerheten för en smart plug. Metoderna DREAD och STRIDE användes för att bedöma de potentiella hoten och hoten med störst potentiell påverkan penetrerades för att testa om det fanns några säkerhetsförebyggande åtgärder. Resultaten från penetrationstesterna presenterade inga större sårbarheter som ledde oss till slutsatsen att Nedis Smart Plug har genomfört tillräckliga säkerhetsåtgärder.
54

USER CONTROLLED PRIVACY BOUNDARIES FOR SMART HOMES

Ryan David Fraser (15299059) 17 April 2023 (has links)
<p>  </p> <p>The rise of Internet of Things (IoT) technologies into the substantial commercial market that it is today comes with several challenges. Not only do these systems face the traditional challenges of security and reliability faced by traditional information technology (IT) products, but they also face the challenge of loss of privacy. The concern of user data privacy is most prevalent when these technologies come into the home environment. In this dissertation quasi-experimental research is conducted on the ability of users to protect private data in a heterogeneous smart home network. For this work the experiments are conducted and verified on eight different smart home devices using network traffic analysis and discourse analysis to identify privacy concerns. The results of the research show that data privacy within the confines of the user’s home often cannot be ensured while maintaining smart home device functionality. This dissertation discusses how those results can inform users and manufacturers alike in the use and development of future smart home technologies to better protect privacy concerns.</p>
55

Ramverk för utveckling av pretotyper : Framtagning av ett Azure-baserat ramverk för pretotypframställningar inom IoT / Framework for pretotype developement : Creation of an Azure-based framework for IoT pretotyping

Jansson, David, Elofsson, Filip January 2023 (has links)
Att utveckla en ny produkt kan vara tids- och pengakrävande. Att veta om det finns en marknad för produkten är inte heller alltid uppenbart. Detta är varför pretotyping är en bra idé. En pretotyp testar konceptet och intresset på produkter hos kunder. Det är därför en fördel att kunna utveckla pretotyper snabbt. I denna uppsats besvaras frågan om hur ett ramverk för pretotyping kan byggas, samt hur en pretotyp av ett ”smartbälte” har implementerats. Ramverket som tagits fram består av tre komponenter: mikrokontroller, molntjänster och applikation. Kommunikation mellan mikrokontroller och moln hanteras med ett MQTT-bibliotek från Microsoft. Molntjänsterna är baserade i Microsoft Azure och innefattar bland annat IoT-Hub och SQL-databas. Applikationen har tagits fram av uppdragsgivare. Ramverket stödjer kommunikation från enhet till applikation och applikation till enhet. / Developing a new product can be time- and money-consuming. Knowing whether there is a market for the product is not always obvious. This is why pretotyping is a good idea. A pretotype tests the concept and interest in products among customers. It is therefore an advantage to be able to develop pretotypes quickly. In this essay, the question of how a framework for pretotyping can be built will be answered, as well as how a pretotype of a ”smart belt” was developed. The framework consists of three components: microcontroller, cloud services and application. Communication between microcontroller and cloud is handled with an MQTT library from Microsoft. The cloud services are based in Microsoft Azure and include IoT Hub and SQL database. The application has been developed by the supervisor from the company. The framework supports communication from device to application and application to device.
56

Use of legacy and wireless protocols in modern IoT / Use of legacy and wireless protocols in modern IoT

Hraško, Andrej January 2018 (has links)
Use of legacy and wireless protocols in modern IoT The main goals of this work is implementation of an extension into Inthouse system which will allow remote control of widespread Modbus-enabled devices and creation of an in-house-made simple controller controllable via Bluetooth using simplified JSON RPC protocol and addition of its control support into Inthouse. The next step is to summarize each implementation focusing on its technical complexity and a business potential. This work uncovers interesting details from the implementation and explain causes why such implementation was used in a commercial environment.
57

Svensk Internet of Things-utveckling : En intervjustudie som undersöker det svenska IoT-klimatet / Swedish Internet of Things development : An interview study that investigates the swedish IoT climate

Schill, Philip January 2017 (has links)
Den här rapporten diskuterar svårigheter med "Internet of Things"-utveckling. Artiklar och rapporter inom området har sammanställts för att ta reda på hur IoT-utveckling skiljer sig från annan typ av utveckling. Dessutom utförs en intervjustudie där svenska IoT-utvecklare beskriver hur de löser de listade programmeringsutmaningarna. Enligt den här undersökningen har utvecklarna i olika företag ofta samma problematik och deras lösningar är snarlika. / This report discusses the difficulties with "Internet of Things"-development. Various articles and reports in the same area have been compiled in order to find out where IoT-development differs from other types of development. In addition, an interview study was conducted in which Swedish IoT developers answer how they solve the challenges listed from this report. According to this survey, developers in different companies often have the same problems and their solutions are often similar.
58

A Comparative Study of Databases for Storing Sensor Data

Fjällid, Jimmy January 2019 (has links)
More than 800 Zettabytes of data is predicted to be generated per year by the Internet of Things by 2021. Storing this data necessitates highly scalable databases. Many different data storage solutions exist that specialize in specific use cases, and designing a system to accept arbitrary sensor data while remaining scalable presents a challenge.The problem was approached through a comparative study of six common databases, inspecting documented features and evaluations, followed by the construction of a prototype system. Elasticsearch was found to be the best suited data storage system for the specific use case presented in this report, and a flexible prototype system was designed. No single database was determined to be best suited for sensor data in general, but with more specific requirements and knowledge of future use, a decision could be made. / Över 800 Zettabytes av data är förutspått att genereras av Sakernas Internet vid år 2021. Lagring av denna data gör det nödvändigt med synnerligen skalbara databaser. Det finns många olika datalagringslösningar som specialiserar sig på specifika användningsområden, och att designa ett system som ska kunna ta emot godtycklig sensordata och samtidigt vara skalbar är en utmaning. Problemet angreps genom en jämförande studie av sex populära databaser som jämfördes utifrån dokumenterad funktionalitet och fristående utvärderingar. Detta följdes av utvecklingen ut av ett prototypsystem. Elasticsearch bedömdes vara bäst lämpad för det specifika användningsområde som presenteras i denna rapport, och ett flexibelt prototypsystem utvecklades. Inte en enda databas bedömdes vara bäst lämpad för att hantera sensordata i allmänhet, men med mer specifika krav och vetskap om framtida användning kan en databas väljas ut.
59

An Internet of Things Software and Firmware Update Architecture Based on the SUIT Specification

Carlson, Simon January 2019 (has links)
As society becomes more digitalized, cyberattacks are increasingly common and severe. Security in the Internet of Things (IoT) is essential, and IoT devices must be updated to patch vulnerabilities. The thesis aims to investigate the question "How can the Software Updates for Internet of Things (SUIT) specification be applied to develop a technology-agnostic and interoperable update architecture for heterogeneous networks of Internet of Things devices?" The thesis project studied the SUIT specifications to gain an understanding of what such an architecture must provide. Five high-level domains were identified and further discussed:1) roles of devices, servers, and operators, 2) key management, 3) device profiles, 4) authorization, and 5) update handling. The architecture was shown to fulfill the requirements SUIT imposes on the architecture and information model, while being flexible and extensible. A prototype was developed in the Contiki-NG operating system to evaluate the feasibility of the architecture. The thesis found that applying the proposed architecture to constrained systems is feasible and would enable updates in heterogeneous IoT networks. / I takt med att samhället blir digitaliserat blir digitala attacker vanligare och får ökade konsekvenser. Säkerhet inom Internet of Things (IoT) är kritiskt och IoT-enheter måste kunna uppdateras för att laga sårbarheter. Denna uppsats ämnar att undersöka frågan "Hur kan Software Updates for Internet of Things (SUIT)-specifikationen appliceras för att utveckla en teknologiskt agnostisk och kompatibel uppdateringsarkitektur för heterogena nätverk av Internet of Things-enheter?"Uppsatsen studerade SUIT-specifikationen för att förstå vad en sådan arkitektur måste erbjuda. Fem abstrakta domänområden identifierades och diskuterades: 1) roller för enheter, uppdateringsservrar, och operatörer, 2) nyckelhantering, 3) enhetsprofiler, 4) auktorisering, och 5) lokal uppdateringshantering. Arkitekturen visades uppfylla de krav SUIT ställer på en arkitektur och informationsmodell samt var flexibel och kunde utökas. En prototyp utvecklades i Contiki-NG operativsystemet för att utvärdera genomförbarheten hos arkitekturen. Uppsatsen fann att det är rimligt att applicera den föreslagna arkitekturen på resursbegränsade enheter, vilket skulle möjliggöra uppdateringar för heterogena IoT-nätverk.
60

Assessing Risk in IoT Devices

Levitsky, David 01 December 2018 (has links) (PDF)
The explosive growth of the Internet of Things ecosystem has thrust these devices into the center of our lives. Unfortunately, the desire to create these devices has been stronger than the one to secure them. Recent attacks have shown us ignoring security in Internet of Things devices can cause severe harm in both a digital and physical sense. This thesis outlines a framework for developers and managers to assess the risk of IoT devices using a weighted scoring system across five different categories. Our case studies suggest that devices with higher security considerations have a better security posture and lower risk than those without.

Page generated in 0.0404 seconds