Spelling suggestions: "subject:"ehe internet off things"" "subject:"ehe internet oof things""
311 |
Detection of IoT Botnets using Decision TreesMeghana Raghavendra (10723905) 29 April 2021 (has links)
<p>International Data Corporation<sup>[3]</sup> (IDC) data estimates that 152,200 Internet of things (IoT) devices will be connected to the Internet every minute by the year 2025. This rapid expansion in the utilization of IoT devices in everyday life leads to an increase in the attack surface for cybercriminals. IoT devices are frequently compromised and used for the creation of botnets. However, it is difficult to apply the traditional methods to counteract IoT botnets and thus calls for finding effective and efficient methods to mitigate such threats. In this work, the network snapshots of IoT traffic infected with two botnets, i.e., Mirai and Bashlite, are studied. Specifically, the collected datasets include network traffic from 9 different IoT devices such as baby monitor, doorbells, thermostat, web cameras, and security cameras. Each dataset consists of 115 stream aggregation feature statistics like weight, mean, covariance, correlation coefficient, standard deviation, radius, and magnitude with a timeframe decay factor, along with a class label defining the traffic as benign or anomalous.</p><p>The goal of the research is to identify a proper machine learning method that can detect IoT botnet traffic accurately and in real-time on IoT edge devices with low computation power, in order to form the first line of defense in an IoT network. The initial step is to identify the most important features that distinguish between benign and anomalous traffic for IoT devices. Specifically, the Input Perturbation Ranking algorithm<sup>[12]</sup> with XGBoost<sup>[26]</sup>is applied to find the 9 most important features among the 115 features. These 9 features can be collected in real time and be applied as inputs to any detection method. Next, a supervised predictive machine learning method, i.e., Decision Trees, is proposed for faster and accurate detection of botnet traffic. The advantage of using decision trees over other machine learning methodologies, is that it achieves accurate results with low computation time and power. Unlike deep learning methodologies, decision trees can provide visual representation of the decision making and detection process. This can be easily translated into explicit security policies in the IoT environment. In the experiments conducted, it can be clearly seen that decision trees can detect anomalous traffic with an accuracy of 99.997% and takes 59 seconds for training and 0.068 seconds for prediction, which is much faster than the state-of-art deep-learning based detector, i.e., Kitsune<sup>[4]</sup>. Moreover, our results show that decision trees have an extremely low false positive rate of 0.019%. Using the 9 most important features, decision trees can further reduce the processing time while maintaining the accuracy. Hence, decision trees with important features are able to accurately and efficiently detect IoT botnets in real time and on a low performance edge device such as Raspberry Pi<sup>[9]</sup>.</p>
|
312 |
CLOSET GO: A DATA-DRIVEN DIGITAL CLOSET SYSTEM TO IMPROVE THE DRESSING EXPERIENCEWeilun Huang (10716564) 06 May 2021 (has links)
<div>
<div>
<div>
<p>This thesis aims to introduce a system design that supports the user experience of outfit selection,
storage, and matching. Clothes are indispensable items in daily human life. Purchasing one's
wardrobe has become more affordable. This has allowed people to focus on purchasing more
fashionable clothes. Garment shopping has even become a type of social and leisure activity.
With the development of internet technology, shopping methods have changed dramatically.
However, these seemingly convenient shopping methods also bring unavoidable problems, such
as an inability to understand apparel companies' different size standards and the challenge of
seeing the details of materials. On the other side, while overemphasizing the convenience of the
shopping process, online companies have ignored people's clothes-wearing experience that is the
most enjoyable and valuable for customers. This paper introduces an IoT (Internet of Things)
design: "Closet Go" including a mobile application and a clip-able camera. "Closet Go" aims to
improve customers' daily outfit selection experience by digitalizing their closets and conducting
data analysis of customized dressing habits. In this thesis, I present the entire design process:
user research, Ideation, UI/UX design, product development, and evaluation. In the research
section, potential users were recruited for interviews to discover the current problems in
acquiring, selecting, and matching outfits in daily life. The design process section introduces the
design development progress and results via user flow, experience map, prototype, and user
interface. Finally, the thesis concludes with a heuristics evaluation section that tests the design's
usability and experience to refine the project.
</p>
</div>
</div>
</div>
|
313 |
Data Cleaning Extension on IoT Gateway : An Extended ThingsBoard GatewayHallström, Fredrik, Adolfsson, David January 2021 (has links)
Machine learning algorithms that run on Internet of Things sensory data requires high data quality to produce relevant output. By providing data cleaning at the edge, cloud infrastructures performing AI computations is relieved by not having to perform preprocessing. The main problem connected with edge cleaning is the dependency on unsupervised pre-processing as it leaves no guarantee of high quality output data. In this thesis an IoT gateway is extended to provide cleaning and live configuration of cleaning parameters before forwarding the data to a server cluster. Live configuration is implemented to be able to fit the parameters to match a time series and thereby mitigate quality issues. The gateway framework performance and used resources of the container was benchmarked using an MQTT stress tester. The gateway’s performance was under expectation. With high-frequency data streams, the throughput was below50%. However, these issues are not present for its Glava Energy Center connector, as their sensory data generates at a slower pace. / AI4ENERGY
|
314 |
The design and implementation of the routing algorithm optimised for spectrum mobility, routing path delay and node relay delayPhaswana, Phetho January 2020 (has links)
Thesis(M.Sc. (Computer Science)) -- University of Limpopo, 2020 / Spectrum scarcity is one of the major problems affecting the advancement of wireless
technology. The world is now entering into a new era called the “Fourth Industrial
Revolution” and technologies like the Internet of Things (IoT) and blockchain are surfacing
at a rapid pace. All these technologies and this new era need high speed network
(Internet) connectivity. Internet connectivity is reliant on the availability of spectrum
Channels. The Federal Communication Commission (FCC) has emphatically alluded on
the urgency of finding quick and effective solutions to the problem of spectrum scarcity
because the available spectrum bands are getting depleted at an alarming rate.
Cognitive Radio Ad Hoc Networks (CRAHNs) have been introduced to solve the problem
of spectrum depletion. CRAHNs are mobile networks which allow for two groups of users:
Primary Users (PUs) and Secondary Users (SUs). PUs are the licensed users of the
spectrum and SUs are the unlicensed users. The SUs access spectrum bands
opportunistically by switching between unused spectrum bands. The current licensed
users do not fully utilize their spectrum bands. Some licensed users only use their
spectrum bands for short time periods and their bands are left idling for the greater part
of time. CRNs take advantage of the periods when spectrum bands are not fully utilized
by introducing secondary users to switch between the idle spectrum bands. The CRAHNs
technology can be implemented in different types of routing environments including
military networks. The military version of CRAHNs is called Military Cognitive Radio Ad
Hoc Networks (MCRAHNs). Military networks are more complex than ordinary networks
because they are subject to random attacks and possible destruction.
This research project investigates the delays experienced in routing packets for
MCRAHNs and proposes a new routing algorithm called Spectrum-Aware Transitive
Multicasting On Demand Distance Vector (SAT-MAODV) which has been optimized for
reducing delays in packet transmission and increasing throughput. In the data
transmission process, there are several levels where delays are experienced. Our
research project focuses on Routing Path (RP) delay, Spectrum Mobility (SM) delay and
Node Relay (NR) delay. This research project proposes techniques for spectrum
switching and routing called Time-Based Availability (TBA), Informed Centralized Multicasting (ICM), Node Roaming Area (NRA) and Energy Smart Transitivity (EST). All
these techniques have been integrated into SAT-MAODV. SAT-MAODV was simulated
and compared with the best performing algorithms in MCRHANs. The results show that
SAT-MAODV performs better than its counterparts
|
315 |
Sensorsystem för farliga luftburna ämnen inom räddningstjänst / Sensor system for dangerous airborne substances within rescure serviceEvansson, Aleksi, Gustafsson, Martin, Hennings, Mathilde, Johansson, Alexander, Lång, Elise, Stål, Gustav, Widén, Ludvig, Öhrström, Frans January 2021 (has links)
Denna rapport beskriver ett kandidatarbete som utfördes av åtta studenter i kursen TDDD96 - Kandidatprojekt i programvaruutvecklingvid Linköpings universitet våren 2021. Projektet handlade om att skapa ett system för att spåra och visualisera förekomsten av farliga ämnen som kan förekomma på olycksplatser och på så sätt underlätta räddningstjänstens arbete. Resultatet av projektet bestod av en sensorenhet som fästs på räddningspersonalens hjälm. Sensorenheten detekterar halten butan, vätgas, ammoniak, sulfider och bensen i luften och skickar dessa värden tillsammans med GPS och acceleration till en instrumentbräda. Där visas all data och kan användas avbakre led. Rapporten beskriver projektets arbete beställt av forskningsgruppen Ubiquitous Computing and Analytics Group vid Institutionen för Datavetenskap på Linköpings universitet. Teorin kring systemet lägger grunden till förståelse av rapporten, samt hur arbete kan effektiviseras med hjälp av till exempel Scrum, parprogrammering och ärendespårning (eng.issue tracking). Rapporten redovisar även projektets resultat och hur den slutgiltiga produktens hårdvara, server och användargränssnitt fungerar. Till sist presenteras gruppmedlemmarnas individuella bidrag som innehåller djupdykningar inom olika områden med koppling till projektet.
|
316 |
Non Visuals : Material exploration of non-visual interaction designde Cabo Portugal, Sebastian January 2020 (has links)
Design is all about visuals, or that is what I have found out during this thesis, from the process materials to the outcome our main entry point to any problem is how will we solve it visually so it’s understandable for the general user. This aspect is problematic in itself due to the fact that we, as humans, understand the world and the things around using all our senses continuously, even though we can forget as visuals are so overpowering. There is a huge opportunity area in exploring our other senses and bringing them back to technology, and this can be seen in works in the past like Tangible Interactions [1] or Natural User Interfaces [2]. But in this moment in time, where all these new technologies like VR/AR and IoT are about to enter our lives and change them forever, this topic is more important than ever. We have already seen what happens when we turn humans into mere machines with some fingers as interactive inputs, and barely any senses to process all the information given to us. Now that these technologies are still young and malleable, we can direct the future to where we want it instead of being guided by the technology itself. To do this we need to reimagine the design process, not reinvent the wheel, but add experts which we currently leave behind and I argue are key to unlock these technologies, experts not only of the technological side of things but on the human side too, like physiotherapists and dancers. Add also people who we never think about when we think of VR like visually impaired users, which could make these technologies inclusive since early on, instead of as an afterthought like we usually do. Not only people, but we also need to add new materials to understand how we use our senses and explore ways that we can understand and explore them differently; like bodystorming and improv theatre because when things aren’t visual, how do you sketch it? A sketch turns into a video about movement. The end result provides a wide breadth of examples of the types of innovations that can come out of using these new design materials, and to open new frontiers. From a VR game with no visuals whatsoever to an AR location based story game, to a home sized multimodal operating system containing several different apps controlled through physical movement. The examples open up the space instead of closing into a single solution. This is just the tip of the iceberg, a hope that others will be inspired by it and continue with this journey that has just started, to guide the future into one that is more technological and at the same time more human than ever before. What we know is that VR does not equate Visual Reality.
|
317 |
Multi-Source Fusion for Weak Target Images in the Industrial Internet of ThingsMao, Keming, Srivastava, Gautam, Parizi, Reza M., Khan, Mohammad S. 01 May 2021 (has links)
Due to the influence of information fusion in Industrial Internet of Things (IIoT) environments, there are many problems, such as weak intelligent visual target positioning, disappearing features, large error in visual positioning processes, and so on. Therefore, this paper proposes a weak target positioning method based on multi-information fusion, namely the “confidence interval method”. The basic idea is to treat the brightness and gray value of the target feature image area as a population with a certain average and standard deviation in IIoT environments. Based on the average and the standard deviation, and using a reasonable confidence level, a critical threshold is obtained. Compared with the threshold obtained by the maximum variance method, the obtained threshold is more suitable for the segmentation of key image features in an environment in which interference is present. After interpolation and de-noising, it is applied to mobile weak target location of complex IIoT systems. Using the metallurgical industry for experimental analysis, results show that the proposed method has better performance and stronger feature resolution.
|
318 |
Comparing the impact of internet of things and cloud computing on organisational behavior: a surveyGarcía-Tadeo, Diego A., Reddy Peram, Dattatreya, Suresh Kumar, K., Vives, Luis, Sharma, Trishu, Manoharan, Geetha 01 January 2022 (has links)
Cloud computing is about delivery of different computing services involving databases, analytics, software, networking with the use of internet to enhance innovation, incorporate flexibility in resources and broaden profitability. However, Internet of Things (IoT) is an essential system for interrelating computer devices, digital machines, people and others which are offered with unique identifiers where data can be transferred with human involvement and wireless network. 42% of organisations in UK use cloud computing. The problem with cloud computing revolves around security and privacy issues as data is stored by a third party from inside or outside of the organisation leading to broken authentication, compromising of credentials and others. The use of IoT is vulnerable as it provides connectivity to devices, machines and people therefore, it needs to contain more storage that is made from cloud facilities. Survey has been conducted where primary quantitative method has been considered to obtain data from 101 managers of the organisation that has adopted cloud computing and IoT. However, 8 close-ended questions have been asked to 101 managers. Positivism philosophy has been used to make quantifiable observations along with descriptive design and others. The results and discussion will analyse responses of the respondents after conducting statistical analysis. However, research has been revolving around making a comparison between using cloud computing and IoT along with analysing organisational behaviour. / Revisión por pares
|
319 |
Signal Processing and Machine Learning Methods for Internet of Things: Smart Energy Generation and Robust Indoor LocalizationChen, Leian January 2022 (has links)
The application of Internet of Things (IoT) where sensors and actuators embedded in physical objects are linked through wired and wireless networks has shown a rapid growth over the past years in various domains with the benefits of improving efficiency and productivity, reducing cost, providing mobility and agility, etc. This dissertation focuses on developing signal processing and machine learning based techniques in IoT with applications to 1) smart energy generation and 2) robust indoor localization in smart city.
Smart grids, in contrast to legacy grids, facilitate more efficient electricity generation and consumption by allowing two-way information exchange among various components in the grid and the users based on the measurements from numerous sensors located at different places. Due to the introduction of information communications, a smart grid is faced with the risk of external attacks which is aimed to take control of the grid. In particular, electricity generation from photovoltaic (PV) systems is a mature power generation technology utilizing renewable resources, owning to its advantages in clean production, reduced cost and high flexibility. However, the performance of a PV system can be susceptible and unstable due to various physical failures and dynamic environments (internal circuit faults, partial shading, etc.).
To safeguard the system security, fault or attack detection technologies are of great importance for PV systems and smart grids. Existing approaches on fault or attack detection either rely on the prediction by a predetermined system model which acts as reference data for comparison or can be applied only within a certain set of component (e.g., several PV strings) based on local statistical properties without the capability of generalization. Furthermore, the output performance of a PV system is dynamic under different environmental conditions (irradiance level, temperature, etc.), which can be optimized by the technique of maximum power point tracking (MPPT). However, previous studies on MPPT usually require prior knowledge of the system model or high computational complexity for iterative optimization.
Smart city, as another important application of IoT, relies on analysis of the measurement data from sensors located at users and environments to provider intelligent solutions in our daily life. One of the fundamental tasks for advanced location-based services is to accurately localize the user in a certain environment, e.g., on a certain floor inside a building. Indoor localization is faced with challenges of moving users, limited availability of sensors and noisy measurements due to hardware constraints and external interferences.
This dissertation first describes our advanced fault/attack detection and localization methods for PV systems and smart grids, then develops our enhanced MPPT techniques for PV systems, and finally presents our robust indoor localization methods for smartphone users, based on statistical signal processing and machine learning approaches.
In Chapter 2 and Chapter 3, we proposes fault/attack detection method in PV systems and smart grids respectively in the framework of abrupt change detection utilizing sequential output measurements without assuming any prior knowledge of the system characteristics or particular faulty/attack patterns, such that an alarm will triggered regardless of the magnitude or the type of faulty/attack signals. Starting from the proposed fault detection method in Chapter 2, we present our fault localization method for PV systems in Chapter 4 where the central controller is able to identify the faulty PV strings without full knowledge of each local measurements.
Chapter 5 studies the MPPT method under dynamic shading conditions where we adopt neural networks to assist the identification of the global maximum power point by depicting the relationship between the system output power and the operating voltage. In Chapter 6, to tackle the challenge of accurate and robust indoor localization for smart city when sensors provides noisy measurement data, we propose a cooperative localization method which exploits the readings of the received strengths of Wi-Fi signals at the smartphone users and the relative distances among neighboring users to combat the deterioration due to aggregated measurement errors.
Throughout the dissertation, our proposed methods are followed by simulations (of a PV system or a grid under various operating conditions) or experiments (of localizing moving users with smartphones to record sensors' measurements). The results demonstrate that our proposed fault/attack detection and localization methods and MPPT schemes can achieve higher adaptivity and efficiency with robustness against various external conditions an lower computational complexity, and our cooperative localization methods have high localization accuracy even given large measurement errors and limited measurement data.
|
320 |
Efficient naming for Smart Home devices in Information Centric NetworksRossland Lindvall, Caspar, Söderberg, Mikael January 2020 (has links)
The current network trends point towards a significant discrepancy between the data usage and the underlying architecture; a severely increasing amount of data is being sent from more devices while data usage is becoming more data-centric instead of the previously host-centric. Information Centric Network (ICN) is a new alternative network paradigm that is designed for a data-centric usage. ICN is based on uniquely naming data packages and making it location independent. This thesis researched how to implement an efficient naming for ICN in a Smart Home Scenario. The results are based on testing how the forwarding information base is populated for numerous different scenarios and how a node's duty cycle affects its power usage. The results indicate that a hierarchical naming is optimized for hierarchical-like network topology and a flat naming for interconnected network topologies. An optimized duty cycle is strongly dependent on the specific network and accordingto the results can a sub-optimal duty cycle lead to excessive powerusage.
|
Page generated in 0.1391 seconds