• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 103
  • 22
  • 17
  • 9
  • 9
  • 9
  • 7
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 198
  • 198
  • 57
  • 52
  • 50
  • 38
  • 35
  • 35
  • 28
  • 27
  • 26
  • 25
  • 24
  • 23
  • 23
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

Detektionsmetoder för skadlig kod i IoT-baserat smart hem : En systematisk litteraturstudie / IoT-malware detection methods in smart home : A systematic literature review

Saxmark, William January 2023 (has links)
IoT devices are being widely deployed within smart homes. Most of these devices are mass-produced at a low cost. As a result, due to the lack of security mechanisms, IoT devices become vulnerable to malware. As more IoT devices are connected to the internet, and given their inability to maintain robust security, these devices are at an increased risk of being infected with malware. Compromised IoT devices enhance the capabilities of cybercriminals and threat actors to perform attacks and distribute malware. To prevent this, proper detection mechanisms are needed. However, traditional malware detection approaches are often not feasible in an IoT environment. This study compiles current detection methods used to detect IoT-malware in smart homes. Existing malware detection solutions will be included to demonstrate the methods, usage, and effectiveness in a specific context. This was achieved by performing a qualitative systematic literature review of articles from two databases with high technological relevance. In total, 12 articles were utilized for the study. The data from these articles were subject to a thematic analysis, yielding two main themes: method and placement. The “method” theme consists of four categories: anomaly detection, signature detection, statistical analysis, and combination of methods. The “placement” theme consists of two categories: device-based and network-based. The study results indicate that both standalone methods and a combination of multiple methods are being employed for the detection of IoT-malware in smart home environments. Based on the results, anomaly-based detection emerges as the most used method for detecting IoT-malware, both on the device and within the network. / IoT-enheter implementeras i allt större utsträckning inom smarta hem. Många av dessa enheter massproduceras till låg kostnad. Som ett resultat blir IoT-enheter, på grund av bristande säkerhetsmekanismer, sårbara för skadlig kod. När fler IoT-enheter ansluts till internet, och med tanke på deras oförmåga att upprätthålla god säkerhet, löper dessa enheter en ökad risk för att infekteras med skadlig kod. Infekterade IoT-enheter ökar förmågan hos cyberkriminella och hotaktörer att utföra attacker och sprida skadlig kod. För att förhindra detta krävs lämpliga detektionsmekanismer. Traditionella metoder för att detektera skadlig kod är ofta inte genomförbara i en IoT-miljö. Denna studie sammanställer aktuella detekteringsmetoder som används för att upptäcka skadlig kod som riktas mot IoT-enheter inom smarta hem. Existerande lösningar för att detektera skadlig kod inom smarta hem kommer att inkluderas för att demonstrera metoderna, användningen och effektiviteten i ett specifikt sammanhang. Detta uppnåddes genom att utföra en kvalitativ systematisk litteraturstudie av artiklar från två databaser med hög teknologisk relevans. Totalt användes 12 artiklar för att utföra studien. Data från dessa artiklar analyserades med tematisk kodning, som resulterade i två huvudteman, metod och placering. Temat ”metod” består av fyra kategorier: anomalibaserad detektion, signaturbaserad detektion, statistisk analys och kombination av metoder. Temat ”placering” består av två kategorier: enhetsbaserad och nätverksbaserad. Resultatet från studien indikerar på att både självständiga metoder och en kombination av flera metoder används för att upptäcka skadlig kod riktat mot IoT-enheter inom smarta hem. Baserat på resultatet framträder anomalibaserad detektion som den vanligaste metoden för att detektera skadlig kod riktat mot IoT-enheter, både på enheten och inom nätverket.
162

Är du medveten om säkerhetsrisker i ditt smarta hem? : En designstudie över hur digitala knuffar kan designas för att stödja medvetenhet kring IoT-säkerhetsrisker i det smarta hemmet

Gulin, Arvid, Holmgren, James January 2022 (has links)
I hänsyn till att Internet of Things (IoT) fortsätter implementeras i privata hem blir säkerhets- och integritetsfrågor allt viktigare. Tidigare studier har visat att det finns flera olika säkerhetsrisker med IoT och smarta hem. Dessa är däremot ofta mycket tekniska och inte lätta att förstå för användare vilket lämnar användare omedvetna om potentiella säkerhetsrisker. Studien har undersökt användares medvetenhet om de säkerhetsrisker som ingår vid användning av IoT i smarta hem. Under studien har en narrativ litteraturstudie genomförts för att utforska tidigare forskning. En prototyp bestående av fyra olika designelement har skapats baserat på heuristiker och designprinciper. Prototypen har därefter använt för att undersöka hur digitala knuffar kan designas för att stödja användares medvetenhet kring IoT-säkerhetsrisker i smarta hem. Utvärderingstester genomfördes med totalt tio användare för att studera hur digitala knuffar kan designas för att stödja användarnas medvetenhet om potentiella säkerhetsrisker i smarta hem. Studien resulterar i fyra designförslag för hur digitala knuffar kan designas för att stödja användarnas medvetenhet kring IoT-säkerhetsrisker i det smarta hemmet. / With the increasing use of Internet of Things (IoT) in private homes the security and privacy issues become increasingly important. Previous studies have highlighted that there are several different security risks with IoT and smart homes. However, these are often very technical and not easily understood for users which leaves the users unaware of potential security risks. This study has investigated users' awareness about the security risks that are included when using IoT in the smart home environment. During the study a narrative literature study has been conducted to explore previous research. A prototype consisting of four different design elements has been created based on heuristics and design principles. The prototype has then been used to study how digital nudges can be designed to support users' awareness in regard to IoT security risks in smart homes. Evaluation tests were performed with a total of ten users to study how digital nudges can be designed to support users' awareness of potential security risks in smart homes. The study results in four design proposals for how digital nudges can be designed to support users' awareness of IoT-security issues in the smart home environment.
163

Автоматизация процессов управления жилыми комплексами и бизнес-центрами на основе цифровых технологий : магистерская диссертация / Automation of processes of management of residential complexes and business centers on the basis of digital technologies

Сабирова, Ю. А., Sabirova, J. A. January 2019 (has links)
The theme of the master's thesis: automation of processes of management of residential complexes and business centers based on digital technologies. The relevance of this thesis is due to the increasing role of automation of information systems in all sectors, including in the field of management of residential buildings. The ability to implement developments on this subject can not only improve the efficient use of resources, but also qualitatively affect the lives of citizens. The purpose of the master's thesis is to develop a model of automation of projects of management of residential complexes and business centers based on digital technologies. To achieve this goal, the following tasks were performed: - studied the theoretical issues of automation in the management of real estate; - product requirements are formed from the point of view of the management company; - the analysis of the feasibility of product implementation for the management company; - estimated economic efficiency. The object of research is an automated control system of residential complexes and business centers. The subject of research is the management of residential buildings and business centers. / Актуальность данной диссертации обусловлена возрастающей ролью автоматизации информационных систем во всех отраслях, в том числе и в области управления жилыми зданиями. Возможность реализации наработок по данной тематике может способствовать не только повышению эффективного использования ресурсов, но и качественно повлиять на жизнь граждан. Целью магистерской диссертации является разработка модели автоматизации проектов управления жилыми комплексами и бизнес-центрами на основе цифровых технологий. Для выполнения этой цели были выполнены следующие задачи: - изучены теоретические вопросы автоматизации при управлении объектами недвижимости; - сформированы требования к продукту с точки зрения управляющей компании; - проведен анализ целесообразности внедрения продукта для управляющей компании; - оценена экономическая эффективность. Объект исследования – автоматизированная система управления жилыми комплексами и бизнес-центрами. Предмет исследования ‒ процессы управления жилыми домами и бизнес-центрами.
164

Разработка проекта «Умный офис» на основе применения технологии Интернета вещей : магистерская диссертация / Development of the "Smart Office" project based on the use of IoT technology

Золотарева, Е. С., Zolotareva, E. S. January 2021 (has links)
В данной работе представлено описание плана по разработке информационной системы «Умный офис» на основе технологий Интернета вещей. Данная система представляет возможности для проактивного управления интеллектуальным зданием. Первая глава работы содержит литературный обзор и анализ источников по предметной области Интернета вещей. Описаны технологии, которые необходимы для работы с Интернет вещами. Во второй главе описан бизнес-проект по реализации системы «Умный офис», который включает в себя описание предметной области, устав проекта, описание жененного цикла развития системы, календарное планирование работ, риски проекта и экономическое обоснование реализации проекта. В третьей главе представлен практический результат работы: требования к системе, архитектура системы и техническое задание. / This paper presents a description of the plan for the development of the "Smart Office" information system based on IoT technologies. This system presents the possibilities for proactive management of an intelligent building. The first chapter of the work contains a literature review and analysis of sources on the subject area of the Internet of Things. The technologies that are necessary for working with the Internet of things are described. The second chapter describes a business project for the implementation of the Smart Office system, which includes a description of the subject area, project charter, description of the system development cycle, work scheduling, project risks and economic justification for project implementation. The third chapter presents the practical result of the work: system requirements, system architecture and terms of reference.
165

Smart Energy Solutions as TechnologicalConfigurations : Implications on theOrganizational Strategy / Smart Energy Solutions som TekniskaKonfigurationer : Implikationer påOrganisations Strategi

OSMAN, NADA, ELNOUR, IBRAHIM January 2016 (has links)
Den länge stabila elbolagssindustrin genomgår stora förändringar. Regelverk, miljömässiga problem, framsteg inom förnybar generering och ICT har orsakat allvarliga tryck på affärsmodellerna för konventionella elbolag. Konsekvenserna på dessa elbolag är; vinstmarginalerna har minskat avsevärt, stora elkraftverk fasas ut och det finns ett stort behov av att generera investeringar för att uppfylla regulatoriska krav. På jakt efter nya affärsmöjligheter utforskar elbolag nya affärsområden så som "Smart Energy Solutions" området. "Smart Energy Solutions" utgör en växande marknad med outnyttjad potential. Uppdragsgivaren för denna rapport är det svenska elbolaget Vattenfall AB. Där uppdraget är att identifiera marknadsmöjligheter för Vattenfall "Smart Energy Solutions" för målgruppen små och medelstora företag (SME). Syftet med denna forskning har varit att undersöka anpassningen som krävs mellan organisationen, "Smart Energy Solutions" och SME marknaden. Resultaten av denna forskning användes för att föreslå en strategi för utveckling av smarta energilösningar med inriktning på SME marknaden. Vid analys av egenskaperna hos "Smart Energy Solutions" och egenskaperna hos SME konstaterandes tre resultat. "Smart Energy Solutions" identifieras som "teknisk konfiguration". SME är heterogena till sin natur och kan därför inte mötas med enhetliga lösningar. Samt det tredje resultatet, baserat på de tidigare två resultaten, en strategi för hur framgångsrika innovationen "Smart Energy Solutions" ska rikta in sig i SME marknaden. / The long-stable eletric utility industry is undergoing major transformations. Regulatory frameworks, enviromental concerns, advancements in the renewable genration and ICT have caused severe pressure on the business model of conventional electric utilites. For these utilities; profit margins have declined considerably, large generation assests are being phased-out,and there is a pressing need to generate investments to meet the regulatory requirements. In search for new business opportunities, electric utilties are exploring new business areas, Smart Energy Solutions represent an emerging market, with untapped potentials. This research was commissioned by the Swedish electric utility Vattenfall AB, to identify market opportunities for Vattenfall Smart Energy Solutions, targetting the small and medium size enterprises SMEs. The purpose of this research has been to investigate the required alignment between the organization, Smart Energy Solutions and the SMEs market; the findings were used to propose a strategy for the development of Smart Energy Solutions targeting the SMEs. Upon analyzing the characteristics of Smart Energy Solutions and the characteristics of SMEs, the finding of this research are: first, Smart Energy Solutions is identified as "Technological Configuration", second: the SMEs are heterogeneous in nature; thereby they can’t be targeted through uniform solutions, third: based on the previous two findings; and considering the organizational context; a strategy was proposed for the successful innovation of Smart Energy Solutions targeting the SMEs.
166

Achieving Autonomic Computing through the Use of Variability Models at Run-time

Cetina Englada, Carlos 15 April 2010 (has links)
Increasingly, software needs to dynamically adapt its behavior at run-time in response to changing conditions in the supporting computing infrastructure and in the surrounding physical environment. Adaptability is emerging as a necessary underlying capability, particularly for highly dynamic systems such as context-aware or ubiquitous systems. By automating tasks such as installation, adaptation, or healing, Autonomic Computing envisions computing environments that evolve without the need for human intervention. Even though there is a fair amount of work on architectures and their theoretical design, Autonomic Computing was criticised as being a \hype topic" because very little of it has been implemented fully. Furthermore, given that the autonomic system must change states at runtime and that some of those states may emerge and are much less deterministic, there is a great challenge to provide new guidelines, techniques and tools to help autonomic system development. This thesis shows that building up on the central ideas of Model Driven Development (Models as rst-order citizens) and Software Product Lines (Variability Management) can play a signi cant role as we move towards implementing the key self-management properties associated with autonomic computing. The presented approach encompass systems that are capable of modifying their own behavior with respect to changes in their operating environment, by using variability models as if they were the policies that drive the system's autonomic recon guration at runtime. Under a set of recon guration commands, the components that make up the architecture dynamically cooperate to change the con guration of the architecture to a new con guration. This work also provides the implementation of a Model-Based Recon guration Engine (MoRE) to blend the above ideas. Given a context event, MoRE queries the variability models to determine how the system should evolve, and then it provides the mechanisms for modifying the system. / Cetina Englada, C. (2010). Achieving Autonomic Computing through the Use of Variability Models at Run-time [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/7484
167

Internet of Things and Cybersecurity in a Smart Home

Kiran Vokkarne (17367391) 10 November 2023 (has links)
<p dir="ltr">With the ability to connect to networks and send and receive data, Internet of Things (IoT) devices involve associated security risks and threats, for a given environment. These threats are even more of a concern in a Smart Home network, where there is a lack of a dedicated security IT team, unlike a corporate environment. While efficient user interface(UI) and ease of use is at the front and center of IoT devices within Smart Home which enables its wider adoption, often security and privacy have been an afterthought and haven’t kept pace when needed. Therefore, a unsafe possibility exists where malicious actors could exploit vulnerable devices in a domestic home environment.</p><p dir="ltr">This thesis involves a detailed study of the cybersecurity for a Smart Home and also examines the various types of cyberthreats encountered, such as DDoS, Man-In-Middle, Ransomware, etc. that IoT devices face. Given, IoT devices are commonplace in most home automation scenarios, its crucially important to detect intrusions and unauthorized access. Privacy issues are also involved making this an even more pertinent topic. Towards this, various state of the art industry standard tools, such as Nmap, Nessus, Metasploit, etc. were used to gather data on a Smart Home environment to analyze their impacts to detect security vulnerabilities and risks to a Smart Home. Results from the research indicated various vulnerabilities, such as open ports, password vulnerabilities, SSL certificate anomalies and others that exist in many cases, and how precautions when taken in timely manner can help alleviate and bring down those risks.</p><p dir="ltr">Also, an IoT monitoring dashboard was developed based on open-source tools, which helps visualize threats and emphasize the importance of monitoring. The IoT dashboard showed how to raise alerts and alarms based on specific threat conditions or events. In addition, currently available cybersecurity regulations, standards, and guidelines were also examined that can help safeguard against threats to commonly used IoT devices in a Smart Home. It is hoped that the research carried out in this dissertation can help maintain safe and secure Smart Homes and provide direction for future work in the area of Smart Home Cybersecurity.</p>
168

The rhythm of life is a powerful beat : demand response opportunities for time-shifting domestic electricity practices

Higginson, Sarah L. January 2014 (has links)
The 2008 Climate Change Act set legally-binding carbon reduction targets. Demand side management (DSM) includes energy use reduction and peak shaving and offers significant potential to reduce the amount of carbon used by the electricity grid. The demand side management (DSM) schemes that have tried to meet this challenge have been dominated by engineering-based approaches and so favour tools like automation (which aims to make shifting invisible) and pricing (which requires customer response) to shift demand. These approaches tend to focus on the tools for change and take little account of people and energy-use practices. This thesis argues that these approaches are limited and therefore unlikely to produce the level of response that will be needed in future. The thesis therefore investigates the potential for time-shifting domestic energy demand but takes a different angle by trying to understand how people use energy in their daily lives, whether this use can be shifted and some of the implications of shifting it. The centrepiece of the work is an empirical study of eleven households energy-use practices. The interdisciplinary methodology involved in-house observations, interviews, photographs, metered energy data and disruptive interventions. The data was collected in two phases. Initially, a twenty-four hour observation was carried out in each household to find out how energy was implicated in everyday practices. Next, a series of three challenges were carried out, aimed at assessing the implications of disrupting practices by time-shifting food preparation, laundry and work/ leisure. A practice theory approach is used to shift the focus of attention from appliances, tools for change, behaviour or even people, to practices. The central finding of this work is that practices were flexible. This finding is nuanced, in the light of the empirical research, by an extended discussion on the nature of practices; in particular, the relationship between practices and agency and the temporal-spatial locatedness of practices. The findings demonstrate that, in this study at least, expanding the range of demand response options was possible. The research suggests numerous possibilities for extending the potential of practices to shift in time and space, shift the energy used in practices or substitute practices for other non-energy-using practices, though there are no simple technological or behavioural fixes . More profoundly, however, the thesis concludes that infrastructures of provision , such as the electricity grid and the companies that run it, underpin and facilitate energy-use practices irrespective of the time of day and year. In this context technology-led demand response schemes may ultimately contribute to the problem they purport to solve. A more fundamental interrogation of demand and the infrastructures that serve it is therefore necessary and is almost entirely absent from the demand response debate.
169

Semantic interoperability in ad-hoc computing environments

Rendo Fernandez, Jose Ignacio January 2007 (has links)
This thesis introduces a novel approach in which multiple heterogeneous devices collaborate to provide useful applications in an ad-hoc network. This thesis proposes a smart home as a particular ubiquitous computing scenario considering all the requirements given by the literature for succeed in this kind of systems. To that end, we envision a horizontally integrated smart home built up from independent components that provide services. These components are described with enough syntactic, semantic and pragmatic knowledge to accomplish spontaneous collaboration. The objective of these collaboration is domestic use, that is, the provision of valuable services for home residents capable of supporting users in their daily activities. Moreover, for the system to be attractive for potential customers, it should offer high levels of trust and reliability, all of them not at an excessive price. To achieve this goal, this thesis proposes to study the synergies available when an ontological description of home device functionality is paired with a formal method. We propose an ad-hoc home network in which components are home devices modelled as processes represented as semantic services by means of the Web Service Ontology (OWL-S). In addition, such services are specified, verified and implemented by means of the Communicating Sequential Processes (CSP), a process algebra for describing concurrent systems. The utilisation of an ontology brings the desired levels of knowledge for a system to compose services in a ad-hoc environment. Services are composed by a goal based system in order to satisfy user needs. Such system is capable of understaning, both service representations and user context information. Furthermore, the inclusion of a formal method contributes with additional semantics to check that such compositions will be correctly implemented and executed, achieving the levels of reliability and costs reduction (costs derived form the design, development and implementation of the system) needed for a smart home to succeed.
170

A Menu-based Universal Control Protocol / Ett menybaserat universiellt kontroll-protokoll

Gustafsson, Per-Ola, Ohlsson, Marcus January 2002 (has links)
<p>This thesis-project aims to research the possibilities of new wireless technologies in general control-situations. We have studied different existing control protocols, and developed a new protocol focusing on textbased menus. Our protocol is scaleable, easy to implement, and platform- and media independent. Since our protocol supports Plug and Play with dynamically allocated id’s, it does not require a unique id in the hardware. </p><p>To test the protocol we have developed a prototype system, consisting of a mobile phone connected to a server, which in turn is connected to two slave units, controlling peripheral equipment on 220 Volt. </p><p>The phone is an <i>Ericsson T28,</i> equipped with a Bluetooth unit. The server is runningthe real-time OS <i>eCos </i>on an A<i>RM 7TDMI Evaluation Kit</i>, and the slave units consist of two developer boards equipped with <i>PIC-processors</i>. Communication between the phone and the server is done over Bluetooth. However we did not find a working Bluetooth protocol stack ported to eCos, so a serial cable was used instead. Communication between the server and the slaves is done over a RS-485 serial network which simulates the traffic over a radio-network. </p><p>The results show that our protocol is working, and that our system would be easy to implement, cheap to produce and very scalable.</p>

Page generated in 0.0351 seconds