To see the other types of publications on this topic, follow the link: Interner of Things.

Dissertations / Theses on the topic 'Interner of Things'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Interner of Things.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Martinsson, Albin Martinsson. "Embedded IoT for Eclipse Arrowhead." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85910.

Full text
Abstract:
This thesis investigates the possibility of connecting an embedded device, STM32 B-L4S5I-IOT01A IoT discovery node, to a Eclipse Arrowhead framework local cloud.This thesis also examines the benefits of using the Eclipse Arrowhead framework compared to its competitors Amazon Web Services and Microsoft Azure. The world is entering a new industrial revolution, often referred to as Industry 4.0, moving towards a more decentralized and software-oriented means of production.This fourth industrial revolution incorporates System of Systems, Cyber-Physical Systems, and embedded software technologies. One of the internet-based industrial solutions is the Eclipse Arrowhead framework. The Eclipse Arrowhead framework contains many examples in various promgramming languages and technologies but lacks an example of a specific piece of hardware connecting to a local Eclipse Arrowhead cloud.Therefore, a project with the clear intent to showcase both the capabilities and possibilities of Cyber-Physical systems and the Eclipse Arrowhead framework is needed. The system this thesis implements consists of three major parts: the stm32 board, a Python flask app, and the Eclipse Arrowhead framework.The main objective of the Eclipse Arrowhead framework is to connect the consumer and the provider in a safe and structured way.The provider is built with C/C++ using ARMs' mbed os.  The response time of the different frameworks, Eclipse Arrowhead framework and Amazon Web Services, was measured.We made a thousand attempts to form an adequate basis for an average response time. In addition to presenting the average response time, we calculated the maximum and minimum response times to understand the different frameworks' performance further.  The thesis shows some benefits in response time when running an Eclipse Arrowhead framework local cloud instead of using a remote service such as Amazon Web Services. Average response time decreased by 17.5 times while running an Eclipse Arrowhead framework local cloud.Maximum and minimum response times decreased by 1.9 and 134 times, respectively.
APA, Harvard, Vancouver, ISO, and other styles
2

Vitale, Clemente. "Internet of Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3184/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Piškula, David. "Internet of Things." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399196.

Full text
Abstract:
This thesis focuses on the Internet of Things and some of the most important problems it faces today. Among these are the overdependence on the Cloud and lack of autonomy, poor security and privacy, complicated initialization and power consumption. The work aims to implement a complex IoT solution that solves the discussed problems. The project is part of a collaboration with NXP Semicondutors and will be used to showcase the company's technologies.
APA, Harvard, Vancouver, ISO, and other styles
4

Costanzi, Elena. "Studio e progettazione di soluzioni di Thing Directory per scenari W3C Web of Things." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22884/.

Full text
Abstract:
Dopo aver analizzato l’Internet of Things (IoT) e il Web of Things (WoT), in particolar modo l'evoluzione, l'architettura e le criticità, si propone la realizzazione di un sistema di Thing Description Directory. La Thing Description Directory è un servizio di directory che permette la registrazione, la gestione e la ricerca di un database di Thing Description. Il sistema proposto permette di fornire all'utente uno strumento per visualizzare e gestire le Thing Description all'interno del database. Inoltre, la funzionalità di ricerca sintattica permette l'estrazione delle Thing Description, nella loro totalità o solo alcune parti, che soddisfano determinate richieste. Il sistema segue le specifiche fornite dal W3C presenti nel documento di WoT Discovery.
APA, Harvard, Vancouver, ISO, and other styles
5

Poggi, Giovanni. "Internet of Medical Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.

Find full text
Abstract:
In questa tesi, si partirà con un'introduzione generale all'Internet of Things focalizzando l'attenzione sulla struttura generale dell'architettura ed il suo funzionamento di base in una rete con molti altri dispositivi. Seguirà l'analisi del trend di questa tecnologia e la sua evoluzione nel tempo, con particolare attenzione all'architettura ed al suo successo ai giorni nostri. Verrà discussa l'industrializzazione che ha portato alla creazione delle Industrie 4.0, ovvero l'Internet of Things in ambito sensoristica applicato all'industria, alla robotica, ai Big Data che si occupano dell'archiviazione, all'acquisizione e all'analisi dei dati provenienti dai vari dispositivi, ai sistemi ciberfisici, alla connessione di tutti questi oggetti tra loro per la comunicazione e lo scambio delle informazioni ed infine alla realtà aumentata per il supporto nei vari processi industriali. Questi macroargomenti saranno lo spunto per introdurre il concetto di Internet of Medical Things. Con una breve panoramica sugli ospedali al giorno d'oggi, si vuol proporre una nuova concezione di ospedale dove vengono poste al centro dell'attenzione le esigenze del paziente e del personale medico, trattando nello specifico le tecnologie impiegate, i processi chirurgici, clinici e l’erogazione delle prestazioni sanitarie. Il discorso seguirà focalizzando l'attenzione anche su ambienti della medicina come la chirurgia, introducendo un luogo in cui migliaia di dispositivi connessi alla rete comunicano tra di loro. Si vedranno anche tutte le eventuali criticità e le varie sfide che bisognerà risolvere ed intraprendere per arrivare ad un corretto ed efficiente passaggio agli odierni ospedali concepiti per essere ospedali 4.0. Si concluderà con una riflessione su tutte queste tecnologie e la rivoluzione in ambito medico che promette cambiamenti che porteranno al nuovo concetto di Ospedale 4.0 su un’ottica di Internet of Medical Things.
APA, Harvard, Vancouver, ISO, and other styles
6

Carlsson, Simon, and Max Näf. "Internet of Things Hacking." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239366.

Full text
Abstract:
As the Internet of Things is gaining more traction in the market, people are becoming more comfortable with having their daily equipment connected to the internet, fewer are taking the security aspect seriously. By attempting an attack on the Telia Sense, an IoT device connected to a car, it is shown how an attacker could try to compromise this type of system and how developers and engineers in the field can test their devices. Information from the device was obtained, including debug information and program code. Telia Sense was found to be a well secured device with a lot of thought and consideration given towards cyber security, therefore a successful attack was not able to be performed. However, the methods and procedures described in this paper are still valid and does aid in securing a device.
APA, Harvard, Vancouver, ISO, and other styles
7

Sabel, Ida. "Internet of Things & Kommunikationsprotokoll." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-27246.

Full text
Abstract:
Genom att studera olika kommunikationsprotokoll kunna svara på vad det är som gör att ett visst protokoll är bäst anpassat för att användas mellan mobila enheter och IoT-enheter. I arbetet användes en kvalitativ litteraturstudie för att ge en grundlig teoretisk bakgrund samt en experimentell studie där ett par teorier undersökts ifall de stämmer med resultaten ifrån verkligheten. De fem faktorerna kompatibilitet, batteritid, frekvens, räckvidd och tillförlitlighet undersöktes hos kommunikationsprotokollen Bluetooth Low Energy (BLE), Närfältskommunikation (NFC) och Wi-Fi. Dessa tre valdes eftersom de stöds av nyare mobila plattformar idag. Kommunikations-protokollen analyserades sedan gentemot olika användningsområden inom IoT, eftersom påståendet vad som är bäst anpassat beror på vad situationen kräver för egenskaper. En systemutvecklare som ska välja kommunikationsprotokoll till en IoT-tillämpning och läser denna rapport bör själv jämföra de olika protokollen mot varandra inom de fem faktorerna för att kunna avgöra vilket protokoll som passar bäst inom dennes situation. I arbetet utfördes endast experimentella studier på BLE på grund av begränsningar inom utrustningen. Ytterligare experiment inom NFC och Wi-Fi skulle ge ett bredare perspektiv med fler infallsvinklar.
By studying different communication protocols respond to what it is that makes a certain protocol best suited for use between mobile devices and IoT devices. This study used a qualitative literature study to create a proper theoretical background and an experimental study where two theories were investigated in whether they matched wih the results from the reality. The five factors compatibility, battery loss, frequency, range and reliability were investigated in the communication protocols Bluetooth Low Energy (BLE), Near field communication (NFC) and Wi-Fi, these three because they are supported by newer mobile platforms today. The communication protocols were then analysed against various uses in the IoT, since the claim what it is that makes it best suited depends on what the situation requires. A system developer that is about to select the communication protocol to use in an IoT application and reads this study should compare the different protocols to each other within the five factors to determine which protocol is best suited for his situation. This study only performed experimental studies on BLE because of limitations in the equipment. Additional experiments on NFC and Wi-Fi would provide a wider perspective.
APA, Harvard, Vancouver, ISO, and other styles
8

Söderberg, Karl Jakob Emanuel. "INTERNET OF THINGS : Smart välfärdsteknologi." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15793.

Full text
Abstract:
Internet of Things är en utveckling som inte endast sträcker sig till de industriella områdena idag. Det når nu mera även ut till välfärdsteknologin. Både användare och företag påverkas idag av detta faktum. Företag har ett behov, och en plikt att värna om sina kunder, och kunder har ett behov av att göra sin röst hörd. Detta arbete har som syfte att utforska acceptansen hos de äldre till denna smarta välfärdsteknologi, samt vad som krävs för att öka acceptansen. Arbetet tillnärmar sig frågan genom litteratur som bas för enkäter och intervjuer, utförda i Sverige och Norge.Det visar sig att acceptansen beror på många olika faktorer, som alla uppfattas olika från person till person. Men att det i många fall kan koka ned till behovet. De flesta människorna vill helst bo hemma så länge som möjligt, i alla fall i Sverige och Norge. Men innan det har gått så långt så kan det vara oklart hur öppna folk är till teknologi som har möjlighet till att uppfattas som integritetskränkande. Nyckeln ligger i att göra teknologin så anpassningsbar som möjligt, vad gäller både funktion och utseende, samt andra faktorer som säkerhet, förståelse, användbarhet och kostnad.
APA, Harvard, Vancouver, ISO, and other styles
9

Norburg, David, and David Persson. "Internet of Things - Ett användarperspektiv." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Okumura, Brandon M. "IoTA: Internet of Things Assistant." DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1769.

Full text
Abstract:
The Internet of Things is the networking of electronic devices, or “Things”, that enables them to collect and share data, as well as interact with their physical surround- ings. Analyzing this collected data allows us to make smarter economic decisions. These interconnected networks are usually driven by low-powered micro-controllers or cheap CPUs that are designed to function optimally with very little hardware. As scale and computational requirements increase, these micro-controllers are unable to grow without being physically replaced. This thesis proposes a system, IoTA, that assists the Internet of Things by pro- viding a shared computational resource for endpoint devices. This solution extends the functionality of endpoint devices without the need of physical replacement. The IoTA system is designed to be easily integrable to any existing IoT network. This system presents a model that allows for seamless processing of jobs submitted by endpoint devices while keeping scalability and flexibility in mind. Additionally, IoTA is built on top of existing IoT protocols. Evaluation shows there is a significant performance benefit in processing computationally heavy algorithms on the IoTA system as compared to processing them locally on the endpoint devices themselves.
APA, Harvard, Vancouver, ISO, and other styles
11

Hrnjez, Tatjana. "Internet of Things på Teknikprogrammet." Thesis, Malmö högskola, Fakulteten för lärande och samhälle (LS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-27618.

Full text
Abstract:
Internet of Things (IoT) är det senaste högaktuella som händer inom den digitala teknik-utvecklingen. Det är ett samlingsbegrepp för den utveckling som innebär att allt från in-frastruktur, fordon och hushållsmaskiner till bohag samt levande varelser (inklusive män-niskor), utrustas med små inbyggda sensorer och datorer och på så sätt kopplas upp i ett virtuellt kommunicerande nätverk. Det talas mycket om smarta hem och smarta städer i sammanhanget. 61 procent av de svenska företagen säger sig arbeta med IoT, 50 miljarder enheter beräknas med hjälp av IoT vara uppkopplade i världen år 2020. Den omfattande digitaliseringen innebär ett paradigmskifte som kommer att påverka hela industrin och samhället, inte minst skolan. Frågan är förberedd skolan är för den senaste stora digitala utmaningen och mer specifikt hur det ser ut på teknikprogrammet. Teknikprogrammet är ett högskoleförberedande program där eleven efter erhållen examen skall ha tillräckliga kunskaper för att bli behörig till högskolestudier.
APA, Harvard, Vancouver, ISO, and other styles
12

Song, Yuanjun. "Security in Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142451.

Full text
Abstract:
The Internet of Things (IoT) is emerging the Internet and other networks with wireless technologies to make physical objects interact online. The IoT has developed to become a promising technology and receives significant research attention in recent years because of the development of wireless communications and micro-electronics.  Like other immature technological inventions, although IoT will promise their users a better life in the near future, it is a security risk, especially today the privacy is increasingly concerned by people. The key technologies of IoT are not yet mature. Therefore the researches and applications of the IoT are in the early stage. In order to make the IoT pervade people’s everyday life, the security of the IoT must be strengthened. In this thesis, first, the IoT is compared with the Internet. Though the IoT is based on the Internet, due to the characteristics of the IoT, those mature end-to-end security protocols and protective measures in the Internet can not directly provide the end-to-end data security through the perceptual layer, the transport layer the and application layer. For the IoT security addressing issues (such as the Internet DNS attack), this thesis proposes the IoT addressing security model. The traditional access control and the identity authentication only works in the same layer. The IoT addressing security model designed in this thesis effectively solves the issues of vertically passing the authentication results in the addressing process without changing the protocols for two communication parties. Besides, this thesis provides the object access control and privacy protection from the object application layer addressing, DNS addressing and IP addressing phases. Finally, combining the IoT object addressing security model with practical application scenario, this thesis designs the IoT object security access model. In this model, the access requester can access objects in different domains through a single sign-on. This model provides the protection for the end-to-end communication between the access requester and object.
APA, Harvard, Vancouver, ISO, and other styles
13

Cobârzan, Cosmin. "Internet of highly mobile things." Thesis, Strasbourg, 2015. http://www.theses.fr/2015STRAD037/document.

Full text
Abstract:
La mobilité devienne un partie intégrante de l’Internet des Object d’aujourd’hui, comme beaucoup d’applications (monitorage des animaux sauvage, suivi des cible dans le champs de bataille) sont impossible de mettre en œuvre juste avec des nœuds statiques. L’objective de cette thèse est de définir une nouvelle architecture de communication articule autour de la mobilité dans les réseaux avec pertes et à bas puissance (Low Power and Lossy Networks - LLNs) (réseaux des capteurs sans fils). Tout d’abord, nous avons analysé théoriquement l’auto configuration des adresses IPv6, fait avec toutes les optimisations disponibles dans Neighbor Discovery Optimization for IPv6 over 6LoWPAN. Cette étape est cruciale pour des protocoles qui donnent de support pour la mobilité dans des réseaux IP, comme MIPv6. Les résultats obtenues – taille des paquets trop grande et consumations énergétique importante pour les routeurs qui tournent Neighbor Discovery – n’ont amener a utiliser le IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). RPL est développe d’el debout pour les LLN. Notre deuxième contribution sont améliorer les opérations du RPL pour mieux supporter les nœuds mobiles. Enfin, nous avons développe une mécanisme inter-couche – Mobility Triggered-RPL – qui profite des actions dans le protocole avec préambule X-Machiavel à la couche accès au medium dans le protocole RPL à la couche routage
Mobility is becoming an integrating part of todays Internet of Things, as many applications such as wildlife monitoring or target tracking in the battlefield cannot be done only with the help of static nodes. The goal of this thesis is to provide new communication architecture articulated around providing mobility support in Low Power and Lossy Networks (LLNs). First we analyzed from a theoretical point of view the IPv6 address auto-configuration with all optimizations made in Neighbor Discovery Optimization for IPv6 over 6LoWPAN. This step is of crucial importance for protocols that offer mobility support in IP networks, such as MIPv6. Our findings, increased message size that leads to fragmentation and high energy consumption for routers that are involved in Neighbor Discovery message exchange, have lead us to use the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) in order to provide mobility support. RPL is build from ground up with respect to LLN requirements. Our second contribution enhanced RPL operations to support mobility management. Finally, we proposed a cross-layer protocol – Mobility Triggered-RPL – that leverages actions from the X-Machiavel preamble sampling MAC protocol into RPL
APA, Harvard, Vancouver, ISO, and other styles
14

Borrillo, Mattia. "Internet of things e integrazione nel web: Web of things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/9229/.

Full text
Abstract:
Internet of Things (IoT): tre parole che sintetizzano al meglio come la tecnologia abbia pervaso quasi ogni ambito della nostra vita. In questa tesi andrò a esplorare le soluzioni hardware e soprattutto software che si celano dietro allo sviluppo di questa nuova frontiera tecnologica, dalla cui combinazione con il web nasce il Web of Things, ovvero una visione globale, accessibile da qualsiasi utente attraverso i comuni mezzi di navigazione, dei servizi che ogni singolo smart device può offrire. Sarà seguito un percorso bottom-up partendo dalla descrizione fisica dei device e delle tecnologie abilitanti alla comunicazione thing to thing ed i protocolli che instaurano fra i device le connessioni. Proseguendo per l’introduzione di concetti quali middleware e smart gateway, sarà illustrata l’integrazione nel web 2.0 di tali device menzionando durante il percorso quali saranno gli scenari applicativi e le prospettive di sviluppo auspicabili.
APA, Harvard, Vancouver, ISO, and other styles
15

Barretta, Salvatore. "UAV based Narrowband - Internet of things." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22761/.

Full text
Abstract:
in this thesis we simulated via Java and Matlab environments a scenario in which a single drone is exploited to carry the NB-IoT base station over an a-priori known area. More specifically, we examined the performance of a drone flying over a area where IoT devices are grouped in clusters and trying to serve as many nodes as possible, with the trajectory solved exploiting the well-known solution of the Travel Salesman Problem (TSP), through which the UAV, that in this study we consider starting from the center of a cluster, finds the minimum path to subsequently reach the center of all the other clusters before reaching again the starting point, where the flight is considered ended. Starting from this assumption we wanted to find the scenario that can best benefit from joint use of NB-IoT and UAV, analyzing both its network throughput and how resources are scheduled by this standard. Then we want to compare the previous results with the new ones obtained changing the way random access is simulated in the code.
APA, Harvard, Vancouver, ISO, and other styles
16

Söderström, Rasmus, and Martin Westman. "Internet of Things : The smart home." Thesis, Uppsala universitet, Institutionen för teknikvetenskaper, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353389.

Full text
Abstract:
This project report treats the basics of the rising phenomenon of Internet of Things, and the devices that can be connected to it. One of the primary goals of the project was to gain greater knowledge in the field of Internet of Things and how it can be approached form an Electrical Engineer point of view.Three types of home devices were chosen to be implemented into the Internet of Things devices. Firstly, a coffeemaker was built so it can be activated from a mobile phone. This was made possible by using cheap electronics in the form of a control board, 433 MHz receiver and a relay.In the second part of the project the window blinders was made controllable from the same application as the coffee machine. This was made possible by using similar devices and small DC servos and stepper motors. The third part of the project was to make a automated irrigation system for a flowerpot. This could be made by measuring the moisture in the soil and thereby pump water from a reservoir in to the soil. Finally a main control device was constructed to handle all the signals from the users smart phone and communicate these signals and commands to the various systems built.
APA, Harvard, Vancouver, ISO, and other styles
17

Valkama, S. (Santeri). "Lämpötilaa mittaava Internet of Things -rele." Bachelor's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201609012678.

Full text
Abstract:
Tässä kandidaatintyössä esitetään internetin välityksellä ohjattavan ja releellä ja lämpösensorilla varustetun Internet of Things -yksikön rakentaminen Digistump Oak- kehitysalustalle ja todistetaan sen toimivuus. Työssä esitetään myös muutamia tapoja todeta internet -pyyntöjen toimivuus. Lisäksi tarkastellaan Internet of Things -tarkoituksiin soveltuvia ohjelmistoja työhön sopivuuden näkökulmasta
The purpose of this bachelor’s work is to present and prove functionality of a basic Internet of Things unit built on the Digistump Oak -development board capable of connections through internet and equipped with a relay and a temperature sensor. A couple of ways to prove the functionality of web requests are also presented. In addition, a few Internet of Things -applicable software were reviewed regarding suitability in this work
APA, Harvard, Vancouver, ISO, and other styles
18

Santos, Vasco Alexandre Maia dos. "Secure decentralized internet of things infrastructure." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/18396.

Full text
Abstract:
Mestrado em Engenharia Eletrónica e Telecomunicações
Despite many IoT Infrastructures having been implemented in recent years, none of them is truly prepared for a global deployment, where failure tolerance and scalability are an essential requirement. This dissertation presents an alternative concept for IoT Infrastructures, which focuses on enhancing the traditional centralized architecture, usually operated by a single entity, into a decentralized architecture featuring multiple entities and use cases. We propose a dynamic, community driven and self-configurable infrastructure on top of a structured Peer-to-Peer network, based on a Distributed Hash Table. Moreover, the proposed infrastructure is flexible enough to allow each peer of the overlay to enable a set of different services, according to its capabilities. In addition, a set of communication protocols is provided in order to support heterogeneous devices, as well as data access, streaming and persistence. It is also an important focus of our proposal to have mechanisms that guarantee the privacy and security of the information flow and storage.
Apesar de várias infraestruturas para IoT terem sido implementadas nos últimos anos, nenhuma delas está realmente preparada para ser utilizada a uma escala global, onde a escalabilidade e a tolerância a falhas são um requisito essencial. Esta dissertação apresenta um conceito alternativo de infraestruturas para a IoT, cujo foco consiste em evoluir a tradicional arquitetura centralizada, normalmente utilizada por uma entidade única, para uma arquitetura descentralizada, compatível com múltiplas entidades e casos de uso. Propomos uma infraestrutura auto-configurável, dinâmica e orientada à comunidade, construída em cima de uma rede Peer-to-Peer estruturada, baseada numa Distributed Hash Table. Além disso, a infraestrutura proposta é suficientemente flexível para permitir que cada peer da rede possa ativar diferentes serviços, mediante as suas capacidades. Por outro lado, um conjunto de protocolos de comunicação é providenciado, de modo a suportar dispositivos heterogéneos, bem como o acesso aos dados e a sua transmissão e persistência. Também é um foco importante desta proposta a disponibilização de mecanismos que garantam a privacidade e segurança da informação durante a sua transmissão e o seu armazenamento.
APA, Harvard, Vancouver, ISO, and other styles
19

Elahi, Faizan Ehsan. "CONCURRENT INTERNET OF THINGS PROTOCOL STACKS." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-397010.

Full text
Abstract:
This work presents the design and implementation of a firmware prototype that allows multiple Internet Of Things (IoT) protocols to coexist such that they share a single radio. 6LoWPAN over Time Slotted Channel Hopping (TSCH) and Bluetooth Low Energy (BLE) are the two network protocols that are explored in this work. 6LoWPAN over TSCH forms a mesh network of low power embedded devices so that they are globally accessible through their IPv6 addresses. BLE is suitable for the direct connectivity between devices in short radio ranges. Sharing a single radio between diverse protocols is challenging since protocols access the radio in different modes and with different time patterns. The proposed architecture uses radio abstraction layer for dynamically sharing the radio based on the priority of the requests. Furthermore, concurrent operation of protocols is achieved with the help of priority based multitasking of Micrium operating system. Finally, the time critical operations of the TSCH and the radio abstraction module are handled with nested interrupts. The implementation of the firmware is evaluated with mainly two types of experiments. Overall, it is observed from the experiments that both protocols can coexist concurrently and can maintain their connections. In one set of experiments, periodic data is sent over both protocols every 5 seconds (with small random jitter). Basically these experiments involve small data traffic on both protocols. It is observed that the protocol with lower radio priority degrades in performance. Approximately 10% of the packets need re-transmissions, and thus have more latency for the protocol with lower radio priority. The second set of experiments involve file transfers over 3 hops using 6LoWPAN, while one of the middle nodes (acting as a router for the file transfer) also carries BLE session comprising of 17 BLE activities. It is observed that the mean file transfer time with BLE session is delayed compared to the no BLE case. The delay is less than the duration of the two active TSCH slots. This architecture is suitable for sharing a single radio where the network traffic is sparse. This architecture allows small embedded devices with a single radio to be accessible across many protocols without any modifications to the protocol standards. Although the performance degrades in the simultaneous operations, the protocols still keep their respective connections and complete their operations.
APA, Harvard, Vancouver, ISO, and other styles
20

Ahlqvist, Niklas, Jonas Jungåker, and Agnes Perrin. "Internet of things and automated farming." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264453.

Full text
Abstract:
The purpose of this project is to make it easier to grow plants domestically all year round. The objective is to construct a remotely controllable and environmentally independent automated hydroponic system. This would minimize the efforts required by the user to sustain plants in non-native climates. A hydroponic gardening system uses water as a growth medium instead of soil. The system is climate conscious and has benefits compared to conventional agriculture. Hydroponic systems are affected by several factors, this project only focuses on controlling the light intensity by isolating the system, and regulating the nutrient concentration through EC. The system uses a microcontroller for analysis and control. The results are promising, showing that the system works. However, the limitations in time led to a short test period, therefore the data gathered is limited. The discussion based on the results conclude that the system cannot be considered completely automatic but reduces the need of manual labour.
Syftet med detta projekt är att göra det lättare att odla växter inhemskt året runt. Målet är att konstruera ett fjärrstyrbart och miljöoberoende automatiskt hydroponiskt system. Detta ska minimera ansträngningarna från användaren för att underhålla växter i icke-inhemska klimat. Ett hydroponiskt odlingssystem använder vatten som tillväxtmedium istället för jord. Tekniken har fördelar jämfört med konventionell odling vilket gör hydroponi mer miljövänligt. Hydroponiska system påverkas av flera faktorer, men detta projekt fokuserar bara på att kontrollera ljusintensiteten genom att isolera ljuset inom systemet samt att reglera näringsämne-koncentrationen genom att mäta den elektriska ledningsförmågan i vattnet. Systemet använder en mikrokontroll för analys och kontroll. Resultaten är lovande och visar att systemet fungerar. Däremot har begränsningarna i tid lett till en kort testperiod, därför är data som samlas in begränsad. Diskussionen baserad på resultaten drar slutsatsen att systemet inte kan anses vara helt automatiskt men reducerar behovet av manuell arbetskraft.
APA, Harvard, Vancouver, ISO, and other styles
21

Vargas, Vargas Fernando. "Cloudlet for the Internet-of- Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191433.

Full text
Abstract:
With an increasing number of people currently living in urban areas, many cities around the globe are faced with issues such as increased pollution and traffic congestion. In an effort to tackle such challenges, governments and city councils are formulating new and innovative strategies. The integration of ICT with these strategies creates the concept of smart cities. The Internet of Things (IoT) is a key driver for smart city initiatives, making it necessary to have an IT infrastructure that can take advantage of the many benefits that IoT can provide. The Cloudlet is a new infrastructure model that offers cloud-computing capabilities at the edge of the mobile network. This environment is characterized by low latency and high bandwidth, constituting a novel ecosystem where network operators can open their network edge to third parties, allowing them to flexibly and rapidly deploy innovative applications and services towards mobile subscribers. In this thesis, we present a cloudlet architecture that leverages edge computing to provide a platform for IoT devices on top of which many smart city applications can be deployed. We first provide an overview of existing challenges and requirements in IoT systems development. Next, we analyse existing cloudlet solutions. Finally, we present our cloudlet architecture for IoT, including design and a prototype solution. For our cloudlet prototype, we focused on a micro-scale emission model to calculate the CO2 emissions per individual trip of a vehicle, and implemented the functionality that allows us to read CO2 data from CO2 sensors. The location data is obtained from an Android smartphone and is processed in the cloudlet. Finally, we conclude with a performance evaluation.
Med en befolkning som ökar i urbana områden, står många av världens städer inför utmaningar som ökande avgaser och trafikstockning. I ett försök att tackla sådana utmaningar, formulerar regeringar och stadsfullmäktige nya och innovativa strategier. Integrationen av ICT med dessa strategier bildar konceptet smart cities. Internet of Things (IoT) är en drivande faktor för smart city initiativ, vilket gör det nödvändigt för en IT infrastruktur som kan ta till vara på de många fördelar som IoT bidrar med. Cloudlet är en ny infrastrukturell modell som erbjuder datormolnskompetens i mobilnätverkets edge. Denna miljö karakteriseras av låg latens och hög bandbredd, utgörande ett nytt ekosystem där nätverksoperatörer kan hålla deras nätverks-edge öppet för utomstående, vilket tillåter att flexibelt och snabbt utveckla innovativa applikationer och tjänster för mobila subskribenter. I denna avhandling presenterar vi en cloudlet-arkitektur som framhäver edge computing, för att förse en plattform för IoT utrustning där många smart city applikationer kan utvecklas. Vi förser er först med en överblick av existerande utmaningar och krav i IoT systemutveckling. Sedan analyserar vi existerande cloudlet lösningar. Slutligen presenteras vår cloudlet arkitektur för IoT, inklusive design och en prototyplösning. För vår cloudlet-prototyp har vi fokuserat på en modell av mikroskala för att räkna ut CO2 emissioner per enskild resa med fordon, och implementerat en funktion som tillåter oss att läsa CO2 data från CO2 sensorer. Platsdata är inhämtad med hjälp av en Android smartphone och behandlas i cloudlet. Det hela sammanfattas med en prestandaevaluering.
APA, Harvard, Vancouver, ISO, and other styles
22

Cooper, Ke'ahi. "Security for the Internet of Things." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172526.

Full text
Abstract:
The Internet of Things (IoT) is an emerging paradigm that will change theway we interact with objects and computers in the future. It envisions a globalnetwork of devices interacting with each other, over the Internet, to perform auseful action. As such, quite a number of useful and benecial applications ofthis technology have been proposed.Although a convenient technology, the use of IoT technology will add additionalrisks to our lives that the traditional Internet did not have. This is primarilybecause IoT technology allows the virtual world to directly aect the physicalworld.Therefore, ensuring security is of paramount importance for IoT technology. Assuch, this thesis has two aims. First, we will identify the security issues for IoTtechnology as well as highlight what approaches academia has developed to resolvethem. This will allow us to see the state of this technology along with whatstill needs to be done in the future. Secondly, we will analyze some security protocolsproposed by academia and evaluate whether they ensure condentialityand authenticity.A literature survey is used to achieve the rst goal and the results show thatalthough a lot of research has been performed regarding security for IoT environments.We still have quite a way to go before a full holistic system isdeveloped which ensures all the security requirements for IoT.The results for the security protocol analysis shows that less than half of theprotocols proposed ensured authenticity and condentiality; despite the factthat their respective papers claim that they did. Therefore, we emphasize thefact that good peer reviews need to be enforced and that protocols need to bevalidated to ensure what is proposed performs as described.
APA, Harvard, Vancouver, ISO, and other styles
23

Verma, Yukti. "Secure system simulation - Internet of Things." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10116148.

Full text
Abstract:

Internet of Things (IoT) can be defined as a collection of smart devices interacting with each other unanimously to fulfill a common goal. The real world data collected from the Internet of Things can be made as an integral part of web known as Web of Things (WoT). With the help of Web of Things architecture, the users can leverage simple web mechanisms such as browsing, searching and caching to interact with the smart devices. This thesis aims to create an entire system simulating the Web of Things architecture including sensors, edge routers, web interfaces, endpoints to the IoT network and access control. Several technologies such as CoAP, 6LoWPAN, IEEE 802.15.4, contiki and DTLS have been evaluated before inclusion in the implementation. A complete web portal utilizing Californium framework and Role Based Access Control has been created for accessing and interacting with the sensors and their data. This thesis provides an end-to-end approach towards IoT device security by implementing Constrained Application Protocol (CoAP) over Datagram Transport Layer Security (DTLS) in the system. The performance of secured system is analyzed in a constrained environment based on which it is observed that DLTS implementation increases the RAM usage, code size, packet overhead and power consumption by a significant value. Finally, the future work that needs to considered in order to iterate towards better security is specified.

APA, Harvard, Vancouver, ISO, and other styles
24

Corino, Gianni. "Internet of props : a performative ontology and design framework for the Internet of Things." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/9511.

Full text
Abstract:
Set in the relatively new and fast developing field of investigation known as Internet of Things (IoT), this research starts by looking at the lack of critical and conceptual reflection on the area. With a main research question that challenges the underlying concepts of the IoT, the study develops a performative design framework to critique the field of investigation. The main corpus consists of: 1. speculative inquiry into the ontological dualisms of ‘objects’ and ‘things’ and the emerging social dimension of humans and non-humans; 2. the identification of an ontological-performative model based on the idea of Props; 3. the entanglement of theory and practice to construct a performative design framework, called the Internet of Props, which includes: an enabling platform (Smarter Planet Lab) and a set of design strategies (Transactional Props) to demonstrate and evaluate this model and framework; 4. a combined-evaluation conversational analysis methodology that assesses the performativity of the setting and the Props, through linguistic and socio-behavioural studies. Inspired by the concepts of ontological theatre, the entanglement of humans and non-humans, and the Internet of People; the IoT is imagined and performed in a theory-driven, practice-based investigation of the Internet of Props, which aims to bring new theoretical and practical knowledge for the future of the IoT.
APA, Harvard, Vancouver, ISO, and other styles
25

Aldossari, Mobark. "Three Essays on Internet of Things Adoption and Use." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1505259/.

Full text
Abstract:
Internet of Things (IoT) is a promising technology with great potential for individuals, society, governments, and the economy. IoT is expected to become ubiquitous and influence every aspect of everyday experience. Thus, IoT represents an important phenomena for both organizational and behavioral information system (IS) researchers. This dissertation seeks to contribute to IS research by studying the aspects that influence IoT adoption and use at both consumer and organizational levels. This dissertation achieves this purpose in a series of three essays. The first essay focuses on IoT acceptance in the context of smart home. The second essay focuses on examining the effect of artificial intelligence (AI) capabilities on consumers' IoT perceptions and intentions. Finally, the third essay focuses on the organizational investment and adoption of IoT technologies.
APA, Harvard, Vancouver, ISO, and other styles
26

Hamzic, Almira, and Isabel Olofsson. "DNS and the Internet of Things : Outlining the challenges faced by DNS in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202591.

Full text
Abstract:
This thesis work consists of a literature study where different aspects of DNS and the Internet of Things have been researched. A functional naming and service identification method is an essential part in making the IoT global, and DNS is the current method of naming devices on the Internet. The study looks into some challenges DNS will encounter, namely functionality, security and availability. This report concludes that a multicast DNS (mDNS) based solution designed for constrained networks is advantageous. This is despite the limited security that is currently available for such a solution. In the future, it is important that security has top priority, as there are currently limited means of security in DNS. Further study is needed when it comes to availability and how name resolving would work with constrained devices that utilise sleep mode.
Detta examensarbete består av en litteraturstudie där olika aspekter av DNS (Domännamnssystemet, eng. Domain Name System) och Sakernas Internet (eng. Internet of Things) har studerats. En fungerande namngivnings-och serviceidentifieringsmetod är en viktig del för att kunna göra Sakernas Internet globalt, och DNS är den nuvarande metoden för att namnge enheter på Internet. Studien undersöker vissa utmaningar som DNS kan stöta på, nämligen funktionalitet, tillgänglighet och säkerhet. Rapportens slutsats är att en lösning baserad på multisändnings-DNS (eng. multicast DNS, mDNS) som är anpassad för begränsade nätverk (eng. constrained networks) är fördelaktig. Detta trots den begränsade säkerhet som finns tillgänglig just nu för en sådan lösning. I framtiden är det viktigt att säkerheten har högsta prioritet, eftersom säkerheten är begränsad hos DNS. Det behövs ytterligare studier när det gäller tillgänglighet och hur adressöversättning skulle fungera med begänsade enheter (eng. constrained devices) som använder viloläge.
APA, Harvard, Vancouver, ISO, and other styles
27

Camacho, Andersson Emil, and Jonathan Karlsson. "Effekter av Internet of Things : Scenariobaserad studie som beskriver inledande effekter av Internet of Things i en verksamhet." Thesis, Högskolan Dalarna, Informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:du-22582.

Full text
Abstract:
Med begreppet "Internet of Things" menas att ett objekt ur den riktiga världen blir en del av internet. Tunabyggen i Borlänge planerar att implementera ett sådant informationssystem som med hjälp av sensorer och en ständig internetuppkoppling håller uppsikt över temperatur och luftfuktighet i utvalda lokaler. Det är ett enkelt system som till synes inte har så stora effekter på den nuvarande verksamheten. De ekonomiska effekterna går ofta att räkna på i förhand men effekterna på personal, miljö och rutiner kan glömmas bort. Vi har därför med detta examensarbete undersökt vilka inledande effekter som kan tänkas uppkomma efter implementering av ett nytt informationssystem med "Internet of Things" funktionalitet i en verksamhet. Detta sker inom kategorierna ekonomi, arbetsmiljö, miljöpåverkan och systemförvaltning. För att kunna besvara detta har vi gjort en fallstudie baserad på en scenariometodik som består av fyra faser. Fas 1, där vi fick vårt Case och skapade en förståelse för scenariofältet. Fas 2, där vi identifierade nyckelfaktorer. Detta har gjorts genom en litteraturstudie samt intervju med berörd personal på Tunabyggen. Fas 3, där analysen av dessa nyckelfaktorer skedde genom nulägesanalys och framtidsanalys av nyckelfaktorer. Fas 4, där vi genererade scenarier av de analyserade nyckelfaktorerna. Det har sedan gjorts en SWOT-analys för att belysa styrkor, svagheter, möjligheter och hot. Resultatet visar tydliga tecken på att det kommer att bli många effekter för Tunabyggen efter implementering av det nya informationssystemet som yttrar sig i alla kategorier. Slutsatsen är att vid implementation av ett informationssystem som detta är effekterna många. Detta är något som vi anser bör beaktas av alla verksamheter som har tankar på att införskaffa ett nytt informationssystem. De bör inte bara utvärdera informationssystem rent ekonomiskt utan borde ta i beaktning att det finns ett antal andra faktorer som har en avgörande roll om implementation av informationssystem ska bli lyckad.
The term "Internet of Things" refers to when an object from the real world becomes a part of the internet. Tunabyggen in Borlänge plans to implement an information system that will monitor temperature and humidity in selected facilities using a constant internet connection and different sensors. It is a simple system that doesn't seem to have a major impact on the current operations. The economic effects is often possible to calculate in advance, but the impact on staff, environment and routines may be forgotten. We have with this thesis examined the initial effects that may occur after the implementation of a new information system with Internet of Things functionality in a business, within the categories of economy, working environment, environmental impact and system management. To answer this we made a case study which is based on a scenario methodology that consists of four phases. Phase 1, where we got our case and created an understanding of the scenario field. Phase 2, identifying the key factors. It has been done through a literature study and interviews with relevant staff on Tunabyggen. Phase 3, where the analysis of these key factors were made through the situation and future analysis. Phase 4, where we generate scenarios of the analyzed key factors. Finally we have done a SWOT analysis to highlight the strengths, weaknesses, opportunities and threats. The results clearly show signs that there will be many effects for Tunabyggen after the implementation of the new information system, which manifests itself in all categories. The conclusion is that even the implementation of a menial information system like this one, the impacts are many. This is something that we believe should be considered by all companies that are thinking of acquiring a new system so they do not only evaluate IT-systems in economic terms, but also other factors that play a crucial role for the implementation of an information system to be successful.
APA, Harvard, Vancouver, ISO, and other styles
28

Ben, Saied Yosra. "Collaborative security for the internet of things." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00879790.

Full text
Abstract:
This thesis addresses new security challenges in the Internet of Things (IoT). The current transition from legacy Internet to Internet of Things leads to multiple changes in its communication paradigms. Wireless sensor networks (WSNs) initiated this transition by introducing unattended wireless topologies, mostly made of resource constrained nodes, in which radio spectrum therefore ceased to be the only resource worthy of optimization. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy and autonomy to once uniform and deterministic systems. The heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT entities make it challenging to provide the required end-to-end secured connections. Unlike Internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources, and thus, are unable to support complex security schemes. The setup of a secure end-to-end communication channel requires the establishment of a common secret key between both peers, which would be negotiated relying on standard security key exchange protocols such as Transport Layer Security (TLS) Handshake or Internet Key Exchange (IKE). Nevertheless, a direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. The issue of adapting existing security protocols to fulfil these new challenges has recently been raised in the international research community but the first proposed solutions failed to satisfy the needs of resource-constrained nodes. In this thesis, we propose novel collaborative approaches for key establishment designed to reduce the requirements of existing security protocols, in order to be supported by resource-constrained devices. We particularly retained TLS handshake, Internet key Exchange and HIP BEX protocols as the best keying candidates fitting the end-to-end security requirements of the IoT. Then we redesigned them so that the constrained peer may delegate its heavy cryptographic load to less constrained nodes in neighbourhood exploiting the spatial heterogeneity of IoT nodes. Formal security verifications and performance analyses were also conducted to ensure the security effectiveness and energy efficiency of our collaborative protocols. However, allowing collaboration between nodes may open the way to a new class of threats, known as internal attacks that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a collaborative group. The trustworthiness level of a node has to be assessed by a dedicated security mechanism known as a trust management system. This system aims to track nodes behaviours to detect untrustworthy elements and select reliable ones for collaborative services assistance. In turn, a trust management system is instantiated on a collaborative basis, wherein multiple nodes share their evidences about one another's trustworthiness. Based on an extensive analysis of prior trust management systems, we have identified a set of best practices that provided us guidance to design an effective trust management system for our collaborative keying protocols. This effectiveness was assessed by considering how the trust management system could fulfil specific requirements of our proposed approaches for key establishment in the context of the IoT. Performance analysis results show the proper functioning and effectiveness of the proposed system as compared with its counterparts that exist in the literature
APA, Harvard, Vancouver, ISO, and other styles
29

K, C. Sandeep. "Platform Independent Connections to Internet of Things." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-24787.

Full text
Abstract:
In the past few years, technology has been changing by leaps and bounds, within which a new topic has emerged as Internet of Things. These things serve as sensors/actuators, connected to the Internet and enabled to communicate with each other simultaneously in a P2P distributed manner. The sensors/actuators sense and generate contextual data in their surroundings in order to enable real-time context-aware behavior that make them more personalized and intelligent. This contextual information may be useful for human purposes like environment monitoring, home surveillance, elderly care, safety, security surveillance, etc. Moreover, smart mobile devices with incredible features have become hugely popular, the use of the Internet of Things would be much handier using smartphones to interact with sensors and also to generate information with its decorated sensors. The main aim of this thesis work is to create an extension for an add-in layer of the Internet of Things (SensibleThings Platform) architecture that adds functionalities like querying UCI value within the platform, connecting different mobile devices regardless of programming language, which has been done using the REST protocol. Furthermore, the intention is to build a P2P connection between the Java coded SensibleThings platform to a non-Java platform, i.e. iOS, by creating an Objective-C library to support dissemination of contextual information between the discrete platform in a distributed manner using JSON. Two servers have been created using Apache web server and sockets to connect with the Objective-C library to compare the performance of extension and library. The thesis work also presents the implementation of the extension and an Objective-C library, integrated to create proof-of-concept applications by developing an iOS application and Mac OS desktop application that can easily interact with the SensibleThings platform by requests through the REST protocol and getting the UCI value in JSON message format. Moreover, to know the best possible solution for the SensibleThings platform, a hybrid application has also been developed by using PhoneGap and JQueryMobile within XCode, which is compared with the iOS web app, and an evaluation of mobile applications using extension and library with two servers has also been performed. According to the results between the web server and sockets, the sockets act scalable and more stable than the web server when interacting with the SensibleThings platform; when comparing between the iOS and Mac app for performance, there is not much difference. The results also suggest that a hybrid app would be a better solution for the SensibleThings platform; it could be developed with less effort and be useful for a variety of mobile devices, which might be the best solution for the IoT in the future. Lastly, the conclusions includes possible future work to be supplemented, to make the IoT better in future.
APA, Harvard, Vancouver, ISO, and other styles
30

Tuyishimire, Emmanuel. "Internet of Things: Least Interference Beaconing Algorithms." Thesis, University of Cape Town, 2014. http://pubs.cs.uct.ac.za/archive/00000997/.

Full text
Abstract:
The emerging sensor networking applications are predicting the deployment of sensor devices in thousands of computing elements into multi-technology and multi-protocol platforms. Access to information will be available not only anytime and anywhere, but also using anything in a first-mile of the Internet referred to as the internet-of-things (IoT). The management of such a large-scale and heterogeneous network, would benefit from some of the traditional IP-based network management techniques such as load and energy balancing, which can be re-factored to achieve efficient routing of sensor network traffic. Research has shown that minimizing the path interference on nodes was necessary to improve traffic engineering in connection oriented networks. The same principle has been applied in past research in the context of the IoT to reveal that the least interference beaconing protocol (LIBP); a protocol derived from the least interference beaconing algorithm (LIBA) outperforms the Collection Tree Protocol (CTP) and Tiny OS Beaconing (ToB) protocol, in terms of energy efficiency and lifetime of the sensor network. However for the purpose of efficiency and accuracy, it is relevant, useful and critical to revisit or re-examine the LIBA algorithm in terms of correctness and investigate potential avenues for improvement. The main contributions of this research work are threefold. Firstly, we build upon formal methods to verify the correctness of the main principles underlying the LIBA, in terms of energy efficiency and interference minimization. The interference is here defined at each node by the number of routing paths carrying the sensor readings from the motes to the sink of the network that traverse the node. Our findings reveal the limitations in LIBA. Secondly, building upon these limitations, we propose two improvements to the algorithm: an algorithm called LIBA+ that improves the algorithm performance by keeping track of the energy usage of the sensor nodes, and a multi-sink version of the algorithm called LIBAMN that extends the algorithm to account for multiple sinks or gateways. These enhancements present preventive mechanisms to include in IoT platforms in order to improve traffic engineering, the security of network protocols and network stability. Lastly, we present analytical results, which reveal that the LIBA algorithm can be improved by more than 84% in terms of energy balancing. These results reveal that formal methods remain essential in the evaluation and performance improvement of wireless sensor network algorithms and protocols.
APA, Harvard, Vancouver, ISO, and other styles
31

Egel, Jill. "Internet of Things and its Business Models." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80995.

Full text
Abstract:
The Internet of Things (IoT) is the next phase in the evolution of the internet, where everyday objects are connected to the internet, and obtain the capacity to communicate with other devices and sense their environment. Especially the IIoT is one of the most talked about industrial business concepts since the recent years, companies try to focus on business models and operational efficiency. That is why this thesis focuses on researching the industrial Internet of Things (IIoT). There is already a lot of information about the common Internet of Things but still a gap in research in the business perspective, especially surrounding the concept of business models for the IIoT. The goal of this project is to investigate different kinds of business models, how they work and how feasible they are. The need to research possible business models for an IIoT framework, as traditional business models are relevant for this study, such as the Business Model Canvas which has been proposed by Alexander Osterwalder or the Business Model Navigator by Oliver Gassmann. But there is still a lack of literature covering the business models for the IIoT. Therefore, after researching the concept of IIoT from a business perspective, I identified some useful criteria and suitable business models. With a qualitative literature study, I was able to develop an IIoT business model framework, based on the dynamics and complexity of the IIoT concept, which incorporates business strategies and provides companies with a flexible approach. The business model framework can be used in any business which is working in the industrial context. To demonstrate how the business model framework works for the IIoT, I clarified how suitable business models can improve the current business model of the very prominent and successful company Tesla. The results show how the framework of IIoT business models can be used to increase profit and work efficiently as a company. The models can also be formed to only highlight single components of an already existing business model, as it offers great flexibility, which is highly valuable in the fast evolving and innovative IIoT phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
32

Renuka, Venkata Ramani Challa. "Two way Firewall for Internet of Things." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194234.

Full text
Abstract:
The Internet of Things(IoT), an emerging global Internet-based technical architecture impacts the security and privacy of the stakeholders involved. IoT security is the area of endeavour concerned with safeguarding connected devices and networks in the Internet of things. It is of utmost importance to allow protected access to IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) networks and protecting Internet-connected critical infrastructures from wireless hosts within 6LoWPAN network. The security architecture deployed must ensure resilience to attacks, data authentication, integrity, access control to data, resources and client privacy. With increasing technology, there is high probability for hackers and intruders to succeed attacking a network. Hence, security of networks is essential.This solution is to counter the attacks by implementing a two way firewall. This solution makes scientific contribution by adding support for the IoT protocol Constrained Application Protocol(CoAP) and Datagram Transport Layer Security(DTLS) which are widely used for communication in IoT networks. If the packet arrives on CoAP or DTLS port, firewall scans the packet to see that the packet confirms to the message format intended. Devices in 6LoWPAN are memory constrained possessing less RAM and hence another key contribution of this thesis is that the rules, stored in files, are read directly from file facilitating minimal use of additional memory. In addition to this, the decisions of firewall i.e. the blacklisted and whitelisted IP addresses are also saved in files.The firewall is deployed and evaluated within 6LoWPAN. The power consumption and memory consumption are calculated. Security is evaluated analytically and it is seen that the true positive rate ranges from 80-95% for DoS(Denial of Service) attacks and 90-100%for IP spoofing attacks. It can be concluded that firewall can be deployed with very little overhead in terms of memory and power consumption. As an extension to this firewall, multiple IoT protocols parsing such as Message Queuing Telemetry Transport(MQTT), Extensible Messaging and Presence Protocol(XMPP) can be added. Similarly support for other attack detection algorithms like IP Spoofing, Distributed DoS(DDoS) can be added.
Sakernas Internet år en framväxande global Internet-baserad teknisk arkitektur som på-verkar säkerheten och integriteten för inblandade deltagare. IoT-säkerhet är området där man strävar mot att såkra uppkopplade apparater och nätverk i Sakernas Inter-net. Det är av yttersta vikt att tillåta skyddad tillgång till IPv6 över trådlösa och energisnåla lokala nätverk (6LoWPAN), samt att skydda kritisk infrastruktur som har Internet-uppkoppling från trådlösa apparater inom 6LoWPAN-nätverken. Den säker-hetsarkitektur som används måste garantera motståndskraft mot attacker, autentisering och integritet av data, tillgångskontroll för data och resurser, samt användares privatliv. Med ökande användning av teknologi stiger möjligheten för hackare att kunna attackera ett nätverk framgångsrikt. Därför är säkerhet i nätverken av yttersta vikt.I denna rapport visar vi hur man kan motverka angrepp på säkerheten genom att im-plementera en två-vägs-brandvägg. Det vetenskapliga bidraget är att vi lägger till stöd för IoT-protokollet Constrained Application Protocol (CoAP) och Datagram Transport Layer Security (DTLS), vilka används av många för kommunikation inom IoT-nätverk. Om ett paket inkommer på en CoAP- eller DTLS-port, så undersöker brandväggen pa-ketet för att se till så att paketet är formaterat korrekt. Apparater i 6LoWPAN har ofta minnesbegränsningar, varför ett annat centralt bidrag i denna rapport är att brandvägg-sreglerna lagras i filer och inläses direkt vid behov för att minimera minnesanvändningen. Dessutom sparas besluten som tas av brandväggen, dvs. svart- och vitlistningar av IP-adresser, i filer.Brandväggen används och utvärderas inom 6LoWPAN. Energiförbrukningen och min-nesanvändningen beräknas utifrån experimentell data. Säkerheten utvärderas analytiskt, och vi ser att andelen sant positiva beslut är 80-95% för Denial-of-Service (DoS) attacker, samt 90-100% för IP-spoofing attacker. Slutsatsen är att brandväggen kan driftsättas med väldigt lågt minnesbehov och låg energiförbrukning. Brandväggen kan i framti-den utökas med ytterligare IoT-protokoll som Message Queuing Telemetry Transport (MQTT) och Extensible Messaging and Presence Protocol (XMPP). Dessutom vore det önskvärt med stöd för andra detekteringsmekanismer mot attacker, som exempelvis IP-spoofing och Distributed Denial-of-Service (DDoS).
APA, Harvard, Vancouver, ISO, and other styles
33

Hassan, Basma Mostafa. "Monitoring the Internet of Things (IoT) Networks." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS100.

Full text
Abstract:
Les réseaux « Internet des Objets » se composent de plusieurs millions d’objets qui possèdent une adresse IP et qui peuvent connecter sur Internet. En général, ces objets sont supposé d’être autonomes et peuvent résoudre des tâches; mesurer, traiter et fournir des informations pour les systèmes connectés et pour les utilisateurs. Aussi, ces réseaux sont vulnérables (c.-à-d. : les éléments peuvent être mobiles et la topologie du réseau peut changer dynamiquement), les changements peuvent influencer le (bon) fonctionnement du réseau. De plus, ils peuvent être alimentés par des batteries de durée de vie limitée, ce que nécessite la réduction de leur consommation.Ce travail de thèse aborde un sujet important dans le domaine de l’Internet des Objets, qui consiste à savoir comment assurer la robustesse et le fonctionnement tolérant aux pannes du réseau pour répondre aux exigences des missions critiques. Avec le large déploiement des services IdO, ce problème est deventé ou de détection de pannes et de sécurité industriel où l’état des objets communicants doit être constamment vérifié pour le rétablissement rapide en cas de problème particulièrement crucial pour les applications telles que le monitorage intelligent de sames de communication inattendus. On cherche alors de minimiser le coût du monitorage et l’utilisation de l’énergie, et aussi les charges additionnelles sur les réseaux.Nous avons proposé un algorithme qui vise à réaliser un placement distribué des moniteurs avec une complexité minimale pour le calcul. L’algorithme proposé fonctionne avec RPL. L’objectif principal est d’augmenter la robustesse dans les réseaux IdO ciblant les applications critiques en temps réel via le monitorage des liaisons dans les DODAGs construits par RPL. Dans notre première contribution, le problème est modélisé comme un problème de couverture minimale des sommets (VCP) sur le DODAG. Nous avons développé un algorithme à temps polynomial qui transforme le DODAG en une décomposition arborescente (Nice-Tree Decomposition) avec une largeur arborescente (treewidth) d’unité. Cette stratégie profite de la spécificité des DODAG et a abouti à une réduction significative de la complexité de la résolution du VCP sur les DODAG. Elle peut être résolue en temps polynomial.La deuxième proposition est un modèle approché pour l’optimisation de l’ordonnancement du rôle de monitorage des nœuds dans les réseaux IdO, afin de maximiser la durée de vie des dispositifs embarqués à ressources limitées, tout en minimisant le coût global du monitorage de réseau. Le monitorage de réseau est très coûteux, en particulier pour les réseaux à ressources limitées tels que l’IdO. Par conséquent, le monitorage doit être économe en énergie et avec des frais généraux minimaux sur la performance normale du réseau. Notre travail correspondant contient une proposition d’un modèle mathématique en trois phases pour assurer l’exigence d’une couverture des moniteurs tout en minimisant la consommation d’énergie de monitorage et les frais de communication.Notre modèle proposé décompose le problème abordé en trois problèmes d’optimisation bien connus, il s’agit du problème de couverture de sommets, problème d’affectation généralisé multi-objectives et problème de voyageur de commerce.Dans cette troisième partie, une approche exacte est proposée pour résoudre le problème décrit dans (Contribution 2). Comme nous avons vu, la décomposition en trois phases ne donne pas la solution exacte. Nous avons donc proposé une formulation exacte du problème qui consiste en un problème de l'affectation minimum des tâches de surveillance avec un fonctionnement de surveillance cyclique. Pour cela, nous avons formulé un programme en nombres entiers binaires. L'ordonnancement optimal garantit la couverture du graphe pour la surveillance avec une consommation d'énergie minimale
By connecting billions of things to the Internet, IoT created a plethora of applications that touch every aspect of human life. Time-sensitive, mission-critical services, require robust connectivity and strict reliability constraints. On the other hand, the IoT relies mainly on Low-power Lossy Networks, which are unreliable by nature due to their limited resources, hard duty cycles, dynamic topologies, and uncertain radio connectivity. Faults in LLNs are common rather than rare events, therefore, maintaining continuous availability of devices and reliability of communication, are critical factors to guarantee a constant, reliable flow of application data.After a comprehensive literature review, and up to our knowledge, it is clear that there is a call for a new approach to monitoring the unreliable nodes and links in an optimized, energy-efficient, proactive manner, and complete interoperability with IoT protocols. To target this research gap, our contributions address the correct assignment (placement) of the monitoring nodes. This problem is known as the minimum assignment problem, which is NP-hard. We target scalable monitoring by mapping the assignment problem into the well-studied MVC problem, also NP-hard. We proposed an algorithm to convert the DODAG into a nice-tree decomposition with its parameter (treewidth) restricted to the value one. As a result of these propositions, the monitor placement becomes only Fixed-Parameter Tractable, and can also be polynomial-time solvable.To prolong network longevity, the monitoring role should be distributed and balanced between the entire set of nodes. To that end, assuming periodical functioning, we propose in a second contribution to schedule between several subsets of nodes; each is covering the entire network. A three-phase centralized computation of the scheduling was proposed. The proposition decomposes the monitoring problem and maps it into three well-known sub-problems, for which approximation algorithms already exist in the literature. Thus, the computational complexity can be reduced.However, the one major limitation of the proposed three-phase decomposition is that it is not an exact solution. We provide the exact solution to the minimum monitor assignment problem with a duty-cycled monitoring approach, by formulating a Binary Integer Program (BIP). Experimentation is designed using network instances of different topologies and sizes. Results demonstrate the effectiveness of the proposed model in realizing full monitoring coverage with minimum energy consumption and communication overhead while balancing the monitoring role between nodes.The final contribution targeted the dynamic distributed monitoring placement and scheduling. The dynamic feature of the model ensures real-time adaptation of the monitoring schedule to the frequent instabilities of networks, and the distributed feature aims at reducing the communication overhead
APA, Harvard, Vancouver, ISO, and other styles
34

Mendes, José Miguel Martins Lopes. "Security techniques for the internet of things." Master's thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/12686.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática
IoT assume que dispositivos limitados, tanto em capacidades computacionais como em energia disponível, façam parte da sua infraestrutura. Dispositivos esses que apresentam menos capacidades e mecanismos de defesa do que as máquinas de uso geral. É imperativo aplicar segurança nesses dispositivos e nas suas comunicações de maneira a prepará-los para as ameaças da Internet e alcançar uma verdadeira e segura Internet das Coisas, em concordância com as visões atuais para o futuro. Esta dissertação pretende ser um pequeno passo nesse sentido, apresentando alternativas para proteger as comunicações de dispositivos restritos numa perspetiva de performance assim como avaliar o desempenho e a ocupação de recursos por parte de primitivas criptográficas quando são aplicadas em dispositivos reais. Dado que a segurança em diversas ocasiões tem de se sujeitar aos recursos deixados após a implementação de funcionalidades, foi colocada uma implementação de exposição de funcionalidades, recorrendo ao uso de CoAP, num dispositivo fabricado com intenção de ser usado em IoT e avaliada de acordo com a sua ocupação de recursos.
IoT comprehends devices constrained in both computational capabilities and available energy to be a part of its infrastructure. Devices which also present less defense capabilities and mechanisms than general purpose machines. It’s imperative to secure such devices and their communications in order to prepare them for the Internet menaces and achieve a true and secure Internet of Things compliant with today’s future visions. This dissertation intends to be a small step towards such future by presenting alternatives to protect constrained device’s communications in a performance related perspective as well as benchmarks and evaluation of resources used by cryptographic primitives when implemented on real devices. Due to security being on multiple occasions subjected to the resources available only after functionalities implementation, a minimalist implementation of functionalities exposure through the use of CoAP was also deployed in an IoT intended device and assessed according to resource overhead.
APA, Harvard, Vancouver, ISO, and other styles
35

Gu, Wei. "Robustness against interference in Internet of Things." Thesis, Lille 1, 2012. http://www.theses.fr/2012LIL10195/document.

Full text
Abstract:
L'Internet des objets, plus particulièrement les réseaux de capteurs, a attiré beaucoup d'attention ces dernières années. Sa mise en œuvre soulève de nombreuses difficultés, comme la génération d'interférences d'accès multiple (MAI) à caractère impulsif et la consommation d'énergie relativement forte. Les MAI et le bruit thermique doivent être considérés simultanément car ils perturbent fortement les communications. Nous modélisons les MAI et le bruit thermique respectivement par la distribution stable et gaussienne. Nous étudions tout d’abord l’effet des turbo-codes sur le lien direct en utilisant la norme-p comme métrique de décodage. Cette métrique permet une performance de correction d’erreur proche du décodeur optimal. Ensuite nous nous penchons sur les communications coopératives. A l’aide de l’échantillonnage préférentiel, nous estimons les densités de probabilité de la décision statistique du récepteur optimal en présence des bruits stable et gaussien. Cette approche est coûteuse en calcul. Nous proposons donc d’approximer ces densités de probabilité par la distribution gaussienne inverse normale (NIG). Cette solution de calcul est efficace pour approcher le récepteur optimal. Nous montrons également que le récepteur utilisant la norme-p a des performances robustes, quel que soit le type de bruit dominant. A la fin nous combinons les travaux du codage canal et des communications coopératives pour établir une stratégie de codage canal distribué. Basé sur la qualité du lien direct et le niveau de taux d’erreur binaire envisagé, la stratégie d’économie d’énergie peut être mise en place via le choix d’un schéma de codage canal distribué
Internet of Things brought great interests in recent years for its attractive applications and intelligent structure. However, the implementation of sensor networks still presents important challenges such as the generation of Multiple-Access-Interference (MAI) with impulsive nature and the relatively high energy consumption. Both the MAI and the thermal noise should be considered due to their strong impairments each may cause on the communication quality. We employ the stable and Gaussian distributions to model the MAI and the thermal noise respectively. Firstly we study the performance of turbo codes in the direct link and we propose the p-norm as a decoding metric. This metric allows a considerable error correction performance improvement which is close to the optimal decoder. Then we investigate cooperative communications. The probability densities in the decision statistic of the optimal receiver are estimated using importance sampling approach when both the stable and Gaussian noises are present. Such a method is computationally expensive. Hence we develop an approximation approach based on the Normal Inverse Gaussian (NIG) distribution. This solution is efficient for calculation and is proximate to the optimal receiver. In addition we show that the p-norm receiver has robust performance no matter what kind of noise is dominant. At last we combine the channel coding and cooperative communication works to establish a distributed channel coding strategy. Through some simulation assessments, the energy saving strategy can be realized by choosing an appropriate distributed channel coding scheme based on the direct link quality and target bit error rate
APA, Harvard, Vancouver, ISO, and other styles
36

Sabe, Tahir, and Ridom Khan. "Blockchain för att säkra Internet of Things." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-283791.

Full text
Abstract:
I dagsläget finns det fler anslutna enheter till internet, Internet of Things-enheter som det benämns, än vad det finns människor på jorden och produkter är lättillgängliga för den vanliga konsumenten. När fler enheter kopplas upp till internet är det också viktigt att hålla reda på dem. En nackdel med allt ökat antal uppkopplade enheter är en potentiellt ökad sårbarhet och det finns en högre risk för privatpersoner eller företag att bli hackade. Examensarbetet undersöker vilka säkerhetsrisker som finns med att skapa ett IoT-system och hur IoT kan kombineras med blockchainteknik ur ett säkerhetsperspektiv i olika branscher genom att titta på IoT-system inom små företag och för privatpersoner med begränsad IT-kompetens. En riskanalys görs för två användarfall, en floristverksamhet för bevarandet av bland annat känsliga växter och blommor respektive ett kommersiellt smart dörrlås som gör det möjligt för hushåll att kunna låsa samt låsa upp ett dörrlås digitalt med hjälp av mobiltelefoner. Därefter presenteras sårbarheter och tillgångar som behöver skyddas och relaterade arbeten undersöks för att se hur sårbarheter kan undvikas. Resultatet visar teknikernas relevans i nuläget, vilka IoT-modeller det finns och hur blockchain kan användas för att säkra IoT med exempelvis användningen av smarta kontrakt. Tre modeller identifieras där graden för inklusion av blockchain skiljer sig. IoT till IoT-modellen lagrar en del av datat i blockchain medan IoT interaktioner sker utan att använda blockchain. IoT till blockchain-modellen innebär att alla interaktioner sker via blockchain. Den tredje modellen är en hybrid vilket innebär att en del av interaktionen och datat placeras i blockchain och att det går att välja vilka interaktioner som ska ske via blockchain. Resultatet visar att blockchain kan användas för att bevara integritet och konfidentialitet mellan IoT enheter, mer specifikt kan det användas för autentisering och säker dataöverföring.
APA, Harvard, Vancouver, ISO, and other styles
37

Denis, Sitenkov. "Access Control in the Internet of Things." Thesis, SICS, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24325.

Full text
Abstract:
The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. The global connectivity provides great opportunities for data collection and analysis as well as for interaction of objects that cannot be connected to the same local area network. Many of application scenarios have high requirements to security and privacy of transmitted data. At the same time security solutions that are utilized for general purpose computers are not always applicable for constrained devices. That leaves a room for new solutions that takes into account the technological aspects of the Internet of Things. In this thesis we investigate the access control solution for the IETF standard draft Constrained Application Protocol, using the Datagram Transport Layer Security protocol for transport security. We use the centralized approach to save access control information in the framework. Since the public key cryptography operations might be computationally too expensive for constrained devices we build our solution based on symmetric cryptography. Evaluation results show that the access control framework increases computational effort of the handshake by 6.0%, increases the code footprint of the Datagram Transport Layer Security implementation by 7.9% and has no effect on the overall handshake time. Our novel protocol is not vulnerable to Denial of Service or Drain Battery Attack.
Thesis supervised by Shahid Raza (shahid@sics.se) and Ludwig Seitz (ludwig@sics.se)
APA, Harvard, Vancouver, ISO, and other styles
38

Acosta, Padilla Francisco Javier. "Self-adaptation for Internet of things applications." Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S094/document.

Full text
Abstract:
L'Internet des Objets (IdO) couvre peu à peu tous les aspects de notre vie. À mesure que ces systèmes deviennent plus répandus, le besoin de gérer cette infrastructure complexe comporte plusieurs défis. En effet, beaucoup de petits appareils interconnectés fournissent maintenant plus d'un service dans plusieurs aspects de notre vie quotidienne, qui doivent être adaptés à de nouveaux contextes sans l'interruption de tels services. Cependant, ce nouveau système informatique diffère des systèmes classiques principalement sur le type, la taille physique et l'accès des nœuds. Ainsi, des méthodes typiques pour gérer la couche logicielle sur de grands systèmes distribués comme on fait traditionnellement ne peuvent pas être employées dans ce contexte. En effet, cela est dû aux capacités très différentes dans la puissance de calcul et la connectivité réseau, qui sont très contraintes pour les appareils de l'IdO. De plus, la complexité qui était auparavant gérée par des experts de plusieurs domaines, tels que les systèmes embarqués et les réseaux de capteurs sans fil (WSN), est maintenant accrue par la plus grande quantité et hétérogénéité des logiciels et du matériel des nœuds. Par conséquent, nous avons besoin de méthodes efficaces pour gérer la couche logicielle de ces systèmes, en tenant compte les ressources très limitées. Cette infrastructure matérielle sous-jacente pose de nouveaux défis dans la manière dont nous administrons la couche logicielle de ces systèmes. Ces défis peuvent entre divisés en : Intra-nœud, sur lequel nous faisons face à la mémoire limitée et à la puissance de calcul des nœuds IdO, afin de gérer les mises à jour sur ces appareils ; Inter-noeud, sur lequel une nouvelle façon de distribuer les mises à jour est nécessaire, en raison de la topologie réseau différente et le coût en énergie pour les appareils alimentés par batterie ; En effet, la puissance de calcul limitée et la durée de vie de chaque nœud combiné à la nature très distribuée de ces systèmes, ajoute de la complexité à la gestion de la couche logicielle distribuée. La reconfiguration logicielle des nœuds dans l'Internet des objets est une préoccupation majeure dans plusieurs domaines d'application. En particulier, la distribution du code pour fournir des nouvelles fonctionnalités ou mettre à jour le logiciel déjà installé afin de l'adapter aux nouvelles exigences, a un impact énorme sur la consommation d'énergie. La plupart des algorithmes actuels de diffusion du code sur l'air (OTA) sont destinés à diffuser un microprogramme complet à travers de petits fragments, et sont souvent mis en œuvre dans la couche réseau, ignorant ainsi toutes les informations de guidage de la couche applicative. Première contribution : Un moteur de modèles en temps d'exécution représentant une application de l'IdO en cours d'exécution sur les nœuds à ressources limitées. La transformation du méta-modèle Kevoree en code C pour répondre aux contraintes de mémoire spécifiques d'un dispositif IdO a été réalisée, ainsi que la proposition des outils de modélisation pour manipuler un modèle en temps d'exécution. Deuxième contribution : découplage en composants d'un système IdO ainsi qu'un algorithme de distribution de composants efficace. Le découplage en composants d'une application dans le contexte de l'IdO facilite sa représentation sur le modèle en temps d'exécution, alors qu'il fournit un moyen de changer facilement son comportement en ajoutant/supprimant des composants et de modifier leurs paramètres. En outre, un mécanisme pour distribuer ces composants en utilisant un nouvel algorithme appelé Calpulli est proposé
The Internet of Things (IoT) is covering little by little every aspect on our lives. As these systems become more pervasive, the need of managing this complex infrastructure comes with several challenges. Indeed, plenty of small interconnected devices are now providing more than a service in several aspects of our everyday life, which need to be adapted to new contexts without the interruption of such services. However, this new computing system differs from classical Internet systems mainly on the type, physical size and access of the nodes. Thus, typical methods to manage the distributed software layer on large distributed systems as usual cannot be employed on this context. Indeed, this is due to the very different capacities on computing power and network connectivity, which are very constrained for IoT devices. Moreover, the complexity which was before managed by experts on several fields, such as embedded systems and Wireless Sensor Networks (WSN), is now increased by the larger quantity and heterogeneity of the node’s software and hardware. Therefore, we need efficient methods to manage the software layer of these systems, taking into account the very limited resources. This underlying hardware infrastructure raises new challenges in the way we administrate the software layer of these systems. These challenges can be divided into: intra-node, on which we face the limited memory and CPU of IoT nodes, in order to manage the software layer and ; inter-node, on which a new way to distribute the updates is needed, due to the different network topology and cost in energy for battery powered devices. Indeed, the limited computing power and battery life of each node combined with the very distributed nature of these systems, greatly adds complexity to the distributed software layer management. Software reconfiguration of nodes in the Internet of Things is a major concern for various application fields. In particular, distributing the code of updated or new software features to their final node destination in order to adapt it to new requirements, has a huge impact on energy consumption. Most current algorithms for disseminating code over the air (OTA) are meant to disseminate a complete firmware through small chunks and are often implemented at the network layer, thus ignoring all guiding information from the application layer. First contribution: A models@runtime engine able to represent an IoT running application on resource constrained nodes. The transformation of the Kevoree meta-model into C code to meet the specific memory constraints of an IoT device was performed, as well as the proposition of modelling tools to manipulate a model@runtime. Second contribution: Component decoupling of an IoT system as well as an efficient component distribution algorithm. Components decoupling of an application in the context of the IoT facilitates its representation on the model@runtime, while it provides a way to easily change its behaviour by adding/removing components and changing their parameters. In addition, a mechanism to distribute such components using a new algorithm, called Calpulli is proposed
APA, Harvard, Vancouver, ISO, and other styles
39

Forsby, Filip. "Digital Certificates for the Internet of Things." Thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217120.

Full text
Abstract:
This thesis will investigate the possibility of developing a lightweight digitalcertificate solution for resource constrained embedded systems in 6LoWPANnetworks. Such systems are battery powered or energy harvesting devices whereit is crucial that energy consumption and memory footprints are as minimalas possible. Current solutions for digital certificates are found to be moredemanding than what is desirable and therefore an issue that needs to besolved.The solution that is proposed in this thesis is a profile for the X.509 cer-tificate standard for use with constrained devices and the Internet of Things(IoT). Furthermore, a compression mechanism is designed and implementedfor certificates following this X.509 profile.Results show that compressing certificates is a highly viable solution, de-spite the added complexity it brings.This new lightweight digital certificate solution will allow resource con-strained systems to be able to run for longer without being interrupted orneeding maintenance.
Denna avhandling undersöker möjligheten att utveckla lättviktslösning förinbyggda system med begränsade resurser i 6LoWPAN-nätverk. Eneheter isådanna system drivs på batteri och återvunnen energi från omgivningen därminimal energi- och minnesanvänding är avgörande. Nuvarande lösningar fördigitala certifikat anses vara mer krävande än önskvärt och det är därför ettproblem som behöver lösas.Lösningen som presenteras i denna avhandling är en profil för certifikatstan-darden X.509 för användning med begränsade enheter inom Internet of Things(IoT). Utöver det är en komprimeringsmekanism designad och implementeradför certifikat som följer denna X.509-profil.Resultat visar att det är högst genomförbart att komprimera certifikat,trots den ökade komoplexiteten det medför.Denna nya lösning för digitala certifikat tillåter resursbegränsade enheteratt köras längre utan att behöva avbrytas eller underhållas.
APA, Harvard, Vancouver, ISO, and other styles
40

Reetz, Eike S. "Service testing for the 'Internet of Things'." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/810848/.

Full text
Abstract:
Services that represent sensor and actuator nodes, together with service orchestration, aid in overcoming the heterogeneous structure of the Internet of Things (IoT). Interconnecting different sensor and actuator nodes and exposing them as services is a complex topic which is even more demanding for testing. Further effort is needed to enable common and effcient methodologies for testing IoT-based services. IoT-based services differ from web services since they usually interact with the physical environment via sensor and actuator nodes. This changes how testing can be performed. An open research question is thereby how to apply Model-Based Testing (MBT) approaches for facilitating scalable and ef cient test automation. This thesis introduces a novel test framework to facilitate functional evaluation of IoT- based services based on MBT methodologies. The concept separates the service logic from connected sensor and actuator nodes in a sandbox environment. Furthermore, a new IoT service behaviour model is designed for representing relevant characteristics of IoT-based services and ensuring the automated emulation of sensor nodes. The IoT-behaviour model proves to be automatically transformable into executable Test Cases (TCs). As a proof of concept, the automated test approach is prototypically implemented as a novel test tool. The execution of the TCs reveals, that crucial failures, such as unexpected messages, data types, or data values, can be detected during test execution. Deriving tests from a test model typically result in huge number of TCs, which cannot be executed within a reasonable time and with limited resources. To enhance the diversity of executed TCs, similarity investigation algorithms are proposed and validated. The results show that the proposed Diversity-based Steady State Genetic algorithm can outperform existing solutions up to 11.6 % with less computation time. With regard to verifying the failure detection rate, experiments show that the proposed Group Greedy algorithm can enhance the rate up to 29 %.
APA, Harvard, Vancouver, ISO, and other styles
41

Iqbal, Muhammad Azhar. "Internet of Things (IoT) Industry Gateway Modelling." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28691.

Full text
Abstract:
The Internet of Things (IoT) provide the possibility to build dynamic industrial systems and applications to improve the quality of production in industrial areas. There are many Industrial IoT Gateways (IoTGWs) available on the market, all of which have different functionalities and properties. Here, the different properties of the IIoTGWs were explored, with the researcher’s as well as vendor’s perspective in mind. The most important properties were identified using research papers and technical data sheets, based on this, a model was created. The model showed the best two gateways available in the database. The results show that methods used can be applied in future research.
APA, Harvard, Vancouver, ISO, and other styles
42

Kroon, Cathering, and Louise Myllylä. "Internet of Things - En studie med användarperspektiv." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-48838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sitenkov, Denis. "Access Control in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177205.

Full text
Abstract:
The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. The global connectivity provides great opportunities for data collection and analysis as well as for interaction of objects that cannot be connected to the same local area network. Many of application scenarios have high requirements to security and privacy of transmitted data. At the same time security solutions that are utilized for general purpose computers are not always applicable for constrained devices. That leaves a room for new solutions that takes into account the technological aspects of the Internet of Things. In this thesis we investigate the access control solution for the IETF standard draft Constrained Application Protocol, using the Datagram Transport Layer Security protocol for transport security. We use the centralized approach to save access control information in the framework. Since the public key cryptography operations might be computationally too expensive for constrained devices we build our solution based on symmetric cryptography. Evaluation results show that the access control framework increases computational effort of the handshake by 6.0%, increases the code footprint of the Datagram Transport Layer Security implementation by 7.9% and has no effect on the overall handshake time. Our novel protocol is not vulnerable to Denial of Service or Drain Battery Attack.
APA, Harvard, Vancouver, ISO, and other styles
44

Zaitov, Alisher. "Internet of things for monitoring grazing animals." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-196213.

Full text
Abstract:
Swedish agricultural industry is well known for it’s fair animal tending and ecological processes, the high standards comes at a cost of tough strict regulations. Laws were introduced to keep a low level usage of antibiotics and toxic products among the agricultural industry. The though competition from products imported from other countries with much less strict laws puts puts Swedish farmers under pressure and pushes them to keep an extra good eye on their animals in order to avoid sickness and injuries of their animals. This master thesis is focusing on investigating the possibility keep the low usage of antibiotics and maintaining the high level of standards by introducing new technology that can help the farmer to monitor their animals and keep them healthy. The goal of this thesis is to develop a system that monitors grazing animals in the pasture land and helps farmer to detect injuries and diseases at an earlier stage. For the system to be viable and useful for the farmer it has to keep low power consumption and come at an affordable price. The implemented system solution consists of a wireless sensor network that collects data about estimated position of the animal in the pasture land , interaction patterns and ambient sensor data of the environment. The data is then propagated using a opportunistic network protocol. Hardware prototype is tested using simulations, indoor tests, and field tests with cows on a farm in northern Sweden. The work is concluded with evaluations of the prototype based on requirements, scalability and cost
Svenska lantbruksndustrin är väl känt för sin rättvisa djurhantering och ekoloiska metoder, den höga standared kommer till en priset av hårda stränga regler. Lagar infördes för att hålla en låg användningsnivå av antibiotika och giftiga ämnen bland jordbruksindustrin. Vilket sätter jordbrukare under press och kräver dem att hålla ett extra gott öga på sina djur för att undvika sjukdom och skador på sina djur. Detta examensarbete fokuserar på att undersöka möjligheten att hålla låg användning av antibiotika men bibehålla den höga standarder genom att införa ny teknik som kan hjälpa bonden att övervaka sina djur och hålla dem friska. Målet med denna examensarbete är att utveckla en system prototyp som övervakar betande djur och hjälper bonden att upptäcka skador och sjukdomar i ett tidigare skede. För att systemet ska vara lönsamt och användbart för jordbrukaren behöver den hålla en låg strömförbrukning och komma till ett överkomligt pris. Den genomförda systemlösningen bygger på ett trådlöst sensornätverk som samlar in data om esitmerad position av djuret i betesmarken, interaktionsmönster och omgivnings sensordata av miljön. Prototypen testas med simuleringar, tester i labmiljö samt fälttester med kor på en gård i norra Sverige. Arbetet avslutas med utvärderingar av prototypen baserat på systemkrav, skalbarhet och kostnad.
APA, Harvard, Vancouver, ISO, and other styles
45

Ydrefors, Anton, and Mikael Örn. "Säker Internet of Things-kommunikation : XMPP och distribuerade sociala nätverk analyserat enligt OWASP top 10 Internet of Things Vulnerabilities." Thesis, Uppsala universitet, Institutionen för informatik och media, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-300943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Corneo, Lorenzo. "Calvin based Internet of Things framework on Resource Constrained Devices : Analysis and implementation of an Internet of Things framework." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204913.

Full text
Abstract:
The Internet of Things (IoT) is a network of devices, usually sensors and actuators, that are connected together through the Internet and can be remotely accessed and commanded. As IoT is getting very pervasive, there is the need to extend, in an efficient manner, such functionality also to Constrained Resource Devices (CRD) which rely on limited computational power. Furthermore, the diversity in the lowest level of the IoT stack, due to the several devices available on the market, is a huge problem to tackle. We propose to solve these problems taking as a case study Calvin, an IoT actor-based hybrid framework by Ericsson Research, and ARM mbed OS, which purpose is to fill the gap between the diversity of devices, providing a set of APIs that hides these differences. The solution we present in this paper is µCalvin, a minimal Calvin prototype implementation that runs on the top of mbed OS. We achieve the porting of Calvin on CRDs selecting a subset of its functionality which still guarantee the ability to run applications. To conclude, we evaluate µCalvin in terms of performance, network traffic and amount of messages exchanged.
Internet of Things (IoT) är ett nätverk av enheter som vanligtvis består utav sensorer och manöverdon, som är sammankopplade genom Internet och kan fjärrstyras. Eftersom, Internet of Things blir mycket genomträngande, finns det ett behov att utvidga, i en effektivt sätt, sådan funktioner även till Constraint Resource Devices (CRD) som är beroende av begränsad beräknings kraft. Dessutom, mångfalden i den lägsta nivån av IoT stack, på grund av de flera enheter som finns på marknaden, är en enorm problem att ta itu med. Vi föreslår att lösa dessa problem med hjälp av en fallstudie Calvin, en IoT actor-baserade hybrid framework utav Ericsson Research, och ARM mbed OS, vilket syftet är att fylla mellanrummet mellan mångfalden av enheter, vilket ger en uppsättning API: er som döljer dessa skillnader. Den lösning som vi presenterar i denna uppsats är µCalvin, en minimal Calvin prototyp genomförande som körs på toppen av mbed OS. Vi uppnår porteringen av Calvin på CRDs, genom att välja en delmängd av dess funktionalitet som fortfarande garantera möjligheten att köra applikationer. För att sammanfatta, utvärderar vi µCalvin i form av prestanda, nätverkstrafiken och mängden av meddelanden som utbyts.
APA, Harvard, Vancouver, ISO, and other styles
47

Huang, Guanglei, and Christensen Joacim Ahlin. "Harnessing the power of the Internet of Things : A Performance-impact model for Companies´adoption of the Internet of Things." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353860.

Full text
Abstract:
Every day, more and more devices are getting connected to the Internet and becoming what we know as the Internet of Things (IoT). In both commercial and industrial context, IoT plays a significant role in enabling automatisation and connectivity. For companies that want to become the innovation leader in their branch of industry, IoT is a useful method to gain competitive advantage where automatisation, predictive maintenance and connectivity can improve company’s performance. However, no research have been done from the perspective of an IoT-provider. How they can fully harness the power of IoT when they adopt it for their existing products or services? This study aim to investigate how a theoretical model would look like with the performance impact in focus when an innovation-driven company adopt IoT on their existing products. The research is conducted with a case study of a Swedish company in the heavy industry sector, which has successfully adapted IoT into their products. The empirical data was collected through documentation review and interview. This study results in a conceptual model that contains crucial factors which needs to be taken into consideration when adopting IoT. However, further research needs to be done, in order to verify this model as well as to be able to generalise the findings to cover innovation adoption in general.
APA, Harvard, Vancouver, ISO, and other styles
48

Resell, Joakim. "Internet of Things i 5G : En systematisk litteraturstudie av säkerhetsrisker för privatpersoner med Internet of Things-enheter i 5G-nätverk." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18718.

Full text
Abstract:
De senaste åren har Internet of Things-enheter fått en explosionsartad tillväxt och möjligheterna är oändliga för hur tillverkare kan öka vår livskvalitet genom internetuppkopplade objekt. Således har Internet of Things-enheter i olika former hittat sin plats i många personers hem och liv. Ännu större blir utvecklingsmöjligheterna då 5G-nätverket kommer implementeras i vårt samhälle inom snar framtid. 5G förväntas bidra med, i jämförelse med 4G, väldigt snabba dataöverföringshastigheter och nya teknologier. Syftet med Internet of Things-enheter är att på något sätt öka användares livskvalitet, men då de även är enkla måltavlor för angrepp riskerar dem att snarare försämra den för privatpersoner. Faktum är att antalet malware-angrepp ständigt ökar,och då särskilt mot Internet of Things-enheter. Då 5G bidrar med nya teknologier som låter enheter ha en direkt sammankopplad kommunikation och uppkoppling till internet lyfter det frågan huruvida det har en påverkan på privatpersoners informationssäkerhet. Detta arbete innefattar en systematisk litteraturstudie kring säkerhetsrisker för privatpersoner med Internet of Things-enheter i 5G-nätverk. Studiens resultat tyder på att Internet of Things-enheter i 5G-nätverk tillsammans bildar en farlig miljö för privatpersoner ur ett informationssäkerhetsperspektiv. Studiens resultat bidrar med en översikt bestående av sex säkerhetsrisker med Internet of Things-enheter i 5G-nätverk, sjutton sårbarheter som säkerhetsriskerna innefattar, dess konsekvenser samt huruvida säkerhetsriskerna och sårbarheterna innebär riskfaktorer gentemot privatpersoners konfidentialitet, integritet eller tillgänglighet.
In recent years, Internet of Things-devices have experienced explosive growth, and the possibilities are endless for how manufacturers can increase our quality of life through Internet-connected objects. Thus, Internet of Things devices in various forms have found their place in the homes and lives of many people. Even greater will the the development opportunities be as the 5G network will be implemented in our society in the near future. 5G is expected to contribute, in comparison with 4G, very fast data transferspeeds and new technologies. The purpose of Internet of Things-devices is to somehow increase the quality of life of users, but as they are also simple targets for attacks, they risk rather deteriorating it for individuals. In fact, the number of malware attacks is constantly increasing, especially against Internet of Things-devices. As 5G contributes new technologies that allow devices to have a direct interconnected communication and connection to the Internet, it raises the question of whether it has an impact on individuals' information security.This study includes a systematic literature review on security risks for individuals with Internet of Things-devices in 5G networks. The study's findings suggest that Internet ofThings-devices in 5G networks together create a dangerous environment for individuals from an information security perspective. The study's findings provide an overview of six security risks with Internet of Things-devices in 5G networks, seventeen vulnerabilities that include security risks, their consequences and whether the security risks and vulnerabilities involve risk factors against individuals' confidentiality, integrityor accessibility.
APA, Harvard, Vancouver, ISO, and other styles
49

Kentpayeva, Madina. "Mozilla Project Things - Gli oggetti si parlano sul Web." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
In questa tesi, per meglio comprendere come nasce e si sviluppa una piattaforma WoT si parte da una panoramica sul grande sviluppo che sta avendo il mondo IoT, con un’analisi delle tecnologie che lo hanno reso possibile, tecnologie di rete, protocolli, hardware e settori applicativi. Successivamente, attraverso lo studio delle specifiche WoT di W3C, Architettura e Thing description, si va ad analizzare la necessità di gestire universalmente questa moltitudine di dispositivi connessi, l'idea del Web of Things è quella di creare un Internet of Things decentralizzato fornendo gli URL delle cose sul Web per renderli collegabili e rilevabili e definendo un modello di dati standard e API per renderli interoperabili. Infine si illustra il lavoro fatto dal Team Mozilla nello sviluppo del progetto Project Things, inizialmente un framework sperimentale di software e servizi per aiutare gli sviluppatori a connettere cose nel web in modo sicuro, protetto e interoperabile, che diventa poi Mozilla WebThings una piattaforma aperta per il monitoraggio e il controllo dei dispositivi sul Web. Con le sue funzionalità peculiari: Mozilla WebThings Gateway, una distribuzione software per gateway domestici, su Raspberry Pi intelligenti incentrata su privacy, sicurezza e interoperabilità e Mozilla WebThings Framework, una raccolta di componenti software riutilizzabili per aiutare gli sviluppatori a creare le proprie Web Things.
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Zhi. "Networked RFID Systems for the Internet of Things." Doctoral thesis, KTH, Elektroniksystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-120056.

Full text
Abstract:
The Internet of Things (IoT) utilizes trillions of uniquely identifiable smart objects to connect anything at anytime and anywhere. Radio frequency identification (RFID) techniques are a powerful promising enabler for realizing the IoT. Around how to build hierarchical networked RFID systems for the IoT, this dissertation formulates and addresses problems in three key areas, i.e., communication protocols, simulation approaches, and RFID applications. Communication protocols are essential for designing high-performance networked RFID systems. First, we propose to use time hopping pulse-position modulation (TH-PPM) impulse radio ultra wideband (IR-UWB) for the tag-to-reader link. We analyze different parts of the system delay and propose relevant strategies to shorten the delay. Second, we give the concept of code division multiple access (CDMA) UWB RFID systems. We analyze the asynchronous matched filter receiver and decorrelating receiver for multi-tag detection, and propose a new communication process that fully exploits the multiple-access capability of the two detection schemes. Simulations are widely used to evaluate the performance of wireless networks. We propose a new approach for simulating networked RFID systems with multiple wireless standards within one case in OMNeT++. It is realized by partitioning and modeling the protocol stacks of different standards and designing a multi-radio module. Moreover, we propose a CO-Simulation framework with MATLAB and OMNeT++ (COSMO). COSMO has the ability of self-validation. It combines the strengths of MATLAB and OMNeT++ by compiling prebuilt models in MATLAB to header files and shared libraries and integrating them into OMNeT++. RFID technology gains popularity because it can be used to track and monitor objects in real time. We implement two typical networked RFID applications, i.e., wide area RFID sensor network and item-level indoor RFID localization. We design a two-layered wide area RFID sensor network for fresh food tracking. It adopts GSM/GPRS for the communication between the server and master nodes, and semi IR-UWB for the communication between master nodes and slave nodes. We develop the control platform and implement the all-in-one sensor nodes. For indoor RFID localization, we give insights about the influence of tag interaction on tag antenna radiation pattern and localization accuracy. Two examples, i.e., the k-NN algorithm and the Simplex algorithm, are taken to show how to utilize tag interaction analysis to improve the design of localization algorithms.

QC 20130409

APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography