Spelling suggestions: "subject:"cachine 1omachine"" "subject:"cachine bodymachine""
21 |
Bootstrapping Secure Sensor Networks in the Internet of Things / Konfiguration av säkra sensornätverk i sakernas internetEdman, Johan January 2022 (has links)
The Internet of Things has become an integral part of modern society and continues to grow and evolve. The devices are expected to operate in various conditions and environments while securely transmitting sensor data and keeping low manufacturing costs. Security for the Internet of Things is still in its infancy and a serious concern. Although there are several schemes and protocols for securing communication over insecure channels, they are deemed too costly to perform on these constrained devices. As a result, substantial effort has been committed to developing secure protocols and adapting existing ones to be more lightweight. What remains seemingly absent in protocol specifications and key management schemes, however, is how to bootstrap and secure the initial communication. While it is possible to use pre-shared keys, such solutions are problematic with security and administrative overhead in mind. When the sensor networks grow in scale, with an increasing number of devices, this becomes especially problematic as autonomous deployment becomes necessary. By reviewing proposed bootstrapping techniques and evaluating suitable candidates, this work aims to provide an overview of approaches, their trade-offs and feasibility. Results of the study show that advancements in high-speed, lightweight and elliptic curve implementations have made public-key cryptography a viable option even on the very constrained platform, with session keys established within the minute. When analysing the node’s capability to generate randomness, a cornerstone of cryptographic security, initial findings indicate that it is not well equipped for the task. Consequently, sources of entropy must be evaluated thoroughly in resource-constrained devices before use and dedicated hardware for randomness might be necessary for the most constrained nodes if any security is to be guaranteed. / Sakernas internet har blivit en central del i dagens samhälle och fortsätter att utvecklas och integreras allt mer. Enheterna förväntas fungera i många typer av miljöer och förhållanden samtidigt som de ska skicka data säkert och vara billiga att producera. Trots att utvecklingen gått framåt, är säkerheten fortfarande väldigt rudimentär och i behov av ytterligare utveckling. För vanliga nätverk finns det många väletablerade protokoll för att säkra kommunikation, men dessa anses oftast vara för komplicerade för de resursbegränsade enheterna. Till följd av detta har forskning inriktats på att effektivisera existerande protokoll men även på att utveckla enklare varianter. Det som fortfarande kvarstår som ett problem och ofta inte diskuteras, är hur den initiala distributionen av kryptografiska nycklar ska genomföras. Att använda sig utav förinstallerade nycklar är en möjlighet, men det brukar oftast bli problematiskt utifrån säkerhet och administrering när sensornätverken växer i storlek. Genom att granska och utvärdera föreslagna metoder för initial konfiguration av sensornätverk, ämnar detta arbete att ge en översikt i vilka olika metoder som finns tillgängliga och deras lämplighet. Resultat från arbetet visar att tack vare framsteg inom elliptisk kurvkryptografi är publik nyckelkryptografi ett rimligt alternativ att använda, då en sessionsnyckel kan etableras inom loppet av en minut. Vid utvärdering av enheternas förmåga att generera slumptal visar initiala resultat däremot att A/D-omvandlaren inte är en lämplig källa för detta då dess entropi är låg och genererad slumpdata har en dålig fördelning och hög upprepning. Det går därför att dra slutsatsen att om någon nivå av kryptografisk säkerhet ska erhållas, så måste källor till entropi utvärderas noggrant. De resursbegränsade enheterna kan även ha ett behov av dedikerad hårdvara för att generera slumptal.
|
22 |
Towards Digitization and Machine learning Automation for Cyber-Physical System of SystemsJaved, Saleha January 2022 (has links)
Cyber-physical systems (CPS) connect the physical and digital domains and are often realized as spatially distributed. CPS is built on the Internet of Things (IoT) and Internet of Services, which use cloud architecture to link a swarm of devices over a decentralized network. Modern CPSs are undergoing a foundational shift as Industry 4.0 is continually expanding its boundaries of digitization. From automating the industrial manufacturing process to interconnecting sensor devices within buildings, Industry 4.0 is about developing solutions for the digitized industry. An extensive amount of engineering efforts are put to design dynamically scalable and robust automation solutions that have the capacity to integrate heterogeneous CPS. Such heterogeneous systems must be able to communicate and exchange information with each other in real-time even if they are based on different underlying technologies, protocols, or semantic definitions in the form of ontologies. This development is subject to interoperability challenges and knowledge gaps that are addressed by engineers and researchers, in particular, machine learning approaches are considered to automate costly engineering processes. For example, challenges related to predictive maintenance operations and automatic translation of messages transmitted between heterogeneous devices are investigated using supervised and unsupervised machine learning approaches. In this thesis, a machine learning-based collaboration and automation-oriented IIoT framework named Cloud-based Collaborative Learning (CCL) is developed. CCL is based on a service-oriented architecture (SOA) offering a scalable CPS framework that provides machine learning-as-a-Service (MLaaS). Furthermore, interoperability in the context of the IIoT is investigated. I consider the ontology of an IoT device to be its language, and the structure of that ontology to be its grammar. In particular, the use of aggregated language and structural encoders is investigated to improve the alignment of entities in heterogeneous ontologies. Existing techniques of entity alignment are based on different approaches to integrating structural information, which overlook the fact that even if a node pair has similar entity labels, they may not belong to the same ontological context, and vice versa. To address these challenges, a model based on a modification of the BERT_INT model on graph triples is developed. The developed model is an iterative model for alignment of heterogeneous IIoT ontologies enabling alignments within nodes as well as relations. When compared to the state-of-the-art BERT_INT, on DBPK15 language dataset the developed model exceeds the baseline model by (HR@1/10, MRR) of 2.1%. This motivated the development of a proof-of-concept for conducting an empirical investigation of the developed model for alignment between heterogeneous IIoT ontologies. For this purpose, a dataset was generated from smart building systems and SOSA and SSN ontologies graphs. Experiments and analysis including an ablation study on the proposed language and structural encoders demonstrate the effectiveness of the model. The suggested approach, on the other hand, highlights prospective future studies that may extend beyond the scope of a single thesis. For instance, to strengthen the ablation study, a generalized IIoT ontology that is designed for any type of IoT devices (beyond sensors), such as SAREF can be tested for ontology alignment. Next potential future work is to conduct a crowdsourcing process for generating a validation dataset for IIoT ontology alignment and annotations. Lastly, this work can be considered as a step towards enabling translation between heterogeneous IoT sensor devices, therefore, the proposed model can be extended to a translation module in which based on the ontology graphs of any device, the model can interpret the messages transmitted from that device. This idea is at an abstract level as of now and needs extensive efforts and empirical study for full maturity.
|
23 |
Impact of Extended DRX Cycles on Battery Lifetimes and UE ReachabilityCholaraju Narasaraju, Vignesh January 2016 (has links)
Several UE energy consumption optimization techniques have been proposed for Machine Type Communication (MTC) devices. Extended Discontinuous Reception (eDRX) in idle mode is one such technique wherein an UE in idle mode wakes up only during its Paging Occasion (PO) to monitor paging messages from eNodeB (eNB). The PO is located within a Paging frame (PF). The PF is a function of System Frame Number (SFN) cycle of eNB. The paging messages may be sent asynchronously from multiple eNBs to a UE. Due to asynchronous operation of eNBs, SFN takes on different values at a given point in time and therefore a paging message is transmitted at different points in time from different eNBs. Due to this SFN misalignment between eNBs, an idle mode UE might receive and respond to the same paging message from different eNBs and/or miss a PO and thus the paging message. Due to this spread in time of SFN and PO, the actual handling of paging message by the UE becomes inefficient leading to increased UE energy consumption and decreased reachability. These issues, resulting from paging handling, will get amplified further if DRX period is extended longer (eDRX). In this study, we investigate the impact of eDRX cycles and mobility related parameters such as UE speed, cell size and size of SFN misalignment between eNBs on UE energy consumption, use of network resources and UE reachability. Receiving and responding to the same paging message results in increased energy consumption for UE and increased signaling between UE and the network. Missing a PO results in delayed paging reception and hence decreases UE reachability. As the DRX cycle lengths are increased from existing maximum of 2.56 seconds to 10.24 seconds and beyond, we see a reduction in UE energy consumption by more than 90%, but the network signaling and the delay to reach the UE increases linearly as a function of the DRX cycle length. We observe that the number of duplicate paging message receptions/missed POs is minuscule for DRX cycle lengths below 10.24 sec. At DRX cycle length of 10.24 seconds, UEs travelling across 500 m cell radius at speeds of 3, 50, 100 km/h the percentage of duplicate paging receptions are 0.07, 0.11, and 0.15 respectively. This duplicate paging message reception increases the UE energy consumption by 2.31, 6.15 and 12 percent of the total energy units respectively. Similarly, UE misses nearly 0.34, 0.39, and 0.405 percent of the total POs respectively. Depending on the number of consecutive PO misses, the UE reachability decreases. But by reducing the size of SFN misalignment between eNBs, we see that it’s possible to increase the reachability for UEs in eDRX. Further we have proposed solutions based on our analytical study to avoid duplicate paging message reception by UE, increase UE reachability and also reduce UE energy consumption using a windowing technique. We conclude that when a UE is configured with eDRX cycles, the tradeoff between battery lifetimes and UE reachability is based on mobility characteristics and service requirements.
|
24 |
Towards interoperability, self-management, and scalability for scalability for machine-to-machine systems / Vers l'interopérabilité, l'autogestion, et la scalabilité des systèmes Machine-to-MachineBen Alaya, Mahdi 06 July 2015 (has links)
La communication Machine-to-Machine (M2M) est l'un des principaux fondements de l'Internet des Objets (IoT). C'est un phénomène qui a évolué discrètement au cours du temps et vient d’émerger à la surface pour do! nner naissance à une explosion de nouveaux usages et services. Capteurs, actionneurs, tags, véhicules et objets intelligents ont tous la possibilité de communiquer. Le nombre de connexions M2M est en constante augmentation et il est prévu de voir des milliards d’objets connectés dans un futur proche. Les applications M2M offrent des avantages dans divers domaines à savoir les villes intelligentes, les voitures connectées, les usines du futures, l’agriculture de précision, l’environnement, la santé, etc. La croissance rapide de cet écosystème est entrain de conduire le M2M vers un avenir prometteur. Cependant, les opportunités d'expansion des marchés M2M ne sont pas évidentes. En effet, un ensemble de challenges doivent être surmontés afin de permettre un déploiement à grande échelle dans des domaines diverses et variés à savoir les défis d’interopérabilité, de complexité et de scalabilité. Actuellement, le marché du M2M souffre d'une fragmentation verticale importante touchant la majorité des domaines industriels. En effet, diverses solutions propriétaires ont été conçues pour répondre à des applications spécifiques engendrant ainsi un sérieux problème d''interopérabilité. Pour adresser ce challenge, nous avons conçu, développer et expérimenté la plateforme OM2M offrant une architecture opérationnelle, flexible et extensible pour l'interopérabilité M2M conforme à la norme SmartM2M. Pour supporter les environnements contraints, nous avons proposé une nouvelle convention de nommage basée sur une structure de ressources non-hiérarchique permettant d’optimiser la taille des messages échangés. Pour assurer l’interopérabilité sémantique entre les applications et les machines, nous avons proposé l'ontologie IoT-O. Cette dernière est composée de cinq modèles de base représentant les capteurs, les actionneurs, les observations, les actuations et les web ! services pour permettre de converger rapidement vers un vocabulaire commun pour l'IoT. Une plateforme M2M horizontale permet d'interconnecter des machines hétérogènes largement distribués et qui évoluent fréquemment en fonction des changements de l’environnement. Maintenir ces systèmes complexes en vie est coûteux en termes de temps et d'argent. Pour adresser ce challenge, nous avons conçu, développé et intégré le framework FRAMESELF afin d'ajouter des capacités d'autogestion aux systèmes M2M basées sur le paradigme de l'informatique autonome. En étendant le modèle d'architecture de référence MAPE-K, notre solution permet d'adapter dynamiquement le comportement de la plateforme OM2M par en fonctions des changements du contexte et des politiques haut niveaux. Nous avons défini un ensemble de règles sémantiques pour faire du raisonnement sur l'ontologie IoT-O en tant que modèle de connaissance. Notre objectif est de permettre la découverte automatique entre les machines et les applications à travers un appariement sémantique et une reconfiguration dynam! ique de l'architecture des ressources. L’interopérabilité et l’autogestion ouvrent la voie à un déploiement de masse des systèmes M2M. Par contre, ces derniers se basent sur l'infrastructure actuelle d'internet qui n'a jamais été conçu pour ce genre de d'utilisation ce qui pose de nouvelles exigences en termes de scalabilité. Pour adresser ce challenge, nous avons conçu, simulé et validé l'approche OSCL proposant une nouvelle topologie de réseau maillé M2M comme alternative à l'approche centralisée actuelle. OSCL s'appuie sur les techniques de routage centrées sur l'information favorisant les communications à sauts multiples et un cache distribué pour une meilleure dissémination des données. Nous avons développé le simulateur OSCLsim pour valider l'approche proposée.[...] / Machine-to-Machine (M2M) is one of the main features of Internet of Things (IoT). It is a phenomenon that has been proceeding quietly in the background, and it is coming into the surface, where explosion of usage scenarios in businesses will happen. Sensors, actuators, tags, vehicles, and intelligent things all have the ability to communicate. The number of M2M connections is continuously increasing, and it has been predicted to see billions of machines interconnected in a near future. M2M applications provide advantages in various domains from smart cities, factories of the future, connected cars, home automation, e-health to precision agriculture. This fast-growing ecosystem is leading M2M towards a promising future. However, M2M market expansion opportunities are not straightforward. A set of challenges should be overcome to enable M2M mass-scale deployment across various industries including interoperability, complexity, and scalability issues. Currently, the M2M market is suffering from a high vertical fragmentation affecting the majority of business sectors. In fact, various vendor-specific M2M solutions have been designed independently for specific applications, which led to serious interoperability issues. To address this challenge, we designed, implemented, and experimented with the OM2M platform offering a flexible and extensible operational architecture for M2M interoperability compliant with the SmartM2M standard. To support constrained environments, we proposed an efficient naming convention relying on a non-hierarchical resource structure to reduce the payload size. To reduce the semantic gap between applications and machines, we proposed the IoT-O ontology for an effective semantic interoperability. IoT-O consists of five main parts, which are sensor, actuator, observation, actuation and service models and aims to quickly converge to a common IoT vocabulary. An interoperable M2M service platform enables one to interconnect heterogeneous devices that are widely distributed and frequently evolving according to their environment changes. Keeping M2M systems alive is costly in terms of time and money. To address this challenge, we designed, implemented, and integrated the FRAMESELF framework to retrofit self-management capabilities in M2M systems based on the autonomic computing paradigm. Extending the MAPE-K reference architecture model, FRAMESELF enables one to dynamically adapt the OM2M system behavior according to high level policies how the environment changes. We defined a set of semantic rules for reasoning about the IoT-O ontology as a knowledge model. Our goal is to enable automatic discovery of machines and applications through dynamic reconfiguration of resource architectures. Interoperability and self-management pave the way to mass-scale deployment of M2M devices. However, current M2M systems rely on current internet infrastructure, which was never designed to address such requirements, thus raising new requirements in term of scalability. To address this challenge, we designed, simulated and validated the OSCL overlay approach, a new M2M meshed network topology as an alternative to the current centralized approach. OSCL relies on the Named Data Networking (NDN) technique and supports multi-hop communication and distributed caching 5 to optimize networking and enhance data dissemination. We developed the OSCLsim simulator to validate the proposed approach. Finally, a theoretical model based on random graphs is formulated to describe the evolution and robustness of the proposed system.
|
25 |
Energy-efficient peer-to-peer networking for constrained-capacity mobile environmentsHarjula, E. (Erkki) 06 June 2016 (has links)
Abstract
Energy efficiency is a powerful measure for promoting sustainability in technological evolution and ensuring feasible battery life of end-user devices in mobile computing. Peer-to-peer technology provides decentralized and self-organizing architecture for distributing content between devices in networks that scale up almost infinitely. However, peer-to-peer networking may require lots of resources from peer nodes, which in turn may lead to increased energy consumption on mobile devices. For this reason, peer-to-peer networking has so far been considered unfeasible for mobile environment.
This thesis makes several contributions towards enabling energy-aware peer-to-peer networking in mobile environments. First, an empirical study is conducted to understand the energy consumption characteristics of radio interfaces and typical composition of traffic in structured peer-to-peer networks. This is done in order to identify the most essential obstacles for utilizing peer-to-peer technology in mobile environments. Second, the e-Aware model for estimating the energy consumption of a mobile device is developed and empirically verified to achieve 3-21% error in comparison to real-life measurements. Third, the e-Mon model for the energy-aware load monitoring of peer nodes is developed and demonstrated to improve the battery life of mobile peer nodes up to 470%. Fourth, the ADHT concept of mobile agent based virtual peers is proposed for sharing the peer responsibilities between peer nodes in a subnet so that they can participate in a peer-to-peer overlay without compromising their battery life.
The results give valuable insight into implementing energy-efficient peer-to-peer systems in mobile environments. The e-Aware energy consumption model accelerates the development of energy-efficient networking solutions by reducing the need for time-consuming iterations between system development and evaluations with real-life networks and devices. The e-Mon load monitoring model facilitates the participation of battery-powered devices in peer-to-peer and other distributed networks by enabling energy-aware load balancing where energy-critical mobile nodes carry less load than other nodes. The ADHT facilitates the participation of constrained-capacity wireless devices, such as machine-to-machine nodes, in a peer-to-peer network by allowing them to sleep for most of their time. / Tiivistelmä
Energiatehokkuus on kustannustehokas tapa vähentää päätelaitteiden käytön aiheuttamia kasvihuonepäästöjä sekä parantaa niiden akunkestoa. Vertaisverkkoteknologia tarjoaa hajautetun, itseorganisoituvan, sekä lähes rajattomasti skaalautuvan verkkoarkkitehtuurin päätelaitteiden väliseen tallennustilan, mediasisältöjen ja tietoliikennekapasiteetin suorajakamiseen. Vertaisverkkojen suurin heikkous mobiilikäytön näkökulmasta on niiden päätelaitteille aiheuttama ylimääräinen kuormitus, mikä näkyy lisääntyneenä energiankulutuksena.
Tässä väitöskirjassa on tutkittu mekanismeja vertaisverkon päätelaitteiden energiatehokkuuden parantamiseksi, tavoitteena riittävä akunkesto mobiilikäytössä. Aluksi työssä tutkittiin empiirisesti langattomien verkkojen mobiilipäätelaitteille aiheuttamaa energiankulutusta sekä rakenteellisten vertaisverkkojen vertaispäätelaitteille aiheuttamaa liikennekuormitusta. Tavoitteena oli muodostaa käsitys suurimmista haasteista mobiililaitteiden käytölle vertaisverkoissa. Seuraavaksi mobiiliverkkojen energiankulutusta koskevasta havaintoaineistosta muodostettiin energiankulutusmalli, e-Aware, jolla voitiin arvioida mobiilipäätelaitteen energiankulutusta erilaisilla verkon liikenneprofiileilla. Mallilla saavutettiin parhaimmillaan kolmen prosentin keskimääräinen virhe. Kolmannessa vaiheessa kehitettiin energiatietoinen kuormanseurantamalli, e-Mon, jota käyttäen saavutettiin jopa 470 % lisäys mobiilin vertaispäätelaitteen akunkestoon. Viimeisessä vaiheessa kehitettiin ADHT-konsepti, joka on uudentyyppinen tapa jakaa vertaispäätelaitteiden kuormaa usean saman verkkoklusterin päätelaitteen kesken käyttäen laitteesta toiseen kiertävää mobiiliagenttia.
Väitöskirjan tulokset osoittavat että mobiililaitteiden energiatehokkuutta vertaisverkoissa pystytään olennaisesti parantamaan energiatietoisia kuormanjakomekanismeja käyttäen. Työssä kehitetty e-Aware nopeuttaa energiatehokkaiden hajautettujen järjestelmien kehitystyötä tarjoamalla tehokkaan työkalun järjestelmän energiankulutuksen arvioimiseen jo kehitysvaiheessa. e-Mon mahdollistaa energiatietoisen kuormanjaon vertaisverkoissa tarjoamalla tarvittavan kuormanseurantamallin. ADHT puolestaan tarjoaa uudenlaisen tavan vähentää vertaisverkkojen aiheuttamaa päätelaitekuormitusta hyödyntäen maksimaalisesti rajoitetun kapasiteetin laitteiden unitilojen käyttöön perustuvaa energiankulutusoptimointia.
|
26 |
Efficient super-peer-based coordinated service provisionLiu, M. (Meirong) 05 April 2014 (has links)
Abstract
Peer-to-Peer (P2P) networks have been applied in many applications for sharing resources such as storage space, media files or network bandwidth. Their main benefits include decentralization, self-organization, and scalability. Moreover, P2P technologies are evolving towards hybrid systems, where P2P networks are used in those parts of a larger system to
leverage the decentralization most efficiently. The examples include cloud computing, where P2P networks are used in sharing computing resources, and Machine-to-Machine communication, where P2P networks are used for resource discovery.
In super-peer overlays, the nodes are either regular nodes or super nodes that are located higher in the node hierarchy. This type of overlay explores the heterogeneity of peers in the overlay network to enable applications to run more efficiently. Leveraging the advantage of a super-peer overlay for service provision is an important issue. This thesis contributes to the research and development of super-peer-based coordination service provision from three aspects.
Firstly, a super-peer-based coordinated service provision framework is proposed to coordinate different service groups and service peers in resource sharing, aiming to enable service groups to adapt to dynamic service demands. The proposed framework is evaluated using the following performance metrics: service response time, scalability, robustness, and communication traffic, in comparison to related work.
Secondly, an efficient algorithm for rapidly constructing a robust super-peer overlay is proposed. The algorithm introduces a super-peer candidate based method for super-peer selection and a two-hop search method for finding client peers. Performance evaluation takes into account the convergence time of building a super-peer overlay, communication overhead, scalability, robustness. A comparison to related work is also conducted.
Thirdly, the architecture of distributed resource discovery based on P2P overlay for Machine-to-Machine service provision is proposed. The architecture supports heterogeneous devices using different communication protocols in resource registration and discovery for achieving interoperability. As a part of the thesis, a functional real-world prototype is implemented and verified with a simple demonstration. Preliminary evaluation on the prototype indicates that caching can improve the response time of resource lookup dramatically. / Tiivistelmä
Vertaisverkkoja on hyödynnetty resurssien kuten tallennustilan, mediasisältöjen ja tietoliikennekapasiteetin jakamisessa. Niiden etuja perinteisiin keskitettyihin järjestelmiin verrattuna ovat hajautettu arkkitehtuuri, itseorganisoituvuus ja skaalautuvuus. Vertaisverkkoja käytetään yhä useammin järjestelmän osien toteuttamisessa, joissa hajautettujen resurssien hyödyntämisellä saavutetaan suurimmat edut. Esimerkkeinä ovat pilvilaskenta, jossa vertaisverkkoa käytetään laskentaresurssien jakamiseen, sekä laitteidenvälinen kommunikaatio, jossa vertaisverkkoja käytetään resurssien löytämiseen.
Hierarkkisissa vertaisverkoissa niihin kytkeytyneet laitteet jaotellaan laitteiden kapasiteetin mukaan tavallisiin noodeihin ja näiden yläpuolella hierarkiassa toimiviin ylinoodeihin. Ylinoodeihin perustuva vertaisverkon kuoriverkko hyödyntää yksittäisten verkon noodien eli laitteiden erilaisuutta, jotta verkko voisi toimia tehokkaammin. Tämän ominaisuuden hyödyntäminen on erityisen tärkeää palvelun tarjonnassa. Tässä työssä on tutkittu ylinoodeihin perustuvan vertaisverkon palvelun tarjontaa kolmesta näkökulmasta.
Ensimmäiseksi, työssä ehdotetaan ylinoodien koordinoimaa palveluntarjonnan toimintamallia resurssien jakamisessa. Toimintamallissa palveluryhmät ja palvelunoodit adaptoituvat dynaamisesti palvelupyyntöjen tarpeisiin. Tämän ratkaisun suorituskykyä arvioidaan palvelun vasteajan, skaalautuvuuden, robustisuuden ja tietoliikennemäärän suhteen verrattuna aiempiin ratkaisuihin.
Toiseksi, työssä esitellään tehokas algoritmi robustin ylinoodikuoriverkon nopeaan muodostamiseen. Algoritmi käyttää ylinoodiehdokasmenetelmää ja kahden hypyn hakumetodia asiakasnoodien etsimisessä. Suorituskyvyn arvioinnissa otetaan huomioon ylinoodikuoriverkon konvergoitumisaika, tietoliikenneviestinnän aiheuttama ylimääräinen kuormitus, sekä järjestelmän skaalautuvuus ja robustisuus. Esitetyn algoritmin tehokkuutta arvioidaan vertaamalla näitä suorituskykymittareita aiempiin ratkaisuihin.
Kolmanneksi, työssä esitellään hajautettu resurssihakemiston arkkitehtuuri, joka perustuu laitteiden välisen kuoriverkon palveluntarjontaan. Arkkitehtuuri tukee erilaisten laitteiden ja niiden käyttämien protokollien resurssien rekisteröintiä ja löytämistä yhteensopivuuden saavuttamiseksi. Väitöskirjatyön osana on toteutettu toimiva prototyyppi, jonka toimivuus on todennettu demonstraation avulla. Prototyypillä tehdyt mittaukset antavat perustellun syyn olettaa, että esitetyn ratkaisun mukainen välimuistin käyttö voi merkittävästi lyhentää resurssien etsimisen vasteaikaa.
|
27 |
Reduced Fuel Emissions through Connected Vehicles and Truck PlatooningBrummitt, Paul D 01 August 2022 (has links)
Vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication enable the sharing, in real time, of vehicular locations and speeds with other vehicles, traffic signals, and traffic control centers. This shared information can help traffic to better traverse intersections, road segments, and congested neighborhoods, thereby reducing travel times, increasing driver safety, generating data for traffic planning, and reducing vehicular pollution. This study, which focuses on vehicular pollution, used an analysis of data from NREL, BTS, and the EPA to determine that the widespread use of V2V-based truck platooning—the convoying of trucks in close proximity to one another so as to reduce air drag across the convoy—could eliminate 37.9 million metric tons of CO2 emissions between 2022 and 2026.
|
28 |
Net Neutrality Implications for Internet Actors in SwedenNikam, Uma January 2016 (has links)
A telecom industry is constantly looking for new ways to generate revenues by offering new and innovative services. Segmentation of customers by offering premium services to premium customers is a one way which has immense potential of revenue generation. Also, network and service providers are keen to provide specialized services with high quality and faster speed, with more emphasis on Quality of Experience (QoE), in order to enhance business revenue. The QoE concept offers several benefits to telecom operators as well as end-users, as it constantly monitors customer feedback and modifies services in order to delight customers. However, Net Neutrality is a current issue all over world and defined/re-defined in many ways, but many definitions overlooks practical difficulties and market realities. This demands in-depth analysis of Net Neutrality concept from regulatory and business point of view. Current business models for specialized services like Machine to Machine (M2M) communication and video streaming are not adequately designed to tackle regulatory issues such as Net Neutrality. Also the QoE concept needs to be tested on the level of Net Neutrality principles. This thesis discusses the business models incorporating QoE concept, along with analysing implications of Net Neutrality principles. The rules and regulations regarding Net Neutrality in Sweden are studied thoroughly in comparison with same principles in other countries like USA, India and countries from EU. The business models of M2M communication and video streaming services are presented and discussed considering effect of Net Neutrality regulations. Implications of Net Neutrality rules on specialize services, customized services, and zero-rating is presented. In order to have practical knowledge of telecom market and business strategies, several activities including brainstorming sessions with industrial experts and market surveys are carried out to generate meaningful conclusions. According to EU Net Neutrality rules specialized services, customized services and zero-rating services are allowed in Sweden with incorporating QoE. / Telekomindustrin letar ständigt efter nya sätt att generera intäkter genom att erbjuda nya och innovativa tjänster. Segmentering av kunder genom att erbjuda tilläggstjänster till premiumkunder är ett sätt som har enorm potential för intäktsgenerering. Även nätverk och tjänsteleverantörer är angelägna om att ge specialiserade tjänster med hög kvalitet och snabbare hastighet, med mer betoning på kvalitet på erfarenhet (QoE) begreppet, i syfte att öka företagens intäkter. Konceptet med QoE erbjuder flera fördelar för teleoperatörer samt slutanvändare, eftersom det ständigt övervakar kunder och modifierar tjänster för att glädja kunderna. Dock är nätneutralitet en aktuell fråga över hela världen och definierade/åter definieras på många sätt, men många definitioner saknar praktiska svårigheter och realiteter. Detta kräver en djupgående analys av nätneutralitet koncept från reglerings- och kommersiell synvinkel. Nuvarande affärsmodeller för specialiserade tjänster som maskin till maskin (M2M) kommunikation och video är inte lämpligt utformade för att hantera regleringsfrågor som nätneutralitet. Även QoE konceptet behöver testas på graden av nätneutralitet principer. Denna avhandling diskuterar affärsmodeller som innehåller QoE koncept, tillsammans med analys av konsekvenserna av nätneutralitet principer. De regler och föreskrifter om nätneutralitet som finns i Sverige studeras noggrant i jämförelse med samma principer i andra länder som USA, Indien och länder från EU. Affärsmodellerna för maskin till maskin (M2M) kommunikation och videostreamingtjänster presenteras och diskuteras. Inblandning av nätneutralitet regler på specialiserade tjänster, kundanpassade tjänster och noll presenteras. För att få praktisk kunskap om telekommarknaden och affärsstrategier, utfördes flera aktiviteter inklusive brainstorming med industri experter och marknadsundersökningar genomförs för att generera meningsfulla slutsatser. Enligt Eus regler gällande nätneutralitet är specialiserade tjänster, kundanpassade tjänster och zero-rating tjänster är tillåtna i Sverige med integration av QoE.
|
29 |
Inter-device authentication protocol for the Internet of ThingsWilson, Preethy 18 May 2017 (has links)
The Internet of things (IoT) recently blossomed remarkably and has been transforming the everyday physical entities around us into an ecosystem of information that will enrich our lives in unimaginable ways. Authentication is one of the primary goals of security in the IoT and acts as the main gateway to a secure system which transmits confidential and/or private data.This thesis focuses on a Device-to-Device Mutual Authentication Protocol, designed for the smart home network, which is an essential component of communication in the Internet of Things(IoT).
The protocol has been developed based on asymmetric cryptography to authenticate the devices in the network and for the devices to agree on a shared secret session key. In order to ensure the security of a communications session between the devices, the session keys are changed frequently - ideally after every communication session. The proposed scheme has been programmed in HLPSL, simulated and its efficiency verified
using the SPAN/ AVISPA tool. When SPAN substantiates the protocol simulation and the attacker simulation, the back-ends of the AVISPA tool verifies the safety and security of the proposed authentication protocol. The thesis also evaluates the protocol's security against the attacks successful against protocols proposed by other researchers. / Graduate / 0544 / 0984 / 0537 / pwilson1@uvic.ca
|
30 |
Návrh mezioperační dopravy ve výrobním podniku podle principů Průmyslu 4.0 / Design of inter-operational transport in a manufacturing company according to the Industry 4.0 conceptMravec, Roman January 2021 (has links)
Based on the description and definition of technology and processes falling within the vision of the fourth industrial revolution with the aim of creating intelligent factories, this diploma thesis deals with the principles of the Industry 4.0 concept in Hilti's production plant with a focus on transport and supply of production equipment. The aim of the work is to create a comprehensive proposal that takes into account all the necessary aspects associated with upgrading the existing state of inter-operational transport in a particular production line to fully automated, flexible and autonomous transport of materials and products in the context of Industry 4.0. A prerequisite for creating a design is the connection of automatically guided vehicles (AGVs) serving individual transport orders. The selection of the vehicle was made taking into account the safety of movement, the method of charging, the system and network integrity of existing and proposed technologies and components. The intention is not only to automate the inter-operational service, but also on the basis of the created automation concept, the ability to autonomously procure the flow of material and products. The mathematical calculation of capacity planning in the production line helped to determine the total load and the number of vehicles needed for continuous procurement of transport requirements. The result of the design part is also the design of specific transport routes and transport conditions that AGV vehicles must comply with in order to maintain a high level of safety. Transparency and a constant overview of transported products is provided by the presented scheme for identification of production batches, Auto-ID system. The financial efficiency of the whole project elaborated in the diploma thesis is evaluated as payable after 4 years from the implementation of the proposal. The financial efficiency of the whole project elaborated in the diploma thesis is evaluated as payable after 4 years from the implementation of the proposal due to high labor costs.
|
Page generated in 0.0559 seconds