• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 100
  • 22
  • 17
  • 9
  • 9
  • 9
  • 7
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 195
  • 195
  • 54
  • 52
  • 50
  • 38
  • 35
  • 33
  • 28
  • 26
  • 26
  • 25
  • 23
  • 22
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Three Essays on Internet of Things Adoption and Use

Aldossari, Mobark 05 1900 (has links)
Internet of Things (IoT) is a promising technology with great potential for individuals, society, governments, and the economy. IoT is expected to become ubiquitous and influence every aspect of everyday experience. Thus, IoT represents an important phenomena for both organizational and behavioral information system (IS) researchers. This dissertation seeks to contribute to IS research by studying the aspects that influence IoT adoption and use at both consumer and organizational levels. This dissertation achieves this purpose in a series of three essays. The first essay focuses on IoT acceptance in the context of smart home. The second essay focuses on examining the effect of artificial intelligence (AI) capabilities on consumers' IoT perceptions and intentions. Finally, the third essay focuses on the organizational investment and adoption of IoT technologies.
122

Threat Analysis of Smart Home Assistants Involving Novel Acoustic Based Attack-Vectors

Björkman, Adam, Kardos, Max January 2019 (has links)
Background. Smart home assistants are becoming more common in our homes. Often taking the form of a speaker, these devices enable communication via voice commands. Through this communication channel, users can for example order a pizza, check the weather, or call a taxi. When a voice command is given to the assistant, the command is sent to cloud services over the Internet, enabling a multitude of functions associated with risks regarding security and privacy. Furthermore, with an always active Internet connection, smart home assistants are a part of the Internet of Things, a type of historically not secure devices. Therefore, it is crucial to understand the security situation and the risks that a smart home assistant brings with it. Objectives. This thesis aims to investigate and compile threats towards smart home assistants in a home environment. Such a compilation could be used as a foundation during the creation of a formal model for securing smart home assistants and other devices with similar properties. Methods. Through literature studies and threat modelling, current vulnerabilities towards smart home assistants and systems with similar properties were found and compiled. A few  vulnerabilities were tested against two smart home assistants through experiments to verify which vulnerabilities are present in a home environment. Finally, methods for the prevention and protection of the vulnerabilities were found and compiled. Results. Overall, 27 vulnerabilities towards smart home assistants and 12 towards similar systems were found and identified. The majority of the found vulnerabilities focus on exploiting the voice interface. In total, 27 methods to prevent vulnerabilities in smart home assistants or similar systems were found and compiled. Eleven of the found vulnerabilities did not have any reported protection methods. Finally, we performed one experiment consisting of four attacks against two smart home assistants with mixed results; one attack was not successful, while the others were either completely or partially successful in exploiting the target vulnerabilities. Conclusions. We conclude that vulnerabilities exist for smart home assistants and similar systems. The vulnerabilities differ in execution difficulty and impact. However, we consider smart home assistants safe enough to usage with the accompanying protection methods activated. / Bakgrund. Smarta hemassistenter blir allt vanligare i våra hem. De tar ofta formen av en högtalare och möjliggör kommunikation via röstkommandon. Genom denna kommunikationskanal kan användare bland annat beställa pizza, kolla väderleken eller beställa en taxi. Röstkommandon som ges åt enheten skickas till molntjänster över internet och möjliggör då flertalet funktioner med associerade risker kring säkerhet och integritet. Vidare, med en konstant uppkoppling mot internet är de smarta hemassistenterna en del av sakernas internet; en typ av enhet som historiskt sett är osäker. Således är det viktigt att förstå säkerhetssituationen och riskerna som medföljer användningen av smarta hemassistenter i en hemmiljö. Syfte. Syftet med rapporten är att göra en bred kartläggning av hotbilden mot smarta hemassistenter i en hemmiljö. Dessutom kan kartläggningen fungera som en grund i skapandet av en modell för att säkra både smarta hemassistenter och andra enheter med liknande egenskaper. Metod. Genom literaturstudier och hotmodellering hittades och sammanställdes nuvarande hot mot smarta hemassistenter och system med liknande egenskaper. Några av hoten testades mot två olika smarta hemassistenter genom experiment för att säkerställa vilka hot som är aktuella i en hemmiljö. Slutligen hittades och sammanställdes även metoder för att förhindra och skydda sig mot sårbarheterna. Resultat. Totalt hittades och sammanställdes 27 stycken hot mot smarta hemassistenter och 12 mot liknande system. Av de funna sårbarheterna fokuserar majoriteten på manipulation av röstgränssnittet genom olika metoder. Totalt hittades och sammanställdes även 27 stycken metoder för att förhindra sårbarheter i smarta hemassistenter eller liknande system, varav elva sårbarheter inte förhindras av någon av dessa metoder. Slutligen utfördes ett experiment där fyra olika attacker testades mot två smarta hemassistenter med varierande resultat. En attack lyckades inte, medan resterande antingen helt eller delvis lyckades utnyttja sårbarheterna. Slutsatser. Vi konstaterar att sårbarheter finns för smarta hemassistenter och för liknande system. Sårbarheterna varierar i svårighet att uföra samt konsekvens. Dock anser vi att smarta hemassistenter är säkra nog att använda med medföljande skyddsmetoder aktiverade.
123

On the assessment of Denial of Service vulnerabilities affecting smart home systems

Andersson, Sebastian, Josefsson, Oliver January 2019 (has links)
IoT is an abbreviation of the term Internet of Things. The term describes everydayitems such as light bulbs that are connected to the Internet. IoT is a field that isgrowing very quickly with some researchers and industry leaders predicting thatthere will be up to 200 billion connected IoT devices in the world by 2020. Many IoTdevices are developed by smaller companies looking to capitalize on a specific needin the market. Because of this, the companies may favor launching a product as fastas possible which could mean that the devices may have not been adequately testedfor different vulnerabilities.The IoT and Smart Home market is currently experiencing rapid growth and all signspoint towards that continuing in the future. This thesis focuses on testing forvulnerabilities to Denial of Service attacks in common-off-the-shelf IoT devices thatcan be found in a smart home environment. The purpose of this thesis is to createmore knowledge about the vulnerabilities that can be found in Internet connecteddevices that are used daily.This thesis includes experiments using OpenVAS, which is a vulnerability scannerdeveloped by Greenbone Security used to test for vulnerabilities to Denial of Serviceattacks in IoT devices. The devices that are tested are Sony PlayStation 4, IKEATrådfri Smart Lighting, Google Chromecast (First Generation), Apple TV (ThirdGeneration) and D-Link DCS-930LB Wi-Fi IP-Camera. The firmware/software of allthe devices are updated as of April of 2019.The results of the conducted experiments show that all the tested devices besidesChromecast and IKEA Trådfri had vulnerabilities to Denial of Service attacks.PlayStation 4 was the device with the highest amount of vulnerabilities (9) and thevulnerability with highest possible severity (10.0). The effects of a Denial of Serviceattack range from an annoyance, when a gaming console is unavailable, to a securityrisk when an IP camera can be temporarily disabled.
124

Applications of Artificial Intelligence in Lighting Systems for Home Environments

Dobrucki, Mikołaj January 2020 (has links)
Artificial Intelligence, being recently one of the most popular topics in technology, has been in a spotlight of Interaction Design for a long time. Despite its success in software and business-oriented cases, the adoption of Artificial Intelligence solutions in home environments still remains relatively low. This study reflects on the key reasons for the low penetration of AI-based solutions in private households and formulates design considerations for possible further developments in this area with a focus on artificial light sources. The design considerations are based on literature review and studies of multiple home environments gathered through qualitative interviews and context mapping exercises. Health influence of lighting, multi-user interactions, and privacy-related and ethical concerns are taken into account as the key factors. The considerations have been validated with participants of the study through user testing sessions of a digital prototype that virtualises a home environment and explores some of the common light usage scenarios. The study argues that despite multiple efforts in this direction during the past three decades, the future of Artificial Intelligence in connected, intelligent homes does not lie in smart, autonomous systems. Instead, Artificial Intelligence can be arguably used to simplify and contextualise interactions between humans and their home environments as well as foster the development of parametric solutions for private households.
125

Säkerhet i smarta hem : En litteraturanalys på protokollsäkerhet för det smarta hemmet / Security in smart homes : A literature review on protocol security for the smart home

Lindorin, Axel January 2020 (has links)
Denna undersökning har granskat det problem som uppstår i samband med den snabba utvecklingen utav Internet of Things där de lågenergienheter saknar kraft för att utföra avancerade säkerhetslösningar. På grund av den låga säkerheten och växande användningsområdet så har Internet of Things enheterna blivit ett lockande mål för eventuella attacker. Den systematiska litteraturanalysen har genomförts genom att granska tidigare mer detaljerade analyser av protokollen och dess säkerhet samt utvecklarnas specifikationer. Detta för att bland annat skapa en sammanfattning utav protokollens säkerhet men också för att sedan jämföra protokollen för att kunna ta fram det säkrare protokollet för hemanvändning. Alla protokoll som tas upp har någon form av säkerhet implementerad för att förse med autentisering i form av MAC (i vissa fall HMAC), nyckelhantering, integritet i form av MIC och kommunikationssäkerhet med kryptering. Alla protokoll har stöd för AES-128 kryptering samt användning av IEEE 802.15.4 säkerhetsserie som ytterligare skydd utöver protokollens egna lösningar. Flertalen av protokollen använder sig också av Elleptic Curve för att säkert transportera nycklar. Analysens slutsats visar att Thread och Z-Wave anses som de två säkraste protokollen för hemmaanvändning. Det baserat på hur protokollen hanterar de olika aspekterna med sin märkbara prioritering av säkerhet tillsammans med det få antalet brister som kan skada det smarta hemmet. Bluetooth Low Energy och EnOcean är de två mindre säkra gällande en IoT miljö. Undersökningen tar också med en diskussion kring olika områden som dykt upp under undersökningens gång. Slutligen tas några punkter som dök upp under granskningen som kan vara bra att tänka på vid utveckling av dessa protokoll men säkerhet i tanken. / This study has examined the problems that arise in connection with the rapid development of the Internet of Things, where the low-energy units lack the power to implement advanced security solutions. Due to the low security and growing area of use, the Internet of Things units have become an attractive target for any attacks. The systematic literature analysis has been carried out by reviewing previously more detailed analyzes of the protocols and their security as well as the developers' specifications. This is to create a wide summary of the security of the protocols and then to compare the protocols to select one or more as the safer protocol for home use. All protocols that are included have some form of security implemented to provide authentication in the form of MAC, key management, integrity in the form of MIC and communication security with encryption. All protocols support AES-128 encryption and the use of IEEE 802.15.4 security suit as additional protection in addition to the protocol's own solutions. The majority of protocols also use Elleptic Curve to safely transport keys. The analysis concludes that Thread and Z-Wave are considered the two most secure home use protocols. It is based on how the protocols handle the various aspects with their noticeable prioritization of security along with the few deficiencies that can damage the smart home. Bluetooth Low Energy and EnOcean are thetwo less secure regarding an IoT environment. The survey also includes a discussion of various areas that emerged during the course of the investigation. Finally, some points that emerged during the review that may be good to consider when developing these protocols with security as focus.
126

Intrusion Detection System in Smart Home Network Using Artificial Immune System and Extreme Learning Machine

Alalade, Emmanuel 16 June 2020 (has links)
No description available.
127

Community-Based Optimal Scheduling of Smart Home Appliances Incorporating Occupancy Error

Ansu-Gyeabour, Ernest 22 August 2013 (has links)
No description available.
128

Smart Home Protocols : User perception and experiences

Lagervall, Mattias January 2023 (has links)
Technology is developing at a rapid pace. With this, Internet of Things (IoT) and smart homes are being used by more and more people every day. The amount of network protocols that is being used in relation to smart homes are many and they come with different features and challenges. With one of the main challenges being the issue of interoperability between the protocols. This has led to the introduction of Matter, a new protocol that uses Thread, Wi-Fi and Ethernet as networking technologies underneath. The goal is to enable smart devices from different companies to seamlessly talk to each other. There is a gap in how the different protocols are perceived by users as well as how a standardized protocol like Matter could impact the experience of a smart home. The aim of the study is to better understand the need of consumers for their smart home protocols. This by using a mixed method approach to get the insight of consumers located in Sweden. The data in the study was collected by conducting a survey and two focus group sessions. The survey was answered by 34 respondents and was structured to answer research question 1. The focus group had 4 participants in the first session and 3 participants in the second session and was structured to answer research question 2. Thematic analysis was used to analyze the collected data which concluded into 7 themes from the survey and 5 themes from the focus groups.  The findings were then discussed subsequently with each theme. Using UTAUT2 as the theoretical framework the similarities and general findings were connected to the constructs of the UTAUT2 model. The themes showed that the perception of protocol is closely tied to its influence on factors like performance, reliability, and functionality of smart home devices. Additionally, it was concluded that adopting a standardized protocol such as Matter could potentially enhance interoperability, make it less complex, and address security and privacy concerns. As a result, this could significantly impact the user experience of individuals in their smart homes.
129

A proposal of a smart home platform for better home entertainment experience

Al-Ashraf, Samir Daniel, Bhatti, Zeeshan Hussain January 2011 (has links)
Smart home is a topic that emerged in the 90s to improve the quality of human life. The evolutions of ambient intelligence, recent technology advancements, internet, and smart devices have had a large impact in smart home environment. In the traditional smart home environment, devices are connected physically in the environment and there are interoperability issues between the devices, because the environment is heterogeneous and the devices do not allow to communicate with the outside world such as the internet.In this master thesis we propose a conceptual design of a platform for better home entertainment experience. Smart phone, smart TV and a personal computer are the most important devices in this platform design. The platform provides a high degree of interaction and integration among devices within the environment. The proposed platform model helps software architects and engineers to have an early involvement in the design process. We proposed the platform to be implemented with the help of hybrid cloud computing model. Our suggested platform design is able to overcome the deficiencies of the previous models and approaches in this domain. We conducted direct interviews with seven computer science teachers at Malmö University for the evaluation of our platform design. The results show that the platform design can be physically implemented with the specified devices, the clouds are better than the traditional approaches and hybrid cloud model is more acceptable in terms of security and economy. We encourage software architects, developers and project supervisors to adopt this proposed platform model in physical smart home environment.
130

基於複合式架構建構具高強健性的智慧家庭服務管理系統 / Robust Service Management for Smart Home Environments: A Hybrid Approach

張惟誠, Chang, Wei Chen Unknown Date (has links)
智慧家庭環境是一個典型的分散式系統,在此類環境中的智慧服務大都由一至多個節點組成,例如一個智慧空調服務需要冷氣機、溫度感測器和邏輯判斷節點。然而,只要服務其中一個節點故障,整個服務就無法正常運作。由於居住在家庭中的大都是不具技術能力的使用者,故理想的智慧家庭服務,即使在有節點故障的狀況下,也應能在短時間內盡可能自動偵測與排除錯誤,使服務的運作不被中斷。本研究主要目的在於提出一個智慧家庭的強健服務管理系統,基於創新的複合式架構,結合集中式與非集中式錯誤偵測機制的特色,能在短時間內偵測到節點失效,進而恢復由於軟體所造成的節點故障或尋找待用節點,使得服務能繼續運行。 / Smart home systems are different from traditional computing systems. In a smart home system, a service is composed of several service nodes. For example, a smart air conditioning service needs a temperature sensor, an application logic, and an air conditioner. A service fails if one of its affiliating nodes fails. However, unexpected failures are undesirable for mission critical services such as healthcare or surveillance. Moreover, a smart home lacks professional system administrators. Users are generally unable to repair a service when it fails. Consequently, in a smart home system, the failed services have to be diagnosed and recovered automatically. In this paper describes a hybrid failure detection and recovery method for smart home environments. Experiments show that the proposed architecture is able to enhance overall availability of a smart home system in a short time.

Page generated in 0.0687 seconds