Dissertations / Theses on the topic 'Cyberphysical systems and internet of things'

To see the other types of publications on this topic, follow the link: Cyberphysical systems and internet of things.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Cyberphysical systems and internet of things.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Lillethun, David. "ssIoTa: A system software framework for the internet of things." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53531.

Full text
Abstract:
Sensors are widely deployed in our environment, and their number is increasing rapidly. In the near future, billions of devices will all be connected to each other, creating an Internet of Things. Furthermore, computational intelligence is needed to make applications involving these devices truly exciting. In IoT, however, the vast amounts of data will not be statically prepared for batch processing, but rather continually produced and streamed live to data consumers and intelligent algorithms. We refer to applications that perform live analysis on live data streams, bringing intelligence to IoT, as the Analysis of Things. However, the Analysis of Things also comes with a new set of challenges. The data sources are not collected in a single, centralized location, but rather distributed widely across the environment. AoT applications need to be able to access (consume, produce, and share with each other) this data in a way that is natural considering its live streaming nature. The data transport mechanism must also allow easy access to sensors, actuators, and analysis results. Furthermore, analysis applications require computational resources on which to run. We claim that system support for AoT can reduce the complexity of developing and executing such applications. To address this, we make the following contributions: - A framework for systems support of Live Streaming Analysis in the Internet of Things, which we refer to as the Analysis of Things (AoT), including a set of requirements for system design - A system implementation that validates the framework by supporting Analysis of Things applications at a local scale, and a design for a federated system that supports AoT on a wide geographical scale - An empirical system evaluation that validates the system design and implementation, including simulation experiments across a wide-area distributed system We present five broad requirements for the Analysis of Things and discuss one set of specific system support features that can satisfy these requirements. We have implemented a system, called \textsubscript{SS}IoTa, that implements these features and supports AoT applications running on local resources. The programming model for the system allows applications to be specified simply as operator graphs, by connecting operator inputs to operator outputs and sensor streams. Operators are code components that run arbitrary continuous analysis algorithms on streaming data. By conforming to a provided interface, operators may be developed that can be composed into operator graphs and executed by the system. The system consists of an Execution Environment, in which a Resource Manager manages the available computational resources and the applications running on them, a Stream Registry, in which available data streams can be registered so that they may be discovered and used by applications, and an Operator Store, which serves as a repository for operator code so that components can be shared and reused. Experimental results for the system implementation validate its performance. Many applications are also widely distributed across a geographic area. To support such applications, \textsubscript{SS}IoTa must be able to run them on infrastructure resources that are also distributed widely. We have designed a system that does so by federating each of the three system components: Operator Store, Stream Registry, and Resource Manager. The Operator Store is distributed using a distributed hast table (DHT), however since temporal locality can be expected and data churn is low, caching may be employed to further improve performance. Since sensors exist at particular locations in physical space, queries on the Stream Registry will be based on location. We also introduce the concept of geographical locality. Therefore, range queries in two dimensions must be supported by the federated Stream Registry, while taking advantage of geographical locality for improved average-case performance. To accomplish these goals, we present a design sketch for SkipCAN, a modification of the SkipNet and Content Addressable Network DHTs. Finally, the fundamental issue in the federated Resource Manager is how to distributed the operators of multiple applications across the geographically distributed sites where computational resources can execute them. To address this, we introduce DistAl, a fully distributed algorithm that assigns operators to sites. DistAl also respects the system resource constraints and application preferences for performance and quality of results (QoR), using application-specific utility functions to allow applications to express their preferences. DistAl is validated by simulation results.
APA, Harvard, Vancouver, ISO, and other styles
2

Magnússon, Sindri. "Bandwidth Limited Distributed Optimization with Applications to Networked Cyberphysical Systems." Doctoral thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205682.

Full text
Abstract:
The emerging technology of Cyberphysical systems consists of networked computing, sensing, and actuator devices used to monitor, connect, and control physical phenomena. In order to economically and sustainably operate Cyberphysical systems, their devices need to cooperate over a communication network to solve optimization problems. For example, in smart power grids, smart meters cooperatively optimize the grid performance, and in wireless sensor networks a number of sensors cooperate to find optimal estimators of real-world parameters. A challenging aspect in the design of distributed solution algorithms to these optimization problems is that while the technology advances and the networks grow larger, the communication bandwidth available to coordinate the solution remains limited. Motivated by this challenge, this thesis investigates the convergence of distributed solution methods for resource allocation optimization problems, where gradient information is communicated at every iteration, using limited communication. This problem is approached from three different perspectives, each presented in a separate paper.  The investigation of the three papers demonstrate promises and limits of solving distributed resource allocation problems using limited communication bandwidth. Future work will consider how even more general problems can be solved using limited communication bandwidth and also study different communication constraints.

QC 20170424

APA, Harvard, Vancouver, ISO, and other styles
3

Söderberg, Karl Jakob Emanuel. "INTERNET OF THINGS : Smart välfärdsteknologi." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15793.

Full text
Abstract:
Internet of Things är en utveckling som inte endast sträcker sig till de industriella områdena idag. Det når nu mera även ut till välfärdsteknologin. Både användare och företag påverkas idag av detta faktum. Företag har ett behov, och en plikt att värna om sina kunder, och kunder har ett behov av att göra sin röst hörd. Detta arbete har som syfte att utforska acceptansen hos de äldre till denna smarta välfärdsteknologi, samt vad som krävs för att öka acceptansen. Arbetet tillnärmar sig frågan genom litteratur som bas för enkäter och intervjuer, utförda i Sverige och Norge.Det visar sig att acceptansen beror på många olika faktorer, som alla uppfattas olika från person till person. Men att det i många fall kan koka ned till behovet. De flesta människorna vill helst bo hemma så länge som möjligt, i alla fall i Sverige och Norge. Men innan det har gått så långt så kan det vara oklart hur öppna folk är till teknologi som har möjlighet till att uppfattas som integritetskränkande. Nyckeln ligger i att göra teknologin så anpassningsbar som möjligt, vad gäller både funktion och utseende, samt andra faktorer som säkerhet, förståelse, användbarhet och kostnad.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Zhi. "Networked RFID Systems for the Internet of Things." Doctoral thesis, KTH, Elektroniksystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-120056.

Full text
Abstract:
The Internet of Things (IoT) utilizes trillions of uniquely identifiable smart objects to connect anything at anytime and anywhere. Radio frequency identification (RFID) techniques are a powerful promising enabler for realizing the IoT. Around how to build hierarchical networked RFID systems for the IoT, this dissertation formulates and addresses problems in three key areas, i.e., communication protocols, simulation approaches, and RFID applications. Communication protocols are essential for designing high-performance networked RFID systems. First, we propose to use time hopping pulse-position modulation (TH-PPM) impulse radio ultra wideband (IR-UWB) for the tag-to-reader link. We analyze different parts of the system delay and propose relevant strategies to shorten the delay. Second, we give the concept of code division multiple access (CDMA) UWB RFID systems. We analyze the asynchronous matched filter receiver and decorrelating receiver for multi-tag detection, and propose a new communication process that fully exploits the multiple-access capability of the two detection schemes. Simulations are widely used to evaluate the performance of wireless networks. We propose a new approach for simulating networked RFID systems with multiple wireless standards within one case in OMNeT++. It is realized by partitioning and modeling the protocol stacks of different standards and designing a multi-radio module. Moreover, we propose a CO-Simulation framework with MATLAB and OMNeT++ (COSMO). COSMO has the ability of self-validation. It combines the strengths of MATLAB and OMNeT++ by compiling prebuilt models in MATLAB to header files and shared libraries and integrating them into OMNeT++. RFID technology gains popularity because it can be used to track and monitor objects in real time. We implement two typical networked RFID applications, i.e., wide area RFID sensor network and item-level indoor RFID localization. We design a two-layered wide area RFID sensor network for fresh food tracking. It adopts GSM/GPRS for the communication between the server and master nodes, and semi IR-UWB for the communication between master nodes and slave nodes. We develop the control platform and implement the all-in-one sensor nodes. For indoor RFID localization, we give insights about the influence of tag interaction on tag antenna radiation pattern and localization accuracy. Two examples, i.e., the k-NN algorithm and the Simplex algorithm, are taken to show how to utilize tag interaction analysis to improve the design of localization algorithms.

QC 20130409

APA, Harvard, Vancouver, ISO, and other styles
5

Salehi-Abari, Omid. "Software-hardware systems for the Internet-of-Things." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/115767.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages [187]-201).
Although interest in connected devices has surged in recent years, barriers still remain in realizing the dream of the Internet of Things (IoT). The main challenge in delivering IoT systems stems from a huge diversity in their demands and constraints. Some applications work with small sensors and operate using minimal energy and bandwidth. Others use high-data-rate multimedia and virtual reality systems, which require multiple-gigabits-per-second throughput and substantial computing power. While both extremes stress the computation, communications, and energy resources available to the underlying devices, each intrinsically requires different solutions to satisfy its needs. This thesis addresses both bandwidth and energy constraints by developing custom software-hardware systems. To tackle the bandwidth constraint, this thesis introduces three systems. First, it presents AirShare, a synchronized abstraction to the physical layer, which enables the direct implementation of diverse kinds of distributed protocols for loT sensors. This capability results in a much higher throughput in today's IoT networks. Then, it presents Agile-Link and MoVR, new millimeter wave devices and protocols which address two main problems that prevent the adoption of millimeter wave frequencies in today's networks: signal blockage and beam alignment. Lastly, this thesis shows how these systems enable new IoT applications, such as untethered high-quality virtual reality. To tackle the energy constraint, this thesis introduces a VLSI chip, which is capable of performing a million-point Fourier transform in real-time, while consuming 40 times less power than prior fast Fourier transforms. Then, it presents Caraoke, a small, low-cost and low-power sensor, which harvests its energy from solar and enables new smart city applications, such as traffic management and smart parking.
by Omid Salehi-Abari.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
6

Kroon, Cathering, and Louise Myllylä. "Internet of Things - En studie med användarperspektiv." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-48838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sufiye, Shooresh. "Industrial Internet of Things Edge Computing : Edge Forensics." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-41390.

Full text
Abstract:
Internet of Things (IoT) is an upcoming prominent technology which is quickly growing. Not all IoTdemands of computing resources can be satisfied by cloud, and obstacles are firmer when it comes to mobility and agility. Thus, edge computing as a suitable middleware can fill the gap between cloud and IoT devices. Refer to the latest researches, edge security is still evolving, and forensics is almost untouched. In this work, we attempt to study available technologies and materials then design and implement an edge computing application which addresses the challenge of log collection from different edge devices. The interaction between edge and cloud is in a fashion that cloud entity can perform log collection from heterogeneous edge devices belong to different owners. On the other hand, due to local computing on the logs, the edge devicecan trust cloud party. Results show that thanks to the crucial topological position of the edge devices, the concept of edge computing can easily solve similar cloud challenges.
APA, Harvard, Vancouver, ISO, and other styles
8

Touati, Lyes. "Internet of things security : towards a robust interaction of systems of systems." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2311/document.

Full text
Abstract:
Cette thèse traite des problèmes et des défis de sécurité dans l’Internet des Objets (IdO). L’évolution de l’Internet classique vers l’Internet des Objets crée de nombreux challenges dans la manière de sécuriser les communications et soulève des problèmes liés au contraintes de l’internet des objets à savoir : objets à faibles ressources d’énergie et de calculs, hétérogénéité nuisant à l’interopérabilité des objets, taille du réseau de plus en plus grande, ... etc. En effet, Internet s’est développé d’un réseau d’ordinateurs personnels et de serveurs vers un immense réseau connectant des milliards d’objets intelligents communicants. Ces objets seront intégrés dans des systèmes complexes et utiliseront des capteurs et actionneurs pour observer et interagir avec leur environnement physique. Les exigences des interactions entre objets communicants en termes de sécurité dépendent du contexte qui évolue dans l’espace et le temps. Par conséquent, la définition de la politique de sécurité doit être adaptative et sensible au contexte. Un des problèmes auxquels nous nous sommes intéressés est le contrôle d’accès efficace à base de cryptographie d’attributs : « Attributes Based Encryption (ABE) ». Les schémas ABE (CP-ABE et KP-ABE) présentent plusieurs atouts pour l’implémentation d’un contrôle d’accès cryptographique. Par contre, ces schémas posent des défis opérationnels à cause de leurs complexités et leur surcoût élevé en termes de temps d’exécution et consommation énergétique. Pour pallier cet inconvénient, nous avons exploité l’hétérogénéité d’environnement Internet des Objets pour proposer des versions collaboratives et distribuées de ces schémas de contrôle d’accès cryptographique. Nos solutions réduisent considérablement le coût en termes d’énergie nécessaire à l’exécution. Le deuxième inconvénient des schémas ABE est l’inexistence de mécanismes efficaces de gestion de clés. Nous avons proposé des solutions pour le problème de révocation d’attributs dans le schéma CP-ABE, Ces solutions, en plus de leur efficacité, répondent à des exigences de sécurité différentes selon le cas d’applications. Nous avons proposé également, une solution à base de CP-ABE pour le problème du « grouping proof ». Le « grouping proof » consiste à fournir une preuve sur la coexistence, dans le temps et l’espace, d’un ensemble d’objets. Parmi les applications de notre solution, on peut citer le payement NFC et la sécurisation de l’accès aux locaux sensibles
In this thesis, we deal with security challenges in the Internet of Things. The evolution of the Internet toward an Internet of Things created new challenges relating to the way to secure communications given the new constraints of IoT, namely: resource constrained objects, heterogeneity of network components, the huge size of the network, etc. Indeed, the Internet evolved from a network of computers and servers toward a huge network connecting billions of smart communicating objects. These objects will be integrated into complex systems and use sensors and actuators to observe and interact with their physical environment. The security requirements of the interactions between smart objects depend on the context which evolves in time and space. Consequently, the definition of the security policies should be adaptive and context-aware. In this thesis, we were interested in the problem of access control in IoT relying on Attribute based Encryption (ABE). Indeed, ABE schemes present many advantages in implementing a cryptographic fine-grained access control. However, these schemes raise many implementation challenges because of their complexity and high computation and energy overheads. To overcome this challenge, we leveraged the heterogeneity of IoT to develop collaborative and distributed versions of ABE schemes. Our solutions reduce remarkably the overhead in terms of energy consumption and computation. The second limitation of ABE schemes is the absence of efficient attribute/key revocation techniques. We have proposed batch based mechanisms for attribute/key revocation in CP-ABE. We demonstrated the efficiency of the proposed solutions through simulations. Finally, we have proposed a CP-ABE based solution for the problem of grouping proof. This problem consists of providing the proof that a set of objects are present simultaneously (same time and same location). The propose solution has many applications such as enforcing the security of NFC based payments and the access to sensitive locations
APA, Harvard, Vancouver, ISO, and other styles
9

Shaikh, Yasir Saleem. "Privacy preserving internet of things recommender systems for smart cities." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS001.

Full text
Abstract:
Au cours de la dernière décennie, la technologie Internet des objets (IoT) a révolutionné presque tous les domaines de la vie quotidienne et a dynamisé les villes intelligentes. Les villes intelligentes utilisent la technologie IoT pour collecter divers types de données de capteurs, puis les utilisent pour offrir diverses applications. Comme les applications des villes intelligentes sont utilisées par les citoyens, donc leur fournir des services de recommandation personnalisés en fonction de leurs préférences, de leurs localisations et de leurs profils ainsi que l'exploitation des données IoT (par exemple, la congestion du trafic et l'occupation du parking) est d'une grande importance qui pourrait être fournie par un recommandateur IoT. Cependant, comme le recommandateur IoT utilise les données privées des citoyens (profils, préférences et habitudes, par exemple), il viole la vie privée des utilisateurs car il pourrait suivre les routines et les habitudes des utilisateurs en analysant la base de données historique ou en analysant les services de recommandation réguliers qu'il offre. Par conséquent, il est important de préserver la confidentialité des utilisateurs du programme de recommandation IoT. Dans cette thèse, nous proposons un nouveau système de recommandation IoT préservant la confidentialité pour les villes intelligentes, qui fournit des recommandations en exploitant les données IoT des capteurs et en tenant compte de diverses métriques. Notre approche est organisée en trois parties. Tout d'abord, nous développons un système de recommandation IoT conforme au règlement européen sur la protection des données (GDPR) pour les systèmes de stationnement intelligent. Ces systèmes fournissent des recommandations sur les emplacements et les itinéraires de stationnement en exploitant les données des capteurs de stationnement et de circulation. Par conséquence, nous proposons d’abord une approche pour la cartographie des capteurs de trafic avec les coordonnées d’itinéraires afin d’analyser les conditions de trafic (par exemple le niveau de congestion) sur les routes. Ensuite, nous avons mis en place un dispositif de recommandation IoT. Le recommandateur IoT a été intégré au scénario d'utilisation du stationnement intelligent d'un projet H2020 EU-KR WISE-IoT et a été évalué par les citoyens de Santander, en Espagne, à l'aide d'un prototype. De plus, nous développons un recommendateur IoT pour le ski intelligent qui fournit des itinéraires de ski comprenant des types de pistes spécifiques, ainsi que la piste la plus proche. Pour les itinéraires de ski, il n’existe aucun moteur de calcul stable. Par conséquent, un nouveau moteur de routage pour les itinéraires de ski a été développé. Ce travail a également été intégré dans le cas d'utilisation du ski intelligent du projet WISE-IoT. Deuxièmement, bien que le recommandateur IoT développé pour le stationnement intelligent soit conforme au GDPR, il ne protège toutefois pas totalement la vie privée des utilisateurs. En effet, le partage sans discernement des données des utilisateurs avec un système tiers de recommandation de stationnement IoT non approuvé ou semi-fiable provoque une violation de la vie privée. En effet, le comportement et les schémas de mobilité des utilisateurs pouvant être déduits en analysant l'historique de leurs déplacements. Par conséquent, nous préservons la confidentialité des utilisateurs contre le système de recommandation de stationnement tout en analysant leur historique de stationnement en utilisant des techniques de k-anonymat et de confidentialité différentielle. Enfin, étant donné que les applications de villes intelligentes sont développées de manière verticale et ne se parlent pas. Par conséquent, nous avons proposé deux cadres pour les services de recommandation parmi les applications de villes intelligentes utilisant l'IdO social
During the past decade, the Internet of Things (IoT) technology has revolutionized almost all the fields of daily life and has boosted smart cities. Smart cities use IoT technology to collect various types of sensors’ data and then use such data to offer a variety of applications. Since the smart cities’ applications are used by the citizens, therefore providing the customized recommendation services to the citizens based on their preferences, locations and profiles, as well as by exploiting the IoT data (e.g., traffic congestion and parking occupancy) is of great importance which could be provided by an IoT recommender. However, since the IoT recommender utilizes the private data of citizens (e.g., profiles, preferences and habits), it breaches the privacy of the users because the IoT recommender could track the routines and habits of the users by analyzing the historical database or by analyzing the regular recommendation services it offers. Therefore, it is important to preserve the privacy of the users from the IoT recommender. In this thesis, we propose a novel privacy preserving IoT recommender system for smart cities that provides recommendations by exploiting the IoT data of sensors and by considering various metrics. Our approach is organized in three parts. Firstly, we develop an EU General Data Protection Regulation (GDPR)-compliant IoT recommender system for smart parking system that provides recommendations of parking spots and routes by exploiting the data of parking and traffic sensors. For this, we first propose an approach for the mapping of traffic sensors with route coordinates in order to analyze the traffic conditions (e.g., the level of congestion) on the roadways and then developed an IoT recommender. The IoT recommender has been integrated into the smart parking use case of an H2020 EU-KR WISE-IoT project and has been evaluated by the citizens of Santander, Spain through a prototype. Additionally, we develop an IoT recommender for smart skiing that provides skiing routes comprised of specific types of slopes, as well as the nearest slope. For skiing routes, there does not exist any stable routing engine. Therefore, a novel routing engine for skiing routes was developed. This work has also been integrated into the smart skiing use case of WISE-IoT project. Secondly, although the developed IoT recommender for smart parking is GDPR-compliant, however, it does not fully protect the privacy of users. Because, an indiscriminately sharing of users’ data with untrusted third-party IoT parking recommender system causes a breach of privacy, as user’s behavior and mobility patterns can be inferred by analyzing the past travelling history of users. Therefore, we preserve privacy of users against parking recommender system while analyzing their past parking history using k-anonymity and differential privacy techniques. Lastly, since the smart cities applications are developed in a vertical manner and do not talk/communicate with each other, i.e., each application is developed for a certain scenario which generally does not share data with other smart cities applications. Therefore, we proposed two frameworks for the recommendation services across smart cities applications using social IoT. Firstly, on how social IoT can be used for the recommendation services across smart cities applications, and secondly, we propose another type of communication of social IoT at a global level, i.e., social cross-domain application-to-application communications, that enables smart cities applications to communicate with each other and establish social relationships between them
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Ning. "EFFICIENT ROUTING AND OFFLOADING DESIGN IN INTERNET-OF-THINGS SYSTEMS." Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/517698.

Full text
Abstract:
Computer and Information Science
Ph.D.
One of the fundamental challenges in Internet-of-Things systems is that network environment is always changing. Conventional networking approaches do not consider the dynamic evaluation of the networks or consider the network dynamic as a mirror thing, which may not be able to work or has a low efficiency in the Internet-of-Things systems. This dissertation is uniquely built by considering the dynamic network environment and even taking advantage of the network dynamic to improve the network performances, with a focus on the routing and offloading issues. The first part is related to the routing design in the opportunistic mobile networks. The opportunistic mobile network is expected to be an intrinsic part of the Internet of Things. Devices communicate with each other autonomously without any centralized control and collaborate to gather, share, and forward information in a multi-hop manner. The main challenge in opportunistic mobile networks is due to intermittent connection and thus data is delivered through store-carry-forwarding paradigm. In this dissertation, We found an observation regarding the contact duration and proposed efficient data partitioning routing algorithms in the opportunistic mobile networks. The second part is related to the offloading issues in the Internet-of-things systems. With the surging demand on high-quality mobile services at any time, from anywhere, how to accommodate the explosive growth of traffics with/without existing network infrastructures is a fundamental issue. Specifically, We consider three different offloading problems, i.e., cellular data offloading, cloud task offloading, and mobile worker task offloading problems in vehicular networks, cloud, and crowdsourcing platforms. The common issue behind them is how to efficiently utilize the network resources in different scenarios by design efficient scheduling mechanisms. For the cellular data offloading, We explored the trade-off of cellular offloading in the vehicular network. For the cloud task offloading, We conducted the research to adjust the offloading strategies wisely so that the total offloading cost is minimized. For the worker task offloading in the smart cities, We optimized the cost-efficiency of the crowdsourcing platforms.
Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles
11

Camacho, Andersson Emil, and Jonathan Karlsson. "Effekter av Internet of Things : Scenariobaserad studie som beskriver inledande effekter av Internet of Things i en verksamhet." Thesis, Högskolan Dalarna, Informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:du-22582.

Full text
Abstract:
Med begreppet "Internet of Things" menas att ett objekt ur den riktiga världen blir en del av internet. Tunabyggen i Borlänge planerar att implementera ett sådant informationssystem som med hjälp av sensorer och en ständig internetuppkoppling håller uppsikt över temperatur och luftfuktighet i utvalda lokaler. Det är ett enkelt system som till synes inte har så stora effekter på den nuvarande verksamheten. De ekonomiska effekterna går ofta att räkna på i förhand men effekterna på personal, miljö och rutiner kan glömmas bort. Vi har därför med detta examensarbete undersökt vilka inledande effekter som kan tänkas uppkomma efter implementering av ett nytt informationssystem med "Internet of Things" funktionalitet i en verksamhet. Detta sker inom kategorierna ekonomi, arbetsmiljö, miljöpåverkan och systemförvaltning. För att kunna besvara detta har vi gjort en fallstudie baserad på en scenariometodik som består av fyra faser. Fas 1, där vi fick vårt Case och skapade en förståelse för scenariofältet. Fas 2, där vi identifierade nyckelfaktorer. Detta har gjorts genom en litteraturstudie samt intervju med berörd personal på Tunabyggen. Fas 3, där analysen av dessa nyckelfaktorer skedde genom nulägesanalys och framtidsanalys av nyckelfaktorer. Fas 4, där vi genererade scenarier av de analyserade nyckelfaktorerna. Det har sedan gjorts en SWOT-analys för att belysa styrkor, svagheter, möjligheter och hot. Resultatet visar tydliga tecken på att det kommer att bli många effekter för Tunabyggen efter implementering av det nya informationssystemet som yttrar sig i alla kategorier. Slutsatsen är att vid implementation av ett informationssystem som detta är effekterna många. Detta är något som vi anser bör beaktas av alla verksamheter som har tankar på att införskaffa ett nytt informationssystem. De bör inte bara utvärdera informationssystem rent ekonomiskt utan borde ta i beaktning att det finns ett antal andra faktorer som har en avgörande roll om implementation av informationssystem ska bli lyckad.
The term "Internet of Things" refers to when an object from the real world becomes a part of the internet. Tunabyggen in Borlänge plans to implement an information system that will monitor temperature and humidity in selected facilities using a constant internet connection and different sensors. It is a simple system that doesn't seem to have a major impact on the current operations. The economic effects is often possible to calculate in advance, but the impact on staff, environment and routines may be forgotten. We have with this thesis examined the initial effects that may occur after the implementation of a new information system with Internet of Things functionality in a business, within the categories of economy, working environment, environmental impact and system management. To answer this we made a case study which is based on a scenario methodology that consists of four phases. Phase 1, where we got our case and created an understanding of the scenario field. Phase 2, identifying the key factors. It has been done through a literature study and interviews with relevant staff on Tunabyggen. Phase 3, where the analysis of these key factors were made through the situation and future analysis. Phase 4, where we generate scenarios of the analyzed key factors. Finally we have done a SWOT analysis to highlight the strengths, weaknesses, opportunities and threats. The results clearly show signs that there will be many effects for Tunabyggen after the implementation of the new information system, which manifests itself in all categories. The conclusion is that even the implementation of a menial information system like this one, the impacts are many. This is something that we believe should be considered by all companies that are thinking of acquiring a new system so they do not only evaluate IT-systems in economic terms, but also other factors that play a crucial role for the implementation of an information system to be successful.
APA, Harvard, Vancouver, ISO, and other styles
12

Elvstam, Andreas, and Daniel Nordahl. "Operating systems for resource constraint Internet of Things devices: An evaluation." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20403.

Full text
Abstract:
Internet of Things (IoT) är ett område under omfattande utveckling, både vad det gäller hårdvara och mjukvara. När det gäller hårdvaruplattformar för IoT enheter finns det platt-formar som är kraftfulla nog att exekvera ett reguljärt OS som t.ex. Linux. Andra hårdvaru-plattformar är inte tillräckligt kraftfulla för att exekvera reguljära OS och för dessa plattformar finns ett behov av resurseffektiva små IoT OS. Dessa resurssnåla OS behöver kunna hantera många av de funktioner som reguljära OS erbjuder, men på ett betydligt mer effektivt sätt.Det har under de senaste åren släppts en uppsjö av olika IoT OS för resurssnåla enheter och därför är syftet med denna rapport en utvärdering av IoT OS för strömsnåla resurssvaga IoT enheter. Utvärdering genomförs på IoT OS:en Contiki, mbed, RIOT och Zephyr. Målet med utvärderingen är att fastställa viktiga egenskaper för ett IoT OS för strömsnåla resurssvaga IoT enheter, och att belysa svårigheter och erfarenheter relaterade till konstruktionsprocessen av en prototyp för IoT enheter. Utvärderingen genomfördes genom att samla in fyra olika typer av data relaterade till IoT OS:en, och sedan utvärdera denna data med hjälp av en kriteriebaserad utvärderingsmetod.Utvärderingen resulterade i en lista av sex viktiga egenskaper för små resurs snåla IoT operativsystem. Dess resultat belyser även svårigheter och erfarenheter som framkommit under byggprocessen av prototyperna baserade på IoT OS:en.Slutsatsen av denna rapport bidrar med erfarenheter från byggning av prototyper IoT OS för resurssnåla enheter, samt ett utvärderingsresultat för IoT OS:en med hänsyn till de sex viktiga IoT OS egenskaperna.
The Internet of Things (IoT) is a large and rapidly expanding area with regards to both hardware platforms and software. When it comes to hardware platforms for the IoT some are more powerful and able to run a traditional OS like Linux, while other platforms are too constraint to do so. To ease the development within the IoT area an appropriate IoT OS is needed for these constrained hardware platforms, which can handle most of the functionality a traditional OS offer.Therefore, we evaluate IoT OSs targeted for low performance battery powered devices. In this thesis Contiki, mbed, RIOT and Zephyr are evaluated. The aim of this evaluation is to determine important IoT OS characteristics for resource constrained devices, and to highlight difficulties and experiences related to the building process of prototypes for such IoT devices.The evaluation of the IoT OSs were conducted on four types of data with regards to several measurable OS characteristics according to a criteria based evaluation method.The evaluation resulted in a list of six IoT OS characteristics important for wireless, resource constrained and battery powered devices. Furthermore the evaluation highlights potential setbacks during the building process of a prototype system for such devices and it also explains what experiences that can be gained.The conclusion of this thesis contributes with experience related to IoT OS prototype construction and also an evaluation result with respect to the six IoT OS characteristics for constraint battery driven devices.
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Yu. "A Data-centric Internet of Things Framework Based on Public Cloud." Licentiate thesis, Linköpings universitet, Fysik, elektroteknik och matematik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159770.

Full text
Abstract:
The pervasive application of Internet of Things (IoT) has been seen in many aspects in human daily life and industrial production. The concept of IoT originates from traditional machine-to-machine (M2M) communications which aimed at solving domain-specific and applicationspecific problems. Today, the rapid progress of communication technologies, the maturation of Internet infrastructures, the continuously reduced cost of sensors, and emergence of more open standards, have witnessed the approaching of the expected IoT era, which envisions full connectivity between the physical world and the digital world via the Internet protocol. The popularity of cloud computing technology has enhanced this IoT transform, benefiting from the superior computing capability and flexible data storage, let alone the security, reliability and scalability advantages. However, there are still a series of obstacles confronted by the industry in deployment of IoT services. First, due to the heterogeneity of hardware devices and application scenarios, the interoperability and compatibility between link-layer protocols, sub-systems and back-end services are significantly challenging. Second, the device management requires a uniform scheme to implement the commissioning, communication, authorization and identity management to guarantee security. Last, the heterogeneity of data format, speed and storage mechanism for different services pose a challenge to further data mining. This thesis aims to solve these aforementioned challenges by proposing a data-centric IoT framework based on public cloud platforms. It targets at providing a universal architecture to facilitate the deployment of IoT services in massive IoT and broadband IoT categories. The framework involves three representative communication protocols, namely WiFi, Thread and Lo-RaWAN, to enable support for local, personal, and wide area networks. A security assessment taxonomy for wireless communications in building automation networks is proposed as a tool to evaluate the security performance of adopted protocols, so as to mitigate potential network flaws and guarantee the security. Azure cloud platform is adopted in the framework to provide device management, data processing and storage, visualization, and intelligent services, thanks to the mature cloud infrastructure and the uniform device model and data model. We also exhibit the value of the study by applying the framework into the digitalization procedure of the green plant wall industry. Based on the framework, a remote monitoring and management system for green plant wall is developed as a showcase to validate the feasibility. Furthermore, three specialized visualization methods are proposed and a neuron network-based anomaly detection method is deployed in the project, showing the potential of the framework in terms of data analytics and intelligence.
APA, Harvard, Vancouver, ISO, and other styles
14

Sylvan, Andreas. "Internet of Things in Surface Mount TechnologyElectronics Assembly." Thesis, KTH, Medieteknik och interaktionsdesign, MID, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209243.

Full text
Abstract:
Currently manufacturers in the European Surface Mount Technology (SMT) industry seeproduction changeover, machine downtime and process optimization as their biggestchallenges. They also see a need for collecting data and sharing information betweenmachines, people and systems involved in the manufacturing process. Internet of Things (IoT)technology provides an opportunity to make this happen. This research project gives answers tothe question of what the potentials and challenges of IoT implementation are in European SMTmanufacturing. First, key IoT concepts are introduced. Then, through interviews with expertsworking in SMT manufacturing, the current standpoint of the SMT industry is defined. The studypinpoints obstacles in SMT IoT implementation and proposes a solution. Firstly, local datacollection and sharing needs to be achieved through the use of standardized IoT protocols andAPIs. Secondly, because SMT manufacturers do not trust that sensitive data will remain securein the Cloud, a separation of proprietary data and statistical data is needed in order take a stepfurther and collect Big Data in a Cloud service. This will allow for new services to be offered byequipment manufacturers.
I dagsläget upplever tillverkare inom den europeiska ytmonteringsindustrin för elektronikproduktionsomställningar, nedtid för maskiner och processoptimering som sina störstautmaningar. De ser även ett behov av att samla data och dela information mellan maskiner,människor och system som som är delaktiga i tillverkningsprocessen.Sakernas internet, även kallat Internet of Things (IoT), erbjuder teknik som kan göra dettamöjligt. Det här forskningsprojektet besvarar frågan om vilken potential som finns samt vilkautmaningar en implementation av sakernas internet inom europeisk ytmonteringstillverkning avelektronik innebär. Till att börja med introduceras nyckelkoncept inom sakernas internet. Sedandefinieras utgångsläget i elektroniktillverkningsindustrin genom intervjuer med experter.Studien belyser de hinder som ligger i vägen för implementation och föreslår en lösning. Dettainnebär först och främst att datainsamling och delning av data måste uppnås genomanvändning av standardiserade protokoll för sakernas internet ochapplikationsprogrammeringsgränssnitt (APIer). På grund av att elektroniktillverkare inte litar påatt känslig data förblir säker i molnet måste proprietär data separeras från statistisk data. Dettaför att möjliggöra nästa steg som är insamling av så kallad Big Data i en molntjänst. Dettamöjliggör i sin tur för tillverkaren av produktionsmaskiner att erbjuda nya tjänster.
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Diliang. "Internet of Smart Wearable Things for Healthcare and Safety Management." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1585059497920229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Alkhabbas, Fahed. "Towards Emergent Configurations in the Internet of Things." Licentiate thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-7795.

Full text
Abstract:
The Internet of Things (IoT) is a fast-spreading technology that enables new types of services in several domains, such as transportation, health, and building automation. To exploit the potential of the IoT effectively, several challenges have to be tackled including the following ones. First, the proposed IoT visions provide a fragmented picture, leading to a lack of consensus about IoT systems and their constituents. A second set of challenges concerns the environment of IoT systems that is often dynamic and uncertain, e.g. devices can appear and be discovered at runtime as well as become suddenly unavailable. Additionally, the in- volvement of human users complicates the scene as people’s activities are not always predictable . The majority of existing approaches to en- gineer IoT systems rely on predefined processes to achieve users’ goals. Consequently, such systems have significant shortcomings in coping with dynamic and uncertain environments. To piece together the fragmented picture of IoT systems, we sys- tematically identified their characteristics by analyzing and synthesizing existing taxonomies. To address the challenges related to the IoT envir- onment and the involvement of human users, we used the concept of Emergent Configurations (ECs) to engineer IoT systems. An EC consists of a dynamic set of devices that cooperate temporarily to achieve a user goal. To realize this vision, we proposed novel approaches that enable users to achieve their goals by supporting the automated formation, en- actment, and self-adaptation of IoT systems.
APA, Harvard, Vancouver, ISO, and other styles
17

Huang, Guanglei, and Christensen Joacim Ahlin. "Harnessing the power of the Internet of Things : A Performance-impact model for Companies´adoption of the Internet of Things." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353860.

Full text
Abstract:
Every day, more and more devices are getting connected to the Internet and becoming what we know as the Internet of Things (IoT). In both commercial and industrial context, IoT plays a significant role in enabling automatisation and connectivity. For companies that want to become the innovation leader in their branch of industry, IoT is a useful method to gain competitive advantage where automatisation, predictive maintenance and connectivity can improve company’s performance. However, no research have been done from the perspective of an IoT-provider. How they can fully harness the power of IoT when they adopt it for their existing products or services? This study aim to investigate how a theoretical model would look like with the performance impact in focus when an innovation-driven company adopt IoT on their existing products. The research is conducted with a case study of a Swedish company in the heavy industry sector, which has successfully adapted IoT into their products. The empirical data was collected through documentation review and interview. This study results in a conceptual model that contains crucial factors which needs to be taken into consideration when adopting IoT. However, further research needs to be done, in order to verify this model as well as to be able to generalise the findings to cover innovation adoption in general.
APA, Harvard, Vancouver, ISO, and other styles
18

Resell, Joakim. "Internet of Things i 5G : En systematisk litteraturstudie av säkerhetsrisker för privatpersoner med Internet of Things-enheter i 5G-nätverk." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18718.

Full text
Abstract:
De senaste åren har Internet of Things-enheter fått en explosionsartad tillväxt och möjligheterna är oändliga för hur tillverkare kan öka vår livskvalitet genom internetuppkopplade objekt. Således har Internet of Things-enheter i olika former hittat sin plats i många personers hem och liv. Ännu större blir utvecklingsmöjligheterna då 5G-nätverket kommer implementeras i vårt samhälle inom snar framtid. 5G förväntas bidra med, i jämförelse med 4G, väldigt snabba dataöverföringshastigheter och nya teknologier. Syftet med Internet of Things-enheter är att på något sätt öka användares livskvalitet, men då de även är enkla måltavlor för angrepp riskerar dem att snarare försämra den för privatpersoner. Faktum är att antalet malware-angrepp ständigt ökar,och då särskilt mot Internet of Things-enheter. Då 5G bidrar med nya teknologier som låter enheter ha en direkt sammankopplad kommunikation och uppkoppling till internet lyfter det frågan huruvida det har en påverkan på privatpersoners informationssäkerhet. Detta arbete innefattar en systematisk litteraturstudie kring säkerhetsrisker för privatpersoner med Internet of Things-enheter i 5G-nätverk. Studiens resultat tyder på att Internet of Things-enheter i 5G-nätverk tillsammans bildar en farlig miljö för privatpersoner ur ett informationssäkerhetsperspektiv. Studiens resultat bidrar med en översikt bestående av sex säkerhetsrisker med Internet of Things-enheter i 5G-nätverk, sjutton sårbarheter som säkerhetsriskerna innefattar, dess konsekvenser samt huruvida säkerhetsriskerna och sårbarheterna innebär riskfaktorer gentemot privatpersoners konfidentialitet, integritet eller tillgänglighet.
In recent years, Internet of Things-devices have experienced explosive growth, and the possibilities are endless for how manufacturers can increase our quality of life through Internet-connected objects. Thus, Internet of Things devices in various forms have found their place in the homes and lives of many people. Even greater will the the development opportunities be as the 5G network will be implemented in our society in the near future. 5G is expected to contribute, in comparison with 4G, very fast data transferspeeds and new technologies. The purpose of Internet of Things-devices is to somehow increase the quality of life of users, but as they are also simple targets for attacks, they risk rather deteriorating it for individuals. In fact, the number of malware attacks is constantly increasing, especially against Internet of Things-devices. As 5G contributes new technologies that allow devices to have a direct interconnected communication and connection to the Internet, it raises the question of whether it has an impact on individuals' information security.This study includes a systematic literature review on security risks for individuals with Internet of Things-devices in 5G networks. The study's findings suggest that Internet ofThings-devices in 5G networks together create a dangerous environment for individuals from an information security perspective. The study's findings provide an overview of six security risks with Internet of Things-devices in 5G networks, seventeen vulnerabilities that include security risks, their consequences and whether the security risks and vulnerabilities involve risk factors against individuals' confidentiality, integrityor accessibility.
APA, Harvard, Vancouver, ISO, and other styles
19

Forsby, Filip. "Digital Certificates for the Internet of Things." Thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217120.

Full text
Abstract:
This thesis will investigate the possibility of developing a lightweight digitalcertificate solution for resource constrained embedded systems in 6LoWPANnetworks. Such systems are battery powered or energy harvesting devices whereit is crucial that energy consumption and memory footprints are as minimalas possible. Current solutions for digital certificates are found to be moredemanding than what is desirable and therefore an issue that needs to besolved.The solution that is proposed in this thesis is a profile for the X.509 cer-tificate standard for use with constrained devices and the Internet of Things(IoT). Furthermore, a compression mechanism is designed and implementedfor certificates following this X.509 profile.Results show that compressing certificates is a highly viable solution, de-spite the added complexity it brings.This new lightweight digital certificate solution will allow resource con-strained systems to be able to run for longer without being interrupted orneeding maintenance.
Denna avhandling undersöker möjligheten att utveckla lättviktslösning förinbyggda system med begränsade resurser i 6LoWPAN-nätverk. Eneheter isådanna system drivs på batteri och återvunnen energi från omgivningen därminimal energi- och minnesanvänding är avgörande. Nuvarande lösningar fördigitala certifikat anses vara mer krävande än önskvärt och det är därför ettproblem som behöver lösas.Lösningen som presenteras i denna avhandling är en profil för certifikatstan-darden X.509 för användning med begränsade enheter inom Internet of Things(IoT). Utöver det är en komprimeringsmekanism designad och implementeradför certifikat som följer denna X.509-profil.Resultat visar att det är högst genomförbart att komprimera certifikat,trots den ökade komoplexiteten det medför.Denna nya lösning för digitala certifikat tillåter resursbegränsade enheteratt köras längre utan att behöva avbrytas eller underhållas.
APA, Harvard, Vancouver, ISO, and other styles
20

Guo, Jia. "Trust-based Service Management of Internet of Things Systems and Its Applications." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/82854.

Full text
Abstract:
A future Internet of Things (IoT) system will consist of a huge quantity of heterogeneous IoT devices, each capable of providing services upon request. It is of utmost importance for an IoT device to know if another IoT service is trustworthy when requesting it to provide a service. In this dissertation research, we develop trust-based service management techniques applicable to distributed, centralized, and hybrid IoT environments. For distributed IoT systems, we develop a trust protocol called Adaptive IoT Trust. The novelty lies in the use of distributed collaborating filtering to select trust feedback from owners of IoT nodes sharing similar social interests. We develop a novel adaptive filtering technique to adjust trust protocol parameters dynamically to minimize trust estimation bias and maximize application performance. Our adaptive IoT trust protocol is scalable to large IoT systems in terms of storage and computational costs. We perform a comparative analysis of our adaptive IoT trust protocol against contemporary IoT trust protocols to demonstrate the effectiveness of our adaptive IoT trust protocol. For centralized or hybrid cloud-based IoT systems, we propose the notion of Trust as a Service (TaaS), allowing an IoT device to query the service trustworthiness of another IoT device and also report its service experiences to the cloud. TaaS preserves the notion that trust is subjective despite the fact that trust computation is performed by the cloud. We use social similarity for filtering recommendations and dynamic weighted sum to combine self-observations and recommendations to minimize trust bias and convergence time against opportunistic service and false recommendation attacks. For large-scale IoT cloud systems, we develop a scalable trust management protocol called IoT-TaaS to realize TaaS. For hybrid IoT systems, we develop a new 3-layer hierarchical cloud structure for integrated mobility, service, and trust management. This architecture supports scalability, reconfigurability, fault tolerance, and resiliency against cloud node failure and network disconnection. We develop a trust protocol called IoT-HiTrust leveraging this 3-layer hierarchical structure to realize TaaS. We validate our trust-based IoT service management techniques developed with real-world IoT applications, including smart city air pollution detection, augmented map travel assistance, and travel planning, and demonstrate that our trust-based IoT service management techniques outperform contemporary non-trusted and trust-based IoT service management solutions.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
21

Skytte, André, and Victor Olsson. "Framtidens teknikinformatör : Hur Internet of Things påverkar en arbetsroll." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-66810.

Full text
Abstract:
Ett teknikskifte mot Internet of Things (IoT) kan medföra förändringar både för företag och konsumenter i form av förändrade arbetsroller, nya sätt att producera innehåll och nya sätt att ta del av innehållet. Fokus i denna rapport har legat på vad detta innebär för tekniska skribenter. För att belysa detta problem har en undersökning utförts på ett fallföretag som specialiserar sig på att producera teknisk dokumentation och som börjat kolla närmre på IoT. Undersökningen ledde fram till slutsatsen att rollen som teknisk skribent inom en IoT-kontext kommer se annorlunda ut gentemot en teknisk skribent som skriver traditionellt. För att skriva teknisk dokumentation för IoT ställs högre krav på teknisk kompetens i form av grundläggande programmeringskunskap och ett objektorienterat tankesätt.
A technology change towards the Internet of Things (IoT) can lead to changes for both businesses and consumers in the form of changing work roles, new ways of producing content and new ways to share content. The focus of this report has been on what this means for technical writers. To highlight this problem, an investigation has been conducted at a case company specializing in producing technical documentation and which has begun to look closer at IoT. The investigation led to the conclusion that the role of technical writer within an IoT-context looks different from a technical writer who writes traditionally. To write technical documentation for IoT, higher demands are placed on technical competence in the form of basic programming skills and object-oriented thinking.
APA, Harvard, Vancouver, ISO, and other styles
22

Seekins, Ryan N. (Ryan Nicholas). "The Internet of things applied to command and control networks." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106263.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2016.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 92-96).
The number of people and things connected to the Internet continue growing at an exponential rate. This record setting growth along with the reduction in small sensor costs and machine learning enabled a concept called the Internet of Things (IoT) to thrive. With numerous applications in both commercial and government spaces, the IoT has the ability to transform any organizations network capabilities. The Air Force has a unique set of requirements centered on cyberspace superiority and the ability to command and control people and things. This paper leverages the traditional systems engineering "'V" model as a framework to develop and analyze a concept for an Air Force command and control network. Methods and tools such as stakeholder analysis, hierarchical control structures and object-process diagrams are used to develop the concept of operations, system architecture, and the preliminary design. The programs technology readiness is also assessed before outlining key milestones and deliverables required for transitioning the program forward in the acquisition life-cycle.
by Ryan N. Seekins.
S.M. in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
23

Dlamini, Nomusa Nomhle. "The potential use of the Internet of Things (IoT) in South African retail businesses." Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/27098.

Full text
Abstract:
Technology advancement has resulted in the creation of new paradigms such as the Internet of Things (IoT). The IoT is defined as the interconnectedness of devices or things through a path or network. The IoT is powered by Radio Frequency Identifiers (RFIDs), sensors, actuators, and the internet to enable an anytime, anyplace, with anything and anyone connection. The IoT is perceived as a major technological advancement in history, even though its enabling devices have been in existence for many years. The IoT is moving the digital world into an era where it will power billions of devices bringing about the transformation of products and services offered by businesses. The IoT is predicted to change business processes by the year 2020 while 33% of South African businesses are set to invest in the IoT in the next 3 years. Businesses that will invest in the devices or things that make up IoT are expected to gain more and grow exceptionally well when compared to other businesses in that same market that are not using the IoT. The IoT is changing the retail industry by providing new opportunities to businesses and its customers creating new efficiencies in the business structures resulting in the increase in revenue. The research took a subjective ontological stance with an interpretive view of reality using a deductive approach to theory employing the Technology Organisation Environment (TOE) Framework as a lens for the research. Data for this research was collected using a qualitative research approach using interviews as data collection method. For this research, heads of Information Technology (IT) were interviewed to answer the main research questions which included: 1. What is the potential use of IoT in South African retail businesses? 2. How can the South African retail environment potentially use IoT? 3. What are the potential benefits of using IoT in South African retail businesses? 4. What are the potential challenges of using IoT in South African retail businesses? The findings revealed that retail businesses in South Africa are potentially looking at using the IoT for business processes in the coming years. Currently, retail businesses are not extensively using IoT as the devices and things that power the IoT are not widely available in South Africa. Other barriers that limit uptake is the cost of IoT devices in South Africa and bandwidth. However, respondents stated that the benefits of the IoT outweigh its challenges. The data further revealed that the Return on Investment (ROI) in the IoT will not be realised immediately. Retail businesses are looking at using the IoT for internal business processes rather than customer interaction. Retailers believe that the South African environment is not ready for a fullyfleshed IoT structure such as Amazon Go or Monoprix as the average South African is not technologically savvy. These findings support the TOE Framework that assumes that the technology, organisation, and environment are the driving forces behind a decision to innovate technologically.
APA, Harvard, Vancouver, ISO, and other styles
24

Lubamba, Claude kakoko. "Internet-Of-Things for Cyber Healthcare (L0t4c): Information Dissemination, systems' Interoperability and security." University of the Western Cape, 2017. http://hdl.handle.net/11394/5875.

Full text
Abstract:
Magister Scientiae - MSc (Computer Science)
Cyber Healthcare is becoming one of the fastest growing industries in the world due to an increasing elderly population and a more health conscious word population. On the other hand, IoT devices are emerging from niche areas to provide new services that we could not fathom without the technological advances made in IoT and healthcare elds [1]. Wireless Sensor Networking (WSN) is a promising approach to cyber healthcare as it can enable real-time monitoring of patients and early detection of emergency conditions and diseases [2, 3]. However, there are a number of issues that need to be addressed in order to bene t from the cyber healthcare promises.
APA, Harvard, Vancouver, ISO, and other styles
25

King-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.

Full text
Abstract:
The phrase 'Internet of Things' refers to the pervasive instrumentation of physical objects with sensors and actuators, and the connection of those sensors and actuators to the Internet. These sensors and actuators are generally based on similar hardware as, and have similar capabilities to, wireless sensor network nodes. However, they operate in a completely different network environment: wireless sensor network nodes all generally belong to a single entity, whereas Internet of Things endpoints can belong to different, even competing, ones. This difference has profound implications for the design of security mechanisms in these environments. Wireless sensor network security is generally focused on defence against attack by external parties. On the Internet of Things, such an insider/outsider distinction is impossible; every entity is both an endpoint for legitimate communications, and a possible source of attack. We argue that that under such conditions, the centralised models that underpin current networking standards and protocols for embedded systems are simply not appropriate, because they require such an insider/outsider distinction. This thesis serves as an exposition in the design of decentralised security mechanisms, applied both to applications, which must perform access control, and networks, which must guarantee communications security. It contains three main contributions. The first is a threat model for Internet of Things networks. The second is BottleCap, a capability-based access control module, and an exemplar of decentralised security architecture at the application layer. The third is StarfishNet, a network-layer protocol for Internet of Things wireless networks, and a similar exemplar of decentralised security architecture at the network layer. Both are evaluated with microbenchmarks on prototype implementations; StarfishNet's association protocol is additionally validated using formal verification in the protocol verification tool Tamarin.
APA, Harvard, Vancouver, ISO, and other styles
26

Shakoori, Moghadam Monfared Shaghayegh. "Design and prototyping of indoor positioning systems for Internet-of-Things sensor networks." Doctoral thesis, Universite Libre de Bruxelles, 2021. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/316363.

Full text
Abstract:
Accurate indoor positioning of narrowband Internet-of-Things (IoT) sensors has drawn more attention in recent years. The introduction of Bluetooth Low Energy (BLE) technology is one of the latest developments of IoT and especially applicable for Ultra-Low Power (ULP) applications. BLE is an attractive technology for indoor positioning systems because of its low-cost deployment and reasonable accuracy. Efficient indoor positioning can be achieved by deducing the sensor position from the estimated signal Angle-of-Arrival (AoA) at multiple anchors. An anchor is a base station of known position and equipped with a narrowband multi-antenna array. However, the design and implementation of indoor positioning systems based on AoA measurements involve multiple challenges. The first part of this thesis mainly addresses the impact of hardware impairments on the accuracy of AoA measurements. In practice, the subspace-based algorithms such as Multiple Signal Classification (MUSIC) suffer from sensitivity to array calibration errors coming from hardware imperfections. A detailed experimental implementation is performed using a Software Defined Radio (SDR) platform to precisely evaluate the accuracy of AoA measurements. For this purpose, a new Over-the-Air (OTA) calibration method is proposed and the array calibration error is investigated. The experimental results are compared with the theoretical analysis. These results show that array calibration errors can cause some degrees of uncertainty in AoA estimation. Moreover, we propose iterative positioning algorithms based on AoA measurements for low capacity IoT sensors with high accuracy and fair computational complexity. Efficient positioning accuracy is obtained by iterating between the angle and position estimation steps. We first develop a Data-Aided Maximum a Posteriori (DA- MAP) estimator based on the preamble of the transmitted signal. DA-MAP estimator relies on the knowledge of the transmitted signal which makes it impractical for narrowband communications where the preamble is short. For this reason, a Non-Data- Aided Maximum a Posteriori (NDA-MAP) estimator is developed to improve the AoA accuracy. The iterative positioning algorithms are therefore classified as Data-Aided Iterative (DA-It) and Non-Data-Aided Iterative (NDA-It) depending on the knowledge of the transmitted signal that is used for estimation. Both numerical and experimental analyses are carried out to evaluate the performance of the proposed algorithms. The results show that DA-MAP and NDA-MAP estimators are more accurate than MUSIC. The results also show that DA-It comes very close to the performance of the optimal approach that directly estimates the position based on the observation of the received signal, known as Direct Position Estimation (DPE). Furthermore, the NDA-It algorithm significantly outperforms the DA-It because it can use a much higher number of samples; however, it needs more iterations to converge. In addition, we evaluate the computational savings achieved by the iterative schemes compared to DPE through a detailed complexity analysis. Finally, we investigate the performance degradation of the proposed iterative algorithms due to the impact of multipath and NLOS propagation in indoor environments. Therefore, we develop an enhanced iterative positioning algorithm with an anchor selection method in order to identify and exclude NLOS anchors. The numerical results show that applying the anchor selection strategy significantly improves the positioning accuracy in indoor environments.
Doctorat en Sciences de l'ingénieur et technologie
info:eu-repo/semantics/nonPublished
APA, Harvard, Vancouver, ISO, and other styles
27

Deserranno, Allen Ronald. "Enhancing the Internet of Things Architecture with Flow Semantics." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/7016.

Full text
Abstract:
Internet of Things (‘IoT’) systems are complex, asynchronous solutions often comprised of various software and hardware components developed in isolation of each other. These components function with different degrees of reliability and performance over an inherently unreliable network, the Internet. Many IoT systems are developed within silos that do not provide the ability to communicate or be interoperable with other systems and platforms. Literature exists on how these systems should be designed, how they should interoperate, and how they could be improved, but practice does not always consult literature. The work brings together a proposed reference architecture for the IoT and engineering practices for flow semantics found in existing literature with a commercial implementation of an IoT platform. It demonstrates that the proposed IoT reference architecture and flow-service-quality engineering practices when integrated together can produce a more robust system with increased functionality and interoperability. It shows how such practices can be implemented into a commercial solution, and explores the value provided to the system when implemented. This work contributes to the current understanding of how complex IoT systems can be developed to be more reliable and interoperable using reference architectures and flow semantics. The work highlights the value of integration of academic solutions with commercial implementations of complex systems.
APA, Harvard, Vancouver, ISO, and other styles
28

Aqeel, Muhammad. "Internet of Things : Systematic literature review of security and future research." Thesis, Uppsala universitet, Informationssystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420118.

Full text
Abstract:
The Internet of Things (IoT) is the network of billions of devices, people and services to Interconnect and exchange information and useful data. The IoT applications are highly affirming to increase the level of comfort, efficiency and automations for the user. The high level of security and privacy, authentication and recovery from the attacks is required to implement IoT automated world. In this thesis I am presenting an overview of IoT layer architecture and attacks regarding security from the layer’s perspective. In addition, this thesis will provide an overview to solve the security and privacy threats. Furthermore, this paper discusses the current state of research on IoT security requirements and future research directions with respect to IoT security and privacy, a detailed review of the security challenges and sources of threat in the IoT applications is presented. Finally, this thesis presents the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
29

Magnusson, Olof, and Mats Hurtig. "Post-Quantum Public Key Cryptography for the Internet of Things." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40459.

Full text
Abstract:
Recent progress in the field of quantum computers provide radically improved muscles to search and sort in lists, solve systems of equations and prime factorize – virtues that inflict an immediate threat to the most common systems for public key cryptography used in a vast proportion of today’s computer networks. NTRUEncrypt is a lattice-based cryptography system which inhibits quantum computers for breaking the algorithm in polynomial time. The cryptographic algorithm is one of the seventeen that passed the first round in the NIST Post-Quantum standardisation competition which serves an indication that this system is robust against the efforts from a cryptanalysist to compromise its security properties. With the development of a server and client application that is built using Python3 integrated with WolfSSL, the results obtained from the experiment show that the suggested model acquires the capabilities to overcome the quantum computers capacities, providing fast quantum-safe asymmetric encryption algorithm for TLS communication in smart homes. The handshake process with NTRUEncrypt and WolfSSL is proven to be significantly faster comparing to other algorithms tested.
APA, Harvard, Vancouver, ISO, and other styles
30

Vijay, Parag. "Evolution of Internet of Things go-to-market strategies for semiconductor companies." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/105321.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Systems Division, 2015.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 118-121).
Internet of Things (IoT) is being touted as the next wave of big opportunity. However, the picture does not seem to be very rosy for semiconductor vendors and chip suppliers who might find it difficult to make high revenues or gain a position of power to drive this market. There are several reasons for this: i. The IoT devices are made up of relatively less complex, low cost and low profit-margin chip components such as sensors, RF and microcontrollers ii. The IoT is not a single market, but an umbrella of fragmented markets with many different niche segments and lack of common standards, making it difficult for companies to decide what they are going to do and which segments and opportunities they want to focus iii. High value and importance is given to software and services in the IoT ecosystem iv. The steadily shifting of power from companies in the supply chain to service providers v. The continuing rising cost of semiconductor manufacturing vi. Increasing SoC design landscape, rather than discreet components Most of the semiconductor companies are not realizing this and, thus, they don't have a go-to-market strategy for IoT in place, even after making a decision to enter the market. The thesis aims at identifying the major IoT trends that will determine the prospects for semiconductor companies. In addition, it tries to answer the questions regarding how and where they can add value to this market and, in return, create a sustainable competitive advantage, or maximum ROI, for themselves. In more details, the thesis will address some of the secondary questions as follows: i. Why having a IoT strategy is so important for semiconductor companies? ii. Who are the different players in the IoT ecosystem? iii. How is evolution of hardware capabilities, as well as other technologies including software and firmware, happened and happening in the IoT space? iv. In the tough economic situations, how can semiconductor manufacturing companies capture more value?
by Parag Vijay.
S.M. in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
31

Ghiselli, Nicola. "Edge-to-Cloud Service Migration in Constrained Internet of Things Scenarios." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018.

Find full text
Abstract:
In this thesis we will treat the Edge-to-Cloud services in the mobile Internet of Things context. Edge-to-Cloud services are services that, up to reach their goals, must run partially on the Cloud and partially on the Edge. This scenario has been chosen for two reasons: it is a very hop-topic nowadays, but these technologies have many treats and weakness to be solved. To refine those problems we considered some Edge-to-Cloud services and so by using some Cloud resources together with other resources, available on the IoT devices. In particular, to use Edge-to-Cloud services, we will move some resources from the Cloud to the device and so, Edge-to-Cloud service can also help the developer to make the deployment of his applications and this is an important feature in the IoT context. In this work our intent will be to make a support system for the developers and for the applications that helps to handle all the application life-cycle, offering a solution that will behave as a Middleware and so that is able to offer some service to the final applications in an almost transparent way. Between al the possible services, we focused our attention in the Migration services and so those services that allow to migrate the requests or application components. To do that we decided to split the applications in components, giving the possibility to the support system on the device to intercept the communication messages between the components. After having intercepted a message, the support system must autonomously take a decision for the application and it must decide if use a Cloud or a local resource to complete the task. Moreover, in most cases, this scenario is a constrained scenario, where the constrain are given by the application requirements. Up to offer a support system that will be more general as possible, we will introduce some user policies, by which the user will give some guidelines to the Edge-to-Cloud support system behavior.
APA, Harvard, Vancouver, ISO, and other styles
32

Björkdahl, Elin, and Julia Stadler. "INTERNET OF THINGS INOM DRIFT OCH UNDERHÅLL I FÖRVALTNINGSSKEDET." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Byggnadsteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-36445.

Full text
Abstract:
Abstract Purpose: This work presents Internet of Things or IoT in facility management; operation and maintenance. One of the many functions of IoT is making “smart” building components, which can communicate when they break and can be controlled from a distance. Today there are many articles on how you can use IoT in buildings but not as many on how you can use it in operation and maintenance of real estates. Therefore, the aim of this thesis is to investigate the possibilities of IoT in facility management; operation and maintenance work. This is investigated by the questions: (1) How can IoT be used in the facility management; operation andmaintenance work? (2) What are the savings in terms of workhours that can be made by using IoT in facility management; operation and maintenance work? (3) What is the attitude to IoT in the facility management industry? Method: The main strategy for this thesis is a case study in the facility section of the municipality in Jönköping. Approaches include interviews with IoT-consultants and employers at the facility section, document analysis of the workhours for different tasks of a operation technician and a literature study. Findings: The first question is answered by that IoT can be used for almost everything because of the huge amount of sensor types and that new ones are constantly in the making. You can also make unique IoT systems which contributes to the flexibility.The limits today are costs and finding value in the collected data. The second question is answered by that saving possibilities exists. Calculations are made based on attitudes from respondents and what they think are possible savings.This results in savings of about 13 000 workhours/year out of 30 000 workhours/year which equals 40 %. The third question is answered by that both employers at the facility section and IoT-consultants find IoT in facility management interesting. Of the different work-categories, it is interesting to mention that the most positive are the real estate managers and the maintenance engineers and the least positive are the operation technicians. Implications: Conclusions made are that the possibilities of IoT in facility management; operation and maintenance are many. In the future, a lot of savings of workhours can be made by using IoT. Since interest in IoT exists at the facility-section future studies should explore the costs of different IoT-systems. If the municipality of Jönköping chooses to implement IoT in their facilities they can become a role model for other facility managers. Limitations: The limitations in this work are the different costs of IoT-products and how the IoT-systems are built. The work tasks investigated include only supervision-tasks.
Sammanfattning Syfte: Detta arbete behandlar Internet of Things eller IoT inom drift och underhåll i förvaltningsskedet. IoT handlar bl.a. om “smarta” byggnadskomponenter som kan meddela när de går sönder samt att man kan styra dessa på avstånd. Det finns många tidigare undersökningar kring hur man kan använda IoT i byggnader men inte särskilt många undersökningar på hur detta kan användas inom just drift och underhållsarbetet med fastigheter. Därför är målet med detta arbete att utreda möjligheterna till användning av Internet of Things inom drift och underhåll i förvaltningsskedet. Som i sin tur bryts ner i frågeställningarna: (1) Vilka användningsområden finns det för Internet of Things inom fastighetsförvaltning, avseende drift och underhåll? (2) Vilka besparingar i form av arbetstid skulle man kunna åstadkomma genom att tillämpa Internet of Things inom fastighetsförvaltning, avseende drift och underhåll? (3) Hur ser inställningen ut för tillämpning av Internet of Things i förvaltningsbranschen? Metod: Huvudstrategin för detta arbete är en Fallstudie på Fastighetsavdelningen, Jönköpings kommun. Tillvägagångssättet består av intervjuer med IoT-konsulter och med anställda på fastighetsavdelningen, dokumentanalys av enhetstider för olika arbetsuppgifter för drifttekniker i Jönköpings kommun samt litteraturstudie. Resultat: Den första frågeställningen besvaras att det mesta är möjligt med IoT då det finns en enorm mängd olika sensorer och det produceras ständigt nya sensortyper. Man kan även skräddarsy IoT-lösningar vilket bidrar till flexibiliteten i systemen. Det som sätter gränser för IoT i dagsläget är ekonomin samt att hitta värde i insamlade data. Frågeställning två visar att besparingsmöjligheter finns. Beräkningar är baserade på attityder hos respondenterna och vad de anser är rimliga besparingspotential. Detta resulterar i en besparing på ca 13 000 arbetstimmar/år av 30 000 arbetstimmar/år vilket är lika med 40 %. Den tredje frågeställningen ger resultatet att inställningen för att implementera IoT till arbetsuppgifter är överlag positiv hos både anställda på fastighetsavdelningen och IoT-konsulter. Av de olika yrkeskategorierna är det intressant att nämna att störst intresse ligger hos förvaltare och underhållsingenjörer och minst hos drifttekniker. Konsekvenser: Slutsatser dras att IoT kan effektivisera arbetet med drift och underhåll i förvaltningsskedet. Man kan komma att spara in mycket arbetstid genom att använda IoT. Eftersom intresse finns hos avdelningen borde man undersöka vidare vilka kostnader systemet kan komma att kosta om man skulle börja utrusta fastigheterna med sensorer etc. Vid en eventuell implementering kan Jönköpings kommun bli en förebild för andra förvaltare och hamna i framkant i teknikutvecklingen. Begränsningar: Avgränsningarna i detta arbete är kostnader för IoT-produkter och hur systemen i detalj är uppbyggda. De arbetsuppgifter som undersöks i detta arbete är tillsynsuppgifter.
APA, Harvard, Vancouver, ISO, and other styles
33

Tägt, Daniel, and Erik Wijnbladh. "Informationssäkerhet inom Internet of Things, vad finns det för behov av en standard? : En kvalitativ studie om utvecklarnas syn på behovet av en standard inom Internet of Things." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-72501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Giachin, Marco. "Integrazione tra Blockchain e Internet of Things: Implementazione, Sviluppo e Analisi." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22330/.

Full text
Abstract:
Negli ultimi anni la tecnologia blockchain si è distinta sia per i risultati portati nel campo dello scambio di valore digitale, tramite le criptovalute, sia per la possibilità di utilizzarla come alternativa ai tradizionali strumenti di memorizzazione delle informazioni. Una peculiarità della tecnologia blockchain infatti è quella di conservare le informazioni in “blocchi”, collegati gli uni agli altri tramite tecniche crittografiche; il risultato di questa particolare struttura dati è la possibilità di tracciare tutta la storia di un dato e i suoi scambi, arrivando al punto in cui è stato inserito all’interno del sistema. Contemporaneamente allo sviluppo della tecnologia blockchain l’IoT ha trovato campo di applicazione in una quantità enorme di applicazioni industriali, al fine di effettuare il monitoraggio e il controllo da remoto o automatico di sistemi elettronici. I dispositivi IoT sono fondamentali per lo sviluppo delle cosiddette smart cities, poiché abilitano l’automazione di tipologie di azioni e controlli che normalmente dovevano essere realizzati in maniera manuale. La commistione delle due tecnologie sopracitate ha preso il nome di Blockchain of Things (BCoT), e rappresenta l’ultima evoluzione dello scambio informativo tra dispositivi IoT, che sono quindi in grado, oltre che di effettuare operazioni sull’ambiente, anche di certificare i dati raccolti in maniera automatica tramite la blockchain e fornirli all’utente finale all’interno di un ledger decentralizzato (letteralmente “libro mastro”, termine inglese usato per indicare la struttura dati che sostiene una generica blockchain). Lo scopo di questo elaborato é quindi quello di proporre una soluzione general-purpose che faccia uso della tecnologia BCoT per rispondere ad un insieme di criticità trasversali e riscontrate in vari campi applicativi.
APA, Harvard, Vancouver, ISO, and other styles
35

Laya, Andrés. "The Internet of Things in Health, Social Care, and Wellbeing." Doctoral thesis, KTH, Radio Systems Laboratory (RS Lab), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-212548.

Full text
Abstract:
The Internet of Things (IoT) enables opportunities to remotely sense and control objects via communication networks. We study services based on connected devices and the collaboration they generate between the ICT and the Health, Social Care and Wellbeing (HSCWB) industries. In HSCWB, IoT can support a change from episodic treatments of illness to preventive care and wellbeing solutions. The IoT can be a supporter in cost efficient and high quality health care. The objective is to achieve healthier life years and more efficiency in health and social care. Even if the potential of IoT in HSCWB has been proven in pilot projects and small-scale solutions, the benefits and opportunities for many actors are still unclear. There is a research gap in studying the roles and business opportunities for market-driven technology-based solutions enabled by connected devices. The research approach separates technological and business domains. On the technology side, the focus is on advances in connectivity for IoT. We present the technical details on a limitation to support IoT devices in cellular networks. We quantify the limitations in the Random Access Channel of the LTE air interface to support IoT devices. Moreover, we propose the adaptation of an access mechanism to enable massive number of simultaneous access attempt in cellular networks. On the business side, we identify and present how the conditions of the health and social care structure in Sweden affect the establishment of IoT solutions in HSCWB. We then show how these conditions have generated three distinctive development patterns—to innovate within the public sector, to develop solutions in the private care sector, or to target the wellbeing sector to avoid regulatory setbacks. Based on these patterns, we look closer into study cases to show how business opportunities have been addressed from a business network perspective. When deploying an IoT service, not all critical challenges can be appreciated at a single firm level. Therefore, we rely on a network-level business model framework to analyze emerging IoT services in HSCWB. The findings suggest that IoT components can improve an existing service by automating internal working processes, or they can enable new value propositions and convenience to end users. In general terms, the collaboration can be used (i) to improve the efficiency of existing services in health and social care without an original intention to change the service offering, or (ii) to create novelty and differentiation, without affecting the internal logics of existing HSCWB services.

QC 20180828


IoT Ecosystems (VINNOVA)
COIN-SWEAT
MTC2020
M2MRISE
APA, Harvard, Vancouver, ISO, and other styles
36

Selvakumaran, Dinesh Kumar. "ENERGY-EFFICIENT AND SECURE HARDWARE FOR INTERNET OF THINGS (IoT) DEVICES." UKnowledge, 2018. https://uknowledge.uky.edu/ece_etds/132.

Full text
Abstract:
Internet of Things (IoT) is a network of devices that are connected through the Internet to exchange the data for intelligent applications. Though IoT devices provide several advantages to improve the quality of life, they also present challenges related to security. The security issues related to IoT devices include leakage of information through Differential Power Analysis (DPA) based side channel attacks, authentication, piracy, etc. DPA is a type of side-channel attack where the attacker monitors the power consumption of the device to guess the secret key stored in it. There are several countermeasures to overcome DPA attacks. However, most of the existing countermeasures consume high power which makes them not suitable to implement in power constraint devices. IoT devices are battery operated, hence it is important to investigate the methods to design energy-efficient and secure IoT devices not susceptible to DPA attacks. In this research, we have explored the usefulness of a novel computing platform called adiabatic logic, low-leakage FinFET devices and Magnetic Tunnel Junction (MTJ) Logic-in-Memory (LiM) architecture to design energy-efficient and DPA secure hardware. Further, we have also explored the usefulness of adiabatic logic in the design of energy-efficient and reliable Physically Unclonable Function (PUF) circuits to overcome the authentication and piracy issues in IoT devices. Adiabatic logic is a low-power circuit design technique to design energy-efficient hardware. Adiabatic logic has reduced dynamic switching energy loss due to the recycling of charge to the power clock. As the first contribution of this dissertation, we have proposed a novel DPA-resistant adiabatic logic family called Energy-Efficient Secure Positive Feedback Adiabatic Logic (EE-SPFAL). EE-SPFAL based circuits are energy-efficient compared to the conventional CMOS based design because of recycling the charge after every clock cycle. Further, EE-SPFAL based circuits consume uniform power irrespective of input data transition which makes them resilience against DPA attacks. Scaling of CMOS transistors have served the industry for more than 50 years in providing integrated circuits that are denser, and cheaper along with its high performance, and low power. However, scaling of the transistors leads to increase in leakage current. Increase in leakage current reduces the energy-efficiency of the computing circuits,and increases their vulnerability to DPA attack. Hence, it is important to investigate the crypto circuits in low leakage devices such as FinFET to make them energy-efficient and DPA resistant. In this dissertation, we have proposed a novel FinFET based Secure Adiabatic Logic (FinSAL) family. FinSAL based designs utilize the low-leakage FinFET device along with adiabatic logic principles to improve energy-efficiency along with its resistance against DPA attack. Recently, Magnetic Tunnel Junction (MTJ)/CMOS based Logic-in-Memory (LiM) circuits have been explored to design low-power non-volatile hardware. Some of the advantages of MTJ device include non-volatility, near-zero leakage power, high integration density and easy compatibility with CMOS devices. However, the differences in power consumption between the switching of MTJ devices increase the vulnerability of Differential Power Analysis (DPA) based side-channel attack. Further, the MTJ/CMOS hybrid logic circuits which require frequent switching of MTJs are not very energy-efficient due to the significant energy required to switch the MTJ devices. In the third contribution of this dissertation, we have investigated a novel approach of building cryptographic hardware in MTJ/CMOS circuits using Look-Up Table (LUT) based method where the data stored in MTJs are constant during the entire encryption/decryption operation. Currently, high supply voltage is required in both writing and sensing operations of hybrid MTJ/CMOS based LiM circuits which consumes a considerable amount of energy. In order to meet the power budget in low-power devices, it is important to investigate the novel design techniques to design ultra-low-power MTJ/CMOS circuits. In the fourth contribution of this dissertation, we have proposed a novel energy-efficient Secure MTJ/CMOS Logic (SMCL) family. The proposed SMCL logic family consumes uniform power irrespective of data transition in MTJ and more energy-efficient compared to the state-of-art MTJ/ CMOS designs by using charge sharing technique. The other important contribution of this dissertation is the design of reliable Physical Unclonable Function (PUF). Physically Unclonable Function (PUF) are circuits which are used to generate secret keys to avoid the piracy and device authentication problems. However, existing PUFs consume high power and they suffer from the problem of generating unreliable bits. This dissertation have addressed this issue in PUFs by designing a novel adiabatic logic based PUF. The time ramp voltages in adiabatic PUF is utilized to improve the reliability of the PUF along with its energy-efficiency. Reliability of the adiabatic logic based PUF proposed in this dissertation is tested through simulation based temperature variations and supply voltage variations.
APA, Harvard, Vancouver, ISO, and other styles
37

Thiagarajan, Darshini. "Analysis of the current state of Industrial Internet of Things (IIoT) adoption." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107361.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2016.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 98-100).
Smart, connected devices are becoming an integral part of our lives, bridging the communication between human-to-machine and machine-to-machine interactions. The potential socioeconomic impact of the Internet of Things (loT) in the Industrials space is forecasted to be huge. These connected devices will result in a significant increase in the overall complexity of systems. While the rate of loT adoption by Industrials is on the rise, a lot of uncertainty remains with regards to the readiness of organizations and the impact of adoption. This could be due to lack of vision from leadership, lack of resources, and also lack of capabilities required for successful adoption. The goal of this thesis is to enable organizations to position themselves well for Industrial loT adoption. This thesis analyzes the current state of Industrial loT adoption by viewing Industrial organizations adopting loT as complex systems. The research consists of an analysis and synthesis of quantitative and qualitative data from organizations around the world, of existing theory, of recent industry research along with the application of systems thinking techniques. The outcome of the thesis is a framework for successful Industrial loT adoption. The research findings reveal several significant implications for managers and leaders of Industrial organizations and the need to employ systems thinking for understanding Industrial loT organizations.
by Darshini Thiagarajan.
S.M. in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
38

Björkman, Anna. "Nyttan med Internet of Things i Offentliga Verksamheter : Att identifiera nyttor, fördelar och utmaningar." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75398.

Full text
Abstract:
Internet of Things (IoT) är ett hett ämne i dagens samhälle då inte bara saker utan även människor kan kopplas upp mot nätet. För verksamheter ses stora fördelar med att använda sig av tekniken i syfte att ligga i framkant och bli effektivare i sina arbetsprocesser. Denna studie fördjupar sig i vilka identifierade nyttor, fördelar och utmaningar som finns samt om det verkligen finns behov av Internet of Things i verksamheter. Studien utgår ifrån en av Region Skånes förvaltningar, Regionservice, som befinner sig på en omfattande digitaliseringsresa av att implementera en ny systemlösning. De intervjuer som gjorts med anställda inom förvaltningen har varit i huvudsakligt syfte att skapa en förståelse för hur den nya systemlösningen kommer att fungera samt deras tankar om att använda Internet of Things. Tillsammans med studiens teori, som fokuserat på nyttor, fördelar och utmaningar med IoT, avslutas studien med en slutsats som är grundad i teorin och den empiriska undersökningen på Regionservice. I slutsatsen presenteras egna åsikter och tankar om hur IoT kommer att bidra med något behov och nytta inom verksamheterna samt vilken påverkan och utmaningar som kan uppstå.
APA, Harvard, Vancouver, ISO, and other styles
39

Butt, Talal A. "Provision of adaptive and context-aware service discovery for the Internet of Things." Thesis, Loughborough University, 2014. https://dspace.lboro.ac.uk/2134/14083.

Full text
Abstract:
The IoT concept has revolutionised the vision of the future Internet with the advent of standards such as 6LoWPAN making it feasible to extend the Internet into previously isolated environments, e.g., WSNs. The abstraction of resources as services, has opened these environments to a new plethora of potential applications. Moreover, the web service paradigm can be used to provide interoperability by offering a standard interface to interact with these services to enable WoT paradigm. However, these networks pose many challenges, in terms of limited resources, that make the adaptability of existing IP-based solutions infeasible. As traditional service discovery and selection solutions demand heavy communication and use bulky formats, which are unsuitable for these resource-constrained devices incorporating sleep cycles to save energy. Even a registry based approach exhibits burdensome traffic in maintaining the availability status of the devices. The feasible solution for service discovery and selection is instrumental to enable the wide application coverage of these networks in the future. This research project proposes, TRENDY, a new compact and adaptive registry-based SDP with context awareness for the IoT, with more emphasis given to constrained networks, e.g., 6LoWPAN It uses CoAP-based light-weight and RESTful web services to provide standard interoperable interfaces, which can be easily translated from HTTP. TRENDY's service selection mechanism collects and intelligently uses the context information to select appropriate services for user applications based on the available context information of users and services. In addition, TRENDY introduces an adaptive timer algorithm to minimise control overhead for status maintenance, which also reduces energy consumption. Its context-aware grouping technique divides the network at the application layer, by creating location-based groups. This grouping of nodes localises the control overhead and provides the base for service composition, localised aggregation and processing of data. Different grouping roles enable the resource-awareness by offering profiles with varied responsibilities, where high capability devices can implement powerful profiles to share the load of other low capability devices. Thus, it allows the productive usage of network resources. Furthermore, this research project proposes APPUB, an adaptive caching technique, that has the following benefits: it allows service hosts to share their load with the resource directory and also decreases the service invocation delay. The performance of TRENDY and its mechanisms is evaluated using an extensive number of experiments performed using emulated Tmote sky nodes in the COOJA environment. The analysis of the results validates the benefit of performance gain for all techniques. The service selection and APPUB mechanisms improve the service invocation delay considerably that, consequently, reduces the traffic in the network. The timer technique consistently achieved the lowest control overhead, which eventually decreased the energy consumption of the nodes to prolong the network lifetime. Moreover, the low traffic in dense networks decreases the service invocations delay, and makes the solution more scalable. The grouping mechanism localises the traffic, which increases the energy efficiency while improving the scalability. In summary, the experiments demonstrate the benefit of using TRENDY and its techniques in terms of increased energy efficiency and network lifetime, reduced control overhead, better scalability and optimised service invocation time.
APA, Harvard, Vancouver, ISO, and other styles
40

Zeitz, Kimberly Ann. "Cybersecurity for the Internet of Things: A Micro Moving Target IPv6 Defense." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/102446.

Full text
Abstract:
As the use of low-power and low-resource embedded devices continues to increase dramatically with the introduction of new Internet of Things (IoT) devices, security techniques are necessary which are compatible with these devices. This research advances the knowledge in the area of cybersecurity for the IoT through the exploration of a moving target defense to apply for limiting the time attackers may conduct reconnaissance on embedded systems while considering the challenges presented from IoT devices such as resource and performance constraints. We introduce the design and optimizations for µMT6D, a Micro-Moving Target IPv6 Defense, including a description of the modes of operation and use of lightweight hash algorithms. Through simulations and experiments µMT6D is shown to be viable for use on low power and low resource embedded devices in terms of footprint, power consumption, and energy consumption increases in comparison to the given security benefits. Finally, this provides information on other future considerations and possible avenues of further experimentation and research.
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
41

Karpf, Brandon Allan. "Dead reckoning : where we stand on privacy and security controls for the Internet of Things." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/111231.

Full text
Abstract:
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2017.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 201-218).
This thesis provides an analysis of privacy and security controls for internet-connected data-driven systems, known as the Internet of Things (IoT). The grounding theory is that numerous pre-existing privacy and security control methods -- not necessarily crafted for IoT -- will bear on the future of IoT privacy and security. This thesis covers fifteen case studies across six different control categories: Individual Choice, Command and Control Regulations, Operational Standards, Technical Standards, Compliance Frameworks, and Federal Authorities. These case studies reveal major deficiencies in current IoT privacy and security controls. IoT privacy and security controls lack a domain or contextual-use focus. Further, most current controls also fail to specify the risks or harms they intend to resolve. Therefore, the current IoT privacy and security controls induce a significant privacy and security market failure. This market failure is evident in recent IoT privacy and security events such as the Federal Trade Commission's cases against the IoT system developers TRENDnet and D-Link. I define three necessary paradigm shifts needed to improve IoT privacy and security controls. I also recommend a specific research endeavor to develop domain-, risk-, and harms-centric privacy and security standards. The realization of these paradigm shifts, and the products from this research endeavor, will navigate the IoT ecosystem towards more effective privacy and security control.
by Brandon Allan Karpf.
S.M. in Technology and Policy
APA, Harvard, Vancouver, ISO, and other styles
42

Jedda, Ahmed. "Distributed Algorithms for Networks Formation in a Scalable Internet of Things." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/30979.

Full text
Abstract:
The Internet of Things (IoT) is a vision that aims at inter-connecting every physical identifiable object (or, a thing) via a global networking infrastructure (e.g., the legacy Internet). Several architectures are proposed to realize this vision; many of which agree that the IoT shall be considered as a global network of networks. These networks are used to manage wireless sensors, Radio Frequency IDentification (RFID) tags, RFID readers and other types of electronic devices and integrate them into the IoT. A major requirement of the IoT architectures is scalability, which is the capability of delivering high performance even if the input size (e.g., number of the IoT objects) is large. This thesis studies and proposes solutions to meet this requirement, and specifically focuses on the scalability issues found in the networks of the IoT. The thesis proposes several network formation algorithms to achieve these objectives, where a network formation algorithm is an algorithm that, if applied to a certain network, optimizes it to perform its tasks in a more efficient manner by virtually deleting some of its nodes and/or edges. The thesis focuses on three types of networks found in the IoT: 1) RFID readers coverage networks; whose main task is to cover (i.e., identify, monitor, track, sense) IoT objects located in a given area, 2) readers inter-communications networks; whose main task is to guarantee that their nodes are able to inter-communicate with each other and hence use their resources more efficiently (the thesis specifically considers inter-communication networks of readers using Bluetooth for communications), and 3) Object Name Systems (ONS) which are networks of several inter-connected database servers (i.e., distributed database) whose main task is to resolve an object identifier into an Internet address to enable inter-communication via the Internet. These networks are chosen for several reasons. For example, the technologies and concepts found in these networks are among the major enablers of the IoT. Furthermore, these networks solve tasks that are central to any IoT architecture. Particularly, the thesis a) studies the data and readers redundancy problem found in RFID readers coverage networks and introduces decentralized RFID coverage and readers collisions avoidance algorithms to solve it, b) contributes to the problem of forming multihop inter-communications networks of Bluetooth-equipped readers by proposing decentralized time-efficient Bluetooth Scatternet Formation algorithms, and c) introduces a geographic-aware ONS architecture based on Peer-To-Peer (P2P) computing to overcome weaknesses found in existing ONS architectures.
APA, Harvard, Vancouver, ISO, and other styles
43

Wallin, Fredrik. "Distributed Communication for Streetlight Systems : A decentralized solution." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191133.

Full text
Abstract:
Streetlights are usually lit during all dark hours even though vehicles or other objects are not using the road. Instead of wasting energy on keeping the streetlights lit when no vehicles are using the road, the streetlights should be lit whenever vehicles are in proximity of the streetlights and turned off otherwise. A distributed network can be used to handle the communication between streetlights for sharing information about vehicles in proximity. There are streetlight systems that adapt from the environment and handles communication but are still not optimized for country roads with low frequency of vehicles. Therefore, distributed communication for streetlight systems is implemented, by letting the streetlights be a part of a distributed system. Each streetlight is represented with a Zolertia RE-Mote, a sensor for detecting objects and an LED. The representation of the streetlights are wirelessly connected as a mesh network where they can communicate with each other and forward data packets to nodes more far away in the network. The concept of having the streetlights in a distributed system is believed to work and can be considered to be applied on streetlights at country roads to save energy.
Gatlyktor är oftast tända under alla timmar då det är mörkt ute, även fast det inte är något fordon eller annat objekt som använder vägen. Istället för att slösa energi på att ha gatlyktorna tända när det inte är några fordon som använder vägen, bör gatlyktorna vara tända när fordon är i närheten av dem och släckta annars. Ett distribuerat nätverk kan användas för att hantera kommunikationen mellan gatlyktor till att dela information om fordon i närheten. Det finns gatlyktsystem som anpassar efter miljön och hanterar kommunikationen, men är inte optimerat för landsvägar med låg trafik. Därför är distribuerad kommunikation för gatlyktsystem implementerat genom att låta gatlyktorna vara en del av ett distribuerat system. Varje gatlykta är representerad med en Zolertia RE-Mote, en sensor för detektering av objekt och en LED. Representationen är trådlöst kopplat som ett meshnätverk där de kan kommunicera med varandra och skicka vidare datapaket till noder längre bort i nätverket. Konceptet att ha gatlyktorna i ett distribuerat system tros fungera och kan tänkas att appliceras på gatlyktor på landsvägar för att spara energi.
APA, Harvard, Vancouver, ISO, and other styles
44

Ciftler, Bekir Sait. "Wireless Positioning and Tracking for Internet of Things in GPS-denied Environments." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3377.

Full text
Abstract:
Wireless positioning and tracking have long been a critical technology for various applications such as indoor/outdoor navigation, surveillance, tracking of assets and employees, and guided tours, among others. Proliferation of Internet of Things (IoT) devices, the evolution of smart cities, and vulnerabilities of traditional localization technologies to cyber-attacks such as jamming and spoofing of GPS necessitate development of novel radio frequency (RF) localization and tracking technologies that are accurate, energy-efficient, robust, scalable, non-invasive and secure. The main challenges that are considered in this research work are obtaining fundamental limits of localization accuracy using received signal strength (RSS) information with directional antennas, and use of burst and intermittent measurements for localization. In this dissertation, we consider various RSS-based techniques that rely on existing wireless infrastructures to obtain location information of corresponding IoT devices. In the first approach, we present a detailed study on localization accuracy of UHF RF IDentification (RFID) systems considering realistic radiation pattern of directional antennas. Radiation patterns of antennas and antenna arrays may significantly affect RSS in wireless networks. The sensitivity of tag antennas and receiver antennas play a crucial role. In this research, we obtain the fundamental limits of localization accuracy considering radiation patterns and sensitivity of the antennas by deriving Cramer-Rao Lower Bounds (CRLBs) using estimation theory techniques. In the second approach, we consider a millimeter Wave (mmWave) system with linear antenna array using beamforming radiation patterns to localize user equipment in an indoor environment. In the third approach, we introduce a tracking and occupancy monitoring system that uses ambient, bursty, and intermittent WiFi probe requests radiated from mobile devices. Burst and intermittent signals are prominent characteristics of IoT devices; using these features, we propose a tracking technique that uses interacting multiple models (IMM) with Kalman filtering. Finally, we tackle the problem of indoor UAV navigation to a wireless source using its Rayleigh fading RSS measurements. We propose a UAV navigation technique based on Q-learning that is a model-free reinforcement learning technique to tackle the variation in the RSS caused by Rayleigh fading.
APA, Harvard, Vancouver, ISO, and other styles
45

Ebrahiem, Waleed, and Naveed Arif. "Internet of Things : How vendors can use IoT to achieve value creation." Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-144582.

Full text
Abstract:
The IoT (Internet of Things) is developing rapidly, as a result of that, the number of connected devices in Sweden has doubled every year. According to big companies like Ericsson, the estimated number of connected devices worldwide will be 50 billion in 2020. IoT, by itself, may be a relatively simple concept of connected devices and machines, but its implications are profound. For companies in Sweden which offer a broad range of non-connected tools and products, it is becoming increasingly important to adapt their products to IoT; adherence to IoT will warrant new developments which offer value-added services such as monitoring and remote control, etc. The primary research method employed for this thesis is a case study at a vendor company who today offers their customers non-connected tools. To be able to demonstrate the concept of IoT enhanced tools we create a conceptual framework and a prototype, which we present to our interviewees and use as a starting point for qualitative interviews. In this thesis, we want to know how vendors could benefit themselves by the use of IoT in their businesses. We formulated some research questions, being, based on a vendor’s perspective: why do they (vendors) need connected products; how can such products be made marketable to the customer; and what are the predicted benefits of IoT-connected products for the customers? The case study brings to light some issues dealing with the business model, service providing, data display and data security which every company should take into consideration before implementing IoT.
APA, Harvard, Vancouver, ISO, and other styles
46

Santhana, Krishnan Archanaa. "Surplus and Scarce Energy: Designing and Optimizing Security for Energy Harvested Internet of Things." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83450.

Full text
Abstract:
Internet of Things require a continuous power supply for longevity and energy harvesting from ambient sources enable sustainable operation of such embedded devices. Using selfpowered power supply gives raise two scenarios, where there is surplus or scarce harvested energy. In situations where the harvester is capable of harvesting beyond its storage capacity, the surplus energy is wasted. In situations where the harvester does not have sufficient resources, the sparse harvested energy can only transiently power the device. Transiently powered devices, referred to as intermittent computing devices, ensure forward progress by storing checkpoints of the device state at regular intervals. Irrespective of the availability of energy, the device should have adequate security. This thesis addresses the security of energy harvested embedded devices in both energy scenarios. First, we propose precomputation, an optimization technique, that utilizes the surplus energy. We study two cryptographic applications, namely bulk encryption and true random number generation, and we show that precomputing improves energy efficiency and algorithm latency in both applications. Second, we analyze the security pitfalls in transiently powered devices. To secure transiently powered devices, we propose the Secure Intermittent Computing Protocol. The protocol provides continuity to underlying application, atomicity to protocol operations and detects replay and tampering of checkpoints. Both the proposals together provide comprehensive security to self-powered embedded devices.
Master of Science
Internet of Things(IoT) is a collection of interconnected devices which collects data from its surrounding environment. The data collected from these devices enable emerging technologies like smart home and smart cities, where objects are controlled remotely. With the increase in the number of such devices, there is a demand for self-powered devices to conserve electrical energy. Energy harvesters are suitable for this purpose because they convert ambient energy into electrical energy to be stored in an energy buffer, which is to be used when required by the device. Using energy harvesters as power supply presents us with two scenarios. First, when there is sufficient ambient energy, the surplus energy, which is the energy harvested beyond the storage capacity of the buffer, is not consumed by the device and thus, wasted. Second, when the harvested energy is scarce, the device is forced to shutdown due to lack of power. In this thesis, we consider the overall security of an energy harvested IoT device in both energy scenarios. We optimize cryptographic algorithms to utilize the surplus energy and design a secure protocol to protect the device when the energy is scarce. Utilizing both the ideas together provides adequate security to the Internet of Things.
APA, Harvard, Vancouver, ISO, and other styles
47

Badokhon, Alaa. "An Adaptable, Fog-Computing Machine-to-Machine Internet of Things Communication Framework." Case Western Reserve University School of Graduate Studies / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=case1492450137643915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Alam, Kazi Masudul. "Towards Cloud-based Vehicular Cyber-physical Systems." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36227.

Full text
Abstract:
We are living in the age of information technology, where we are fully occupied with the revolutionary innovations of the last few decades such as the Internet, mobile devices, wireless communications, social networks, wearables, cloud computing, etc. While these technologies have become integral part of our daily life, we are now anxiously waiting to embrace Internet-of-Things (IoT), intelligent digital assistants, driver-less cars, drone deliveries, virtual reality, and smart city applications. Recently, research community is demonstrating increasing interests about Cyber-Physical Systems (CPS) that resides in the cross-section of embedded systems, network communications, and scalable distributed infrastructures. The main responsibility of a CPS is to collect sensory data about the physical world and to inform the computation module using communication technologies that processes the data, identifies important insights and notifies back using a feedback loop. These notifications can however be control commands to reconfigure the physical world. Such a setup is a useful method to deploy smart city applications. In this dissertation, we keep our focus onto the smart transport objective using vehicular CPS (VCPS) based systems organization. We have compiled this dissertation with our research contributions in this growing field of VCPS. One of our key contributions in this field is an architecture reference model for the cloud-based CPS, C2PS, where we analytically describe the key properties of a CPS: computation, communication and control, while integrating cloud features to it. We have identified various types of computation and interaction modes of this paradigm as well as describe Bayesian network and fuzzy logic based smart connection to select a mode at any time. It is considered that the true adoption of CPS is only possible through the deployment of the IoT systems. Thus, it is important to have IoT as a foundation in the CPS architectures. Our next contribution is to leverage existing Vehicular Adhoc Network (VANET) technologies and map them with the standard IoT-Architecture reference model to design the VCPS, Social Internet-of-Vehicles (SIoV). In this process, we have identified the social structures and system interactions among the subsystems involved in the SIoV. We also present a message structure to facilitate different types of SIoV interactions. The ability of dynamic reconfiguration in a C2PS is very appealing. We capture this feature in the VCPS by designing a model-based reconfiguration scheme for the SIoV, where we measure the data workloads of distinct subsystems involved in various types of SIoV interactions. We further use these models to design dynamic adaptation schemes for the subsystems involved in VCPS interactions. Our final contribution is an application development platform based on C2PS design technique that uses server-client based system communications. In this platform, server side is built using JAVA, client side uses Android, message communication uses JSON and every component has its own MySQL database to store the interactions. We use this platform to emulate and deploy SIoV related applications and scenarios. Such a platform is necessary to continue C2PS related research and developments in the laboratory environment.
APA, Harvard, Vancouver, ISO, and other styles
49

Johansson, Fredrik, and Martin Göthe. "Internet of Things, bekvämt, men säkert? : En studie kring säkerhetsaspekter inom IoT." Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-135063.

Full text
Abstract:
The new technological phenomenon Internet of Things (IoT) is steadily growing and has become more incorporated into our daily lives. The technology can be found in a variety of applications in today's society and has helped to simplify and streamline tasks and processes. Analysts estimate that the market for IoT could potentially be worth 11 billion dollars by 2025. Large technology corporations are spending a vast amount of money to promote their IoT products, but we are also seeing companies which normally are not associated with IT making an entrance to make their products connected. During the fall of 2016 media reported about a big security breach within the IoT that affected security cameras and forced them to commit denial of service attacks. This event led us to take a closer look at the IoT and the security around the products. The aim of this study is to investigate how developers and security experts working with IoT perceive the current state of security and the possible threats and risks we face when using the technology. For this study we have used a qualitative approach with semi-structured interviews. A total of eight interviews were conducted equally divided between developers and security experts. Our results show that a common denominator between the respondents' answers was that the lack of standardization and platforms for IoT-applications is a problem. However, a unified security solution is currently unattainable due to the vast number of platforms present in IoT today. Therefore, the use of a standard or platform does not guarantee security. Also, with the increasing popularity of IoT, products from developers without the proper knowledge is becoming a serious security concern for the IoT.
APA, Harvard, Vancouver, ISO, and other styles
50

Psyhojos, Marika A. "Aging, empathy, and the Internet of Things : a measure of physician readiness to treat older adults." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/111222.

Full text
Abstract:
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2017.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 146-156).
Aging is an increasingly disruptive force in the US -- nearly 1 in 5 Americans will be at least 65 years old by 2030. Largely due to the high incidence of chronic disease among older adults, health care spending is larger in magnitude for older adults than it is for any other age group. To treat older adults and reduce the prevalence of chronic disease more effectively and efficiently, health professionals may likely incorporate patient-generated health data (PGHD) from the Internet of Things (IoT). IoT devices can help providers to evaluate treatment options, compliance, and overall patient well-being. Critics of PGHD integration in the health care space cite challenges such as poor interoperability of devices and electronic health record systems, a lack of standards, a host of liability concerns, workflow interruptions, and a lack of reimbursement models. There is little research, however, that explores how the inclusion and analysis of PGHD may affect provider empathy and the physician-patient relationship. We were interested in understanding how the integration of wearables, smart devices, and other connected health devices would affect the physician-patient (or provider-patient) relationship and how those changes might affect both providers and patient health and well-being. We conducted two surveys, one of health care providers and one of patients, to understand current and expected uses of connected health devices to examine how the collection and analysis of PGHD will affect provider empathy and the physician-patient relationship. We subsequently examine across different age groups, how the provision of health care and individual health management is projected to change as a result of PGHD analysis. Finally, we evaluate the socio-technical barriers to connected health devices and discuss the entities which could successfully mitigate these barriers, as perceived by health care providers and patients.
by Marika A. Psyhojos.
S.M. in Technology and Policy
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography