Dissertations / Theses on the topic 'Interner of Things'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Interner of Things.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Martinsson, Albin Martinsson. "Embedded IoT for Eclipse Arrowhead." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85910.
Full textVitale, Clemente. "Internet of Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3184/.
Full textPiškula, David. "Internet of Things." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399196.
Full textCostanzi, Elena. "Studio e progettazione di soluzioni di Thing Directory per scenari W3C Web of Things." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22884/.
Full textPoggi, Giovanni. "Internet of Medical Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textCarlsson, Simon, and Max Näf. "Internet of Things Hacking." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239366.
Full textSabel, Ida. "Internet of Things & Kommunikationsprotokoll." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-27246.
Full textBy studying different communication protocols respond to what it is that makes a certain protocol best suited for use between mobile devices and IoT devices. This study used a qualitative literature study to create a proper theoretical background and an experimental study where two theories were investigated in whether they matched wih the results from the reality. The five factors compatibility, battery loss, frequency, range and reliability were investigated in the communication protocols Bluetooth Low Energy (BLE), Near field communication (NFC) and Wi-Fi, these three because they are supported by newer mobile platforms today. The communication protocols were then analysed against various uses in the IoT, since the claim what it is that makes it best suited depends on what the situation requires. A system developer that is about to select the communication protocol to use in an IoT application and reads this study should compare the different protocols to each other within the five factors to determine which protocol is best suited for his situation. This study only performed experimental studies on BLE because of limitations in the equipment. Additional experiments on NFC and Wi-Fi would provide a wider perspective.
Söderberg, Karl Jakob Emanuel. "INTERNET OF THINGS : Smart välfärdsteknologi." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15793.
Full textNorburg, David, and David Persson. "Internet of Things - Ett användarperspektiv." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37712.
Full textOkumura, Brandon M. "IoTA: Internet of Things Assistant." DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1769.
Full textHrnjez, Tatjana. "Internet of Things på Teknikprogrammet." Thesis, Malmö högskola, Fakulteten för lärande och samhälle (LS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-27618.
Full textSong, Yuanjun. "Security in Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142451.
Full textCobârzan, Cosmin. "Internet of highly mobile things." Thesis, Strasbourg, 2015. http://www.theses.fr/2015STRAD037/document.
Full textMobility is becoming an integrating part of todays Internet of Things, as many applications such as wildlife monitoring or target tracking in the battlefield cannot be done only with the help of static nodes. The goal of this thesis is to provide new communication architecture articulated around providing mobility support in Low Power and Lossy Networks (LLNs). First we analyzed from a theoretical point of view the IPv6 address auto-configuration with all optimizations made in Neighbor Discovery Optimization for IPv6 over 6LoWPAN. This step is of crucial importance for protocols that offer mobility support in IP networks, such as MIPv6. Our findings, increased message size that leads to fragmentation and high energy consumption for routers that are involved in Neighbor Discovery message exchange, have lead us to use the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) in order to provide mobility support. RPL is build from ground up with respect to LLN requirements. Our second contribution enhanced RPL operations to support mobility management. Finally, we proposed a cross-layer protocol – Mobility Triggered-RPL – that leverages actions from the X-Machiavel preamble sampling MAC protocol into RPL
Borrillo, Mattia. "Internet of things e integrazione nel web: Web of things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/9229/.
Full textBarretta, Salvatore. "UAV based Narrowband - Internet of things." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22761/.
Full textSöderström, Rasmus, and Martin Westman. "Internet of Things : The smart home." Thesis, Uppsala universitet, Institutionen för teknikvetenskaper, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353389.
Full textValkama, S. (Santeri). "Lämpötilaa mittaava Internet of Things -rele." Bachelor's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201609012678.
Full textThe purpose of this bachelor’s work is to present and prove functionality of a basic Internet of Things unit built on the Digistump Oak -development board capable of connections through internet and equipped with a relay and a temperature sensor. A couple of ways to prove the functionality of web requests are also presented. In addition, a few Internet of Things -applicable software were reviewed regarding suitability in this work
Santos, Vasco Alexandre Maia dos. "Secure decentralized internet of things infrastructure." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/18396.
Full textDespite many IoT Infrastructures having been implemented in recent years, none of them is truly prepared for a global deployment, where failure tolerance and scalability are an essential requirement. This dissertation presents an alternative concept for IoT Infrastructures, which focuses on enhancing the traditional centralized architecture, usually operated by a single entity, into a decentralized architecture featuring multiple entities and use cases. We propose a dynamic, community driven and self-configurable infrastructure on top of a structured Peer-to-Peer network, based on a Distributed Hash Table. Moreover, the proposed infrastructure is flexible enough to allow each peer of the overlay to enable a set of different services, according to its capabilities. In addition, a set of communication protocols is provided in order to support heterogeneous devices, as well as data access, streaming and persistence. It is also an important focus of our proposal to have mechanisms that guarantee the privacy and security of the information flow and storage.
Apesar de várias infraestruturas para IoT terem sido implementadas nos últimos anos, nenhuma delas está realmente preparada para ser utilizada a uma escala global, onde a escalabilidade e a tolerância a falhas são um requisito essencial. Esta dissertação apresenta um conceito alternativo de infraestruturas para a IoT, cujo foco consiste em evoluir a tradicional arquitetura centralizada, normalmente utilizada por uma entidade única, para uma arquitetura descentralizada, compatível com múltiplas entidades e casos de uso. Propomos uma infraestrutura auto-configurável, dinâmica e orientada à comunidade, construída em cima de uma rede Peer-to-Peer estruturada, baseada numa Distributed Hash Table. Além disso, a infraestrutura proposta é suficientemente flexível para permitir que cada peer da rede possa ativar diferentes serviços, mediante as suas capacidades. Por outro lado, um conjunto de protocolos de comunicação é providenciado, de modo a suportar dispositivos heterogéneos, bem como o acesso aos dados e a sua transmissão e persistência. Também é um foco importante desta proposta a disponibilização de mecanismos que garantam a privacidade e segurança da informação durante a sua transmissão e o seu armazenamento.
Elahi, Faizan Ehsan. "CONCURRENT INTERNET OF THINGS PROTOCOL STACKS." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-397010.
Full textAhlqvist, Niklas, Jonas Jungåker, and Agnes Perrin. "Internet of things and automated farming." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264453.
Full textSyftet med detta projekt är att göra det lättare att odla växter inhemskt året runt. Målet är att konstruera ett fjärrstyrbart och miljöoberoende automatiskt hydroponiskt system. Detta ska minimera ansträngningarna från användaren för att underhålla växter i icke-inhemska klimat. Ett hydroponiskt odlingssystem använder vatten som tillväxtmedium istället för jord. Tekniken har fördelar jämfört med konventionell odling vilket gör hydroponi mer miljövänligt. Hydroponiska system påverkas av flera faktorer, men detta projekt fokuserar bara på att kontrollera ljusintensiteten genom att isolera ljuset inom systemet samt att reglera näringsämne-koncentrationen genom att mäta den elektriska ledningsförmågan i vattnet. Systemet använder en mikrokontroll för analys och kontroll. Resultaten är lovande och visar att systemet fungerar. Däremot har begränsningarna i tid lett till en kort testperiod, därför är data som samlas in begränsad. Diskussionen baserad på resultaten drar slutsatsen att systemet inte kan anses vara helt automatiskt men reducerar behovet av manuell arbetskraft.
Vargas, Vargas Fernando. "Cloudlet for the Internet-of- Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191433.
Full textMed en befolkning som ökar i urbana områden, står många av världens städer inför utmaningar som ökande avgaser och trafikstockning. I ett försök att tackla sådana utmaningar, formulerar regeringar och stadsfullmäktige nya och innovativa strategier. Integrationen av ICT med dessa strategier bildar konceptet smart cities. Internet of Things (IoT) är en drivande faktor för smart city initiativ, vilket gör det nödvändigt för en IT infrastruktur som kan ta till vara på de många fördelar som IoT bidrar med. Cloudlet är en ny infrastrukturell modell som erbjuder datormolnskompetens i mobilnätverkets edge. Denna miljö karakteriseras av låg latens och hög bandbredd, utgörande ett nytt ekosystem där nätverksoperatörer kan hålla deras nätverks-edge öppet för utomstående, vilket tillåter att flexibelt och snabbt utveckla innovativa applikationer och tjänster för mobila subskribenter. I denna avhandling presenterar vi en cloudlet-arkitektur som framhäver edge computing, för att förse en plattform för IoT utrustning där många smart city applikationer kan utvecklas. Vi förser er först med en överblick av existerande utmaningar och krav i IoT systemutveckling. Sedan analyserar vi existerande cloudlet lösningar. Slutligen presenteras vår cloudlet arkitektur för IoT, inklusive design och en prototyplösning. För vår cloudlet-prototyp har vi fokuserat på en modell av mikroskala för att räkna ut CO2 emissioner per enskild resa med fordon, och implementerat en funktion som tillåter oss att läsa CO2 data från CO2 sensorer. Platsdata är inhämtad med hjälp av en Android smartphone och behandlas i cloudlet. Det hela sammanfattas med en prestandaevaluering.
Cooper, Ke'ahi. "Security for the Internet of Things." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172526.
Full textVerma, Yukti. "Secure system simulation - Internet of Things." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10116148.
Full textInternet of Things (IoT) can be defined as a collection of smart devices interacting with each other unanimously to fulfill a common goal. The real world data collected from the Internet of Things can be made as an integral part of web known as Web of Things (WoT). With the help of Web of Things architecture, the users can leverage simple web mechanisms such as browsing, searching and caching to interact with the smart devices. This thesis aims to create an entire system simulating the Web of Things architecture including sensors, edge routers, web interfaces, endpoints to the IoT network and access control. Several technologies such as CoAP, 6LoWPAN, IEEE 802.15.4, contiki and DTLS have been evaluated before inclusion in the implementation. A complete web portal utilizing Californium framework and Role Based Access Control has been created for accessing and interacting with the sensors and their data. This thesis provides an end-to-end approach towards IoT device security by implementing Constrained Application Protocol (CoAP) over Datagram Transport Layer Security (DTLS) in the system. The performance of secured system is analyzed in a constrained environment based on which it is observed that DLTS implementation increases the RAM usage, code size, packet overhead and power consumption by a significant value. Finally, the future work that needs to considered in order to iterate towards better security is specified.
Corino, Gianni. "Internet of props : a performative ontology and design framework for the Internet of Things." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/9511.
Full textAldossari, Mobark. "Three Essays on Internet of Things Adoption and Use." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1505259/.
Full textHamzic, Almira, and Isabel Olofsson. "DNS and the Internet of Things : Outlining the challenges faced by DNS in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202591.
Full textDetta examensarbete består av en litteraturstudie där olika aspekter av DNS (Domännamnssystemet, eng. Domain Name System) och Sakernas Internet (eng. Internet of Things) har studerats. En fungerande namngivnings-och serviceidentifieringsmetod är en viktig del för att kunna göra Sakernas Internet globalt, och DNS är den nuvarande metoden för att namnge enheter på Internet. Studien undersöker vissa utmaningar som DNS kan stöta på, nämligen funktionalitet, tillgänglighet och säkerhet. Rapportens slutsats är att en lösning baserad på multisändnings-DNS (eng. multicast DNS, mDNS) som är anpassad för begränsade nätverk (eng. constrained networks) är fördelaktig. Detta trots den begränsade säkerhet som finns tillgänglig just nu för en sådan lösning. I framtiden är det viktigt att säkerheten har högsta prioritet, eftersom säkerheten är begränsad hos DNS. Det behövs ytterligare studier när det gäller tillgänglighet och hur adressöversättning skulle fungera med begänsade enheter (eng. constrained devices) som använder viloläge.
Camacho, Andersson Emil, and Jonathan Karlsson. "Effekter av Internet of Things : Scenariobaserad studie som beskriver inledande effekter av Internet of Things i en verksamhet." Thesis, Högskolan Dalarna, Informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:du-22582.
Full textThe term "Internet of Things" refers to when an object from the real world becomes a part of the internet. Tunabyggen in Borlänge plans to implement an information system that will monitor temperature and humidity in selected facilities using a constant internet connection and different sensors. It is a simple system that doesn't seem to have a major impact on the current operations. The economic effects is often possible to calculate in advance, but the impact on staff, environment and routines may be forgotten. We have with this thesis examined the initial effects that may occur after the implementation of a new information system with Internet of Things functionality in a business, within the categories of economy, working environment, environmental impact and system management. To answer this we made a case study which is based on a scenario methodology that consists of four phases. Phase 1, where we got our case and created an understanding of the scenario field. Phase 2, identifying the key factors. It has been done through a literature study and interviews with relevant staff on Tunabyggen. Phase 3, where the analysis of these key factors were made through the situation and future analysis. Phase 4, where we generate scenarios of the analyzed key factors. Finally we have done a SWOT analysis to highlight the strengths, weaknesses, opportunities and threats. The results clearly show signs that there will be many effects for Tunabyggen after the implementation of the new information system, which manifests itself in all categories. The conclusion is that even the implementation of a menial information system like this one, the impacts are many. This is something that we believe should be considered by all companies that are thinking of acquiring a new system so they do not only evaluate IT-systems in economic terms, but also other factors that play a crucial role for the implementation of an information system to be successful.
Ben, Saied Yosra. "Collaborative security for the internet of things." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00879790.
Full textK, C. Sandeep. "Platform Independent Connections to Internet of Things." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-24787.
Full textTuyishimire, Emmanuel. "Internet of Things: Least Interference Beaconing Algorithms." Thesis, University of Cape Town, 2014. http://pubs.cs.uct.ac.za/archive/00000997/.
Full textEgel, Jill. "Internet of Things and its Business Models." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80995.
Full textRenuka, Venkata Ramani Challa. "Two way Firewall for Internet of Things." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194234.
Full textSakernas Internet år en framväxande global Internet-baserad teknisk arkitektur som på-verkar säkerheten och integriteten för inblandade deltagare. IoT-säkerhet är området där man strävar mot att såkra uppkopplade apparater och nätverk i Sakernas Inter-net. Det är av yttersta vikt att tillåta skyddad tillgång till IPv6 över trådlösa och energisnåla lokala nätverk (6LoWPAN), samt att skydda kritisk infrastruktur som har Internet-uppkoppling från trådlösa apparater inom 6LoWPAN-nätverken. Den säker-hetsarkitektur som används måste garantera motståndskraft mot attacker, autentisering och integritet av data, tillgångskontroll för data och resurser, samt användares privatliv. Med ökande användning av teknologi stiger möjligheten för hackare att kunna attackera ett nätverk framgångsrikt. Därför är säkerhet i nätverken av yttersta vikt.I denna rapport visar vi hur man kan motverka angrepp på säkerheten genom att im-plementera en två-vägs-brandvägg. Det vetenskapliga bidraget är att vi lägger till stöd för IoT-protokollet Constrained Application Protocol (CoAP) och Datagram Transport Layer Security (DTLS), vilka används av många för kommunikation inom IoT-nätverk. Om ett paket inkommer på en CoAP- eller DTLS-port, så undersöker brandväggen pa-ketet för att se till så att paketet är formaterat korrekt. Apparater i 6LoWPAN har ofta minnesbegränsningar, varför ett annat centralt bidrag i denna rapport är att brandvägg-sreglerna lagras i filer och inläses direkt vid behov för att minimera minnesanvändningen. Dessutom sparas besluten som tas av brandväggen, dvs. svart- och vitlistningar av IP-adresser, i filer.Brandväggen används och utvärderas inom 6LoWPAN. Energiförbrukningen och min-nesanvändningen beräknas utifrån experimentell data. Säkerheten utvärderas analytiskt, och vi ser att andelen sant positiva beslut är 80-95% för Denial-of-Service (DoS) attacker, samt 90-100% för IP-spoofing attacker. Slutsatsen är att brandväggen kan driftsättas med väldigt lågt minnesbehov och låg energiförbrukning. Brandväggen kan i framti-den utökas med ytterligare IoT-protokoll som Message Queuing Telemetry Transport (MQTT) och Extensible Messaging and Presence Protocol (XMPP). Dessutom vore det önskvärt med stöd för andra detekteringsmekanismer mot attacker, som exempelvis IP-spoofing och Distributed Denial-of-Service (DDoS).
Hassan, Basma Mostafa. "Monitoring the Internet of Things (IoT) Networks." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS100.
Full textBy connecting billions of things to the Internet, IoT created a plethora of applications that touch every aspect of human life. Time-sensitive, mission-critical services, require robust connectivity and strict reliability constraints. On the other hand, the IoT relies mainly on Low-power Lossy Networks, which are unreliable by nature due to their limited resources, hard duty cycles, dynamic topologies, and uncertain radio connectivity. Faults in LLNs are common rather than rare events, therefore, maintaining continuous availability of devices and reliability of communication, are critical factors to guarantee a constant, reliable flow of application data.After a comprehensive literature review, and up to our knowledge, it is clear that there is a call for a new approach to monitoring the unreliable nodes and links in an optimized, energy-efficient, proactive manner, and complete interoperability with IoT protocols. To target this research gap, our contributions address the correct assignment (placement) of the monitoring nodes. This problem is known as the minimum assignment problem, which is NP-hard. We target scalable monitoring by mapping the assignment problem into the well-studied MVC problem, also NP-hard. We proposed an algorithm to convert the DODAG into a nice-tree decomposition with its parameter (treewidth) restricted to the value one. As a result of these propositions, the monitor placement becomes only Fixed-Parameter Tractable, and can also be polynomial-time solvable.To prolong network longevity, the monitoring role should be distributed and balanced between the entire set of nodes. To that end, assuming periodical functioning, we propose in a second contribution to schedule between several subsets of nodes; each is covering the entire network. A three-phase centralized computation of the scheduling was proposed. The proposition decomposes the monitoring problem and maps it into three well-known sub-problems, for which approximation algorithms already exist in the literature. Thus, the computational complexity can be reduced.However, the one major limitation of the proposed three-phase decomposition is that it is not an exact solution. We provide the exact solution to the minimum monitor assignment problem with a duty-cycled monitoring approach, by formulating a Binary Integer Program (BIP). Experimentation is designed using network instances of different topologies and sizes. Results demonstrate the effectiveness of the proposed model in realizing full monitoring coverage with minimum energy consumption and communication overhead while balancing the monitoring role between nodes.The final contribution targeted the dynamic distributed monitoring placement and scheduling. The dynamic feature of the model ensures real-time adaptation of the monitoring schedule to the frequent instabilities of networks, and the distributed feature aims at reducing the communication overhead
Mendes, José Miguel Martins Lopes. "Security techniques for the internet of things." Master's thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/12686.
Full textIoT assume que dispositivos limitados, tanto em capacidades computacionais como em energia disponível, façam parte da sua infraestrutura. Dispositivos esses que apresentam menos capacidades e mecanismos de defesa do que as máquinas de uso geral. É imperativo aplicar segurança nesses dispositivos e nas suas comunicações de maneira a prepará-los para as ameaças da Internet e alcançar uma verdadeira e segura Internet das Coisas, em concordância com as visões atuais para o futuro. Esta dissertação pretende ser um pequeno passo nesse sentido, apresentando alternativas para proteger as comunicações de dispositivos restritos numa perspetiva de performance assim como avaliar o desempenho e a ocupação de recursos por parte de primitivas criptográficas quando são aplicadas em dispositivos reais. Dado que a segurança em diversas ocasiões tem de se sujeitar aos recursos deixados após a implementação de funcionalidades, foi colocada uma implementação de exposição de funcionalidades, recorrendo ao uso de CoAP, num dispositivo fabricado com intenção de ser usado em IoT e avaliada de acordo com a sua ocupação de recursos.
IoT comprehends devices constrained in both computational capabilities and available energy to be a part of its infrastructure. Devices which also present less defense capabilities and mechanisms than general purpose machines. It’s imperative to secure such devices and their communications in order to prepare them for the Internet menaces and achieve a true and secure Internet of Things compliant with today’s future visions. This dissertation intends to be a small step towards such future by presenting alternatives to protect constrained device’s communications in a performance related perspective as well as benchmarks and evaluation of resources used by cryptographic primitives when implemented on real devices. Due to security being on multiple occasions subjected to the resources available only after functionalities implementation, a minimalist implementation of functionalities exposure through the use of CoAP was also deployed in an IoT intended device and assessed according to resource overhead.
Gu, Wei. "Robustness against interference in Internet of Things." Thesis, Lille 1, 2012. http://www.theses.fr/2012LIL10195/document.
Full textInternet of Things brought great interests in recent years for its attractive applications and intelligent structure. However, the implementation of sensor networks still presents important challenges such as the generation of Multiple-Access-Interference (MAI) with impulsive nature and the relatively high energy consumption. Both the MAI and the thermal noise should be considered due to their strong impairments each may cause on the communication quality. We employ the stable and Gaussian distributions to model the MAI and the thermal noise respectively. Firstly we study the performance of turbo codes in the direct link and we propose the p-norm as a decoding metric. This metric allows a considerable error correction performance improvement which is close to the optimal decoder. Then we investigate cooperative communications. The probability densities in the decision statistic of the optimal receiver are estimated using importance sampling approach when both the stable and Gaussian noises are present. Such a method is computationally expensive. Hence we develop an approximation approach based on the Normal Inverse Gaussian (NIG) distribution. This solution is efficient for calculation and is proximate to the optimal receiver. In addition we show that the p-norm receiver has robust performance no matter what kind of noise is dominant. At last we combine the channel coding and cooperative communication works to establish a distributed channel coding strategy. Through some simulation assessments, the energy saving strategy can be realized by choosing an appropriate distributed channel coding scheme based on the direct link quality and target bit error rate
Sabe, Tahir, and Ridom Khan. "Blockchain för att säkra Internet of Things." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-283791.
Full textDenis, Sitenkov. "Access Control in the Internet of Things." Thesis, SICS, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24325.
Full textThesis supervised by Shahid Raza (shahid@sics.se) and Ludwig Seitz (ludwig@sics.se)
Acosta, Padilla Francisco Javier. "Self-adaptation for Internet of things applications." Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S094/document.
Full textThe Internet of Things (IoT) is covering little by little every aspect on our lives. As these systems become more pervasive, the need of managing this complex infrastructure comes with several challenges. Indeed, plenty of small interconnected devices are now providing more than a service in several aspects of our everyday life, which need to be adapted to new contexts without the interruption of such services. However, this new computing system differs from classical Internet systems mainly on the type, physical size and access of the nodes. Thus, typical methods to manage the distributed software layer on large distributed systems as usual cannot be employed on this context. Indeed, this is due to the very different capacities on computing power and network connectivity, which are very constrained for IoT devices. Moreover, the complexity which was before managed by experts on several fields, such as embedded systems and Wireless Sensor Networks (WSN), is now increased by the larger quantity and heterogeneity of the node’s software and hardware. Therefore, we need efficient methods to manage the software layer of these systems, taking into account the very limited resources. This underlying hardware infrastructure raises new challenges in the way we administrate the software layer of these systems. These challenges can be divided into: intra-node, on which we face the limited memory and CPU of IoT nodes, in order to manage the software layer and ; inter-node, on which a new way to distribute the updates is needed, due to the different network topology and cost in energy for battery powered devices. Indeed, the limited computing power and battery life of each node combined with the very distributed nature of these systems, greatly adds complexity to the distributed software layer management. Software reconfiguration of nodes in the Internet of Things is a major concern for various application fields. In particular, distributing the code of updated or new software features to their final node destination in order to adapt it to new requirements, has a huge impact on energy consumption. Most current algorithms for disseminating code over the air (OTA) are meant to disseminate a complete firmware through small chunks and are often implemented at the network layer, thus ignoring all guiding information from the application layer. First contribution: A models@runtime engine able to represent an IoT running application on resource constrained nodes. The transformation of the Kevoree meta-model into C code to meet the specific memory constraints of an IoT device was performed, as well as the proposition of modelling tools to manipulate a model@runtime. Second contribution: Component decoupling of an IoT system as well as an efficient component distribution algorithm. Components decoupling of an application in the context of the IoT facilitates its representation on the model@runtime, while it provides a way to easily change its behaviour by adding/removing components and changing their parameters. In addition, a mechanism to distribute such components using a new algorithm, called Calpulli is proposed
Forsby, Filip. "Digital Certificates for the Internet of Things." Thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217120.
Full textDenna avhandling undersöker möjligheten att utveckla lättviktslösning förinbyggda system med begränsade resurser i 6LoWPAN-nätverk. Eneheter isådanna system drivs på batteri och återvunnen energi från omgivningen därminimal energi- och minnesanvänding är avgörande. Nuvarande lösningar fördigitala certifikat anses vara mer krävande än önskvärt och det är därför ettproblem som behöver lösas.Lösningen som presenteras i denna avhandling är en profil för certifikatstan-darden X.509 för användning med begränsade enheter inom Internet of Things(IoT). Utöver det är en komprimeringsmekanism designad och implementeradför certifikat som följer denna X.509-profil.Resultat visar att det är högst genomförbart att komprimera certifikat,trots den ökade komoplexiteten det medför.Denna nya lösning för digitala certifikat tillåter resursbegränsade enheteratt köras längre utan att behöva avbrytas eller underhållas.
Reetz, Eike S. "Service testing for the 'Internet of Things'." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/810848/.
Full textIqbal, Muhammad Azhar. "Internet of Things (IoT) Industry Gateway Modelling." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28691.
Full textKroon, Cathering, and Louise Myllylä. "Internet of Things - En studie med användarperspektiv." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-48838.
Full textSitenkov, Denis. "Access Control in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177205.
Full textZaitov, Alisher. "Internet of things for monitoring grazing animals." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-196213.
Full textSvenska lantbruksndustrin är väl känt för sin rättvisa djurhantering och ekoloiska metoder, den höga standared kommer till en priset av hårda stränga regler. Lagar infördes för att hålla en låg användningsnivå av antibiotika och giftiga ämnen bland jordbruksindustrin. Vilket sätter jordbrukare under press och kräver dem att hålla ett extra gott öga på sina djur för att undvika sjukdom och skador på sina djur. Detta examensarbete fokuserar på att undersöka möjligheten att hålla låg användning av antibiotika men bibehålla den höga standarder genom att införa ny teknik som kan hjälpa bonden att övervaka sina djur och hålla dem friska. Målet med denna examensarbete är att utveckla en system prototyp som övervakar betande djur och hjälper bonden att upptäcka skador och sjukdomar i ett tidigare skede. För att systemet ska vara lönsamt och användbart för jordbrukaren behöver den hålla en låg strömförbrukning och komma till ett överkomligt pris. Den genomförda systemlösningen bygger på ett trådlöst sensornätverk som samlar in data om esitmerad position av djuret i betesmarken, interaktionsmönster och omgivnings sensordata av miljön. Prototypen testas med simuleringar, tester i labmiljö samt fälttester med kor på en gård i norra Sverige. Arbetet avslutas med utvärderingar av prototypen baserat på systemkrav, skalbarhet och kostnad.
Ydrefors, Anton, and Mikael Örn. "Säker Internet of Things-kommunikation : XMPP och distribuerade sociala nätverk analyserat enligt OWASP top 10 Internet of Things Vulnerabilities." Thesis, Uppsala universitet, Institutionen för informatik och media, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-300943.
Full textCorneo, Lorenzo. "Calvin based Internet of Things framework on Resource Constrained Devices : Analysis and implementation of an Internet of Things framework." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204913.
Full textInternet of Things (IoT) är ett nätverk av enheter som vanligtvis består utav sensorer och manöverdon, som är sammankopplade genom Internet och kan fjärrstyras. Eftersom, Internet of Things blir mycket genomträngande, finns det ett behov att utvidga, i en effektivt sätt, sådan funktioner även till Constraint Resource Devices (CRD) som är beroende av begränsad beräknings kraft. Dessutom, mångfalden i den lägsta nivån av IoT stack, på grund av de flera enheter som finns på marknaden, är en enorm problem att ta itu med. Vi föreslår att lösa dessa problem med hjälp av en fallstudie Calvin, en IoT actor-baserade hybrid framework utav Ericsson Research, och ARM mbed OS, vilket syftet är att fylla mellanrummet mellan mångfalden av enheter, vilket ger en uppsättning API: er som döljer dessa skillnader. Den lösning som vi presenterar i denna uppsats är µCalvin, en minimal Calvin prototyp genomförande som körs på toppen av mbed OS. Vi uppnår porteringen av Calvin på CRDs, genom att välja en delmängd av dess funktionalitet som fortfarande garantera möjligheten att köra applikationer. För att sammanfatta, utvärderar vi µCalvin i form av prestanda, nätverkstrafiken och mängden av meddelanden som utbyts.
Huang, Guanglei, and Christensen Joacim Ahlin. "Harnessing the power of the Internet of Things : A Performance-impact model for Companies´adoption of the Internet of Things." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353860.
Full textResell, Joakim. "Internet of Things i 5G : En systematisk litteraturstudie av säkerhetsrisker för privatpersoner med Internet of Things-enheter i 5G-nätverk." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18718.
Full textIn recent years, Internet of Things-devices have experienced explosive growth, and the possibilities are endless for how manufacturers can increase our quality of life through Internet-connected objects. Thus, Internet of Things devices in various forms have found their place in the homes and lives of many people. Even greater will the the development opportunities be as the 5G network will be implemented in our society in the near future. 5G is expected to contribute, in comparison with 4G, very fast data transferspeeds and new technologies. The purpose of Internet of Things-devices is to somehow increase the quality of life of users, but as they are also simple targets for attacks, they risk rather deteriorating it for individuals. In fact, the number of malware attacks is constantly increasing, especially against Internet of Things-devices. As 5G contributes new technologies that allow devices to have a direct interconnected communication and connection to the Internet, it raises the question of whether it has an impact on individuals' information security.This study includes a systematic literature review on security risks for individuals with Internet of Things-devices in 5G networks. The study's findings suggest that Internet ofThings-devices in 5G networks together create a dangerous environment for individuals from an information security perspective. The study's findings provide an overview of six security risks with Internet of Things-devices in 5G networks, seventeen vulnerabilities that include security risks, their consequences and whether the security risks and vulnerabilities involve risk factors against individuals' confidentiality, integrityor accessibility.
Kentpayeva, Madina. "Mozilla Project Things - Gli oggetti si parlano sul Web." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textZhang, Zhi. "Networked RFID Systems for the Internet of Things." Doctoral thesis, KTH, Elektroniksystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-120056.
Full textQC 20130409