Dissertationen zum Thema „Internet of Things Network (IoTN)“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Internet of Things Network (IoTN)" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Okumura, Brandon M. „IoTA: Internet of Things Assistant“. DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1769.
Der volle Inhalt der QuelleShahid, Mustafizur Rahman. „Deep learning for Internet of Things (IoT) network security“. Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS003.
Der volle Inhalt der QuelleThe growing Internet of Things (IoT) introduces new security challenges for network activity monitoring. Most IoT devices are vulnerable because of a lack of security awareness from device manufacturers and end users. As a consequence, they have become prime targets for malware developers who want to turn them into bots. Contrary to general-purpose devices, an IoT device is designed to perform very specific tasks. Hence, its networking behavior is very stable and predictable making it well suited for data analysis techniques. Therefore, the first part of this thesis focuses on leveraging recent advances in the field of deep learning to develop network monitoring tools for the IoT. Two types of network monitoring tools are explored: IoT device type recognition systems and IoT network Intrusion Detection Systems (NIDS). For IoT device type recognition, supervised machine learning algorithms are trained to perform network traffic classification and determine what IoT device the traffic belongs to. The IoT NIDS consists of a set of autoencoders, each trained for a different IoT device type. The autoencoders learn the legitimate networking behavior profile and detect any deviation from it. Experiments using network traffic data produced by a smart home show that the proposed models achieve high performance.Despite yielding promising results, training and testing machine learning based network monitoring systems requires tremendous amount of IoT network traffic data. But, very few IoT network traffic datasets are publicly available. Physically operating thousands of real IoT devices can be very costly and can rise privacy concerns. In the second part of this thesis, we propose to leverage Generative Adversarial Networks (GAN) to generate bidirectional flows that look like they were produced by a real IoT device. A bidirectional flow consists of the sequence of the sizes of individual packets along with a duration. Hence, in addition to generating packet-level features which are the sizes of individual packets, our developed generator implicitly learns to comply with flow-level characteristics, such as the total number of packets and bytes in a bidirectional flow or the total duration of the flow. Experimental results using data produced by a smart speaker show that our method allows us to generate high quality and realistic looking synthetic bidirectional flows
Diratie, Eyassu Dilla. „Hybrid internet of things network for energy-efficient video surveillance system“. Electronic Thesis or Diss., université Paris-Saclay, 2022. http://www.theses.fr/2022UPASG066.
Der volle Inhalt der QuelleWireless visual sensor networks based on IEEE 802.11 mesh networks are effective and suitable solutions for video surveillance systems in monitoring intrusions in selected areas. The IEEE 802.11-based visual sensor networks offer high bit rate video transmissions but suffer from energy inefficiency issues. Moreover, the video transmission in the visual sensor networks requires strict quality of service (QoS) in terms of bandwidth and delay. Also, it is challenging to decrease the overall energy consumption of the network while assuring guaranteed QoS in terms of bandwidth and delay in energy-constrained wireless visual sensor networks. The main contribution of this dissertation is to provide an energy-efficient video surveillance network without compromising the QoS requirement of video transmission. First, we propose a new hybrid IoT network architecture for a video surveillance system that detects and tracks an intruder in the monitoring area. The hybrid IoT network integrates the IEEE 802.11-based multi-hop visual Sensor Networks and LoRa network to provide an autonomous, energy-efficient, high-bitrate video surveillance system. Leveraging the LoRa network characteristics, the LoRa network is utilized as an always-active network for preliminary motion detection and tracking. Moreover, the LoRa network also decides which visual sensor nodes to wake up depending on the tracking information. The Kalman filter is investigated to track the intruder's trajectory from noise measurements of low-power motion sensors to activate only the visual sensor nodes along the intruder's trajectory to provide effective video vigilance. We showed through simulation that Kalman filter estimates and predicts intruder trajectory with reasonable accuracy. Moreover, the proposed hybrid IoT network approach reduces energy consumption significantly compared with a traditional, always active continuous monitoring single-tier visual sensor network. Next, the contribution of this dissertation focuses on an energy-aware and QoS routing mechanism for the IEEE 802.11-based multi-hop visual sensor network of the hybrid IoT network. We propose a routing algorithm that routes a set of video streams to the gateway with guaranteed QoS in terms of bandwidth and delay while minimizing the number of visual sensor nodes that are involved in routing. This maximizes the number of nodes that can be turned off completely to optimize the overall energy consumption of the network without compromising QoS performance. The proposed routing problem is formulated as an Integer Linear Program (ILP) and solved using the branch-and-bound algorithm. Through computer simulation, the performance of the proposed approach is compared with the existing state-of-the-art routing algorithms from the literature. The results clearly show that the proposed mechanism saves a significant amount of the overall energy consumption while guaranteeing QoS in terms of bandwidth and delay
Alm, Anton. „Internet of Things mesh network : Using the Thread networking protocol“. Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.
Der volle Inhalt der QuelleXu, Ran. „Federated Sensor Network architectural design for the Internet of Things (IoT)“. Thesis, Loughborough University, 2013. https://dspace.lboro.ac.uk/2134/13453.
Der volle Inhalt der QuelleCarlquist, Johan. „Evaluating the use of ICN for Internet of things“. Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-343368.
Der volle Inhalt der QuelleHsu, Alexander Sirui. „Automatic Internet of Things Device Category Identification using Traffic Rates“. Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/88421.
Der volle Inhalt der QuelleMaster of Science
IoT (Internet of Things) devices are an exploding field, with many devices being created, manufactured, and utilized per year. With the rise of so many internet capable devices, there is a risk that the devices may have vulnerabilities and exploits able to allow unauthorized users to access. While a problem for a consumer network, this is an increased problem in an enterprise network, since much of the information on the network is sensitive and should be kept confidential and private. While a ban of IoT devices on a network is able to solve this problem, with the rise of machine learning able to characterize and recognize patterns, a smarter approach can be created to distinguish when and which types of IoT devices enter the network. Previous attempts to identify IoT devices used signature schemes specific to a single device, but this paper aims to generalize traffic behaviors and identifying a device category rather than a specific IoT device to ensure future new devices can also be recognized. With device category identification in place on an internet network, smarter approaches can be implemented to ensure the devices remain secure while still able to be used.
Frawley, Ryan Joseph. „Logging and Analysis of Internet of Things (IoT) Device Network Traffic and Power Consumption“. DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1911.
Der volle Inhalt der QuelleHobring, Linus, und Philip Söderberg. „A sensor network for the Internet of Things Integrated with a bidirectional backend“. Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2702.
Der volle Inhalt der QuelleNITTI, MICHELE. „Managing the Internet of Things based on its Social Structure“. Doctoral thesis, Università degli Studi di Cagliari, 2014. http://hdl.handle.net/11584/266422.
Der volle Inhalt der QuelleZhang, Jie, und Jingbo Wu. „Visualization techniques in Logistics : Case study on the strategy development for logistics network in Internet of Things era“. Thesis, Högskolan i Gävle, Akademin för teknik och miljö, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-9919.
Der volle Inhalt der QuellePutchala, Manoj Kumar. „Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network using Gated Recurrent Neural Networks (GRU)“. Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1503680452498351.
Der volle Inhalt der QuelleMontanari, Luca. „A Network Function Virtualization Architecture for Distributed IoT Gateways“. Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13345/.
Der volle Inhalt der QuelleArbiza, Lucas Mendes Ribeiro. „SDN no contexto de IoT : refatoração de middleware para monitoramento de pacientes crônicos baseada em software-defined networking“. reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/134368.
Der volle Inhalt der QuelleSome words and definitions usually employed when talking about Software-Defined Networking such as programmability, frexibility, or centralized management sound very appropriate to the context of another network paradigm: Internet of Things. The presence of devices designed for security, air conditioning, lighting, health monitoring and some other automation resources have become common in home networks; those devices may be different in many ways, such as the way they operate and communicate, between others. Dealing with this kind of scenario may differ in many ways from what we are familiar regarding networking and services management; the use of traditional management tools and protocols may be hard or even unfeasible. Aiming to enable the health monitoring of patients with chronical illnesses through using off-the-shelf healthcare devices a middleware proposal was developed in a research project to circumvent interoperability, data collecting, management, security and privacy issues found in employed devices. The middleware was designed to run on access points in the homes of the patients. Although hardware and software limitations of the used access points reflect on the development process, because they restrict the use of programming languages and resources that could be employed to expedite the implementation of necessary modules and features. Development related mishaps have motivated the search for alternatives resulting in the middleware refactoring through Software-Defined Networking, based on previous works where that paradigm is used in home networks. This work aims to verify the feasability of the employment of Software- Defined Networking in the Internet of Things context, and its resulting benefits; specifically in the health monitoring of chronic patients service from the previous proposal. After refactoring most of the network and services load was distributed among remote dedicated servers allowing developers to go beyond the limitations imposed by access points constraints, and to make use of resources not available before enabling agility to the development process; it also enables the development of more complex features expanding services possibilities. Additionally Software-Defined Networking employment provides benefits such as the delivering of more than only one service through the same access point; scalability and autonomy to the network and devices monitoring, as to the service deployment through the use of OpenFlow resources; and devices and services cooperation enabling the built of a wider digital representation of the monitored environment.
Baccelli, Emmanuel. „IP-Disruptive Wireless Networking: Integration in the Internet“. Habilitation à diriger des recherches, Université Pierre et Marie Curie - Paris VI, 2012. http://tel.archives-ouvertes.fr/tel-00770791.
Der volle Inhalt der QuelleDrápela, Roman. „Implementace a vyhodnocení komunikační technologie LTE Cat-M1 v simulačním prostředí Network Simulator 3“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400908.
Der volle Inhalt der QuelleBadokhon, Alaa. „An Adaptable, Fog-Computing Machine-to-Machine Internet of Things Communication Framework“. Case Western Reserve University School of Graduate Studies / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=case1492450137643915.
Der volle Inhalt der QuelleAguiari, Davide. „Exploring Computing Continuum in IoT Systems : sensing, communicating and processing at the Network Edge“. Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS131.
Der volle Inhalt der QuelleAs Internet of Things (IoT), originally comprising of only a few simple sensing devices, reaches 34 billion units by the end of 2020, they cannot be defined as merely monitoring sensors anymore. IoT capabilities have been improved in recent years as relatively large internal computation and storage capacity are becoming a commodity. In the early days of IoT, processing and storage were typically performed in cloud. New IoT architectures are able to perform complex tasks directly on-device, thus enabling the concept of an extended computational continuum. Real-time critical scenarios e.g. autonomous vehicles sensing, area surveying or disaster rescue and recovery require all the actors involved to be coordinated and collaborate without human interaction to a common goal, sharing data and resources, even in intermittent networks covered areas. This poses new problems in distributed systems, resource management, device orchestration,as well as data processing. This work proposes a new orchestration and communication framework, namely CContinuum, designed to manage resources in heterogeneous IoT architectures across multiple application scenarios. This work focuses on two key sustainability macroscenarios: (a) environmental sensing and awareness, and (b) electric mobility support. In the first case a mechanism to measure air quality over a long period of time for different applications at global scale (3 continents 4 countries) is introduced. The system has been developed in-house from the sensor design to the mist-computing operations performed by the nodes. In the second scenario, a technique to transmit large amounts of fine-time granularity battery data from a moving vehicle to a control center is proposed jointly with the ability of allocating tasks on demand within the computing continuum
Numair, M., D.-EA Mansour und Geev Mokryani. „A Proposed IoT Architecture for Effective Energy Management in Smart Microgrids“. IEEE, 2020. http://hdl.handle.net/10454/18491.
Der volle Inhalt der QuelleThe current electricity grid suffers from numerous challenges due to the lack of an effective energy management strategy that is able to match the generated power to the load demand. This problem becomes more pronounced with microgrids, where the variability of the load is obvious and the generation is mostly coming from renewables, as it depends on the usage of distributed energy sources. Building a smart microgrid would be much more economically feasible than converting the large electricity grid into a smart grid, as it would require huge investments in replacing legacy equipment with smart equipment. In this paper, application of Internet of Things (IoT) technology in different parts of the microgrid is carried out to achieve an effective IoT architecture in addition to proposing the Internet-of-Asset (IoA) concept that will be able to convert any legacy asset into a smart IoT-ready one. This will allow the effective connection of all assets to a cloud-based IoT. The role of which is to perform computations and big data analysis on the collected data from across the smart microgrid to send effective energy management and control commands to different controllers. Then the IoT cloud will send control actions to solve microgrid's technical issues such as solving energy mismatch problem by setting prediction models, increasing power quality by the effective commitment of DERs and eliminating load shedding by turning off only unnecessary loads so consumers won't suffer from power outages. The benefits of using IoT on various parts within the microgrid are also addressed.
Laroui, Mohammed. „Distributed edge computing for enhanced IoT devices and new generation network efficiency“. Electronic Thesis or Diss., Université Paris Cité, 2022. http://www.theses.fr/2022UNIP7078.
Der volle Inhalt der QuelleTraditional cloud infrastructure will face a series of challenges due to the centralization of computing, storage, and networking in a small number of data centers, and the long-distance between connected devices and remote data centers. To meet this challenge, edge computing seems to be a promising possibility that provides resources closer to IoT devices. In the cloud computing model, compute resources and services are often centralized in large data centers that end-users access from the network. This model has an important economic value and more efficient resource-sharing capabilities. New forms of end-user experience such as the Internet of Things require computing resources near to the end-user devices at the network edge. To meet this need, edge computing relies on a model in which computing resources are distributed to the edge of a network as needed, while decentralizing the data processing from the cloud to the edge as possible. Thus, it is possible to quickly have actionable information based on data that varies over time. In this thesis, we propose novel optimization models to optimize the resource utilization at the network edge for two edge computing research directions, service offloading and vehicular edge computing. We study different use cases in each research direction. For the optimal solutions, First, for service offloading we propose optimal algorithms for services placement at the network edge (Tasks, Virtual Network Functions (VNF), Service Function Chain (SFC)) by taking into account the computing resources constraints. Moreover, for vehicular edge computing, we propose exact models related to maximizing the coverage of vehicles by both Taxis and Unmanned Aerial Vehicle (UAV) for online video streaming applications. In addition, we propose optimal edge-autopilot VNFs offloading at the network edge for autonomous driving. The evaluation results show the efficiency of the proposed algorithms in small-scale networks in terms of time, cost, and resource utilization. To deal with dense networks with a high number of devices and scalability issues, we propose large-scale algorithms that support a huge amount of devices, data, and users requests. Heuristic algorithms are proposed for SFC orchestration, maximum coverage of mobile edge servers (vehicles). Moreover, The artificial intelligence algorithms (machine learning, deep learning, and deep reinforcement learning) are used for 5G VNF slices placement, edge-autopilot VNF placement, and autonomous UAV navigation. The numerical results give good results compared with exact algorithms with high efficiency in terms of time
Al-Kaseem, Bilal R. „Optimised cloud-based 6LoWPAN network using SDN/NFV concepts for energy-aware IoT applications“. Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/15642.
Der volle Inhalt der QuelleOlsson, Isak, und André Lindgren. „LiDAR-Equipped Wireless Sensor Network for Speed Detection on Classification Yards“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301053.
Der volle Inhalt der QuelleEvery day, thousands of train wagons are coupled on the multiple classification yards in Sweden. To be able to automatically brake the wagons a sufficient amount, it is a necessity to determine the speed of the wagons. A technology that has been on the rise recently is Light Detection and Ranging (LiDAR) that emits light to determine the distance to objects. This report discusses the design and implementation of a wireless sensor network consisting of a LiDAR-equipped sensor node. The design process provided insight into how LiDAR sensors may be placed for maximum utilization. The sensor node was programmed to determine the speed of an object by first using Random Sample Consensus (RANSAC) for outlier removal and then linear regression on the inliers. The implementation was evaluated by building a small track with an object sliding over it and placing the sensor node at an angle to the side of the track. The results showed that the implementation could both detect objects on the track and also track the speed of the objects. A simulation was also made using a 3D model of a wagon to see how the algorithm performs on non-smooth surfaces. The simulated LiDAR sensor had a beam divergence of 0_. 30% of the simulated measurements were turned into outliers to replicate bad weather conditions. The results showed that RANSAC was efficient at removing the outliers but that the rough surface of the wagon resulted in some incorrect speed measurements. A conclusion was made that a sensor with some beam divergence could be beneficial. Future work includes testing the implementation in real-world scenarios, finding optimal parameters for the proposed algorithm, and to evaluate algorithms that can filter rough geometry data.
Tuccio, Angelo. „Rete Lepida IoT Sperimentazione del servizio“. Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Den vollen Inhalt der Quelle findenChiwewe, Tapiwa Moses. „Efficient spectrum use in cognitive radio networks using dynamic spectrum management“. Thesis, University of Pretoria, 2016. http://hdl.handle.net/2263/59624.
Der volle Inhalt der QuelleThesis (PhD)--University of Pretoria, 2016.
Centre for Telecommunication Engineering for the Information Society
Electrical, Electronic and Computer Engineering
PhD
Unrestricted
Aboubakar, Moussa. „Efficient management of IoT low power networks“. Thesis, Compiègne, 2020. http://www.theses.fr/2020COMP2571.
Der volle Inhalt der QuelleIn these recent years, several connected objects such as computer, sensors and smart watches became part of modern living and form the Internet of Things (IoT). The basic idea of IoT is to enable interaction among connected objects in order to achieve a desirable goal. IoT paradigm spans across many areas of our daily life such as smart transportation, smart city, smart agriculture, smart factory and so forth. Nowadays, IoT networks are characterized by the presence of billions of heterogeneous embedded devices with limited resources (e.g. limited memory, battery, CPU and bandwidth) deployed to enable various IoT applications. However, due to both resource constraints and the heterogeneity of IoT devices, IoT networks are facing with various problems (e.g. link quality deterioration, node failure, network congestion, etc.). Considering that, it is therefore important to perform an efficient management of IoT low power networks in order to ensure good performance of those networks. To achieve this, the network management solution should be able to perform self-configuration of devices to cope with the complexity introduced by current IoT networks (due to the increasing number of IoT devices and the dynamic nature of IoT networks). Moreover, the network management should provide a mechanism to deal with the heterogeneity of the IoT ecosystem and it should also be energy efficient in order to prolong the operational time of IoT devices in case they are using batteries. Thereby, in this thesis we addressed the problem of configuration of IoT low power networks by proposing efficient solutions that help to optimize the performance of IoT networks. We started by providing a comparative analysis of existing solutions for the management of IoT low power networks. Then we propose an intelligent solution that uses a deep neural network model to determine the efficient transmission power of RPL networks. The performance evaluation shows that the proposed solution enables the configuration of the transmission range that allows a reduction of the network energy consumption while maintaining the network connectivity. Besides, we also propose an efficient and adaptative solution for configuring the IEEE 802.15.4 MAC parameters of devices in dynamic IoT low power networks. Simulation results show that our proposal improves the end-to-end delay compared to the usage of the standard IEEE 802.15.4 MAC. Additionally, we develop a study on solutions for congestion control in IoT low power networks and propose a novel scheme for collecting the congestion state of devices in a given routing path of an IoT network so as to enable an efficient mitigation of the congestion by the network manager (the device in charge of configuration of the IoT network)
Rossland, Lindvall Caspar, und Mikael Söderberg. „Efficient naming for Smart Home devices in Information Centric Networks“. Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-424259.
Der volle Inhalt der QuelleCavaletti, Marco. „A Wireless Solution for Industrial IoT Using LoRa at 2.4 GHz“. Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Den vollen Inhalt der Quelle findenMårdsjö, Jon. „Security concerns regarding connected embedded systems“. Thesis, Linköpings universitet, Databas och informationsteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-92755.
Der volle Inhalt der QuellePolya, Alexander, und Anders Lindén. „Förening av trådlösa mesh-nätverk och PLC-miljö för industriella behov“. Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-28262.
Der volle Inhalt der QuelleHussein, Ali Dina. „A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds“. Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024/document.
Der volle Inhalt der QuelleThe paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
Mo, Yuqi. „Ultra narrow band based IoT networks“. Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEI069/document.
Der volle Inhalt der QuelleSigfox rises as a promising candidate dedicated for long-distance and low-power transmissions in the IoT backgrounds. Ultra Narrow Band (UNB), being the communication technology chosen by Sigfox, allows to transmit information through signals whose bandwidth is very limited, typically 100 Hz. Due to the imprecision restraint on electronic devices, it is impossible to transmit UNB signals in orthogonal channels. The natural radio access for this kind of system is thus random ALOHA, in both time and frequency domain. This random access can induce collisions which degrades the networks performance. The aim of this thesis is to characterize the capacity of UNB based networks, as well as to enhance its performance, by considering the randomness in time and frequency. The first contribution of the thesis, is the theoretical and numerical capacity evaluation under idealized and realistic channel conditions, for mono base station (BS) case. Under idealized conditions, we have quantified this capacity for generalized ALOHA case and extended for replications. We highlight the time-frequency duality in UNB systems, and that there exists an optimum replication number for a given network parameter set. Under realistic conditions, we have taken into account the specific spectral interference of UNB systems and propagation path loss (without and with Rayleigh fading) to characterize the performance, with the aid of stochastic geometry. The second contribution is the enhancement of UNB network performance in single BS case. We propose to use successive interference cancellation (SIC) in UNB networks, which allows to mitigate the interference. We have provided a theoretical analysis by considering both SIC and the spectral interference, for mono-BS case. We bring to light the efficiency of SIC in enhancing UNB system performance. The third contribution is the improvement of UNB systems, by exploiting the multiple BS diversity. An analytical performance evaluation considering the simplest selection combining is conducted. In particular, we consider the interference viewed by all the BSs are correlated. Then we apply more complex signal combining technologies such as MRC (max ratio combining) and EGC (equal gain combining), and even interference cancellation across multi-BS in UNB networks. We evaluate the performance improvement that each technology can bring, and compare them with each other. We highlight the efficiency of these multi-BS technologies which allow us to achieve significant performance enhancement compared to mono-BS (e.x. 125 times better performance with global SIC). Last but not least, we experimentally verify the the spectral interference model and network capacity on a cognitive radio testbed
Ortis, Pasamontes Enrique. „Comparison Study and Product Development using Wireless Narrowband Low-power Wide-area Network Technologies“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-227857.
Der volle Inhalt der QuelleHussein, Ali Dina. „A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds“. Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024.
Der volle Inhalt der QuelleThe paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
Stenbrunn, Alf, und Theodor Lindquist. „Hosting a building management system on a smart network camera: On the development of an IoT system“. Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20517.
Der volle Inhalt der QuelleSamikwa, Eric. „Flood Prediction System Using IoT and Artificial Neural Networks with Edge Computing“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280299.
Der volle Inhalt der QuelleÖversvämningar drabbar miljontals människor över hela världen genom att orsaka dödsfall och förstöra egendom. Sakernas Internet (IoT) har använts i områden som översvämnings förutsägelse, översvämnings övervakning, översvämning upptäckt, etc. Även om IoT-teknologier inte kan stoppa förekomsten av översvämningar, så är de mycket användbara när det kommer till transport av katastrofberedskap och motverkande handlingsdata. Utveckling har skett när det kommer till att förutspå översvämningar med hjälp av artificiella neuronnät (ANN). Trots de olika framstegen inom system för att förutspå översvämningar genom ANN, så har det varit mindre fokus på användningen av edge computing vilket skulle kunna förbättra effektivitet och tillförlitlighet. I detta examensarbete föreslås ett system för kortsiktig översvämningsförutsägelse genom IoT och ANN, där gissningsberäkningen utförs över en låg effekt edge enhet. Systemet övervakar sensordata från regn och vattennivå i realtid och förutspår översvämningsvattennivåer i förtid genom att använda långt korttidsminne. Systemet kan köras på batteri eftersom det använder låg effekt IoT-enheter och kommunikationsteknik. Resultaten från en utvärdering av en prototyp av systemet indikerar en bra prestanda när det kommer till noggrannhet att förutspå översvämningar och responstid. Användningen av ANN med edge computing kommer att förbättra effektiviteten av tidiga varningssystem för översvämningar i realtid genom att ta gissningsberäkningen närmare till där datan samlas.
Hammi, Mohamed Tahar. „Sécurisation de l'Internet des objets“. Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006/document.
Der volle Inhalt der QuelleInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Wen, Wen. „Energy Efficient Secure Key Management Schemes for WSNs and IoT“. Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35257.
Der volle Inhalt der QuelleHassan, Basma Mostafa. „Monitoring the Internet of Things (IoT) Networks“. Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS100.
Der volle Inhalt der QuelleBy connecting billions of things to the Internet, IoT created a plethora of applications that touch every aspect of human life. Time-sensitive, mission-critical services, require robust connectivity and strict reliability constraints. On the other hand, the IoT relies mainly on Low-power Lossy Networks, which are unreliable by nature due to their limited resources, hard duty cycles, dynamic topologies, and uncertain radio connectivity. Faults in LLNs are common rather than rare events, therefore, maintaining continuous availability of devices and reliability of communication, are critical factors to guarantee a constant, reliable flow of application data.After a comprehensive literature review, and up to our knowledge, it is clear that there is a call for a new approach to monitoring the unreliable nodes and links in an optimized, energy-efficient, proactive manner, and complete interoperability with IoT protocols. To target this research gap, our contributions address the correct assignment (placement) of the monitoring nodes. This problem is known as the minimum assignment problem, which is NP-hard. We target scalable monitoring by mapping the assignment problem into the well-studied MVC problem, also NP-hard. We proposed an algorithm to convert the DODAG into a nice-tree decomposition with its parameter (treewidth) restricted to the value one. As a result of these propositions, the monitor placement becomes only Fixed-Parameter Tractable, and can also be polynomial-time solvable.To prolong network longevity, the monitoring role should be distributed and balanced between the entire set of nodes. To that end, assuming periodical functioning, we propose in a second contribution to schedule between several subsets of nodes; each is covering the entire network. A three-phase centralized computation of the scheduling was proposed. The proposition decomposes the monitoring problem and maps it into three well-known sub-problems, for which approximation algorithms already exist in the literature. Thus, the computational complexity can be reduced.However, the one major limitation of the proposed three-phase decomposition is that it is not an exact solution. We provide the exact solution to the minimum monitor assignment problem with a duty-cycled monitoring approach, by formulating a Binary Integer Program (BIP). Experimentation is designed using network instances of different topologies and sizes. Results demonstrate the effectiveness of the proposed model in realizing full monitoring coverage with minimum energy consumption and communication overhead while balancing the monitoring role between nodes.The final contribution targeted the dynamic distributed monitoring placement and scheduling. The dynamic feature of the model ensures real-time adaptation of the monitoring schedule to the frequent instabilities of networks, and the distributed feature aims at reducing the communication overhead
Zhang, Ruide. „Hardware-Aided Privacy Protection and Cyber Defense for IoT“. Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.
Der volle Inhalt der QuelleDoctor of Philosophy
The past few years have witnessed a rising in computing and networking technologies. Such advances enable the new paradigm, IoT, which brings great convenience to people's life. Large technology companies like Google, Apple, Amazon are creating smart devices such as smartwatch, smart home, drones, etc. Compared to the traditional internet, IoT can provide services beyond digital information by interacting with the physical world by its sensors and actuators. While the deployment of IoT brings value in various aspects of our society, the lucrative reward from cyber-crimes also increases in the upcoming IoT era. Two unique privacy and security concerns are emerging for IoT. On one hand, IoT brings a large volume of new sensors that are deployed ubiquitously and collect data 24/7. User's privacy is a big concern in this circumstance because collected sensor data may be used to infer a user's private activities. On the other hand, cyber-attacks now harm not only cyberspace but also the physical world. A failure in IoT devices could result in loss of human life. For example, a remotely hacked vehicle could shut down its engine on the highway regardless of the driver's operation. Our approach to emerging privacy and security concerns consists of two directions. The first direction targets at privacy protection. We first look at the privacy impact of upcoming ubiquitous sensing and argue for stricter access control on smart devices. Then, we follow the data flow of private data and propose solutions to protect private data from the networking and cloud computing infrastructure. The other direction aims at protecting the physical world. We propose an innovative method to verify the cyber state of IoT devices.
Furquim, Gustavo Antonio. „Uma abordagem tolerante a falhas para a previsão de desastres naturais baseada em IoT e aprendizado de máquina“. Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-06122017-083224/.
Der volle Inhalt der QuelleNatural disasters have been increasing intensely all around the globe. The consequences of these disasters are significantly amplified when they occur in urban areas or places where there are human activities due to loss of lives and assets. The usage of Wireless Sensor Networks (WSN) for data collection and Machine Learning (ML) to create natural disasters forecast models are viable options. However, new technology trends have been showing promising results, which can aggregate to the tasks of environmental monitoring and natural disasters forecast. One of these new trends is to adopt IP based sensor networks and to use emergent Internet of Things (IoT) standards. In this context, this Thesis presents and analyzes an approach called SENDI (System for dEtecting and forecasting Natural Disasters based on IoT), a fault-tolerant system based on IoT, ML and WSN to detect and forecast natural disasters. SENDI was modelled using ns-3 and validated by means of real data collected by a WSN installed in São Carlos - Brazil, which collects the data of rivers around the region. This system also foresees the possibility of communication failures and loss of nodes during disasters, also adding intelligence to the nodes in order to perform the distribution of data and forecasts, even in such cases. This Thesis presents a case study about flash flooding forecast as well, which uses the system model and the data collected by the WSN. The results of the experiments show that SENDI allows to generate warnings in time to make decisions as such predictions can be foreseen even if partial failure of the system occurs. However, there is a variable accuracy, which depends on the system degradation.
Maslák, Roman. „Implementace a vyhodnocení komunikační technologie LTE Cat-M1 v simulačním prostředí NS-3“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442354.
Der volle Inhalt der QuelleRamos, Alex Lacerda. „Network security metrics for the Internet of things“. Universidade de Fortaleza, 2018. http://dspace.unifor.br/handle/tede/108423.
Der volle Inhalt der QuelleRecent advances in networking technologies, such as the IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) standard, have allowed to interconnect wireless sensor networks (WSNs) to the Internet, thus forming the Internet of Things (IoT). Despite the availability of different message security mechanisms, sensor networks are still vulnerable to several types of attack. To identify such attacks, an Intrusion Detection System (IDS) can be deployed. However, IDSs can generate several false positives and false negatives. Moreover, the alerts raised by IDSs provide no information regarding the impact an attack has on the security of a sensor network. As a consequence, it becomes difficult for WSN administrators and users to take proper responsive actions when attacks occur. To address these issues, this thesis proposes three security metrics. The first metric, called Trust Probability, quantifies by how much an IDS output could be trusted (to be correct). Such metric can help administrators decide which alerts deserve careful attention or which alerts might be safely ignored. Since this type of metric provides a measure of IDS effectiveness, it can also be used to compare different IDSs as well as to fine-tune a given IDS. The second metric, named Damage Level, quantifies the severity of an attack. This metric, when combined with the Trust Probability metric, enables the administrator to correctly prioritize and respond to alerts by evaluating them in terms of accuracy and attack impact. Finally, the third metric, namely Data Security Level, quantifies the degree to which sensor data can be trusted when the sensor is under attack. The security situational awareness provided by this metric helps WSN users make better decisions about the use of the gathered sensor data. Experimental results show that the proposed metrics can accurately quantify security level with low performance overhead and power consumption. Keywords: Network Security Metrics, Quantitative Security Analysis, Security Situational Awareness, Internet of Things, Wireless Sensor Networks.
Recentes avanços nas tecnologias de rede, tais como o padrão IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN), permitiram a interconexão de redes de sensores sem fio (RSSF) à Internet, formando assim a Internet das Coisas (Internet of Things -- IoT). Apesar da disponibilidade de diferentes mecanismos de segurança de mensagens, as redes de sensores ainda são vulneráveis a vários tipos de ataques. Para identificar esses ataques, um Sistema de Detecção de Intrusão (Intrusion Detection System -- IDS) pode ser implantado. No entanto, os IDSs podem gerar vários falsos positivos e falsos negativos. Além disso, os alertas gerados pelos IDSs não fornecem nenhuma informação sobre o impacto de um ataque sobre a segurança de uma RSSF. Consequentemente, torna-se difícil para os administradores e usuários da rede tomarem as devidas ações responsivas quando ataques ocorrerem. Para tratar estas questões, esta tese propõe três métricas de segurança. A primeira delas, chamada Trust Probability, quantifica o quão confiável (correto) é um output de um IDS. Essa métrica pode ajudar os administradores a decidir quais alertas merecem mais atenção ou quais podem ser ignorados com segurança. Já que essa métrica fornece uma medida da efetividade de um IDS, ela também pode ser usada para comparar diferentes IDSs, bem como para otimizar um dado IDS. A segunda métrica, denominada Damage Level, quantifica a gravidade de um ataque. Esta métrica, quando combinada com a Trust Probability, permite ao administrador priorizar e responder corretamente a alertas, avaliando-os em termos de precisão e impacto de ataque. Por fim, a terceira métrica, chamada de Data Security Level, quantifica quão confiáveis os dados dos sensores são quando a rede está sob ataque. Conhecer a informação fornecida por esta métrica ajuda os usuários a tomar melhores decisões sobre o uso dos dados coletados pelos sensores. Os resultados experimentais mostram que as métricas propostas podem quantificar com precisão o nível de segurança da rede, com baixo consumo de energia e sobrecarga de desempenho. Palavras-chave:Métricas de Segurança de Rede, Análise Quantitativa de Segurança, Consciência Situacional de Segurança, Internet das Coisas, Redes de Sensores sem Fio.
Možný, Radek. „Univerzální testovací zařízení pro ověření komunikačních parametrů technologie Narrowband IoT“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400912.
Der volle Inhalt der QuelleSYED, MUHAMMAD FARRUKH SHAHID. „Data-Driven Approach based on Deep Learning and Probabilistic Models for PHY-Layer Security in AI-enabled Cognitive Radio IoT“. Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1048543.
Der volle Inhalt der QuelleМіхненко, Ярослав Олександрович. „Модифікований метод передачі даних в мережі Інтернету Речей“. Master's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/42139.
Der volle Inhalt der QuelleThe thesis contains 70 pages, 15 figures, and 10 tables. 35 sources have been used. The purpose of the work is to increase the energy efficiency of the IoT sensor network by modifying the method of information transmission, which will increase the operating time of the nodes of collection and transmission of information of the IoT sensor network. The detailed analysis of the problems of the Internet of Things has been made. Special attention has been paid to modernizing the architecture of the network for improving its energy efficiency and extending its lifetime. The method of random Sleep/Wake cycle has been analyzed in detail. The task to modify the architecture of the wireless sensorу network of the Internet of Things has been fulfilled. The co-ordinated Sleep/Wake cycle method is proposed for transmitting information packets within the sensory network of the Internet of Things. After evaluating the new method and its simulation model, it was concluded that this modified method might be useful for implementation, since: 1. The life cycle of the network with the proposed coordinated method for calculating the duty cycle and queue determination increased from 3.8% to 11.25%. 2. The lifetime of the sensory network increased from 8.4% to 14.8%, compared to the asynchronous cycle of queues in the sensory networks of the Internet of Things.
Крамаренко, Є. С. „Iнтелектуальна мережа Internet of Things“. Master's thesis, Сумський державний університет, 2019. http://essuir.sumdu.edu.ua/handle/123456789/76473.
Der volle Inhalt der QuelleLeyva, Mayorga Israel. „On reliable and energy efficient massive wireless communications: the road to 5G“. Doctoral thesis, Universitat Politècnica de València, 2019. http://hdl.handle.net/10251/115484.
Der volle Inhalt der QuelleLa cinquena generació de xarxes mòbils (5G) es troba molt a la vora. S'espera que proveïsca de beneficis extraordinaris a la població i que resolga la majoria dels problemes de les xarxes 4G actuals. L'èxit de 5G, per a la qual ja ha sigut completada la primera fase del qual d'estandardització, depén de tres pilars: comunicacions tipus-màquina massives, banda ampla mòbil millorada, i comunicacions ultra fiables i de baixa latència (mMTC, eMBB i URLLC, respectivament, per les seues sigles en anglés). En aquesta tesi ens enfoquem en el primer pilar de 5G, mMTC, però també proveïm una solució per a aconseguir eMBB en escenaris de distribució massiva de continguts. Específicament, les principals contribucions són en les àrees de: 1) suport eficient de mMTC en xarxes cel·lulars; 2) accés aleatori per al report d'esdeveniments en xarxes sense fils de sensors (WSNs); i 3) cooperació per a la distribució massiva de continguts en xarxes cel·lulars. En l'apartat de mMTC en xarxes cel·lulars, aquesta tesi realitza una anàlisi profunda de l'acompliment del procediment d'accés aleatori, que és la forma mitjançant la qual els dispositius mòbils accedeixen a la xarxa. Aquestes anàlisis van ser inicialment dutes per mitjà de simulacions i, posteriorment, per mitjà d'un model analític. Els models van ser desenvolupats específicament per a aquest propòsit i inclouen un dels esquemes de control d'accés més prometedors: el access class barring (ACB). El nostre model és un dels més precisos que es poden trobar i l'únic que incorpora l'esquema d'ACB. Els resultats obtinguts per mitjà d'aquest model i per simulació són clars: els accessos altament sincronitzats que ocorren en aplicacions de mMTC poden causar congestió severa en el canal d'accés. D'altra banda, també són clars en què aquesta congestió es pot previndre amb una adequada configuració de l'ACB. No obstant això, els paràmetres de configuració de l'ACB han de ser contínuament adaptats a la intensitat d'accessos per a poder obtindre unes prestacions òptimes. En la tesi es proposa una solució pràctica a aquest problema en la forma d'un esquema de configuració automàtica per a l'ACB; l'anomenem ACBC. Els resultats mostren que el nostre esquema pot aconseguir un acompliment molt proper a l'òptim sense importar la intensitat dels accessos. Així mateix, pot ser directament implementat en xarxes cel·lulars per a suportar el trànsit mMTC, ja que ha sigut dissenyat tenint en compte els estàndards del 3GPP. A més de les anàlisis descrites anteriorment per a xarxes cel·lulars, es realitza una anàlisi general per a aplicacions de comptadors intel·ligents. És a dir, estudiem un escenari de mMTC des de la perspectiva de les WSNs. Específicament, desenvolupem un model híbrid per a l'anàlisi de prestacions i l'optimització de protocols de WSNs d'accés aleatori i basats en clúster. Els resultats mostren la utilitat d'escoltar el mitjà sense fil per a minimitzar el nombre de transmissions i també de modificar les probabilitats de transmissió després d'una col·lisió. Pel que fa a eMBB, ens enfoquem en un escenari de distribució massiva de continguts, en el qual un mateix contingut és enviat de forma simultània a un gran nombre d'usuaris mòbils. Aquest escenari és problemàtic, ja que les estacions base de la xarxa cel·lular no compten amb mecanismes eficients de multicast o broadcast. Per tant, la solució que s'adopta comunament és la de replicar el contingut per a cadascun dels usuaris que ho sol·liciten; és clar que això és altament ineficient. Per a resoldre aquest problema, proposem l'ús d'esquemes de network coding i d'arquitectures cooperatives anomenades núvols mòbils. En concret, desenvolupem un protocol per a realitzar la distribució massiva de continguts de forma eficient, juntament amb un model analític per a la seua optimització. Els resultats demostren que el model proposat és simple i precís
The 5th generation (5G) of mobile networks is just around the corner. It is expected to bring extraordinary benefits to the population and to solve the majority of the problems of current 4th generation (4G) systems. The success of 5G, whose first phase of standardization has concluded, relies in three pillars that correspond to its main use cases: massive machine-type communication (mMTC), enhanced mobile broadband (eMBB), and ultra-reliable low latency communication (URLLC). This thesis mainly focuses on the first pillar of 5G: mMTC, but also provides a solution for the eMBB in massive content delivery scenarios. Specifically, its main contributions are in the areas of: 1) efficient support of mMTC in cellular networks; 2) random access (RA) event-reporting in wireless sensor networks (WSNs); and 3) cooperative massive content delivery in cellular networks. Regarding mMTC in cellular networks, this thesis provides a thorough performance analysis of the RA procedure (RAP), used by the mobile devices to switch from idle to connected mode. These analyses were first conducted by simulation and then by an analytical model; both of these were developed with this specific purpose and include one of the most promising access control schemes: the access class barring (ACB). To the best of our knowledge, this is one of the most accurate analytical models reported in the literature and the only one that incorporates the ACB scheme. Our results clearly show that the highly-synchronized accesses that occur in mMTC applications can lead to severe congestion. On the other hand, it is also clear that congestion can be prevented with an adequate configuration of the ACB scheme. However, the configuration parameters of the ACB scheme must be continuously adapted to the intensity of access attempts if an optimal performance is to be obtained. We developed a practical solution to this problem in the form of a scheme to automatically configure the ACB; we call it access class barring configuration (ACBC) scheme. The results show that our ACBC scheme leads to a near-optimal performance regardless of the intensity of access attempts. Furthermore, it can be directly implemented in 3rd Generation Partnership Project (3GPP) cellular systems to efficiently handle mMTC because it has been designed to comply with the 3GPP standards. In addition to the analyses described above for cellular networks, a general analysis for smart metering applications is performed. That is, we study an mMTC scenario from the perspective of event detection and reporting WSNs. Specifically, we provide a hybrid model for the performance analysis and optimization of cluster-based RA WSN protocols. Results showcase the utility of overhearing to minimize the number of packet transmissions, but also of the adaptation of transmission parameters after a collision occurs. Building on this, we are able to provide some guidelines that can drastically increase the performance of a wide range of RA protocols and systems in event reporting applications. Regarding eMBB, we focus on a massive content delivery scenario in which the exact same content is transmitted to a large number of mobile users simultaneously. Such a scenario may arise, for example, with video streaming services that offer a particularly popular content. This is a problematic scenario because cellular base stations have no efficient multicast or broadcast mechanisms. Hence, the traditional solution is to replicate the content for each requesting user, which is highly inefficient. To solve this problem, we propose the use of network coding (NC) schemes in combination with cooperative architectures named mobile clouds (MCs). Specifically, we develop a protocol for efficient massive content delivery, along with the analytical model for its optimization. Results show the proposed model is simple and accurate, and the protocol can lead to energy savings of up to 37 percent when compared to the traditional approach.
Leyva Mayorga, I. (2018). On reliable and energy efficient massive wireless communications: the road to 5G [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/115484
TESIS
Fabricio, Marcos Aurelio. „Monitoramento de Equipamentos El?tricos Industriais Utilizando IoT“. Pontif?cia Universidade Cat?lica de Campinas, 2018. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/1059.
Der volle Inhalt der QuelleMade available in DSpace on 2018-04-10T12:01:51Z (GMT). No. of bitstreams: 1 MARCOS AUR?LIO BEHRENS.pdf: 3872179 bytes, checksum: edb54d47e1f7953187e4e8675003302b (MD5) Previous issue date: 2018-02-08
The objective of this work is to monitor the electrical equipment of a production line, aiming at monitoring in real time the state of the operation of the monitored machines, allowing the accomplishment of equipment management and early detection of operational deviations and faults. The developed system performs the measurement of the effective electric current through monitored equipment, use a network of sensors connected to a data concentrator module, which in turn performs the intermediate storage, the preliminary treatment of the data and the subsequent send an Internet platform of Things (Internet of Things - IoT). The preliminary treatment of data for analysis of the time series of values of electric currents to obtain an initial evaluation of the state of operation of the monitored machine. Then, the pre-processed information is sent via the internet, a usage platform for term storage, post-processing and real-time visualization of the data by users of interest. In the data platform, the data is formatted for visualization and evaluation of the users, allowing the presentation of alerts and knowledge when deviations are detected in relation to the normal operational parameters. When a current consumption behavior deviation is detected, correlating a potential failure type, the system signals additional information to a User's interest group (to the supervisor of the production line, for example), which in a planned manner, proceeds to some intervention without equipment, without prejudice of the production. The availability of the full-time series of stored data as well as the history of occurrences recorded throughout the use of the monitoring system but is still looking for correlations between data of other origins and nature, and the interpretation of the same data under other perspectives beyond the operation or maintenance of the machine. The monitoring system proposed in this work allows to provide a minimum of automation in old machines and opens the possibility of independent, parallel and non-intrusive monitoring in machines that already have a modern supervisory system. An industry that achieves the goal of making all its production equipment fully monitored is credited to take the next step towards Industry 4.0.
Este trabalho tem como objetivo apresentar um sistema de monitoramento de equipamentos el?tricos de uma linha de produ??o, visando o acompanhamento em tempo real do estado de opera??o das m?quinas monitoradas, permitindo a realiza??o da gest?o de opera??o desses equipamentos e a detec??o antecipada de desvios operacionais e de falhas. O sistema desenvolvido realiza a medi??o da corrente el?trica eficaz consumida pelos equipamentos monitorados, utilizando uma rede de sensores conectados a um m?dulo concentrador de dados, que por sua vez realiza o armazenamento intermedi?rio, o tratamento preliminar dos dados e o posterior envio a uma plataforma de Internet da Coisas (Internet of Things - IoT). O tratamento preliminar de dados visa ? an?lise da s?rie temporal dos valores das correntes el?tricas com o fim de obter uma avalia??o inicial do estado de opera??o da m?quina monitorada. Em seguida, essas informa??es pr?-processadas s?o enviadas via internet a uma plataforma de IoT com o objetivo de armazenamento a longo prazo, p?s-processamento e visualiza??o em tempo real dos dados pelos usu?rios de interesse. Na plataforma de IoT, os dados s?o formatados para exibi??o e avalia??o dos usu?rios considerando formatos gr?ficos compreens?veis, sendo poss?vel a emiss?o de alertas e de relat?rios ao serem detectados desvios em rela??o aos par?metros operacionais normais. Ao ser detectado um desvio de comportamento no consumo de corrente, correlacionando a algum tipo de falha em potencial, o sistema sinaliza informa??es adicionais a um usu?rio de interesse (ao supervisor da linha de produ??o, por exemplo), que de forma planejada, procede a alguma interven??o no equipamento, sem preju?zo da produ??o. A disponibilidade da s?rie temporal completa dos dados armazenados bem como o hist?rico de ocorr?ncias registrados ao longo do uso do sistema de monitoramento permite ainda a busca de correla??es entre dados de outras origens e naturezas, e a interpreta??o dos mesmos dados sob outras ?ticas em contextos al?m da opera??o ou manuten??o da m?quina. O sistema de monitoramento proposto permite prover um m?nimo de automa??o em m?quinas antigas e abre a possibilidade de monitoramento independente, paralela e n?o intrusiva em m?quinas que j? contam com um sistema supervis?rio moderno. Uma ind?stria que atinja o objetivo de tornar o conjunto de seus equipamentos produtivos totalmente monitorado se credencia para dar o pr?ximo passo rumo ? Ind?stria 4.0.
Nergis, Damirag Melodi. „Web Based Cloud Interaction and Visualization of Air Pollution Data“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254401.
Der volle Inhalt der QuelleEnligt World Health Organization dör 7 miljoner människor varje år på grund av sjukdomar orsakade av luftföroreningar. Med förbättringar inom Internet of Things under senare år, har betydelsen av system för miljösensorer. Genom att använda tekniker som molntjänster, RFID, trådlösa sensornätverk och öppna programmeringsgränssnitt, har det blivit enklare att samla in data för visualisering på olika plattformar. Men insamlad data behöver bli representerad på ett effektivt sätt för bättre förståelse och analys, vilket kräver utformande av verktyg för visualisering av data. Initiativet GreenIoT strävar mot att erbjuda öppen data med sin infrastruktur för hållbar stadsutveckling i Uppsala. I detta arbete presenteras en webb-tillämpning, som visualiserar den insamlade miljödatan för att hjälpa kommunen att implementera nya policies för hållbar stadsutveckling, och stimulera medborgare till att skaffa mer kunskap för att göra miljövänliga val i sin vardag. Tillämpningen har utvecklats med hjälp av 4Dialog API, som tillhandahåller data från lagring i molnet för visualiseringssyfte. Enligt den utvärdering som presenteras i denna rapport konstateras att vidare utveckling behövs för att förbättra dels prestanda för att erbjuda en snabbare och mer tillförlitlig service, och dels åtkomstmöjligheter för att främja öppenhet och social inkludering.
Cobârzan, Cosmin. „Internet of highly mobile things“. Thesis, Strasbourg, 2015. http://www.theses.fr/2015STRAD037/document.
Der volle Inhalt der QuelleMobility is becoming an integrating part of todays Internet of Things, as many applications such as wildlife monitoring or target tracking in the battlefield cannot be done only with the help of static nodes. The goal of this thesis is to provide new communication architecture articulated around providing mobility support in Low Power and Lossy Networks (LLNs). First we analyzed from a theoretical point of view the IPv6 address auto-configuration with all optimizations made in Neighbor Discovery Optimization for IPv6 over 6LoWPAN. This step is of crucial importance for protocols that offer mobility support in IP networks, such as MIPv6. Our findings, increased message size that leads to fragmentation and high energy consumption for routers that are involved in Neighbor Discovery message exchange, have lead us to use the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) in order to provide mobility support. RPL is build from ground up with respect to LLN requirements. Our second contribution enhanced RPL operations to support mobility management. Finally, we proposed a cross-layer protocol – Mobility Triggered-RPL – that leverages actions from the X-Machiavel preamble sampling MAC protocol into RPL