201 |
Examining citizens' perceived value of internet of things technologies in facilitating public sector services engagementEl-Haddadeh, R., Weerakkody, Vishanth J.P., Osmani, M., Thakker, Dhaval, Kapoor, K.K. 29 September 2018 (has links)
Yes / With the advancement of disruptive new technologies, there has been a considerable focus on personalisation as an important component in nurturing users' engagement. In the context of smart cities, Internet of Things (IoT) offer a unique opportunity to help empower citizens and improve societies' engagement with their governments at both micro and macro levels. This study aims to examine the role of perceived value of IoT in improving citizens' engagement with public services. A survey of 313 citizens in the UK, engaging in various public services, enabled through IoT, found that the perceived value of IoT is strongly influenced by empowerment, perceived usefulness and privacy related issues resulting in significantly affecting their continuous use intentions. The study offers valuable insights into the importance of perceived value of IoT-enabled services, while at the same time, providing an intersectional perspective of UK citizens towards the use of disruptive new technologies in the public sector.
|
202 |
Machine Learning for Botnet Detection: An Optimized Feature Selection ApproachLefoane, Moemedi, Ghafir, Ibrahim, Kabir, Sohag, Awan, Irfan U. 05 April 2022 (has links)
Yes / Technological advancements have been evolving for so long, particularly
Internet of Things (IoT) technology that has seen an increase
in the number of connected devices surpass non IoT connections.
It has unlocked a lot of potential across different organisational
settings from healthcare, transportation, smart cities etc. Unfortunately,
these advancements also mean that cybercriminals are
constantly seeking new ways of exploiting vulnerabilities for malicious
and illegal activities. IoT is a technology that presents a
golden opportunity for botnet attacks that take advantage of a
large number of IoT devices and use them to launch more powerful
and sophisticated attacks such as Distributed Denial of Service
(DDoS) attacks. This calls for more research geared towards the detection
and mitigation of botnet attacks in IoT systems. This paper
proposes a feature selection approach that identifies and removes
less influential features as part of botnet attack detection method.
The feature selection is based on the frequency of occurrence of the
value counts in each of the features with respect to total instances.
The effectiveness of the proposed approach is tested and evaluated
on a standard IoT dataset. The results reveal that the proposed
feature selection approach has improved the performance of the
botnet attack detection method, in terms of True Positive Rate (TPR)
and False Positive Rate (FPR). The proposed methodology provides
100% TPR, 0% FPR and 99.9976% F-score.
|
203 |
Failure analysis of IoT-based smart agriculture system: towards sustainable food securityRahman, Md M., Abdulhamid, Alhassan, Kabir, Sohag, Gope, P. 16 December 2023 (has links)
Yes / Internet of Things (IoT)-based smart agriculture
systems are increasingly being used to improve agricultural yield.
IoT devices used for agricultural monitoring are often deployed
in outdoor environments in remote areas. Due to the exposure
to harsh environments and the nature of deployment, sensors
and other devices are susceptible to an increased rate of failure,
which can take a system to unsafe and dangerous states. Failure
of a smart agriculture system can cause significant harm to
nature and people and reduce agricultural production. To address
the concerns associated with the failure of the system, it is
necessary to understand how the failures of the components of
a system can contribute to causing the overall system failure.
This paper adopts Fault Tree Analysis, a widely used framework
for failure behaviour analysis in other safety-critical domains, to
demonstrate the qualitative failure analysis of smart irrigation
systems based on the components’ failure. / The full-text of this article will be released for public view at the end of the publisher embargo on 10 Dec 2024.
|
204 |
Surplus and Scarce Energy: Designing and Optimizing Security for Energy Harvested Internet of ThingsSanthana Krishnan, Archanaa January 2018 (has links)
Internet of Things require a continuous power supply for longevity and energy harvesting from ambient sources enable sustainable operation of such embedded devices. Using selfpowered power supply gives raise two scenarios, where there is surplus or scarce harvested energy. In situations where the harvester is capable of harvesting beyond its storage capacity, the surplus energy is wasted. In situations where the harvester does not have sufficient resources, the sparse harvested energy can only transiently power the device. Transiently powered devices, referred to as intermittent computing devices, ensure forward progress by storing checkpoints of the device state at regular intervals. Irrespective of the availability of energy, the device should have adequate security.
This thesis addresses the security of energy harvested embedded devices in both energy scenarios. First, we propose precomputation, an optimization technique, that utilizes the surplus energy. We study two cryptographic applications, namely bulk encryption and true random number generation, and we show that precomputing improves energy efficiency and algorithm latency in both applications. Second, we analyze the security pitfalls in transiently powered devices. To secure transiently powered devices, we propose the Secure Intermittent Computing Protocol. The protocol provides continuity to underlying application, atomicity to protocol operations and detects replay and tampering of checkpoints. Both the proposals together provide comprehensive security to self-powered embedded devices. / Master of Science / Internet of Things(IoT) is a collection of interconnected devices which collects data from its surrounding environment. The data collected from these devices enable emerging technologies like smart home and smart cities, where objects are controlled remotely. With the increase in the number of such devices, there is a demand for self-powered devices to conserve electrical energy.
Energy harvesters are suitable for this purpose because they convert ambient energy into electrical energy to be stored in an energy buffer, which is to be used when required by the device. Using energy harvesters as power supply presents us with two scenarios. First, when there is sufficient ambient energy, the surplus energy, which is the energy harvested beyond the storage capacity of the buffer, is not consumed by the device and thus, wasted. Second, when the harvested energy is scarce, the device is forced to shutdown due to lack of power.
In this thesis, we consider the overall security of an energy harvested IoT device in both energy scenarios. We optimize cryptographic algorithms to utilize the surplus energy and design a secure protocol to protect the device when the energy is scarce. Utilizing both the ideas together provides adequate security to the Internet of Things.
|
205 |
Provision of adaptive and context-aware service discovery for the Internet of ThingsButt, Talal A. January 2014 (has links)
The IoT concept has revolutionised the vision of the future Internet with the advent of standards such as 6LoWPAN making it feasible to extend the Internet into previously isolated environments, e.g., WSNs. The abstraction of resources as services, has opened these environments to a new plethora of potential applications. Moreover, the web service paradigm can be used to provide interoperability by offering a standard interface to interact with these services to enable WoT paradigm. However, these networks pose many challenges, in terms of limited resources, that make the adaptability of existing IP-based solutions infeasible. As traditional service discovery and selection solutions demand heavy communication and use bulky formats, which are unsuitable for these resource-constrained devices incorporating sleep cycles to save energy. Even a registry based approach exhibits burdensome traffic in maintaining the availability status of the devices. The feasible solution for service discovery and selection is instrumental to enable the wide application coverage of these networks in the future. This research project proposes, TRENDY, a new compact and adaptive registry-based SDP with context awareness for the IoT, with more emphasis given to constrained networks, e.g., 6LoWPAN It uses CoAP-based light-weight and RESTful web services to provide standard interoperable interfaces, which can be easily translated from HTTP. TRENDY's service selection mechanism collects and intelligently uses the context information to select appropriate services for user applications based on the available context information of users and services. In addition, TRENDY introduces an adaptive timer algorithm to minimise control overhead for status maintenance, which also reduces energy consumption. Its context-aware grouping technique divides the network at the application layer, by creating location-based groups. This grouping of nodes localises the control overhead and provides the base for service composition, localised aggregation and processing of data. Different grouping roles enable the resource-awareness by offering profiles with varied responsibilities, where high capability devices can implement powerful profiles to share the load of other low capability devices. Thus, it allows the productive usage of network resources. Furthermore, this research project proposes APPUB, an adaptive caching technique, that has the following benefits: it allows service hosts to share their load with the resource directory and also decreases the service invocation delay. The performance of TRENDY and its mechanisms is evaluated using an extensive number of experiments performed using emulated Tmote sky nodes in the COOJA environment. The analysis of the results validates the benefit of performance gain for all techniques. The service selection and APPUB mechanisms improve the service invocation delay considerably that, consequently, reduces the traffic in the network. The timer technique consistently achieved the lowest control overhead, which eventually decreased the energy consumption of the nodes to prolong the network lifetime. Moreover, the low traffic in dense networks decreases the service invocations delay, and makes the solution more scalable. The grouping mechanism localises the traffic, which increases the energy efficiency while improving the scalability. In summary, the experiments demonstrate the benefit of using TRENDY and its techniques in terms of increased energy efficiency and network lifetime, reduced control overhead, better scalability and optimised service invocation time.
|
206 |
Industrial Internet of Things : En analys av hot och sårbarheter i industriella verksamheterJohnsson, Daniel, Krohn, Lina January 2019 (has links)
Today the digital evolution is progressing rapidly. This entails both pros and cons concerning the security of devices. Despite the evolution, security has been left in the dark. This results in threats and vulnerabilities in devices, which could potentially be used by a hacker with the purpose of exploiting information. Security has not been a priority in industrial enterprises, even though industrial devices and other networked devices reside on the same network. The evolution of the infrastructure of the Internet has resulted in an increase of cyberattacks. These attacks used to target random individuals. The attacks of today are more intelligent, and hackers have changed their targets to specific enterprises to further exploit sensitive information, damage devices or for financial benefits. Safety in today’s industrial workplaces, such as firewalls, encryption and intrusion detection systems are not specifically designed to work in this type of environment. This leads to new threats and vulnerabilities which further leads to more exploited vulnerabilities. This formulate the following questions: Which are the most occurring threats and vulnerabilities today? What current methods and tools are suited for controlling security in IIoT-networks and its internal industrial devices? The purpose of this thesis was to examine the most occurring threats and vulnerabilities in IIoT-networks and its internal devices and reason among the methods to evaluate security in industrial enterprises. Lastly, an experiment in a real industrial workplace was conducted to attain a nuanced picture of the implementation of finding threats and vulnerabilities in industrial systems. In summary, there are a lot of different threats and vulnerabilities divided into categories and many tools are available to ensure the vulnerability. To conduct a test to find threats and vulnerabilities in an industrial enterprise, it needs to be ethically correct and the consequences carefully considered. The result of this thesis is a mapping and a demonstration of how threats and vulnerabilities are detected in an industrial workplace.
|
207 |
Arquitetura, cidade e cinema: vanguardas e imaginário / Architecture, city and cinema: avant-Gardes and imaginaryLezo, Denise 10 May 2010 (has links)
Nas primeiras décadas do século XX, em um contexto cultural caracterizado por experimentações, redefinições e rupturas, no qual se desenvolveram as chamadas vanguardas artísticas européias, arquitetura, cidade e cinema estabeleceram entre si diferentes formas de interlocução, inclusive a criação de arquiteturas e cidades destinadas exclusivamente para os filmes. Estreitamente vinculadas às problemáticas de seu tempo, estas arquiteturas e cidades ficcionais dialogaram diretamente com as experimentações realizadas no âmbito artístico e arquitetônico das vanguardas, além de configurarem um veículo direto de comunicação com o público de massas. A partir de três filmes produzidos no cinema europeu do período entreguerras - Aelita (Yakov Protazanov, URSS, 1924), Metropolis (Fritz Lang, Alemanha, 1927) e Things to Come (Daqui a Cem Anos, William Cameron Menzies, Inglaterra, 1936) - este trabalho analisa estas arquiteturas e cidades cinematográficas, seus processos de concepção, produção e difusão, assim como suas interlocuções com o contexto cultural vigente. Através de artifícios intrínsecos à linguagem e à narrativa cinematográficas, estas obras incorporam em suas visões de cidade muitos dos aspectos da metrópole do início do século XX, assim como das propostas arquitetônicas e urbanísticas desenvolvidas naquele período, configurando espaços de problematização e articulação de idéias, tratando de questões como: a vida na metrópole e as ambigüidades e contradições impostas ao habitante metropolitano; as novas tecnologias, e as formas como estas impactavam o cotidiano e incitavam a imaginação; as experimentações formais das vanguardas artísticas e a busca pela superação dos limites entre arte e vida; as novas concepções de arquiteturas e cidades, e seu intuito de criar novas lógicas de organização espacial e urbana, que poderiam contribuir para a criação de um novo homem e uma nova sociedade. / In the first decades of the twentieth century, in the cultural context of the European Avant Gardes, architecture, city and cinema had established between themselves different forms of dialogue, including the creation of fictional architectures and cities destined exclusively for the films. Through the analysis of three films - Aelita (Yakov Protazanov, USSR, 1924), Metropolis (Fritz Lang, Germany, 1927) and Things to Come (William Cameron Menzies, 1936), this work seeks to identify the ways that these cinematographic architectures and cities, developed for the European cinema in the interwar period, had reflected, reformulated and released for the masses such issues as: the life in the metropolis and the ambiguities and contradictions imposed to the metropolitan inhabitant; the new technologies, and the ways they impacted the daily lives and incited the imagination; the formal experimentations of the avant-gardes and the pursuit of overcoming the boundaries between art and life; the new conceptions of architectures and cities, and its intention to create new logics of space and urban organizations, which could contribute to the creation of a new man and a new society.
|
208 |
Tisser le Web Social des Objets : Permettre une Interaction Autonome et Flexible dans l’Internet des Objets / Weaving a Social Web of Things : Enabling Autonomous and Flexible Interaction in the Internet of ThingsCiortea, Andrei-Nicolae 14 January 2016 (has links)
L’Internet des Objets (IoT) vise à créer un eco-système global et ubiquitaire composé d’un grand nombre d’objets hétérogènes. Afin d’atteindre cette vision, le World Wide Web apparaît comme un candidat adapté pour interconnecter objets et services à la couche applicative en un Web des Objets (WoT).Cependant l’évolution actuelle du WoT produit des silos d’objets et empêche ainsi la mise en place de cette vision. De plus, même si le Web facilite la composition d’objets et services hétérogènes, les approches existantes produisent des compositions statiques incapables de s’adapter à des environnements dynamiques et des exigences évolutives. Un autre défi est à relever: permettre aux personnes d’interagir avec le vaste, évolutif et hétérogène IoT.Afin de répondre à ces limitations, nous proposons une architecture pour IoT ouvert et autogouverné, constitué de personnes et d’objets situés, en interaction avec un environnement global via des plateformes hétérogènes. Notre approche consiste de rendre les objets autonomes et d’appliquer la métaphore des réseaux sociaux afin de créer des réseaux flexibles de personnes et d’objets. Nous fondons notre approche sur les résultats issus des domaines des multi-agents et du WoT afin de produit un WoT Social.Notre proposition prend en compte les besoins d’hétérogénéité, de découverte et d’interaction flexible dans l’IoT. Elle offre également un coût minimal pour les développeurs et les utilisateurs via différentes couches d’abstraction permettant de limité la complexité de cet éco-système. Nous démontrons ces caractéristiques par la mise en oeuvre de plus scénarios applicatifs. / The Internet of Things (IoT) aims to create a global ubiquitous ecosystem composed of large numbers of heterogeneous devices. To achieve this vision, the World Wide Web is emerging as a suitable candidate to interconnect IoT devices and services at the application layer into a Web of Things (WoT).However, the WoT is evolving towards large silos of things, and thus the vision of a global ubiquitous ecosystem is not fully achieved. Furthermore, even if the WoT facilitates mashing up heterogeneous IoT devices and services, existing approaches result in static IoT mashups that cannot adapt to dynamic environments and evolving user requirements. The latter emphasizes another well-recognized challenge in the IoT, that is enabling people to interact with a vast, evolving, and heterogeneous IoT.To address the above limitations, we propose an architecture for an open and self-governed IoT ecosystem composed of people and things situated and interacting in a global environment sustained by heterogeneous platforms. Our approach is to endow things with autonomy and apply the social network metaphor to createflexible networks of people and autonomous things. We base our approach on results from multi-agent and WoT research, and we call the envisioned IoT ecosystem the Social Web of Things.Our proposal emphasizes heterogeneity, discoverability and flexible interaction in the IoT. In the same time, it provides a low entry-barrier for developers and users via multiple layers of abstraction that enable them to effectively cope with the complexity of the overall ecosystem. We implement several application scenarios to demonstrate these features.
|
209 |
Tisser le Web Social des Objets : Permettre une Interaction Autonome et Flexible dans l’Internet des Objets / Weaving a Social Web of Things : Enabling Autonomous and Flexible Interaction in the Internet of ThingsCiortea, Andrei-Nicolae 14 January 2016 (has links)
L’Internet des Objets (IoT) vise à créer un eco-système global et ubiquitaire composé d’un grand nombre d’objets hétérogènes. Afin d’atteindre cette vision, le World Wide Web apparaît comme un candidat adapté pour interconnecter objets et services à la couche applicative en un Web des Objets (WoT).Cependant l’évolution actuelle du WoT produit des silos d’objets et empêche ainsi la mise en place de cette vision. De plus, même si le Web facilite la composition d’objets et services hétérogènes, les approches existantes produisent des compositions statiques incapables de s’adapter à des environnements dynamiques et des exigences évolutives. Un autre défi est à relever: permettre aux personnes d’interagir avec le vaste, évolutif et hétérogène IoT.Afin de répondre à ces limitations, nous proposons une architecture pour IoT ouvert et autogouverné, constitué de personnes et d’objets situés, en interaction avec un environnement global via des plateformes hétérogènes. Notre approche consiste de rendre les objets autonomes et d’appliquer la métaphore des réseaux sociaux afin de créer des réseaux flexibles de personnes et d’objets. Nous fondons notre approche sur les résultats issus des domaines des multi-agents et du WoT afin de produit un WoT Social.Notre proposition prend en compte les besoins d’hétérogénéité, de découverte et d’interaction flexible dans l’IoT. Elle offre également un coût minimal pour les développeurs et les utilisateurs via différentes couches d’abstraction permettant de limité la complexité de cet éco-système. Nous démontrons ces caractéristiques par la mise en oeuvre de plus scénarios applicatifs. / The Internet of Things (IoT) aims to create a global ubiquitous ecosystem composed of large numbers of heterogeneous devices. To achieve this vision, the World Wide Web is emerging as a suitable candidate to interconnect IoT devices and services at the application layer into a Web of Things (WoT).However, the WoT is evolving towards large silos of things, and thus the vision of a global ubiquitous ecosystem is not fully achieved. Furthermore, even if the WoT facilitates mashing up heterogeneous IoT devices and services, existing approaches result in static IoT mashups that cannot adapt to dynamic environments and evolving user requirements. The latter emphasizes another well-recognized challenge in the IoT, that is enabling people to interact with a vast, evolving, and heterogeneous IoT.To address the above limitations, we propose an architecture for an open and self-governed IoT ecosystem composed of people and things situated and interacting in a global environment sustained by heterogeneous platforms. Our approach is to endow things with autonomy and apply the social network metaphor to createflexible networks of people and autonomous things. We base our approach on results from multi-agent and WoT research, and we call the envisioned IoT ecosystem the Social Web of Things.Our proposal emphasizes heterogeneity, discoverability and flexible interaction in the IoT. In the same time, it provides a low entry-barrier for developers and users via multiple layers of abstraction that enable them to effectively cope with the complexity of the overall ecosystem. We implement several application scenarios to demonstrate these features.
|
210 |
Integration of OPC Unified Architecture with IIoT Communication Protocols in an Arrowhead TranslatorRönnholm, Jesper January 2018 (has links)
This thesis details the design of a protocol translator between the industrial-automation protocol OPC UA, and HTTP. The design is based on the architecture of the protocol translator of the Arrowhead framework, and is interoperable with all of its associated protocols. The design requirements are defined to comply with a service-oriented architecture (SOA) and RESTful interaction through HTTP, with minimal requirement of the consuming client to be familiar with OPC UA semantics. Effort is put into making translation as transparent as possible, but limits the scope of this work to exclude a complete semantic translation. The solution presented in this thesis satisfies structural- and foundational interoperability, and bridges interaction to be independent of OPC UA services. The resulting translator is capable of accessing the content of any OPC UA server with simple HTTP-requests, where addressing is oriented around OPC UA nodes.
|
Page generated in 0.0689 seconds