• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 13
  • 13
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Open Platform Semi-Passive Ultra High Frenquency Radio Frequency Identi

Li, Tzu Hao 20 June 2011 (has links)
Radio frequency identi cation (RFID) is a rapidly emerging technology that enables au- tomatic remote identi cation of objects. Passive and semi-passive RFID systems can be distinguished from other forms of wireless systems, because the RFID tags (transponders) communicate by way of backscatter. In addition, passive tags derive their energy from the RF energy emitted by the reader. RFID technology can provide a fully automated data capture and analysis system. Compared to a passive RFID system, an open platform semi-passive UHF RFID tag can provide identi cation, security, low-power (compared to a wireless sensor net- work(WSN)), medium range and medium processing speed. However, the eld of semi- passive RFID is still under development, and has yet there are no open development platforms available. This thesis develops a prototype of a semi-passive UHF RFID tag that is compatible with the leading UHF RFID standard EPCglobal Gen 2 Class 1. I alsot has the exible I2C and analog digital converter(ADC) interface, which allows the additional of external analog and digital sensors. The sensor data can be read by microcontroller and stored at memory. Standard reader can get sensor data by sending QUERY and READ command to tag. Test results of our open platform semi-passive UHF RFID tag demonstrated that it can achieve a read rate above 50% when an open platform semi-passive UHF RFID tag is placed four meters from the reader antenna and the reader output power is set to 21 dBm. In addition, the proposed semi-passive open platform RFID tag consumes very little power (4.9 mA in 2V with system frequency set to 8MHz).
2

Open Platform Semi-Passive Ultra High Frenquency Radio Frequency Identi

Li, Tzu Hao 20 June 2011 (has links)
Radio frequency identi cation (RFID) is a rapidly emerging technology that enables au- tomatic remote identi cation of objects. Passive and semi-passive RFID systems can be distinguished from other forms of wireless systems, because the RFID tags (transponders) communicate by way of backscatter. In addition, passive tags derive their energy from the RF energy emitted by the reader. RFID technology can provide a fully automated data capture and analysis system. Compared to a passive RFID system, an open platform semi-passive UHF RFID tag can provide identi cation, security, low-power (compared to a wireless sensor net- work(WSN)), medium range and medium processing speed. However, the eld of semi- passive RFID is still under development, and has yet there are no open development platforms available. This thesis develops a prototype of a semi-passive UHF RFID tag that is compatible with the leading UHF RFID standard EPCglobal Gen 2 Class 1. I alsot has the exible I2C and analog digital converter(ADC) interface, which allows the additional of external analog and digital sensors. The sensor data can be read by microcontroller and stored at memory. Standard reader can get sensor data by sending QUERY and READ command to tag. Test results of our open platform semi-passive UHF RFID tag demonstrated that it can achieve a read rate above 50% when an open platform semi-passive UHF RFID tag is placed four meters from the reader antenna and the reader output power is set to 21 dBm. In addition, the proposed semi-passive open platform RFID tag consumes very little power (4.9 mA in 2V with system frequency set to 8MHz).
3

Open Platform Semi-Passive Ultra High Frenquency Radio Frequency Identi

Li, Tzu Hao 20 June 2011 (has links)
Radio frequency identi cation (RFID) is a rapidly emerging technology that enables au- tomatic remote identi cation of objects. Passive and semi-passive RFID systems can be distinguished from other forms of wireless systems, because the RFID tags (transponders) communicate by way of backscatter. In addition, passive tags derive their energy from the RF energy emitted by the reader. RFID technology can provide a fully automated data capture and analysis system. Compared to a passive RFID system, an open platform semi-passive UHF RFID tag can provide identi cation, security, low-power (compared to a wireless sensor net- work(WSN)), medium range and medium processing speed. However, the eld of semi- passive RFID is still under development, and has yet there are no open development platforms available. This thesis develops a prototype of a semi-passive UHF RFID tag that is compatible with the leading UHF RFID standard EPCglobal Gen 2 Class 1. I alsot has the exible I2C and analog digital converter(ADC) interface, which allows the additional of external analog and digital sensors. The sensor data can be read by microcontroller and stored at memory. Standard reader can get sensor data by sending QUERY and READ command to tag. Test results of our open platform semi-passive UHF RFID tag demonstrated that it can achieve a read rate above 50% when an open platform semi-passive UHF RFID tag is placed four meters from the reader antenna and the reader output power is set to 21 dBm. In addition, the proposed semi-passive open platform RFID tag consumes very little power (4.9 mA in 2V with system frequency set to 8MHz).
4

Open Platform Semi-Passive Ultra High Frenquency Radio Frequency Identi

Li, Tzu Hao January 2011 (has links)
Radio frequency identi cation (RFID) is a rapidly emerging technology that enables au- tomatic remote identi cation of objects. Passive and semi-passive RFID systems can be distinguished from other forms of wireless systems, because the RFID tags (transponders) communicate by way of backscatter. In addition, passive tags derive their energy from the RF energy emitted by the reader. RFID technology can provide a fully automated data capture and analysis system. Compared to a passive RFID system, an open platform semi-passive UHF RFID tag can provide identi cation, security, low-power (compared to a wireless sensor net- work(WSN)), medium range and medium processing speed. However, the eld of semi- passive RFID is still under development, and has yet there are no open development platforms available. This thesis develops a prototype of a semi-passive UHF RFID tag that is compatible with the leading UHF RFID standard EPCglobal Gen 2 Class 1. I alsot has the exible I2C and analog digital converter(ADC) interface, which allows the additional of external analog and digital sensors. The sensor data can be read by microcontroller and stored at memory. Standard reader can get sensor data by sending QUERY and READ command to tag. Test results of our open platform semi-passive UHF RFID tag demonstrated that it can achieve a read rate above 50% when an open platform semi-passive UHF RFID tag is placed four meters from the reader antenna and the reader output power is set to 21 dBm. In addition, the proposed semi-passive open platform RFID tag consumes very little power (4.9 mA in 2V with system frequency set to 8MHz).
5

Balancing walled garden and open platform approaches for the Internet of Things : A case study of Husqvarna Group

Adomnita, Alexandr January 2016 (has links)
The term “Internet of Things” (IoT) was first introduced by a technology pioneer Kevin Ashton in 1999.Although the term is relatively new, the idea of making networks and computers communicate in order totrack and manage devices has been around for many years. As of now IoT is a rising topic in technicalcommunity. Some specialists are anticipating that by 2025 there will be around 100 billion connected IoTdevices with a worldwide economic impact of more than $11 trillion. On the other hand, Internet of Thingsemerges significant challenges. Currently the organization around world use two main approaches whenentering the IoT market. First one is an open platform and is represented by interoperability andcollaboration with devices from different vendors. Second one is a closed platform, or a “walled garden”approach. A “walled garden” approach is characterized by building “fences” around the user. In other words,the service provider has control over applications, content and media and also restricts the non-approvedcontent to reach the customer. Therefore, the research set out to explore these approaches and show thebenefits and limits they can have on an organization. The research was conducted in collaboration with aSwedish manufacturer of outdoor power products called Husqvarna Group. In order to fully acknowledgethe organization’s approach, 4 interviews were conducted with managers, back end developers andconsultants hired by Husqvarna Group. From the findings, some things should be taken in consideration.First, IoT involves big data being collected, therefore security and privacy are crucial when developingdevices and systems. Second, it is essential for an organization to have the same views when taking a newdirection. Third, when discussing Internet of Things, it means that things connect, devices to sensors,sensor to gateways and gateways to system. And there shouldn’t be a delimitation from a vendor to another.Therefore, open platform approach is seen as the way to diversity and innovation.
6

Implementace moderních hašovacích funkcí / Implementation of modern hash functions

Trbušek, Pavel January 2010 (has links)
Master's thesis analyses modern hash functions. The requirements for these features and briefly outlined some of the types of attacks are given in the first part. The second part focuses on the specication Skein hash function, which is among the candidates for the new SHA-3 standard, and a description of the JCOP platform, which is a function implemented. In the last part of the work there are discussed implementation problematic parts and evaluation of the selected solution.
7

Open Innovation Strategy: Open platform-based digital mapping; as tools for value creation and value capture : Case study of OpenStreetMap and Google Maps

William, Jeffry Leonardo, Wijaya, Mochamad Rifky January 2017 (has links)
Open innovation has been rising in popularity as an alternative to traditional model for organizations to enhance innovation in their products or services. In the past, the innovation processes was time-consuming and costly. It has now become significantly efficient and effective, supported by the advancement of today’s IT such as Internet, Cloud Computing and Big Data. Open innovation has changed the aspect of the innovation source; from closed internal R&D to fully utilization of consumers’ collaboration. Decision to shift towards open innovation strategy has been lying on several areas including motivation, financial direction, and preference of the innovation strategies and business models that fitting the organizational core strategy. This research studied the relation of these areas and its effect; it determined the way IT-organization creates and captures value that were done by opening its product platform. This thesis was conducted to analyze the open innovation approach in an open digital navigation platform, featuring two platforms as case study: Google Maps and OpenStreetMap. The investigation emphasized the utilizing of the open innovation strategy to build its platform where crowdsourcing and open source software as objects highlighted in the research. The data was collected from secondary sources. Research findings suggested that crowdsourcing and open source software strategy are the main strategies of open innovation implemented in IT digital mapping platform to create and capture value. While these strategies have been practiced in both platforms, circumstances (motivation, financial direction, and business strategy) that hovering around the internal aspect of organizations affected the application of those strategies. The implementation results are differ according to preferred business model. The result of this research suggested that a non-profit based organization tends to utilize open innovation to improve the value of their product through consumer collaboration, while a profit based organization adopts open innovation to generate additional pool of revenue through customers’ feedback and input data. The open innovation leads to creation of a new business model as the foundation of innovation.
8

User entrepreneurship in companies’ communities : Rules of open platform usage in the music streaming industry

Kokkola, Juho January 2013 (has links)
This thesis investigates user entrepreneurship in companies’ communities in the music streaming industry. Speci!cally, the rules of open platform usage are de!ned by conducting a qualitative multi-case study of four different companies. The purpose of the research is to show how music streaming companies’ open platforms support entrepreneurship among user-developers. A signi!cant amount of different applications have been created, but user-developers’ possibilities to commercialize are very limited. A new notion, “community user entrepreneur”, is suggested as a contribution to the theoretical framework.
9

Security Analysis of OPC UA in Automation Systems for IIoT / Säkerhetsanalys av OPC UA inom automationssystem för IIoT.

Varadarajan, Vaishnavi January 2022 (has links)
Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. Prevailing industrial communication standards were proven to meet the security needs to some extent, but the major issue which was yet to be addressed was interoperability. To achieve interoperability, Open Platform Communication Unified Architecture (OPC UA) was introduced as a communication protocol. OPC UA helped bridge the gap between Information Technology (IT) and Operational Technology (OT) security needs, but this also gives rise to new attack opportunities for the intruder. In this thesis, we have analysed the security challenges in OPC UA and the impact of two different cyberattacks on the OPCUA. First, we have implemented an OPC UA Network with the help of Raspberry Pis and open62541, an open-source implementation of the OPC UA client and server. Following this, to evaluate the performance of the network, we performed three cybersecurity attacks, Packet Sniffing, Man in the Middle Attack (MITM) and Denial of Service attack. We assessed the impact these attacks have on the OPC UA network. We have also discussed the detection mechanism for the same attacks. This analysis has helped us recognize the threats faced by OPC UA in an IIoT environment with respect to message flooding, packet sniffing and man in the middle attack and the countermeasures to this attack have been discussed. / Att etablera en säker kommunikation mellan de olika enheterna i en industriell miljö är en stor utmaning. Speciellt efter introduktionen av Industrial Internet of Things (IIoT) har industrier varit mottagliga för cyberhot vilket gör cybersäkerhet en prioritet. Rådande industriella kommunikationsstandarder har visats att till viss del uppfylla säkerhets- behoven, men en av de största problemen var bristen på interoperabilitet. För att uppnå interoperabiliteten skapades Open Platform Communication Unified Architecture (OPC UA) som kommun- ikationsprotokoll. OPC UA hjälper till att överbrygga gapet mellan säkerhetsbehoven av information- steknologi (IT) och Operational Technology (OT), men detta ger också upphov till nya attackmöjligheter för inkräktare. I detta examensarbete har vi analyserat säkerhetsutmaningarna i OPC UA och effekten av två olika cyberattacker på OPC UA. Först har vi implementerat ett OPC UA Network med hjälp av Raspberry Pis och open62541 som är en öppen källkodsimplementering av OPC UA klient och server. Efter detta utförde vi tre cybersäkerhetsattacker för att utvärdera nätverkets prestanda, packet sniffing, Man in the Middle Attack (MITM) och Denial of Service attack. Vi bedömde vilken effekt dessa attacker har på OPC UA-nätverket. Vi har också diskuterat detektionsmekanismen för samma attacker. Denna analys har hjälpt oss att känna igen de hot som OPC UA står inför i en IIoT-miljö med avseende på dataflöde, packet sniffing och Man in the Middle attack och även försvar mot dessa attacker har diskuterats.
10

Security Analysis of OPC UA in Automation Systems for IIoT / Säkerhetsanalys av OPC UA inom automationssystem för IIoT.

Varadarajan, Vaishnavi January 2022 (has links)
Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. Prevailing industrial communication standards were proven to meet the security needs to some extent, but the major issue which was yet to be addressed was interoperability. To achieve interoperability, Open Platform Communication Unified Architecture (OPC UA) was introduced as a communication protocol. OPC UA helped bridge the gap between Information Technology (IT) and Operational Technology (OT) security needs, but this also gives rise to new attack opportunities for the intruder. In this thesis, we have analysed the security challenges in OPC UA and the impact of two different cyberattacks on the OPC UA. First, we have implemented an OPC UA Network with the help of Raspberry Pis and open62541, an open-source implementation of the OPC UA client and server. Following this, to evaluate the performance of the network, we performed three cybersecurity attacks, Packet Sniffing, Man in the Middle Attack (MITM) and Denial of Service attack. We assessed the impact these attacks have on the OPC UA network. We have also discussed the detection mechanism for the same attacks. This analysis has helped us recognize the threats faced by OPC UA in an IIoT environment with respect to message flooding, packet sniffing and man in the middle attack and the countermeasures to this attack have been discussed / Att etablera en säker kommunikation mellan de olika enheterna i en industriell miljö är en stor utmaning. Speciellt efter introduktionen av Industrial Internet of Things (IIoT) har industrier varit mottagliga för cyberhot vilket gör cybersäkerhet en prioritet. Rådande industriella kommunikationsstandarder har visats att till viss del uppfylla säkerhets- behoven, men en av de största problemen var bristen på interoperabilitet. För att uppnå interoperabiliteten skapades Open Platform Communication Unified Architecture (OPC UA) som kommun- ikationsprotokoll. OPC UA hjälper till att överbrygga gapet mellan säkerhetsbehoven av information- steknologi (IT) och Operational Technology (OT), men detta ger också upphov till nya attackmöjligheter för inkräktare. I detta examensarbete har vi analyserat säkerhetsutmaningarna i OPC UA och effekten av två olika cyberattacker på OPC UA. Först har vi implementerat ett OPC UA Network med hjälp av Raspberry Pis och open62541 som är en öppen källkodsimplementering av OPC UA klient och server. Efter detta utförde vi tre cybersäkerhetsattacker för att utvärdera nätverkets prestanda, packet sniffing, Man in the Middle Attack (MITM) och Denial of Service attack. Vi bedömde vilken effekt dessa attacker har på OPC UA-nätverket. Vi har också diskuterat detektionsmekanismen för samma attacker. Denna analys har hjälpt oss att känna igen de hot som OPC UA står inför i en IIoT-miljö med avseende på dataflöde, packet sniffing och Man in the Middle attack och även försvar mot dessa attacker har diskuterats.

Page generated in 0.0781 seconds