• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 542
  • 112
  • 107
  • 36
  • 34
  • 23
  • 13
  • 9
  • 9
  • 8
  • 8
  • 7
  • 5
  • 5
  • 2
  • Tagged with
  • 1010
  • 1010
  • 303
  • 231
  • 227
  • 203
  • 195
  • 188
  • 181
  • 141
  • 135
  • 118
  • 117
  • 117
  • 108
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
731

An analysis and a comparative study of cryptographic algorithms used on the internet of things (IoT) based on avalanche effect

Muthavhine, Khumbelo Difference 07 1900 (has links)
Ubiquitous computing is already weaving itself around us and it is connecting everything to the network of networks. This interconnection of objects to the internet is new computing paradigm called the Internet of Things (IoT) networks. Many capacity and non-capacity constrained devices, such as sensors are connecting to the Internet. These devices interact with each other through the network and provide a new experience to its users. In order to make full use of this ubiquitous paradigm, security on IoT is important. There are problems with privacy concerns regarding certain algorithms that are on IoT, particularly in the area that relates to their avalanche effect means that a small change in the plaintext or key should create a significant change in the ciphertext. The higher the significant change, the higher the security if that algorithm. If the avalanche effect of an algorithm is less than 50% then that algorithm is weak and can create security undesirability in any network. In this, case IoT. In this study, we propose to do the following: (1) Search and select existing block cryptographic algorithms (maximum of ten) used for authentication and encryption from different devices used on IoT. (2) Analyse the avalanche effect of select cryptographic algorithms and determine if they give efficient authentication on IoT. (3) Improve their avalanche effect by designing a mathematical model that improves their robustness against attacks. This is done through the usage of the initial vector XORed with plaintext and final vector XORed with cipher tect. (4) Test the new mathematical model for any enhancement on the avalanche effect of each algorithm as stated in the preceding sentences. (5) Propose future work on how to enhance security on IoT. Results show that when using the proposed method with variation of key, the avalanche effect significantly improved for seven out of ten algorithms. This means that we have managed to improve 70% of algorithms tested. Therefore indicating a substantial success rate for the proposed method as far as the avalanche effect is concerned. We propose that the seven algorithms be replaced by our improved versions in each of their implementation on IoT whenever the plaintext is varied. / Electrical and Mining Engineering / M. Tech. (Electrical Engineering)
732

Integrated wireless sensor system for efficient pre-fall detection

Tiwari, Nikhil 13 April 2015 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / The life expectancy of humans in today's era have increased to a very large extent due to the advancement of medical science and technology. The research in medical science has largely been focused towards developing methods and medicines to cure a patient after a diagnosis of an ailment. It is crucial to maintain the quality of life and health of the patient. It is of most importance to provide a healthy life to the elderly as this particular demographic is the most severely affected by health issues, which make them vulnerable to accidents, thus lowering their independence and quality of life. Due to the old age, most of the people become weak and inefficient in carrying their weight, this increases the probability of falling when moving around. This research of iterative nature focuses on developing a device which works as a preventive measure to reduce the damage due to a fall. The research critically evaluates the best approach for the design of the Pre-Fall detection system. In this work, we develop two wearable Pre-Fall detection system with reduced hardware and practical design. One which provides the capability of logging the data on an SD card in CSV format so that the data can be analyzed, and second, capability to connect to the Internet through Wifi. In this work, data from multiple accelerometers attached at different locations of the body are analyzed in Matlab to find the optimum number of sensors and the best suitable position on the body that gives the optimum result. In this work, a strict set of considerations are followed to develop a flexible, practical and robust prototype which can be augmented with different sensors without changing the fundamental design in order to further advance the research. The performance of the system to distinguish between fall and non-fall is improved by selecting and developing the most suitable way of calculating the body orientation. The different ways of calculating the orientation of the body are scrutinized and realized to compare the performance using the hardware. To reduce the number of false positives, the system considers the magnitude and the orientation to make a decision.
733

Building Energy-efficient Edge Systems

Tumkur Ramesh Babu, Naveen January 2020 (has links)
No description available.
734

Mitigación de riesgos a través del uso de una arquitectura de ciberseguridad mediante modelamiento de amenazas en la implementación de sistemas de información basados en internet de las cosas / Risk mitigation through the use of a cybersecurity architecture through threat modeling in the implementation of information systems based on the Internet of Things

Espina Suárez, Enrique Alberto, Gomez Hormaza, Giancarlo Erick 25 April 2021 (has links)
El presente trabajo busca proponer una arquitectura de ciberseguridad para la implementación de dispositivos que hacen uso del Internet Of Things (IoT). En los últimos años, la cantidad de dispositivos conectados a internet por persona ha aumentado de 0.08 en el 2003 a un total de 6.58 en el 2020, lo cual sugiere un aumento del 8,225% en 7 años. Mejoramos la estructura de una arquitectura funcional IoT mediante la inclusión de componentes que permitan asegurar el cumplimiento de los controles propuestos dentro de un framework de ciberseguridad más la inclusión de un modelamiento de amenazas de IoT. Nuestra arquitectura se enfoca en disminuir la cantidad de vulnerabilidades presentes en dispositivos IoT puesto a que, en promedio, el 57% de estos dispositivos son vulnerables a ataques. La arquitectura tiene una estructura de 3 capas: negocio, aplicaciones y tecnología, donde se describe componentes tales como políticas, servicios y nodos respectivamente. La arquitectura fue validada a través de un ambiente simulado de un sistema para el control y seguimiento del proceso de gestación de mujeres utilizando dispositivos wearables. Los resultados evidencian una reducción del índice de la probabilidad y el impacto de los riesgos en un 14.95% y 6.81% respectivamente. / The present work seeks to propose a cybersecurity architecture for the implementation of devices that make use of the Internet of Things (IoT). In recent years, the number of devices connected to the internet per person has increased from 0.08 in 2003 to a total of 6.58 in 2020, which suggests an increase of 8.225% in 7 years. We improve the structure of a functional IoT architecture by including components that ensure compliance with the proposed controls within a cybersecurity framework plus the inclusion of IoT threat modeling. Our architecture focuses on reducing the number of vulnerabilities present in IoT devices since, on average, 57% of these devices are vulnerable to attacks. The architecture has a 3-layer structure: business, applications and technology, where components such as policies, services and nodes are described respectively. The architecture was validated through a simulated environment of a system for the control and monitoring of the pregnancy process of women using wearable devices. The results show a reduction in the probability index and the impact of risks by 14.95% and 6.81% respectively. / Trabajo de investigación
735

A Reticulation of Skin-Applied Strain Sensors for Motion Capture

Schroeck, Christopher A. 12 June 2019 (has links)
No description available.
736

Adaptive Counteraction Against Denial of Service Attack / Adaptiv Motverkan mot Denial of Service Attack

Atiiq, Syafiq Al January 2017 (has links)
The Internet of Things (IoT) is the next generation of networked society where billions of, everyday-life, devices are directly connected to the Internet and able to communicate with each other. In particular, the Constrained Application Protocol (CoAP) has become the de-facto IoT standard for communication at the application layer, as a lightweight web transfer protocol affordable also for resource-constrained platforms. However, as IoT devices are directly connected to the Internet, they are especially vulnerable to a number of security attacks including Denial of Service (DoS), which can seriously worsen their performance and responsiveness, and even make them totally unavailable to serve legitimate requests. In this Master's Thesis project, we have developed a cross-layer and context-aware approach that adaptively counteracts DoS attacks against CoAP server devices, by dynamically adjusting their operative state according to the attack intensity. This considerably limits the impact of DoS attacks and preserves service availability of victim devices to the best possible extent. The proposed approach leverages a trusted Proxy that adaptively shields victim devices, while effectively forwarding and caching messages if needed. We have made a proof-of-concept implementation of our solution for the Californium framework and the CoAP protocol, and experimentally evaluated its effectiveness in counteracting DoS and preserving availability of devices under attack. This Master's Thesis project has been conducted in collaboration with RISE SICS, a research institute for applied information and communication technology in Sweden. / Sakernas Internet (IoT) är nästa generations nätverkssamhälle där miljarder av, vardagliga, enheter är direkt anslutna till Internet och har möjlighet att kommunicera med varandra. Särskilt har CoAP, ett lättviktsprotokoll för webbtrafik som även fungerar för plattformar med begränsade resurser, blivit Sakernas Internets standard för kommunikation på applikationslagret. Men eftersom IoT-enheter är direkt anslutna till Internet så är de också speciellt utsatta för ett antal säkerhetsattacker, inklusive DoS, som kan försämra deras prestanda och mottaglighet avsevärt och i värsta fall göra dem helt otillgängliga för legitima förfrågningar. I detta examensarbete har vi utvecklat en lageröverskridande och kontextmedveten metod som adaptivt motverkar DoS attacker mot CoAP serverenheter genom att dynamiskt anpassa enhetens operativa tillstånd i enlighet med attackintensiteten. Detta begränsar DoS-attackers påverkan på enheterna avsevärt samtidigt som det bibehåller tillgänglighet för tjänster på utsatta enheter till största möjliga utsträckning. Den föreslagna metoden utnyttjar en betrodd proxy som adaptivt skyddar utsatta enheter, samtidigt som den effektivt vidarebefordrar och sparar meddelanden om så behövs. I detta arbete har vi skapat en proof of concept-implementation av vår lösning för Californium-ramverket och CoAP protokollet. Arbetet har utvärderats experimentellt för att undersöka lösningens effektivitet när det gäller att motarbeta DoS-attacker samt hur den bibehåller enheters tillgänglighet under attacker. Detta uppsatsprojekt har utförts i samarbete med RISE SICS som är ett forskningsinstitut för tillämpad informations- och kommunikationsteknik i Sverige.
737

Labor Skills in the Maintenance Department for Industry 4.0

Marzullo, Tomas 04 May 2018 (has links)
Industry 4.0 is changing the manufacturing environment with its cyber-physical infrastructure to support and help increase production performance. The cyber-physical infrastructure brings new technologies such as Internet of Things, big data, cloud computing, and machine learning using advanced algorithms. To deal with this new order to preserve asset performance, industrial maintenance needs to be prepared. This study aims to understand the impact of Industry 4.0 on the skills required within industrial maintenance departments. A survey of industrial maintenance professionals finds that the majority of training comes from internal sources and that much of the information systems used for training are out-of-date or does not exist. The results of this study show that Industry 4.0 will impact the maintenance department and that a Change Management process should be put in place to accomplish this transition smoothly.
738

Security and Privacy Concerns for IoTAdoption : A User Perspective

Mazvimba, Dennis January 2022 (has links)
The Internet of Things (IoT) is one of the most rapidly evolving technologies aroundthe globe that has changed the way people live due to the benefits that comes with itsadoption. However, they have been associated with privacy and security risks. Witha focus on technical mechanisms and a lack of attention to consumer concerns over along time, it is unsurprising that manufacturers lack an understanding of consumersecurity and privacy concerns. While there has been significant empirical researchwarranting consumer concerns, their perceptions remain afoot.The purpose of this study is to understand the consumer privacy and securityperceptions associated with adoption of IoT devices within a smart home. Without an understanding of the consumer perceptions on privacy and security issues, manu-facturers may not address these issues which may hinder the adoption of IoT. While a significant number of studies have shown the privacy and security issues surrounding IoT devices, they have only extended to technical issues, mostly from the manufac-turer’s perspective. Since security is a complex issue involving several stakeholders, these studies cannot be applied from a consumer perspective.In this study we adopt an interpretive philosophical orientation and a qualitativeapproach. In depth interviews are used to collect data from smart homeowners,investigating their perceptions of smart home privacy issues. We have identified threesignificant recurring themes that need to be addressed: ethical and regulatory issues,information control and ownership, and technology design issues.
739

Conceptualizing the Next Generation of Post Occupancy Evaluations

Tripathi, Ishan 19 July 2022 (has links)
The design and construction of high-performance buildings have emerged as a preferred solution for reducing energy consumption and greenhouse gas emissions. However, sometimes there is a considerable gap between the design performance and the actual performance of the buildings. Post Occupancy Evaluations (POE) provide tools to quantify the performance relative to the occupant's health, well-being, and comfort. POE is getting widely accepted to obtain feedback for various parameters such as water, energy, indoor environmental quality, and occupant comfort. Key Performance Indicators (KPIs) can be derived based on the obtained feedback to determine the performance gaps. POE has evolved to be a robust scientific methodology; however, traditional methods of conducting POE have been proven time-consuming, inconsistent, and inefficient. This research aims to conceptualize the next generation of post occupancy evaluations that leverages cutting-edge technologies such as Building Information Modeling (BIM), Internet of Things based sensors (IoT), Geographic Information Systems (GIS), and digital twins. The key contributions of this research are presented in a series of manuscripts. In the first paper, the gaps in the existing POE were determined by conducting a thorough literature review. The observed gaps were classified in data collection, analysis, and visualization categories. Broader POE definition, spot measurements of parameters, and 2D plans and charts for visualization made the existing POE procedure time-consuming. Using digital twins that combine the geometric and parametric data from BIM models and built-environment data from GIS and sensor measurements were recommended as potential solutions to address the observed gaps. The second paper explored the application of BIM-IoT-GIS integration to conduct POE. Use case scenarios were developed to derive system requirements to host the BIM-IoT-GIS-integrated POE. Four sequential tests were conducted to integrate a BIM model from Revit and sensors' data from Excel with ArcGIS pro that contained the surrounding environment data. Based on lessons learned from the tests, an optimized workflow was recommended that can be used across a variety of projects. The third paper used the BIM-IoT-GIS-integration concept to create a holistic proof of concept for digital-twin-enabled POE. The proof of concept was validated by conducting a digital-twin-based POE on the STTC building on the Red River College campus in Winnipeg. The indoor thermal comfort was visualized within the STTC digital twin developed in ArcGIS Pro. The preliminary energy consumption analysis concluded that the STTC buildings' average energy savings were approximately 70,000 KWH/year. The potential users for digital-twin-enabled POE were presented with a comparison of iv existing POE and digital-twin-based POE over a survey and a focus group discussion. Based on opinion-based feedback, the conclusion can be made that digital twins improve the overall efficiency of POE. The fourth paper recommended the digital-twin-enabled POE procedure for UVic's engineering expansion project. It established the semantics for POE, followed by a digital twin execution plan that can be used for developing a digital twin during each phase (from planning to operations) of the project. Furthermore, the benefits of the digital-twin-enabled POE procedure were demonstrated by comparison with the existing POE procedure relative to the project phases. This study concluded that conducting the POE on the UVic ECS expansion project will enable the researchers to determine the effectiveness of sustainable features by comparing the performance of existing and proposed facilities. In conclusion, BIM-IoT-GIS-integrated digital twins address the limitations of data collection, analysis, and visualization. These digital twins will enable multi-objective analysis and spatial-temporal visualization and provide deeper insights into the way these high-performance buildings function. / Graduate / 2023-05-24
740

Hardware Security Design, and Vulnerability Analysis of FPGA based PUFs to Machine Learning and Swarm Intelligence based ANN Algorithm Attacks

Oun, Ahmed 11 July 2022 (has links)
No description available.

Page generated in 0.1434 seconds