• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 541
  • 112
  • 107
  • 36
  • 34
  • 23
  • 13
  • 9
  • 9
  • 8
  • 8
  • 7
  • 5
  • 5
  • 2
  • Tagged with
  • 1008
  • 1008
  • 301
  • 231
  • 227
  • 202
  • 195
  • 188
  • 181
  • 141
  • 135
  • 117
  • 117
  • 117
  • 108
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Influence d'une architecture de type maître-esclave dans les problématiques de sécurité de l'Internet des objets / Influence of master-slave architecture in the Internet of things

Pittoli, Philippe 21 May 2019 (has links)
L'Internet des objets est un principe selon lequel des clients sur Internet peuvent contacter des objets intelligents de notre quotidien, comme des capteurs de température d'une pièce ou des ampoules connectées. Ces objets sont contraints en mémoire, en capacité de calcul et aussi en capacité de communication (taille des paquets, médium partagé). Le travail effectué se focalise sur des problématiques liées à ces contraintes. Lorsqu'un client souhaite envoyer une commande à un objet, il a le choix de s'y connecter directement (architecture bout-en-bout) ou de se connecter à une passerelle réseau (non contrainte en mémoire et en calculs) qui jouera le rôle d'intermédiaire entre les clients et les objets (architecture maître-esclave). Le travail effectué consiste à comprendre les différences entre ces deux architectures et leur viabilité dans des réseaux de l'Internet des Objets. / The Internet of things is a network design where "things" are connected to the Internet, such as thermometers or lights. These objects are constrained in memory, computational capacity and communication (packet size, shared medium). The thesis is focused on issues around those constraints. A client willing to send a request to an object may either establish a direct connection to the object (end-to-end architecture) or establish a connection to the network gateway, which is not constrained in memory or computation capabilities, and will be used as a broker between clients and objects (master-slave architecture). This purpose of the thesis is to understand and to spotlight the differences between those two kinds of architectures and to determine their viability in an IoT context.
202

MODELING AND SECURITY IN CLOUD AND RELATED ECOSYSTEMS

Unknown Date (has links)
Software systems increasingly interact with each other, forming ecosystems. Cloud is one such ecosystem that has evolved and enabled other technologies like IoT and containers. Such systems are very complex and heterogeneous because their components can have diverse origins, functions, security policies, and communication protocols, which makes it difficult to comprehend, utilize and consequently secure them. Abstract architectural models can be used to handle this complexity and heterogeneity but there is lack of work on precise, implementation/vendor neutral and holistic models which represent ecosystem components and their mutual interactions. We attempted to find similarities in systems and generalize to create abstract models for adding security. We represented the ecosystem as a Reference architecture (RA) and the ecosystem units as patterns. We started with a pattern diagram which showed all the components involved along with their mutual interactions and dependencies. We added components to the already existent Cloud security RA (SRA). Containers, being relatively new virtualization technology, did not have a precise and holistic reference architecture. We have built a partial RA for containers by identifying and modeling components of the ecosystem. Container security issues were identified from the literature as well as analysis of our patterns. We added corresponding security countermeasures to container RA as security patterns to build a container SRA. Finally, using container SRA as an example, we demonstrated an approach for RA validation. We have also built a composite pattern for fog computing that is an intermediate platform between Cloud and IoT devices. We represented an attack, Distributed Denial of Service (DDoS) using IoT devices, in the form of a misuse pattern which explains it from the attacker’s perspective. We found this modelbased approach useful to build RAs in a flexible and incremental way as components can be identified and added as the ecosystems expand. This provided us better insight to analyze security issues across boundaries of individual ecosystems. A unified, precise and holistic view of the system is not just useful for adding or evaluating security, this approach can also be used to ensure compliance, privacy, safety, reliability and/or governance for cloud and related ecosystems. This is the first work we know of where patterns and RAs are used to represent ecosystems and analyze their security. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2019. / FAU Electronic Theses and Dissertations Collection
203

Exploring Security, Privacy, and Reliability Strategies to Enable the Adoption of IoT

Kamin, Daud Alyas 01 January 2017 (has links)
The Internet of things (IoT) is a technology that will enable machine-to-machine communication and eventually set the stage for self-driving cars, smart cities, and remote care for patients. However, some barriers that organizations face prevent them from the adoption of IoT. The purpose of this qualitative exploratory case study was to explore strategies that organization information technology (IT) leaders use for security, privacy, and reliability to enable the adoption of IoT devices. The study population included organization IT leaders who had knowledge or perceptions of security, privacy, and reliability strategies to adopt IoT at an organization in the eastern region of the United States. The diffusion of innovations theory, developed by Rogers, was used as the conceptual framework for the study. The data collection process included interviews with organization IT leaders (n = 8) and company documents and procedures (n = 15). Coding from the interviews and member checking were triangulated with company documents to produce major themes. Through methodological triangulation, 4 major themes emerged during my analysis: securing IoT devices is critical for IoT adoption, separating private and confidential data from analytical data, focusing on customer satisfaction goes beyond reliability, and using IoT to retrofit products. The findings from this study may benefit organization IT leaders by enhancing their security, privacy, and reliability practices and better protect their organization's data. Improved data security practices may contribute to social change by reducing risk in security and privacy vulnerabilities while also contributing to new knowledge and insights that may lead to new discoveries such as a cure for a disease.
204

Uma abordagem para a integração de diferentes fontes de dados provenientes de redes de sensores no contexto de internet das coisas / An Approach for the Integration of Different Data Sources from Sensor Networks in the Internet of Things Context

Barros, Vinícius Aires 05 August 2019 (has links)
Internet das Coisas (IoT) tem como principal característica a conexão em rede entre dispositivos como sensores, smartphones e wearables, com a finalidade de coletar informações dos ambientes físicos em que se encontram. Um desafio relacionado é a falta de padronização da comunicação entre dispositivos e de um mecanismo que realiza o processamento, armazenamento e recuperação de dados de forma simplificada, sendo, portanto, um grande desafio a interoperabilidade. Esta dissertação introduz o Internet of Things Data as a Service Module (IoTDSM), uma abordagem que baseia-se no modelo de Data as a Service (DaaS), que tem como objetivo auxiliar a gestão de fontes de dados de sensores heterogêneos, que independem da sua origem, formato ou sistema de banco de dados utilizado. Além disso, é apresentado o Internet of Things Multi-Protocol Message Broker (IoTM2B), uma extensão do IoTDSM que permite a integração com diferentes protocolos de comunicação utilizados em redes de sensores. Neste sentido, para avaliação desta pesquisa foi utilizado a metodologia de avaliação de desempenho, a qual contribuiu para a identificação das limitações dos mecanismos propostos. Além disso, neste trabalho diferentes cenários de avaliação foram conduzidas: (i) avaliação de desempenho do Middleware Global Sensor Network (GSN), que auxiliou na definição dos demais cenários de avaliação abordados; (ii) avaliação de desempenho IoTDSM utilizando diferentes sistemas de bancos de dados (PostgreSQL ou MongoDB) e formatos de dados (JSON ou XML), para o processamento de dados climáticos; (iii) avaliação de desempenho uma estratégia IoTM2B a qual permitiu a integração do IoTDSM com os protocolos HTTP, MQTT e CoAP em um ambiente de comunicação Machine-to-Machine (M2M) e Computação em Nuvem; e, (iv) avaliação de uma arquitetura que realiza a classificação de emoções de usuários em um ambiente de casa inteligente. Por fim, é feito uma discussão sobre os resultados obtidos, além de demonstrar a possibilidade da integração do IoTDSM e IoTM2B com diferentes formatos de dados, estratégias de armazenamento e protocolos de comunicação. / Internet of Things (IoT) has a primary characteristic of the network connection among devices e.g., sensors, smartphones, and wearables, in order to collect information about the physical environments. A related challenge is the non-standardization of communication among devices and a mechanism that performs data processing, storage, and retrieval in a simplified way, hence interoperability a big problem. This thesis introduces the Internet of Things Data as a Service Module (IoTDSM), an approach that is based on the Data as a Service (DaaS) model, which aims to assist the management of heterogeneous sensor data sources, regardless the data source, format or database system utilized. In addition, the Internet of Things Multi-Protocol Message Broker (IoTM2B) is presented, an extension of IoTDSM that allows integration with different sensor networks communication protocols. The performance evaluation methodology was utilized to evaluate this research, which contributed to the identification of the limitations of the proposed mechanisms. Furthermore, different evaluation scenarios were employed: (i) performance evaluation of the Global Sensor Network (GSN), which assisted the execution of the others evaluation scenarios; (ii) performance evaluation of IoTDSM employing different database systems (PostgreSQL or MongoDB) and input/output data formats (JSON or XML) for the processing world wide climatic data; (iii) performance evaluation of IoTM2B strategy which allowed the integration of IoTDSM with the HTTP, MQTT and CoAP protocols in a Machine-to-Machine (M2M) and Cloud Computing environment; and (iv) evaluation of an architecture for emotion recognition on smart home environment. Finally, a discussion is made about the results obtained, besides demonstrating the possibility of the integration of IoTDSM and IoTM2B with different data formats, storage strategies, and communication protocols.
205

Modelling of secure communication system for IoT enabled waste management system

Szabo, Florian Akos January 2019 (has links)
Urban expansion is a key driving force of our modern world. Increasing environmental footprint is an example issue that is directly caused by it. The city of St. Petersburg employs on average almost 500 garbage trucks on a daily basis and spends more than 1 million US Dollars every year to collect, process and manage waste. In order for megacities, such as St. Petersburg, to cope with its effects, new ideas are needed. This seems to be an obvious area in which technology can be used to improve current practices and help save resources. In this study, we investigate how the Internet of Things, blockchain and Quantum Key Distribution systems can be integrated to provide a safe and efficient method for improving the waste management process in the context of Smart City projects. Our implemented simulations in Mininet show that there are some clear challenges with regards to the adoption of blockchain technology in an IoT environment. However, the integration of quantum channels and the use of Quantum Key Distribution within the blockchain infrastructure shows good potential for balancing the advantages and disadvantages of blockchain. With the implemented simulations we demonstrate the superior capabilities of the Proof of Infrastructure blockchain solution, which can facilitate secure transactions within the waste management scenario.
206

CAVISAP : Context-Aware Visualization of Air Pollution with IoT Platforms

Nurgazy, Meruyert January 2019 (has links)
Air pollution is a severe issue in many big cities due to population growth and the rapid development of the economy and industry. This leads to the proliferating need to monitor urban air quality to avoid personal exposure and to make savvy decisions on managing the environment. In the last decades, the Internet of Things (IoT) is increasingly being applied to environmental challenges, including air quality monitoring and visualization. In this thesis, we present CAVisAP, a context-aware system for outdoor air pollution visualization with IoT platforms. The system aims to provide context-aware visualization of three air pollutants such as nitrogen dioxide (NO2), ozone (O3) and particulate matter (PM2.5) in Melbourne, Australia and Skellefteå, Sweden. In addition to the primary context as location and time, CAVisAP takes into account users’ pollutant sensitivity levels and colour vision impairments to provide personalized pollution maps and pollution-based route planning. Experiments are conducted to validate the system and results are discussed.
207

A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems

Wang, Xiaolong 09 November 2018 (has links)
Building Automation System (BAS) is a complex distributed control system that is widely deployed in commercial, residential, industrial buildings for monitoring and controlling mechanical/electrical equipment. Through increasing industrial and technological advances, the control components of BAS are becoming increasingly interconnected. Along with potential benefits, integration also introduces new attack vectors, which tremendous increases safety and security risks in the control system. Historically, BAS lacks security design and relies on physical isolation and "security through obscurity". These methods are unacceptable with the "smart building" technologies. The industry needs to reevaluate the safety and security of the current building automation system, and design a comprehensive solution to provide integrity, reliability, and confidentiality on both system and network levels. This dissertation focuses on the system level in the effort to provide a reliable computing foundation for the devices and controllers. Leveraged on the preferred security features such as, robust modular design, small privilege code, and formal verifiability of microkernel architecture, this work describes a security enhanced operating system with built-in mandatory access control and a proxy-based communication framework for building automation controllers. This solution ensures policy-enforced communication and isolation between critical applications and non-critical applications in a potentially hostile cyber environment.
208

IT i bilen : En fallstudie av ubikvitär datorisering

Gyllhamn, Noel, Jonsson, Klas January 2012 (has links)
This paper aims to study the possibilities and challenges the car industry has to face with applying information technology in cars. The goal is to describe and analyse all the existing technology in the cars out on the market today as well as future possible technologies in cars. By interviewing people who has been working or are working with information technology in cars, we aim to clarify the obstacles and opportunities in the process of implementing informatics in cars. With this knowledge we want to learn more about Ubiquitous computing and how humans interact with Ubiquitous computers today and will be interacting in the future. Technology has a rapid development pace and we find it interesting to examine how the car industry can keep up with the rapid development pace of technology.
209

Förening av trådlösa mesh-nätverk och PLC-miljö för industriella behov / Composition of wireless mesh networks and PLC for industrial needs

Polya, Alexander, Lindén, Anders January 2015 (has links)
In conjunction with the possibility of inexpensive wireless communication, many products of tomorrow are developed with the support for wireless communication. The technology enables the possibilty of wireless communication to small plattforms at a realistic price. The cheap connectivity allows for great creativity and gives the developers imagination a wide discretion in the development of new products. This thesis aims to evaluate how the serial communication protocol Modbus RTU - RS232, performs and behaves when transported through meshed networks (Atmel lightweight mesh will be used in this thesis). The work was commissioned by M2M Solutions in J¨onk¨oping. The report will answer the following questions1. How does Modbus RTU behaves when transported through a meshed network. 2. How does Modbus RTU preform when transported through Atmel Lightweight Mesh.The authors have chosen to conduct action research to answer established questions. A test system consisting of both hardware and software was designed and created. With this system, several different tests were conducted and the results were observed and subjected to reflection. The different tests varied the distance, the network’s composition and location of the network infrastructure. Through observation of the test system and evaluation of the recorded data conclusions concering Modbus RTU’s performance and behavior during transport in Atmel lightweigh mesh has been drawn. The test system has been designed with the help of clients and previously made research. Modbus behaves nominally during transportation through Atmel lightweight mesh. Before the network is fully established, an inability to transport data has beend observed. The performance is evaluated by the time it takes to send data, the time is greatly affected by the following factors; Network composition and changes in signal strength (that creates changes in transport routes). For each additional node that traffic is transported through an increase of 5-10ms in the responstime was noted. The network’s ability to change the transport route is also expected to increase performance. The wireless communication provides a longer range than during transportation by standard conventional cable.Considering the results, the authors believe that Modbus RTU has the potential for use in transportation through wireless, meshed networks. One possible scenario is when several Modbus RTU masters are beeing used and data needs to be transported over large distances.
210

Information Centric Data Collection and Dissemination Fabric for Smart Infrastructures

Nigam, Aakash 09 December 2013 (has links)
Evolving smart infrastructures requires both content distribution as well as event notification and processing support. Content Centric Networking (CCN), built around named data, is a clean slate network architecture for supporting future applications. Due to its focus on content distribution, CCN does not inherently support Publish-Subscribe event notification, a fundamental building block in computer mediated systems and a critical requirement for smart infrastructure applications. While semantics of content distribution and event notification require different support systems from the underlying network infrastructure, content distribution and event notification can still be united by leveraging similarities in the routing infrastructure. Our Extended-CCN architecture(X-CCN) realizes this to provide lightweight content based pub-sub service at the network layer, which is used to provide advanced publish/subscribe services at higher layers. Light weight content based pub-sub and CCN communication at network layer along with advanced publish/subscribe together are presented as data fabric for the smart infrastructures applications.

Page generated in 0.1311 seconds