To see the other types of publications on this topic, follow the link: Internet of Things (IoT).

Dissertations / Theses on the topic 'Internet of Things (IoT)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Internet of Things (IoT).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Nazim, Umair. "Securing Internet of Things (IoT)." Thesis, The University of Sydney, 2018. http://hdl.handle.net/2123/20275.

Full text
Abstract:
The Internet of Things (IoT) is our future and human life is now entering in to a generation where everyone will be using sensory information and artificial intelligence to make day to day life decisions in real-time. With implementation and enhancements around Internet protocol (IP) now it’s possible to connect and control these devices from anywhere around the globe they can be control by either human or even machines. Security is a critical element and building block for Internet of things (IoT) success. First, we have worked finding out possibility of detecting different types of attacks in Internet of things Wireless networks and identify them based on throughput, delay and energy consumed. Attack that we have work on include DOS attacks and DDOS attacks. Motivated by current use of Blockchain in resolving various problems we have evaluated its implementation to find solutions to secure Internet of Things. This become possible by utilising block chain network and smart contracts to validate any IoT communication . Using Blockchain network allowed IoT to detect securely authenticate without over utilizing device resource keeping in mind the limited hardware and bandwidth. IoT node or nodes communicates to a validator node within Blockchain network to get the most current binary of contracts status and in order to achieve this all the devices required to be in sync with Blockchain version of accounts stored by this validator node. We have worked out how this communication will work in order to ensure security and privacy while doing performance analysis of overheads. In conclusion IoT and Blockchain combine together is very promising solution to solve many current security issues in order to take it to mass scale deployment which allow implementation of Internet of things for a purposeful manner.
APA, Harvard, Vancouver, ISO, and other styles
2

Vitale, Clemente. "Internet of Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3184/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Iqbal, Muhammad Azhar. "Internet of Things (IoT) Industry Gateway Modelling." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28691.

Full text
Abstract:
The Internet of Things (IoT) provide the possibility to build dynamic industrial systems and applications to improve the quality of production in industrial areas. There are many Industrial IoT Gateways (IoTGWs) available on the market, all of which have different functionalities and properties. Here, the different properties of the IIoTGWs were explored, with the researcher’s as well as vendor’s perspective in mind. The most important properties were identified using research papers and technical data sheets, based on this, a model was created. The model showed the best two gateways available in the database. The results show that methods used can be applied in future research.
APA, Harvard, Vancouver, ISO, and other styles
4

Hassan, Basma Mostafa. "Monitoring the Internet of Things (IoT) Networks." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS100.

Full text
Abstract:
Les réseaux « Internet des Objets » se composent de plusieurs millions d’objets qui possèdent une adresse IP et qui peuvent connecter sur Internet. En général, ces objets sont supposé d’être autonomes et peuvent résoudre des tâches; mesurer, traiter et fournir des informations pour les systèmes connectés et pour les utilisateurs. Aussi, ces réseaux sont vulnérables (c.-à-d. : les éléments peuvent être mobiles et la topologie du réseau peut changer dynamiquement), les changements peuvent influencer le (bon) fonctionnement du réseau. De plus, ils peuvent être alimentés par des batteries de durée de vie limitée, ce que nécessite la réduction de leur consommation.Ce travail de thèse aborde un sujet important dans le domaine de l’Internet des Objets, qui consiste à savoir comment assurer la robustesse et le fonctionnement tolérant aux pannes du réseau pour répondre aux exigences des missions critiques. Avec le large déploiement des services IdO, ce problème est deventé ou de détection de pannes et de sécurité industriel où l’état des objets communicants doit être constamment vérifié pour le rétablissement rapide en cas de problème particulièrement crucial pour les applications telles que le monitorage intelligent de sames de communication inattendus. On cherche alors de minimiser le coût du monitorage et l’utilisation de l’énergie, et aussi les charges additionnelles sur les réseaux.Nous avons proposé un algorithme qui vise à réaliser un placement distribué des moniteurs avec une complexité minimale pour le calcul. L’algorithme proposé fonctionne avec RPL. L’objectif principal est d’augmenter la robustesse dans les réseaux IdO ciblant les applications critiques en temps réel via le monitorage des liaisons dans les DODAGs construits par RPL. Dans notre première contribution, le problème est modélisé comme un problème de couverture minimale des sommets (VCP) sur le DODAG. Nous avons développé un algorithme à temps polynomial qui transforme le DODAG en une décomposition arborescente (Nice-Tree Decomposition) avec une largeur arborescente (treewidth) d’unité. Cette stratégie profite de la spécificité des DODAG et a abouti à une réduction significative de la complexité de la résolution du VCP sur les DODAG. Elle peut être résolue en temps polynomial.La deuxième proposition est un modèle approché pour l’optimisation de l’ordonnancement du rôle de monitorage des nœuds dans les réseaux IdO, afin de maximiser la durée de vie des dispositifs embarqués à ressources limitées, tout en minimisant le coût global du monitorage de réseau. Le monitorage de réseau est très coûteux, en particulier pour les réseaux à ressources limitées tels que l’IdO. Par conséquent, le monitorage doit être économe en énergie et avec des frais généraux minimaux sur la performance normale du réseau. Notre travail correspondant contient une proposition d’un modèle mathématique en trois phases pour assurer l’exigence d’une couverture des moniteurs tout en minimisant la consommation d’énergie de monitorage et les frais de communication.Notre modèle proposé décompose le problème abordé en trois problèmes d’optimisation bien connus, il s’agit du problème de couverture de sommets, problème d’affectation généralisé multi-objectives et problème de voyageur de commerce.Dans cette troisième partie, une approche exacte est proposée pour résoudre le problème décrit dans (Contribution 2). Comme nous avons vu, la décomposition en trois phases ne donne pas la solution exacte. Nous avons donc proposé une formulation exacte du problème qui consiste en un problème de l'affectation minimum des tâches de surveillance avec un fonctionnement de surveillance cyclique. Pour cela, nous avons formulé un programme en nombres entiers binaires. L'ordonnancement optimal garantit la couverture du graphe pour la surveillance avec une consommation d'énergie minimale
By connecting billions of things to the Internet, IoT created a plethora of applications that touch every aspect of human life. Time-sensitive, mission-critical services, require robust connectivity and strict reliability constraints. On the other hand, the IoT relies mainly on Low-power Lossy Networks, which are unreliable by nature due to their limited resources, hard duty cycles, dynamic topologies, and uncertain radio connectivity. Faults in LLNs are common rather than rare events, therefore, maintaining continuous availability of devices and reliability of communication, are critical factors to guarantee a constant, reliable flow of application data.After a comprehensive literature review, and up to our knowledge, it is clear that there is a call for a new approach to monitoring the unreliable nodes and links in an optimized, energy-efficient, proactive manner, and complete interoperability with IoT protocols. To target this research gap, our contributions address the correct assignment (placement) of the monitoring nodes. This problem is known as the minimum assignment problem, which is NP-hard. We target scalable monitoring by mapping the assignment problem into the well-studied MVC problem, also NP-hard. We proposed an algorithm to convert the DODAG into a nice-tree decomposition with its parameter (treewidth) restricted to the value one. As a result of these propositions, the monitor placement becomes only Fixed-Parameter Tractable, and can also be polynomial-time solvable.To prolong network longevity, the monitoring role should be distributed and balanced between the entire set of nodes. To that end, assuming periodical functioning, we propose in a second contribution to schedule between several subsets of nodes; each is covering the entire network. A three-phase centralized computation of the scheduling was proposed. The proposition decomposes the monitoring problem and maps it into three well-known sub-problems, for which approximation algorithms already exist in the literature. Thus, the computational complexity can be reduced.However, the one major limitation of the proposed three-phase decomposition is that it is not an exact solution. We provide the exact solution to the minimum monitor assignment problem with a duty-cycled monitoring approach, by formulating a Binary Integer Program (BIP). Experimentation is designed using network instances of different topologies and sizes. Results demonstrate the effectiveness of the proposed model in realizing full monitoring coverage with minimum energy consumption and communication overhead while balancing the monitoring role between nodes.The final contribution targeted the dynamic distributed monitoring placement and scheduling. The dynamic feature of the model ensures real-time adaptation of the monitoring schedule to the frequent instabilities of networks, and the distributed feature aims at reducing the communication overhead
APA, Harvard, Vancouver, ISO, and other styles
5

Okumura, Brandon M. "IoTA: Internet of Things Assistant." DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1769.

Full text
Abstract:
The Internet of Things is the networking of electronic devices, or “Things”, that enables them to collect and share data, as well as interact with their physical surround- ings. Analyzing this collected data allows us to make smarter economic decisions. These interconnected networks are usually driven by low-powered micro-controllers or cheap CPUs that are designed to function optimally with very little hardware. As scale and computational requirements increase, these micro-controllers are unable to grow without being physically replaced. This thesis proposes a system, IoTA, that assists the Internet of Things by pro- viding a shared computational resource for endpoint devices. This solution extends the functionality of endpoint devices without the need of physical replacement. The IoTA system is designed to be easily integrable to any existing IoT network. This system presents a model that allows for seamless processing of jobs submitted by endpoint devices while keeping scalability and flexibility in mind. Additionally, IoTA is built on top of existing IoT protocols. Evaluation shows there is a significant performance benefit in processing computationally heavy algorithms on the IoTA system as compared to processing them locally on the endpoint devices themselves.
APA, Harvard, Vancouver, ISO, and other styles
6

Muhonen, T. (Tiia). "Standardization of Industrial internet and IoT (IoT — Internet of Things):perspective on condition-based maintenance." Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201504081319.

Full text
Abstract:
Decreasing costs of electronic devices, increasing computing abilities and advances in sensor technologies have enabled the internet to spread to the whole new area. In the near future, more and more smart objects will be connected to the internet, and new businesses will be created around them. Industrial internet and IoT are topical issues at the moment and both of them are widely studied and discussed in the literature. However, an up-to-date study about the state of their standardization is difficult to find. In this research, the objective is to find out what is the current state of Industrial internet and IoT standardization. Therefore, the results of this research will be useful for anyone working in these fields. Different standardization organizations, alliances and consortiums are also studied. In addition, unofficial industry standards and their potential development and impacts are reviewed. The perspective of the research is outlined especially into Condition-Based Maintenance (CBM). The theoretical part of the research is a literature review that creates a basis for the empirical part. The literature review studies the relevant topics of the research theme: Industrial internet, M2M (Machine to Machine), IoT, standardization and CBM. Qualitative case study method is applied in the empirical part of the research, and ten carefully chosen interviewees are interviewed for gathering the data. The case analysis shows that standardization is seen as an important part when machines start to share information with each other. However, the majority of the interviewees are not taking part of the standardization activities and the knowledge about the current state of standardization is yet quite unclear. The conclusion is based on the findings of the literature review and case analysis. The research findings indicate that standardization in the field of Industrial internet and IoT is just emerging. There is an extensive amount of organizations that are creating standards, both official and non-official, and the application space is wide. Many emerging applications are exploiting their own standards and many standards are still under development. The solutions rely on various co-existing protocols, interfaces and platforms, either proprietary or standard. Some of the Industrial internet and IoT standards will be official standards, whereas some will be de facto standards that are agreed by forums or alliances or dictated by companies in decisive roles. The study results show that standardization plays a key role in Industrial internet and IoT as it contributes to interoperability, compatibility, reliability, security and effective operations between heterogeneous technical solutions globally. Therefore collaboration among various organizations is important and needed
Elektronisten laitteiden kustannusten lasku, tietokoneiden laskentatehojen kasvu ja kehittyneet sensoriteknologiat ovat mahdollistaneet internetin leviämisen täysin uudelle alueelle. Lähitulevaisuudessa yhä useammat älykkäät esineet ovat yhteydessä internetiin, ja uusia liiketoimintoja luodaan niiden ympärille. Teollinen internet ja esineiden internet (IoT — Internet of Things) ovat ajankohtaisia aiheita tällä hetkellä ja molemmat laajalti tutkittuja kirjallisuudessa. Silti ajankohtaista tutkimusta niiden tämän hetkisestä standardoinnin tilasta on vaikea löytää. Tämän tutkimuksen tavoitteena on selvittää Teollisen internetin ja IoT:n standardoinnin nykytila. Näin ollen tutkimuksen tulokset hyödyttävät toimijoita näillä aloilla. Myös eri standardointiorganisaatioita, alliansseja ja yhteenliittymiä tarkastellaan. Lisäksi epävirallisia teollisuusstandardeja ja niiden mahdollista kehitystä ja vaikutuksia arvioidaan. Tutkimuksen näkökulma on rajattu erityisesti ennakoivaan kunnossapitoon. Tutkimuksen teoriaosuus on kirjallisuuskatsaus, joka muodostaa perustan empirialle. Kirjallisuuskatsaus tarkastelee tutkimuksen teeman kannalta relevantteja aihepiirejä: Teollinen internet, M2M (Machine to Machine), IoT, standardointi ja ennakoiva kunnossapito. Kvalitatiivista case-tutkimusmenetelmää sovelletaan tutkimuksen empiriaosiossa, ja tiedon keräämistä varten haastatellaan kymmenen tarkoin valittua haastateltavaa. Case-analyysi osoittaa, että standardointia pidetään tärkeänä laitteiden jakaessa tietoa toisilleen. Kuitenkaan suurin osa haastateltavista ei ota osaa standardointitoimintaan, ja käsitys standardoinnin nykytilasta on heille vielä melko epäselvä. Johtopäätökset pohjautuvat kirjallisuuskatsauksen ja case-analyysin perusteella saatuihin löydöksiin. Tutkimustulokset osoittavat, että Teollisen internetin ja IoT:n standardointi on vasta kehittymässä. Standardeja luovia organisaatioita, sekä virallisia että epävirallisia, on suuri määrä, ja sovelluskenttä on laaja. Monet kehittymässä olevat sovellukset hyödyntävät omia standardejaan, ja useat standardit ovat yhä kehitysasteella. Ratkaisut perustuvat erilaisiin yhtä aikaa olemassa oleviin protokolliin, rajapintoihin ja sovellusalustoihin, niin patentoituihin kuin standardeihinkin. Osa Teollisen internetin ja IoT:n standardeista tulevat olemaan virallisia standardeja, kun taas osa tulee olemaan de facto standardeja, jotka on hyväksytty forumeissa ja alliansseissa tai ratkaisevassa roolissa olevissa yrityksissä. Tutkimustulokset osoittavat, että standardointi on tärkeässä roolissa Teollisessa internetissä ja IoT:ssä, sillä se vaikuttaa yhteensopivuuteen, yhdenmukaisuuteen, luotettavuuteen, turvallisuuteen ja tehokkaaseen toimintaan hajanaisten teknisten sovellusten välillä globaalisti. Siitä syystä yhteistyö eri organisaatioiden välillä on tärkeää ja tarpeellista
APA, Harvard, Vancouver, ISO, and other styles
7

Eriksson, Fredrik. "Internet of Things (IoT): avskalad plattform i Java." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34066.

Full text
Abstract:
The need of smart devices that uses sensors have never been higher and by the year 2020 it will be over 50 billion devices connected to the internet. All these devices that uses a sensor and are connected to the internet are a part of something called Internet of Things. The purpose of this study has therefore been to implement a stripped IoT platform that doesn’t use any external libraries to lower the cost for minor companies that doesn’t need the more advanced and expensive platforms. After the implementation various stress test will be performed to see the performance of the platform. The study has been done through web- based sources and as a programming language Java has been used in the development environment NetBeans, the database has been made with MySQL workbench. The result of the study has been a platform that uses REST to post and get data from the database. The external library mysql- connector-java-5.1.45 was essential for a connection to the database and therefore had to be used. The result of the stress test was that the platform performed well and could handle at least 500 REST calls per second with a small increase in response time, but the standard deviation was considerably higher. The conclusion was that the platform performed stable at 50 – 250 calls per second and because of it being stripped several platforms could be used in a company to divide the work load between them resulting in a both stable and scalable solution.
Behovet för smarta enheter som använder sensorer har aldrig varit högre och det är trott att vid år 2020 kommer mer än 50 miljarder enheter vara uppkopplad mot internet. Alla dessa enheter med sensorer som är anslutna mot internet går under namnet Internet of Things. Syftet med denna studie har därför varit att skapa en avskalad IoT plattform som inte använder externa bibliotek för att hålla ned kostnaderna för de mindre företagen som inte behöver de mer avancerade och dyrare plattformarna. Efter att plattformen blivit implementerad skulle stresstester utförs för att avgöra hur bra den presterar. Studien har genomförts med hjälp av webbaserade källor och programmeringen av plattformen har utförts i programmeringsmiljön NetBeans i språket Java och databasen är skapad i MySQL workbench. Resultatet av studien har gett en plattform som använder REST för att skicka till och hämta data från databasen. Att göra implementeringen utan att använda externa bibliotek gick inte då biblioteket mysql-connector-java-5.1.45 var essentiellt för uppkoppling mot databasen. Stresstesterna gav att plattformen presterade stabilt och kunde hantera åtminstone 500 REST förfrågningar per sekund med endast en liten ökning i svarstiden, dock blev standardavvikelsen för svarstiden betydligt högre. Slutsatsen av studien blev att eftersom plattformen fungerar stabilt för 50 – 250 förfrågningar per sekund och då den tar upp lite processorkraft kan flera plattformar användas i ett företag för att då fördela arbetskraften emellan dem vilket resulterar i en lösning som både är skalbar samt stabil.
APA, Harvard, Vancouver, ISO, and other styles
8

Leonardi, S. "INTERNET OF THINGS (IOT) AND DAIRY FARM AUTOMATION." Doctoral thesis, Università degli Studi di Milano, 2015. http://hdl.handle.net/2434/262453.

Full text
Abstract:
The objectives of the thesis were: (i) to evaluate the use of automatic systems and the related sensor-based technologies (Precision Dairy Farming – PDF - systems) in three important areas of a dairy farming; (ii) to assess different methods of estimating liner compression (LC) by using a new test device and a novel artificial teat sensor, both specifically designed and built. Four studies were carried out to achieve these goals. In the first study “Use of a proactive herd management system in a dairy farm of northern Italy: technical and economic results” the reproductive and economical performances of an AMS farm that adopted a proactive herd management system (Herd Navigator™) were analyzed. Reproductive and economic data were recorded before and one year after the installation of Herd Navigator™. Number of days open reduced from 166 to 103 days, number of days between the first and second insemination decreased from 45 to 28 days, and days for identifying an abortion were 80 % less, from 31 to 6 days. The preliminary results highlighted the usefulness of the proactive herd management system implemented for the reproduction management. A basic economic model was proposed to evaluate the potential economic benefits coming from the introduction of this technology. The model considered the benefits deriving from the reduction of reproduction problems and, consequently, of days open. Considering the effects related to the above mentioned aspects in a case study involving 60 dairy cows, a return on investment over 5 years was calculated. In the second study “Evaluation of an electronic system for automatic calving detection on a dairy farm”, a GSM-based remote alarm system for automatic calving detection was evaluated - in terms of sensitivity and PPV- as useful and reliable tool to detect the exact moment of calving in the field. Up to date, various monitoring technologies and protocols have been proposed to predict the exact moment of the calving but none of them have been adopted widely by producers due to high costs, difficulties of execution or lack of quality staff. Visual observation of the cow’s behavior is still the most frequent. The system object of the study, showed very high sensitivity and PPV, respectively 100% and 95 %, allowing the farm staff to be present at the moment of calving in 100 % of cases when cow were monitored using this system. Cows not monitored by this system, were assisted only in 17% of cases (P<0.001). The farm staff, if present during this crucial and important moment, could assist the animal preventing possible problems for the cow and the calf. This possibility would be of great interest particularly with heifers and with problematic cows. In the third study “Evaluation of the performance of the first automatic milking system for buffaloes”, the response of buffaloes to automatic milking and the related performance of the system were investigated. Automatic milking systems (AMS) are a revolutionary innovation in dairy cow farming and can now be considered a well-established technology. In 2008, automatic milking of dairy buffaloes was introduced for the first time in a commercial farm in southern Italy. The aim of this study was to evaluate the response of buffaloes to automatic milking, examining the relationships between milking interval, milk production, and milking time for this species. A total of 7,550 milking records from an average of 40 buffaloes milked by an AMS were analyzed during a 3-mo experimental period at a commercial farm with Italian Mediterranean buffaloes in southern Italy. Date and time of animal identification, milk yield, milking duration, milking interval, and average milk flow rate were determined for each milking. The results were also used to predict the maximum number of milkings per day and the optimal number of buffaloes per AMS for different levels of milk production. The average interval period between 2 consecutive milkings was 10.3 h [standard deviation (SD) 3.3]. Overall, 3.4 and 25.7% of the milkings had an interval of ≤6 h or >12 h, respectively. Milking duration averaged 8.3 min per buffalo per milking (SD 2.7). The average milk flow rate was 1.3 kg/min (SD 0.5) at a milk yield of 2.8 kg per milking (SD 1.4). Assuming that the milking station is occupied 80% of the time, the number of milkings ranged from 136 to 152 per day and the optimal number of buffaloes per AMS ranged from 59 to 66 when the production level increased from 2 to 5 kg of milk per milking. Automatic milking systems seems suitable for buffalo, opening new options for the management of dairy buffalo farms. In the last study “Methods of estimating Liner Compression” the aim was to compare different methods of estimating liner compression (LC) by using a new test device and a novel artificial teat sensor, both specifically designed and built. Liner compression (LC) is the pressure applied to the teat end when liner collapses during the d-phase of pulsation. Liners with higher LC are thought to increase the occurrence of teat-end hyperkeratosis. Overpressure (OP)has been proposed as a relative indicator of LC. By using the new test device developed, two methods of measuring overpressure were compared: liner overpressure (OP) was measured with no pulsation (OPnp) and with limited pulsation (OPlp) repeatedly on the same cow during a single milking. Each of the six liners (three round liners and three triangular liners) used in this study were tested on the same six experimental cows. OPnp and OPlp were measured on all four teats of each experimental cow twice for each liner. The order of OPnp and OPlp alternated sequentially for each cow test. The OP results for the six liners were also compared to LC estimated on the same liners with a novel artificial teat sensor (ATS). The OPlp method showed small but significantly higher values than the OPnp method (13.9 kPa vs. 13.4 kPa). The OPlp method would be recommended as the preferred method as it more closely approximates normal milking condition. OP values decreased significantly between the first and the following measurements, (from 15.0 kPa to 12.4 kPa). Thus, performing the OP test at a consistent time, one minute after attaching the teatcup to a well-stimulated teat, to reduce the variability produced by OP changing during the peak flow period would be recommend. The new test device showed several advantages over previously published methods of measuring OP. A high correlation between OP and LC estimated by the ATS was found, however, difficulties were noted when using the ATS with triangular liners.
APA, Harvard, Vancouver, ISO, and other styles
9

Wernersson, Henrik Wernersson, and Yassin Atwa. "Resource constrained Industrial IoT device." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31252.

Full text
Abstract:
I dagens läge är industriella nätverk inte anpassade för att koppla upp resursbegränsade enheter pga av att industriella nätverks-protokollen som används är mer anpassade för real time applikationer. Det skulle vara ett stort steg för de industriella nätverken att kunna koppla upp resursbegränsade enheter för enkel övervakning samt analysering av data. Efter en undersökningsperiod av ett flertal olika IoT-protokoll, gjordes valet att implementera CoAP på en Anybus CompactCom-modul för testning. Under projektets gång användes det en del white-box testning i början vid implementationen av libCoAP. Efter att en fungerande implementation var gjord, påbörjades testning av input och output överensstämmelser med hjälp av black-box testning istället. Resultatet jämfördes i slutändan med den existerande lösningen att skicka parameterdata med hjälp av TCP. Resultatet hade en responstidsskillnad som var 92,3 % snabbare. Samtidigt tog det sammanlagt 24,2 % mindre plats i minnet (FLASH och RAM) för implementationen på Anybus CompactCom-modulen.
APA, Harvard, Vancouver, ISO, and other styles
10

Goad, David Douglas. "Barriers to IoT Benefits Realization." Thesis, University of Sydney, 2021. https://hdl.handle.net/2123/24520.

Full text
Abstract:
The Internet of Things (IoT) is often referred to as one of the key technologies of the Fourth Industrial Revolution. Along with the three industrial revolutions before it, this current industrial revolution promises to be disruptive, changing how we live our lives and run our organizations. Yet, while the IoT has demonstrated great promise, it will underperform in terms of expected adoption and resultant benefits realization compared to initially overly optimistic industry forecasts. This is partly due to several barriers to implementing IoT based solutions that inhibit, reduce, or slow the realization of the intended benefits. In this research thesis, I identify and then analyze several of the barriers to IoT benefits realization. These include issues related to IoT architectural heterogeneity, the challenges with securing the IoT, the reduction in privacy that the IoT creates and the resultant regulatory burden and the need for new business models to realize the value that the IoT can create. For each identified barrier I look to contribute to the literature by furthering understanding of that phenomena in question and/or by exploring potential solutions to improve benefits realization. Adopting a “Thesis including Publications” approach the analysis of each barrier is presented in a separate self-contained research paper with four papers presented in total. Two of these research papers (on IoT Architecture and Privacy) have been published and a further two (on IoT Security and Business Models) have been submitted for publication.
APA, Harvard, Vancouver, ISO, and other styles
11

Hamzic, Almira, and Isabel Olofsson. "DNS and the Internet of Things : Outlining the challenges faced by DNS in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202591.

Full text
Abstract:
This thesis work consists of a literature study where different aspects of DNS and the Internet of Things have been researched. A functional naming and service identification method is an essential part in making the IoT global, and DNS is the current method of naming devices on the Internet. The study looks into some challenges DNS will encounter, namely functionality, security and availability. This report concludes that a multicast DNS (mDNS) based solution designed for constrained networks is advantageous. This is despite the limited security that is currently available for such a solution. In the future, it is important that security has top priority, as there are currently limited means of security in DNS. Further study is needed when it comes to availability and how name resolving would work with constrained devices that utilise sleep mode.
Detta examensarbete består av en litteraturstudie där olika aspekter av DNS (Domännamnssystemet, eng. Domain Name System) och Sakernas Internet (eng. Internet of Things) har studerats. En fungerande namngivnings-och serviceidentifieringsmetod är en viktig del för att kunna göra Sakernas Internet globalt, och DNS är den nuvarande metoden för att namnge enheter på Internet. Studien undersöker vissa utmaningar som DNS kan stöta på, nämligen funktionalitet, tillgänglighet och säkerhet. Rapportens slutsats är att en lösning baserad på multisändnings-DNS (eng. multicast DNS, mDNS) som är anpassad för begränsade nätverk (eng. constrained networks) är fördelaktig. Detta trots den begränsade säkerhet som finns tillgänglig just nu för en sådan lösning. I framtiden är det viktigt att säkerheten har högsta prioritet, eftersom säkerheten är begränsad hos DNS. Det behövs ytterligare studier när det gäller tillgänglighet och hur adressöversättning skulle fungera med begänsade enheter (eng. constrained devices) som använder viloläge.
APA, Harvard, Vancouver, ISO, and other styles
12

Steinkjer, Ole Marius. "Routing and load balancing in Internet of Things (IoT)." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9089.

Full text
Abstract:

The assignment includes the following tasks 1. Study the Telenor Connected Object (COOS) infrastructure 2. Study existing load balancing techniques that are relevant for COOS 3. Make a model of COOS in order to investigate load balancing techniques 4. Propose usage scenarios for COOS which need performance differentiation and load balancing 5. Conduct load balancing experiments on scenarios with different techniques 6. Propose principles for load balancing in COOS • How can you achieve effective routing across different (access) network technologies? Load balancing of traffic – optimised for node performance (e.g. battery and/or bandwidth limitations, least cost routing). How can one distribute load across different networks (e.g. wifi, bluetooth, 3G...) in an effective manner?

APA, Harvard, Vancouver, ISO, and other styles
13

Thomas, Darshana. "Optimal wireless technologies for the Internet of Things (IoT)." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=28633.

Full text
Abstract:
The Internet of Things (IoT) - connection of small smart sensors, actuators and other devices to the Internet - is a key concept within the smart home. To ease deployment, such devices are often wireless and battery powered. An important question is the wireless interface used. As these small sensors are increasing in number, the need to implement these with much more capable and ubiquitous transmission technology is necessary. The ubiquity of Wi-Fi in homes today makes this an attractive option, but the relatively high power requirements of Wi-Fi conflict with the requirement for long battery life and low maintenance. Lower power alternatives, such as Bluetooth and Zigbee, have been proposed, but these have a much smaller installed base. In addition, many Smart Home products are currently available using 433MHz technology. This thesis considers whether it is possible to reduce Wi-Fi power usage to the point where cheap Wi-Fi based products can be used instead of other protocols. A low cost Wi-Fi inbuilt IoT prototype was developed and tested for the purpose of the experiment carried out for this thesis, part of Treegreen project. The work in this thesis undertakes power analysis of a wireless sensor with a System on Chip (SoC) Wi-Fi module, with and without a separate microcontroller, optimized for low power usage which can be used to control the Wi-Fi module. The Wi-Fi chip used within the prototype is the ESP8266- ESP03. Based on the results, in order to optimize the power consumption of the Wi-Fi chip, an MSP430 microcontroller was added onto the existing device. Finally, the IoT data in LTE network is investigated and compared with the real world IoT data.
APA, Harvard, Vancouver, ISO, and other styles
14

Shahid, Mustafizur Rahman. "Deep learning for Internet of Things (IoT) network security." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS003.

Full text
Abstract:
L’internet des objets (IoT) introduit de nouveaux défis pour la sécurité des réseaux. La plupart des objets IoT sont vulnérables en raison d'un manque de sensibilisation à la sécurité des fabricants d'appareils et des utilisateurs. En conséquence, ces objets sont devenus des cibles privilégiées pour les développeurs de malware qui veulent les transformer en bots. Contrairement à un ordinateur de bureau, un objet IoT est conçu pour accomplir des tâches spécifiques. Son comportement réseau est donc très stable et prévisible, ce qui le rend bien adapté aux techniques d'analyse de données. Ainsi, la première partie de cette thèse tire profit des algorithmes de deep learning pour développer des outils de surveillance des réseaux IoT. Deux types d'outils sont explorés: les systèmes de reconnaissance de type d’objets IoT et les systèmes de détection d'intrusion réseau IoT. Pour la reconnaissance des types d’objets IoT, des algorithmes d'apprentissage supervisé sont entrainés pour classifier le trafic réseau et déterminer à quel objet IoT le trafic appartient. Le système de détection d'intrusion consiste en un ensemble d'autoencoders, chacun étant entrainé pour un type d’objet IoT différent. Les autoencoders apprennent le profil du comportement réseau légitime et détectent tout écart par rapport à celui-ci. Les résultats expérimentaux en utilisant des données réseau produites par une maison connectée montrent que les modèles proposés atteignent des performances élevées. Malgré des résultats préliminaires prometteurs, l’entraînement et l'évaluation des modèles basés sur le machine learning nécessitent une quantité importante de données réseau IoT. Or, très peu de jeux de données de trafic réseau IoT sont accessibles au public. Le déploiement physique de milliers d’objets IoT réels peut être très coûteux et peut poser problème quant au respect de la vie privée. Ainsi, dans la deuxième partie de cette thèse, nous proposons d'exploiter des GAN (Generative Adversarial Networks) pour générer des flux bidirectionnels qui ressemblent à ceux produits par un véritable objet IoT. Un flux bidirectionnel est représenté par la séquence des tailles de paquets ainsi que de la durée du flux. Par conséquent, en plus de générer des caractéristiques au niveau des paquets, tel que la taille de chaque paquet, notre générateur apprend implicitement à se conformer aux caractéristiques au niveau du flux, comme le nombre total de paquets et d'octets dans un flux ou sa durée totale. Des résultats expérimentaux utilisant des données produites par un haut-parleur intelligent montrent que notre méthode permet de générer des flux bidirectionnels synthétiques réalistes et de haute qualité
The growing Internet of Things (IoT) introduces new security challenges for network activity monitoring. Most IoT devices are vulnerable because of a lack of security awareness from device manufacturers and end users. As a consequence, they have become prime targets for malware developers who want to turn them into bots. Contrary to general-purpose devices, an IoT device is designed to perform very specific tasks. Hence, its networking behavior is very stable and predictable making it well suited for data analysis techniques. Therefore, the first part of this thesis focuses on leveraging recent advances in the field of deep learning to develop network monitoring tools for the IoT. Two types of network monitoring tools are explored: IoT device type recognition systems and IoT network Intrusion Detection Systems (NIDS). For IoT device type recognition, supervised machine learning algorithms are trained to perform network traffic classification and determine what IoT device the traffic belongs to. The IoT NIDS consists of a set of autoencoders, each trained for a different IoT device type. The autoencoders learn the legitimate networking behavior profile and detect any deviation from it. Experiments using network traffic data produced by a smart home show that the proposed models achieve high performance.Despite yielding promising results, training and testing machine learning based network monitoring systems requires tremendous amount of IoT network traffic data. But, very few IoT network traffic datasets are publicly available. Physically operating thousands of real IoT devices can be very costly and can rise privacy concerns. In the second part of this thesis, we propose to leverage Generative Adversarial Networks (GAN) to generate bidirectional flows that look like they were produced by a real IoT device. A bidirectional flow consists of the sequence of the sizes of individual packets along with a duration. Hence, in addition to generating packet-level features which are the sizes of individual packets, our developed generator implicitly learns to comply with flow-level characteristics, such as the total number of packets and bytes in a bidirectional flow or the total duration of the flow. Experimental results using data produced by a smart speaker show that our method allows us to generate high quality and realistic looking synthetic bidirectional flows
APA, Harvard, Vancouver, ISO, and other styles
15

Cooper, Ke'ahi. "Security for the Internet of Things." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172526.

Full text
Abstract:
The Internet of Things (IoT) is an emerging paradigm that will change theway we interact with objects and computers in the future. It envisions a globalnetwork of devices interacting with each other, over the Internet, to perform auseful action. As such, quite a number of useful and benecial applications ofthis technology have been proposed.Although a convenient technology, the use of IoT technology will add additionalrisks to our lives that the traditional Internet did not have. This is primarilybecause IoT technology allows the virtual world to directly aect the physicalworld.Therefore, ensuring security is of paramount importance for IoT technology. Assuch, this thesis has two aims. First, we will identify the security issues for IoTtechnology as well as highlight what approaches academia has developed to resolvethem. This will allow us to see the state of this technology along with whatstill needs to be done in the future. Secondly, we will analyze some security protocolsproposed by academia and evaluate whether they ensure condentialityand authenticity.A literature survey is used to achieve the rst goal and the results show thatalthough a lot of research has been performed regarding security for IoT environments.We still have quite a way to go before a full holistic system isdeveloped which ensures all the security requirements for IoT.The results for the security protocol analysis shows that less than half of theprotocols proposed ensured authenticity and condentiality; despite the factthat their respective papers claim that they did. Therefore, we emphasize thefact that good peer reviews need to be enforced and that protocols need to bevalidated to ensure what is proposed performs as described.
APA, Harvard, Vancouver, ISO, and other styles
16

Pavlíček, Tomáš. "Potenciál IoT v Smart city." Master's thesis, Vysoká škola ekonomická v Praze, 2016. http://www.nusl.cz/ntk/nusl-261976.

Full text
Abstract:
The aim of this masters thesis is to identify, in which phase of adoption of Internet of Things (IoT) application areas of concept Smart City are nowadays Czech regional cities, what is their outlook to 2025 and also identify in which dimensions of concept Smart city, supported by IoT technologies, perceive Czech regional cities the greatest potential. Based on information obtained from the studied materials, the concept of Internet of Things (IoT) is described, along with a detailed description of one of its application area, namely Smart City. This area is further divided into specific dimensions, that cover specific application areas which can, through internet technology, support things in a special way. With these insights, the questionnaire (built on identified IoT application areas of smart city) was developed. Thesis should be beneficial for all towns in the Czech Republic, because it provides a comprehensive view of individual IoT application areas of concept Smart City including information on which of these IoT application areas are currently focusing regional cities, and on which they want to focus to the future. On the other hand, the survey results could also be beneficial for commercial entities, which focus on IoT implementation in cities. These entities will be able to recognise which IoT products are currently best for cities.
APA, Harvard, Vancouver, ISO, and other styles
17

Egel, Jill. "Internet of Things and its Business Models." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80995.

Full text
Abstract:
The Internet of Things (IoT) is the next phase in the evolution of the internet, where everyday objects are connected to the internet, and obtain the capacity to communicate with other devices and sense their environment. Especially the IIoT is one of the most talked about industrial business concepts since the recent years, companies try to focus on business models and operational efficiency. That is why this thesis focuses on researching the industrial Internet of Things (IIoT). There is already a lot of information about the common Internet of Things but still a gap in research in the business perspective, especially surrounding the concept of business models for the IIoT. The goal of this project is to investigate different kinds of business models, how they work and how feasible they are. The need to research possible business models for an IIoT framework, as traditional business models are relevant for this study, such as the Business Model Canvas which has been proposed by Alexander Osterwalder or the Business Model Navigator by Oliver Gassmann. But there is still a lack of literature covering the business models for the IIoT. Therefore, after researching the concept of IIoT from a business perspective, I identified some useful criteria and suitable business models. With a qualitative literature study, I was able to develop an IIoT business model framework, based on the dynamics and complexity of the IIoT concept, which incorporates business strategies and provides companies with a flexible approach. The business model framework can be used in any business which is working in the industrial context. To demonstrate how the business model framework works for the IIoT, I clarified how suitable business models can improve the current business model of the very prominent and successful company Tesla. The results show how the framework of IIoT business models can be used to increase profit and work efficiently as a company. The models can also be formed to only highlight single components of an already existing business model, as it offers great flexibility, which is highly valuable in the fast evolving and innovative IIoT phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
18

Vargas, Vargas Fernando. "Cloudlet for the Internet-of- Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191433.

Full text
Abstract:
With an increasing number of people currently living in urban areas, many cities around the globe are faced with issues such as increased pollution and traffic congestion. In an effort to tackle such challenges, governments and city councils are formulating new and innovative strategies. The integration of ICT with these strategies creates the concept of smart cities. The Internet of Things (IoT) is a key driver for smart city initiatives, making it necessary to have an IT infrastructure that can take advantage of the many benefits that IoT can provide. The Cloudlet is a new infrastructure model that offers cloud-computing capabilities at the edge of the mobile network. This environment is characterized by low latency and high bandwidth, constituting a novel ecosystem where network operators can open their network edge to third parties, allowing them to flexibly and rapidly deploy innovative applications and services towards mobile subscribers. In this thesis, we present a cloudlet architecture that leverages edge computing to provide a platform for IoT devices on top of which many smart city applications can be deployed. We first provide an overview of existing challenges and requirements in IoT systems development. Next, we analyse existing cloudlet solutions. Finally, we present our cloudlet architecture for IoT, including design and a prototype solution. For our cloudlet prototype, we focused on a micro-scale emission model to calculate the CO2 emissions per individual trip of a vehicle, and implemented the functionality that allows us to read CO2 data from CO2 sensors. The location data is obtained from an Android smartphone and is processed in the cloudlet. Finally, we conclude with a performance evaluation.
Med en befolkning som ökar i urbana områden, står många av världens städer inför utmaningar som ökande avgaser och trafikstockning. I ett försök att tackla sådana utmaningar, formulerar regeringar och stadsfullmäktige nya och innovativa strategier. Integrationen av ICT med dessa strategier bildar konceptet smart cities. Internet of Things (IoT) är en drivande faktor för smart city initiativ, vilket gör det nödvändigt för en IT infrastruktur som kan ta till vara på de många fördelar som IoT bidrar med. Cloudlet är en ny infrastrukturell modell som erbjuder datormolnskompetens i mobilnätverkets edge. Denna miljö karakteriseras av låg latens och hög bandbredd, utgörande ett nytt ekosystem där nätverksoperatörer kan hålla deras nätverks-edge öppet för utomstående, vilket tillåter att flexibelt och snabbt utveckla innovativa applikationer och tjänster för mobila subskribenter. I denna avhandling presenterar vi en cloudlet-arkitektur som framhäver edge computing, för att förse en plattform för IoT utrustning där många smart city applikationer kan utvecklas. Vi förser er först med en överblick av existerande utmaningar och krav i IoT systemutveckling. Sedan analyserar vi existerande cloudlet lösningar. Slutligen presenteras vår cloudlet arkitektur för IoT, inklusive design och en prototyplösning. För vår cloudlet-prototyp har vi fokuserat på en modell av mikroskala för att räkna ut CO2 emissioner per enskild resa med fordon, och implementerat en funktion som tillåter oss att läsa CO2 data från CO2 sensorer. Platsdata är inhämtad med hjälp av en Android smartphone och behandlas i cloudlet. Det hela sammanfattas med en prestandaevaluering.
APA, Harvard, Vancouver, ISO, and other styles
19

Astistova, T. I., and D. M. Kochuk. "Software development for technology "Internet of Things"." Thesis, Київський національний університет технологій та дизайну, 2021. https://er.knutd.edu.ua/handle/123456789/19193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Deserranno, Allen Ronald. "Enhancing the Internet of Things Architecture with Flow Semantics." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/7016.

Full text
Abstract:
Internet of Things (‘IoT’) systems are complex, asynchronous solutions often comprised of various software and hardware components developed in isolation of each other. These components function with different degrees of reliability and performance over an inherently unreliable network, the Internet. Many IoT systems are developed within silos that do not provide the ability to communicate or be interoperable with other systems and platforms. Literature exists on how these systems should be designed, how they should interoperate, and how they could be improved, but practice does not always consult literature. The work brings together a proposed reference architecture for the IoT and engineering practices for flow semantics found in existing literature with a commercial implementation of an IoT platform. It demonstrates that the proposed IoT reference architecture and flow-service-quality engineering practices when integrated together can produce a more robust system with increased functionality and interoperability. It shows how such practices can be implemented into a commercial solution, and explores the value provided to the system when implemented. This work contributes to the current understanding of how complex IoT systems can be developed to be more reliable and interoperable using reference architectures and flow semantics. The work highlights the value of integration of academic solutions with commercial implementations of complex systems.
APA, Harvard, Vancouver, ISO, and other styles
21

Alsén, Caroline. "Kostnadsfördelar med IoT för hissystem." Thesis, KTH, Data- och elektroteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188482.

Full text
Abstract:
Internet of things är idag en utveckling som starkt går framåt för att göra samhället mer tekniskt styrt, modernt och för att underlätta för människor. Det finns många branscher och arbetsområden för denna teknik och hissbranschen är en utav dessa. I denna rapport utreds de fördelar som finns med Internet of things inom hissövervakning. Företaget Safeline Sweden AB har tagit fram en produkt för att underlätta övervakningen av hissar på avstånd. En utredning av denna produkt och dess kostnadsfördelar togs fram, för att sedan kunna ta fram en affärsmodell för Safelines nya produkt IMS. Genom intervjuer med potentiella kunder kunde information tas fram angående dagens läge inställningen till ny teknik. Den informationen som kom fram under dessa intervjuer användes för att skapa en affärsmodell som ska användas som grund för en affärplan för Safeline.En affärsmodell skapades för Safeline Sweden AB och deras nya produkt IMS. I affärmodellen framgår det bland annat hur företaget bör lansera den nya produkten, hur kundrelationer ska skapas, utvecklas och behållas. Utifrån intervjuerna valdes det att IMS bör säljas som en systemlösning då det anses vara det bästa för att det ska vara attraktivt och prisvärt för kunderna.
Internet of things is today a development that is strongly moving forward to make society more con-trolled by technology, modern and it will be easier for many people. This technology can be used in many diffrent industries and work areas, such as elevator monitoring. This report evaluates the benefits with Internet of things within elevator monitoring. The company Safeline Sweden AB has developed a product that will make it easier to monitor elevators from a distance. An investigation of this product has been done and what their advantages were. After that, a buisness model was formed for Safelines new product IMS. By interviewing potential customers, the information about the sitaution today and the approach for new technology was discovered. The information from the interviews was then used to create a good and sustainable business model for Safeline.A buisness model was created for Safeline Sweden AB and the produkt IMS. The business model describes how the company should launch the new product, how the customer relations should be created, developed and retained. The information from the interviews made it clear that the IMS should be sold as a system solution because it is considered to be more attractive and be more valu-able for the customers.
APA, Harvard, Vancouver, ISO, and other styles
22

Song, Yuanjun. "Security in Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142451.

Full text
Abstract:
The Internet of Things (IoT) is emerging the Internet and other networks with wireless technologies to make physical objects interact online. The IoT has developed to become a promising technology and receives significant research attention in recent years because of the development of wireless communications and micro-electronics.  Like other immature technological inventions, although IoT will promise their users a better life in the near future, it is a security risk, especially today the privacy is increasingly concerned by people. The key technologies of IoT are not yet mature. Therefore the researches and applications of the IoT are in the early stage. In order to make the IoT pervade people’s everyday life, the security of the IoT must be strengthened. In this thesis, first, the IoT is compared with the Internet. Though the IoT is based on the Internet, due to the characteristics of the IoT, those mature end-to-end security protocols and protective measures in the Internet can not directly provide the end-to-end data security through the perceptual layer, the transport layer the and application layer. For the IoT security addressing issues (such as the Internet DNS attack), this thesis proposes the IoT addressing security model. The traditional access control and the identity authentication only works in the same layer. The IoT addressing security model designed in this thesis effectively solves the issues of vertically passing the authentication results in the addressing process without changing the protocols for two communication parties. Besides, this thesis provides the object access control and privacy protection from the object application layer addressing, DNS addressing and IP addressing phases. Finally, combining the IoT object addressing security model with practical application scenario, this thesis designs the IoT object security access model. In this model, the access requester can access objects in different domains through a single sign-on. This model provides the protection for the end-to-end communication between the access requester and object.
APA, Harvard, Vancouver, ISO, and other styles
23

Poggi, Giovanni. "Internet of Medical Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.

Find full text
Abstract:
In questa tesi, si partirà con un'introduzione generale all'Internet of Things focalizzando l'attenzione sulla struttura generale dell'architettura ed il suo funzionamento di base in una rete con molti altri dispositivi. Seguirà l'analisi del trend di questa tecnologia e la sua evoluzione nel tempo, con particolare attenzione all'architettura ed al suo successo ai giorni nostri. Verrà discussa l'industrializzazione che ha portato alla creazione delle Industrie 4.0, ovvero l'Internet of Things in ambito sensoristica applicato all'industria, alla robotica, ai Big Data che si occupano dell'archiviazione, all'acquisizione e all'analisi dei dati provenienti dai vari dispositivi, ai sistemi ciberfisici, alla connessione di tutti questi oggetti tra loro per la comunicazione e lo scambio delle informazioni ed infine alla realtà aumentata per il supporto nei vari processi industriali. Questi macroargomenti saranno lo spunto per introdurre il concetto di Internet of Medical Things. Con una breve panoramica sugli ospedali al giorno d'oggi, si vuol proporre una nuova concezione di ospedale dove vengono poste al centro dell'attenzione le esigenze del paziente e del personale medico, trattando nello specifico le tecnologie impiegate, i processi chirurgici, clinici e l’erogazione delle prestazioni sanitarie. Il discorso seguirà focalizzando l'attenzione anche su ambienti della medicina come la chirurgia, introducendo un luogo in cui migliaia di dispositivi connessi alla rete comunicano tra di loro. Si vedranno anche tutte le eventuali criticità e le varie sfide che bisognerà risolvere ed intraprendere per arrivare ad un corretto ed efficiente passaggio agli odierni ospedali concepiti per essere ospedali 4.0. Si concluderà con una riflessione su tutte queste tecnologie e la rivoluzione in ambito medico che promette cambiamenti che porteranno al nuovo concetto di Ospedale 4.0 su un’ottica di Internet of Medical Things.
APA, Harvard, Vancouver, ISO, and other styles
24

Sabel, Ida. "Internet of Things & Kommunikationsprotokoll." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-27246.

Full text
Abstract:
Genom att studera olika kommunikationsprotokoll kunna svara på vad det är som gör att ett visst protokoll är bäst anpassat för att användas mellan mobila enheter och IoT-enheter. I arbetet användes en kvalitativ litteraturstudie för att ge en grundlig teoretisk bakgrund samt en experimentell studie där ett par teorier undersökts ifall de stämmer med resultaten ifrån verkligheten. De fem faktorerna kompatibilitet, batteritid, frekvens, räckvidd och tillförlitlighet undersöktes hos kommunikationsprotokollen Bluetooth Low Energy (BLE), Närfältskommunikation (NFC) och Wi-Fi. Dessa tre valdes eftersom de stöds av nyare mobila plattformar idag. Kommunikations-protokollen analyserades sedan gentemot olika användningsområden inom IoT, eftersom påståendet vad som är bäst anpassat beror på vad situationen kräver för egenskaper. En systemutvecklare som ska välja kommunikationsprotokoll till en IoT-tillämpning och läser denna rapport bör själv jämföra de olika protokollen mot varandra inom de fem faktorerna för att kunna avgöra vilket protokoll som passar bäst inom dennes situation. I arbetet utfördes endast experimentella studier på BLE på grund av begränsningar inom utrustningen. Ytterligare experiment inom NFC och Wi-Fi skulle ge ett bredare perspektiv med fler infallsvinklar.
By studying different communication protocols respond to what it is that makes a certain protocol best suited for use between mobile devices and IoT devices. This study used a qualitative literature study to create a proper theoretical background and an experimental study where two theories were investigated in whether they matched wih the results from the reality. The five factors compatibility, battery loss, frequency, range and reliability were investigated in the communication protocols Bluetooth Low Energy (BLE), Near field communication (NFC) and Wi-Fi, these three because they are supported by newer mobile platforms today. The communication protocols were then analysed against various uses in the IoT, since the claim what it is that makes it best suited depends on what the situation requires. A system developer that is about to select the communication protocol to use in an IoT application and reads this study should compare the different protocols to each other within the five factors to determine which protocol is best suited for his situation. This study only performed experimental studies on BLE because of limitations in the equipment. Additional experiments on NFC and Wi-Fi would provide a wider perspective.
APA, Harvard, Vancouver, ISO, and other styles
25

Girotti, Alessandro. "Piattaforme per lo sviluppo di progetti IoT." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017.

Find full text
Abstract:
In questo lavoro viene introdotto il concetto di Internet of Things, soffermandosi sugli obiettivi che tale tecnologia si prefigge di raggiungere e analizzandone i domini applicativi. In seguito saranno discusse le principali tecnologie abilitanti IoT, descrivendo in particolare il principio di comunicazione Machine-to-Machine che le caratterizza e proseguendo con l’analisi dei principali protocolli utilizzati in questo ambito. Successivamente verranno analizzati i problemi di sicurezza e di privacy legati all’aumento di dispositivi connessi alla rete che fanno parte di IoT. Sarà inoltre effettuata un’analisi sull'impiego della tecnologia di Internet of Things in Italia e verranno analizzate le manovre di governo per favorirne lo sviluppo. In seguito sarà analizzato il processo di sviluppo di un dispositivo IoT, descrivendo anche le caratteristiche hardware e software richieste. Infine saranno discusse le principali piattaforme per lo sviluppo di progetti IoT e i servizi da esse offerti allo sviluppatore e all’utente.
APA, Harvard, Vancouver, ISO, and other styles
26

Ding, Yuxia. "Internet of Things : Quantitative Evaluation on Microsoft Azure IoT Suite." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31006.

Full text
Abstract:
The Internet of Things (IoT) is rapidly gaining ground in our daily life. There is a trend that the number of devices and data increases rapidly in the future. Meanwhile, IoT platforms are emerging to enable people conveniently deal with the IoT and these huge amount of data and devices. Therefore, the goal in this paper is to perform a quantitative evaluation on Microsoft Azure, one of the IoT platform, about its advantages and disadvantages under press to determine if Azure IoT is fit for future IoT. In order to reach this goal, Azure IoT Hub is used as a bridge to connect and manage lots of IoT devices which send and receive huge amount of data. .NET is used to simulate devices and connect them to the IoT Hub. The two-way communication from sensor to cloud and from cloud to actuator is implemented through MQTT protocol. This paper makes measurements on three metrics including response time from sensor sending messages to actuator receiving messages, scalability and cost and analyzes them in detail. Besides, the analysis is also made in a specific scenario which has high demand on sensor update to see how Azure IoT performs. Finally, conclusion is made on Microsoft Azure IoT's advantages and disadvantages under stress.
APA, Harvard, Vancouver, ISO, and other styles
27

Kalashnikov, A., H. Zhang, J. Jennings, and M. Abramriuk. "Remote laboratory: using Internet-of-Things (IoT) for E-learning." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/55781.

Full text
Abstract:
In order to equip engineering E-learners with realistic hands-on laboratory experience, remote access to an operating lab may be provided. Such an access can be implemented using live video streaming from a physical lab coupled with IoT telemetry and telecontrol. The progress of an ongoing remote laboratory project is presented. Three different video streaming solutions were compared side-by-side, the back end electronic architecture was fully developed and the most notable observations are now reported.
APA, Harvard, Vancouver, ISO, and other styles
28

Su, Runbo. "Trust Management in Service-Oriented Internet of Things (SO-IoT)." Electronic Thesis or Diss., Université de Lorraine, 2024. http://www.theses.fr/2024LORR0054.

Full text
Abstract:
À la différence de la confiance dans les sciences sociales, où les interactions entre les humains sont mesurées, la confiance dans la sécurité de l'IdO (Internet des Objets) se concentre davantage sur les interactions entre les nœuds (objets) grâce à l'intégration des objets intelligents. En outre, comme les nœuds de l'IdO peuvent en quelque sorte bénéficier d'un "groupe"/d'une "communauté" puisqu'ils sont formés par leurs propres intérêts ou fonctionnalités similaires, l'évaluations de la confiance d'intergroupes, interindividuelle, et celle de groupe-individuel, sont également importantes. Cependant, la gestion des limitations apportées par les menaces potentielles et la vulnérabilité inhérente à l'architecture des MT reste un défi. Cette thèse étudie la confiance sous trois angles dans l'internet des objets orienté services (SO-IoT) : La confiance intergroupe, la confiance groupe-individu et la confiance interindividuelle. Tout d'abord, un modèle dynamique basé sur les rôles est développé pour évaluer la confiance intra- et inter-communauté (groupe), en améliorant les activités orientées services et en abordant les questions de sécurité au sein des communautés et entre elles. Une approche centralisée locale en quatre phases est employée, qui se concentre sur les contre-mesures contre les attaques sur les services au sein de la communauté. En outre, un mécanisme en trois phases est conçu pour mesurer la coopération entre les communautés. Une implémentation basée sur le système ROS 2 a été mise en œuvre pour analyser les performances du modèle proposé sur la base des résultats préliminaires. Deuxièmement, pour traiter le mauvais comportement dans SO-IoT en termes de confiance interindividuelle, un jeu stochastique bayésien (SBG) est introduit, qui prend en compte l'hétérogénéité des nœuds IoT, et des schémas comportementaux complexes des fournisseurs de services sont incorporés, encourageant la coopération et pénalisant les actions stratégiques malveillantes. Enfin, le travail d'évaluation de la confiance des messages V2X dans l'IoV démontre la possibilité de mettre en œuvre la gestion de la confiance dans un environnement de l'IdO concret
Unlike Trust in Social Science, in which interactions between humans are measured, thanks to the integration of numerous smart devices, Trust in IoT security focuses more on interactions between nodes. Moreover, As IoT nodes can somehow benefit from 'Group'/'Community' since they form by similar interests or functionalities, the assessment of Group-Individual and Inter-Individual Trust is also important. However, handling limitations brought by potential threats and inherent vulnerability due to TM architecture remains challenging. This thesis investigates Trust from three perspectives in the Service-Oriented Internet of Things (SO-IoT): Inter-Group Trust, Group-Individual Trust, and Inter-Individual Trust. Firstly, a role-based dynamic model is developed to assess intra- and inter-community(group), enhancing service-oriented activities and addressing security issues within and between communities. A locally centralized four-phase approach is employed, focusing on countermeasures against attacks on services within the community. Additionally, a three-phase mechanism is devised to measure cooperativeness between communities. An implementation based on the ROS 2 system was implemented to analyze the performance of the proposed model based on the preliminary results. Secondly, to address misbehavior in SO-IoT in terms of Inter-Individual trust, a Stochastic Bayesian Game (SBG) is introduced, which considers the heterogeneity of IoT nodes, and complex behavioral schemes of service providers are incorporated, encouraging cooperation and penalizing malicious strategical actions. Lastly, the work of assessing the Trust of V2X messages in IoV demonstrates the possibility of implementing Trust Management in a concrete IoT environment
APA, Harvard, Vancouver, ISO, and other styles
29

Mateus, Márcio Filipe Caetano. "Measuring data transfer in heterogeneous IoT environments." Master's thesis, Faculdade de Ciências e Tecnologia, 2012. http://hdl.handle.net/10362/7580.

Full text
Abstract:
Dissertação para obtenção do Grau de Mestre em Engenharia Electrotécnica e de Computadores
Internet of Things (IoT) is characterised by the heterogeneity of the used devices, which leads to information exchange problems. To address these problems, the Plug’n’Interoperate approach is used, where the steps needed to perform the information exchange between devices are described by interoperability specifications (IS) and are operated by the devices. However, more than one IS can exist to describe the information exchange between each pair of devices, so to choose the suitable IS, there is the need to measure the information exchange described by each one. To do this, there already exist some methods. But, they rely on a deep understanding of the IS and the data formats involved. To overcome this, an advanced measurement method is presented. This method advances by measuring the data transfer provided by an IS, without the need of specific knowledge about it. This measurement does that, by relying only on an abstract view of the data transfer and providing results that allows the benchmarking of the entire interoperability performance of the IoT environment. Thus allowing the comparison of different IS without the need of being specialized on them.
APA, Harvard, Vancouver, ISO, and other styles
30

Sabe, Tahir, and Ridom Khan. "Blockchain för att säkra Internet of Things." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-283791.

Full text
Abstract:
I dagsläget finns det fler anslutna enheter till internet, Internet of Things-enheter som det benämns, än vad det finns människor på jorden och produkter är lättillgängliga för den vanliga konsumenten. När fler enheter kopplas upp till internet är det också viktigt att hålla reda på dem. En nackdel med allt ökat antal uppkopplade enheter är en potentiellt ökad sårbarhet och det finns en högre risk för privatpersoner eller företag att bli hackade. Examensarbetet undersöker vilka säkerhetsrisker som finns med att skapa ett IoT-system och hur IoT kan kombineras med blockchainteknik ur ett säkerhetsperspektiv i olika branscher genom att titta på IoT-system inom små företag och för privatpersoner med begränsad IT-kompetens. En riskanalys görs för två användarfall, en floristverksamhet för bevarandet av bland annat känsliga växter och blommor respektive ett kommersiellt smart dörrlås som gör det möjligt för hushåll att kunna låsa samt låsa upp ett dörrlås digitalt med hjälp av mobiltelefoner. Därefter presenteras sårbarheter och tillgångar som behöver skyddas och relaterade arbeten undersöks för att se hur sårbarheter kan undvikas. Resultatet visar teknikernas relevans i nuläget, vilka IoT-modeller det finns och hur blockchain kan användas för att säkra IoT med exempelvis användningen av smarta kontrakt. Tre modeller identifieras där graden för inklusion av blockchain skiljer sig. IoT till IoT-modellen lagrar en del av datat i blockchain medan IoT interaktioner sker utan att använda blockchain. IoT till blockchain-modellen innebär att alla interaktioner sker via blockchain. Den tredje modellen är en hybrid vilket innebär att en del av interaktionen och datat placeras i blockchain och att det går att välja vilka interaktioner som ska ske via blockchain. Resultatet visar att blockchain kan användas för att bevara integritet och konfidentialitet mellan IoT enheter, mer specifikt kan det användas för autentisering och säker dataöverföring.
APA, Harvard, Vancouver, ISO, and other styles
31

Dovile, Trepkeviciute. "Internet of Things (IoT) driven media recommendations for television viewers. The concept of IoT TV." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209574.

Full text
Abstract:
In today’s overloaded media landscape, television viewers are constantly confronted with the problem of what media content to select. This media overload speaks directly to the theory of bounded rationality when viewers work to understand all available choices. This thesis presents and evaluates an Internet of Things driven media recommendation concept (IoT TV) which could ease decision making for viewers by providing more personalized media content recommendations. This study evaluates the concept using three focus groups to understand what aspects of IoT TV are important for viewers. IoT TV concept addresses factors such as timing and emotions which influence a media choice extensively. The conducted thematic analysis identifies the four themes: time saving and passing, monitoring people and devices, media choice, and privacy. These themes are treated as the results of this study because the themes describe the important aspects which have to be considered before launching IoT TV. IoT TV will make media content selection easier by saving time and matching content according to emotions. Consequently, IoT TV connection with smart devices which share data about viewers’ time and emotions would solve the problem of media overload.
I dagens överbelastade medielandskap stöter tv-tittare ständigt på frågan om vilket medieinnehåll de ska välja. Denna medieöverbelastning väcker teorier om begränsad rationalitet när tittarna kämpar för att förstå alla tillgängliga valmöjligheter. Denna uppsats presenterar ett rekommendationskoncept för medier drivna av sakernas internet (IoT-tv), som skulle kunna underlätta tittarnas beslutsfattande genom att ge mer personaliserade medieinnehållsrekommendationer. Studien utvärderar konceptet genom tre fokusgrupper för att förstå vilka aspekter av IoT-tv som är viktiga för tittare. Konceptet IoT-tv tar i beaktande sådana faktorer som tajmning och känslor som kan påverka medievalet betydligt. Den utförda tematiska analysen pekar ut följande fyra teman: tidsbesparing och -passning, människo- och enhetsövervakning, medieval samt integritet. Dessa teman behandlas som studiens resultat eftersom de beskriver viktiga aspekter som bör beaktas innan IoT-tv lanseras. IoT-tv kommer att underlätta val av medieinnehåll genom att spara tid och synkronisera innehållet med aktuella känslor hos tittaren. Således skulle smarta tv-enheter med IoT-anslutning som delar data om tittarens tid och känslor, lösa problemet med medieöverbelastning.
APA, Harvard, Vancouver, ISO, and other styles
32

Westman, Andreas, and Filip Wilén. "IoT-lang : Hotmodellering av sakernas internet." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295619.

Full text
Abstract:
In the past decade, Internet of Things (IoT) has beena fast growing product type. Most homes in a modern societyhas several IoT-products, to automate and simplify the daily lifeof many people. While IoT-devices may increase the quality oflife, they can impose a great security threat. The simplicity ofthe products usually makes them an easy target for hackers andother types of malicious activity.To increase the security of these types of devices the aim ofthis project is to simplify the process of finding and preventingsecurity flaws. This was done by creating a programmable modelmodell which can be used to simulate attacks on IoT-devices. Theresults from the validation shows that this model can be used forsimulation of attacks with great precision for basic systems.
Under det senaste årtiondet, har Internet of Things (IoT) haft en snabb framfart. De flesta hem i vårt moderna samhälle innehåller numera ett flertal IoT-produkter, för att automatisera och förenkla vardagen. Trots att IoT-enheter förenklar vardagen för många människor utgör de ofta även ett stort säkerhetshot. Systemens enkelhet bidrar till att de ofta är lätta måltavlor för hackers och andra typer av skadlig aktivitet.  För att förbättra säkerheten i dessa typer av system är  målet med detta projekt att förenkla processen att hitta och motarbeta säkerhetsbrister. Genom att skapa en programmerbar modell som kan användas för att simulera attacker mot IoTsystem kunde detta göras. Resultaten från valideringen visar att modellen kan användas för att simulera attacker med god precision för enklare system.
Kandidatexjobb i elektroteknik 2020, KTH, Stockholm
APA, Harvard, Vancouver, ISO, and other styles
33

Barretta, Salvatore. "UAV based Narrowband - Internet of things." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22761/.

Full text
Abstract:
in this thesis we simulated via Java and Matlab environments a scenario in which a single drone is exploited to carry the NB-IoT base station over an a-priori known area. More specifically, we examined the performance of a drone flying over a area where IoT devices are grouped in clusters and trying to serve as many nodes as possible, with the trajectory solved exploiting the well-known solution of the Travel Salesman Problem (TSP), through which the UAV, that in this study we consider starting from the center of a cluster, finds the minimum path to subsequently reach the center of all the other clusters before reaching again the starting point, where the flight is considered ended. Starting from this assumption we wanted to find the scenario that can best benefit from joint use of NB-IoT and UAV, analyzing both its network throughput and how resources are scheduled by this standard. Then we want to compare the previous results with the new ones obtained changing the way random access is simulated in the code.
APA, Harvard, Vancouver, ISO, and other styles
34

Aïssaoui, François. "Autonomic Approach based on Semantics and Checkpointing for IoT System Management." Thesis, Toulouse 1, 2018. http://www.theses.fr/2018TOU10061/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Bude, Cristian, and Bergstrand Andreas Kervefors. "Internet of Things : Exploring and Securing a Future Concept." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516.

Full text
Abstract:
Internet of Things (IoT) is a concept that encompasses various objects and methods of communication to exchange information. Today IoT is more a descriptive term of a vision that everything should be connected to the internet. IoT will be fundamental in the future because the concept opens up opportunities for new services and new innovations. All objects will be connected and able to communicate with each other, while they operate in unprotected environments. This later aspect leads to major security challenges. Today, IoT is in great need of standardization and clear architectures that describe how this technology should be implemented and how IoT devices interact with each other in a secure manner. The security challenges are rooted in the technology and how information is acquired and manipulated by this technology. This thesis provides an introduction to what the IoT is and how it can be used as well as some of the threats that IoT may face in regards to information security. In addition, the thesis provides the reader with some suggestions about how to potentially solve the fundamental need for authentication and secure communications. The solutions presented are based on both contemporary solutions and technologies that are under development for the future. Contemporary solutions are based on security protocols such as IPSec and DTLS. These protocols are being used in an environment that extends across the Internet and into a 6LoWPAN network. The proposed authentication solution has been developed based on a public key infrastructure and trust models for certificate management. As future work, the thesis presents several research areas where this thesis can be used as a basis. These specialization areas include further analysis of vulnerabilities and an implementation of the proposed solutions.
Internet of Things (IoT) är ett koncept som omfattar olika objekt och kommunikationsmetoder för utbyte av information. Idag är IoT mer en beskrivande term av den framtidsvision som finns att allting ska vara uppkopplat på internet. IoT kommer vara fundamentalt i framtiden eftersom konceptet öppnar upp möjligheter för nya tjänster samt nya innovationer. Då alla objekt ska vara uppkopplade och kunna kommunicera med varandra samtidigt som de skall kunna operera i oskyddade miljöer, bidrar detta till stora säkerhetsutmaningar. Dagens IoT är i stort behov av standardisering och klara strukturer för hur tekniken ska implementeras samt samverka med varandra på ett säkert sätt.  Utmaningarna ligger i att säkra tekniken samt informationen som tekinken bidrar med. Denna rapport ger en introduktion till vad IoT är och hur det kan användas samt vilka hot som IoT kan möta i avseende till informationssäkerhet. Utöver detta så förser rapporten läsaren med förslag om hur man eventuellt kan lösa de fundamentala behoven av autentisering och säker kommunikation. Lösningarna som läggs fram är baserade på både nutida lösningar och teknik som är under utveckling inför framtiden. Nutida lösningar är baserade på säkerhetsprotokoll som IPsec och DTLS som används i en miljö som sträcker över internet och in i ett 6LoWPAN nätverk. Den autentiseringslösning som tagits fram grundar sig på PKI och förtroendemodeller för certifikathantering. För framtida arbete presenteras flertalet vidare fördjupningsområden där denna rapport kan användas som grund. Dessa fördjupningsområden inkluderar vidare analys av sårbarheter och implementation av de lösningar som tagits fram.
APA, Harvard, Vancouver, ISO, and other styles
36

Jonsson, Måns, and Johannes Sandberg. "Reducing food waste in the Swedish household using IoT." Thesis, Blekinge Tekniska Högskola, Institutionen för maskinteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-19671.

Full text
Abstract:
Anledningen till denna avhandling är att undersöka hur ett innovativt Internet of Things-baserat system kan vara fördelaktigt för att minska matavfall. Det anses viktigt att hitta nya sätt och lösningar på det växande problemet med matavfall. Syftet med denna studie är att hitta nya möjliga lösningar för att minska matavfall i Sverige. För att utveckla en lösning krävs en större förståelse för hur svenskar hanterar matavfall idag. Avhandlingen bygger på verkliga behov och undersöker noggrant hur en lösning kan utvecklas på bästa sätt.   Design Thinking processen kommer att genomföras i denna studie. För att närma sig och undersöka dagens behov kommer en enkätundersökning och intervjuer att genomföras tillsammans med sökandet efter liknande forskning och lösningar inom området matavfall. En prototyp har utvecklats och olika funktioner har skapats i enlighet med de behov som fanns. Den utvecklade prototypen har också varit i kontakt med potentiella användare för att samla in feedback om prototypen.   Resultatet av detta arbete är att det är möjligt att utveckla en teknisk och innovativ lösning för problemet med matavfall. Det går också att se att det finns en stor utvecklingspotential när det gäller Internet of Things på detta område. En välutvecklad prototyp med flera funktioner har skapats och kan visa vägen för andra innovativa lösningar för matavfall.   Matavfall är ett enormt problem i världen idag och lösningar krävs. Det finns människor runt om i världen som svälter ihjäl och fortfarande kastas 30% av den producerade ätbara maten bort. Nya tekniska och innovativa lösningar behövs inom detta område och mer forskning bör bedrivas. Internet of Things har en stor potential för att minska matavfallet i framtiden.
The reason for this thesis is to investigate how an innovative Internet of Things based system can be beneficial in reducing food waste. It´s considered important to find new ways and solutions to the growing problem of food waste.    The purpose of this study is to find new possible solutions to reduce food waste in Sweden. To develop a solution, a greater understanding of how Swedes handle food waste today is required. The thesis will be based on real needs and carefully examine how a solution can be developed in the best way. The Design Thinking process will be carried out in this study. To approach and investigate the needs of today, a survey and interviews will be conducted together with article research with similar solutions in the field of food waste. A prototype has been developed, and different features have been created according to the needs that existed. The developed prototype has also been in contact with potential users to collect feedback about the prototype. The result of this work is that it´s possible to develop a technical and innovative solution for the problem of food waste. It can also be seen that there is a great development potential regarding the Internet of Things in this area. A well-developed prototype with multiple features has been created and can show the direction for other innovative solutions for food waste. Food waste is a huge problem in the world today, and solutions are required. There are people around the world that are starving to death, and still, 30% of the produced eatable food is thrown away. New technical and innovative solutions are needed in this area, and more research should be conducted. Internet of Things will continue its development in the near future and has big potential to help reducing food waste.
APA, Harvard, Vancouver, ISO, and other styles
37

Huang, Guanglei, and Christensen Joacim Ahlin. "Harnessing the power of the Internet of Things : A Performance-impact model for Companies´adoption of the Internet of Things." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353860.

Full text
Abstract:
Every day, more and more devices are getting connected to the Internet and becoming what we know as the Internet of Things (IoT). In both commercial and industrial context, IoT plays a significant role in enabling automatisation and connectivity. For companies that want to become the innovation leader in their branch of industry, IoT is a useful method to gain competitive advantage where automatisation, predictive maintenance and connectivity can improve company’s performance. However, no research have been done from the perspective of an IoT-provider. How they can fully harness the power of IoT when they adopt it for their existing products or services? This study aim to investigate how a theoretical model would look like with the performance impact in focus when an innovation-driven company adopt IoT on their existing products. The research is conducted with a case study of a Swedish company in the heavy industry sector, which has successfully adapted IoT into their products. The empirical data was collected through documentation review and interview. This study results in a conceptual model that contains crucial factors which needs to be taken into consideration when adopting IoT. However, further research needs to be done, in order to verify this model as well as to be able to generalise the findings to cover innovation adoption in general.
APA, Harvard, Vancouver, ISO, and other styles
38

Namirimu, Victoria. "User Requirements for Internet Of Things (IoT) Applications : An Observational study." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-11025.

Full text
Abstract:
Context. Internet of Things (IoT) is a new trending phase of technology. IoT refers to communication and connectivity between things such as technological devices, actuators, sensors, and people or processes with unique identifiers. The importance of IoT is to improve the daily living standards of an average user. IoT is made for the people and used by the people for many reasons such as improved health, business innovations, and personal health trackers. Examples of IoT applications and services today include  Smart thermostats like NEST, connected cars like Car2Go, activity trackers like BASIS, smart outlets like Belkin, Parking sensors like streetline and so much more services being developed. Objectives. The main goal of this study is to identify the challenges users face in understanding IoT and monitoring it as it undergoes change through self-adaptation. Once the challenges have been known then the gap between system requirements and user requirements can be bridged. The study also states the different ways the developers can improve the IoT services and applications for the users through user feedback. Methods. In this paper, an observational study is conducted. Within the study, two data collection methods were used; observational of the users and post observation questionnaires. The observational study was done by video recording users while using the IoT application. This was to obtain information about the IoT. The post observational questionnaires were to obtain information about the users’ judgement of their IoT experience. The IoT application used in this study is a Smart Home Starter Kit. The users are to secure a room with the Smart Home Starter kit. Later on, the users are presented with a post observational questionnaire to further elaborate on their experience in case the researcher missed something while recording. The study was performed with 5 users. The users were found through convenience sampling at the Karlskrona central train station and the Hogsland Park. They were then asked, if they were willing to take part in the study. This number of users was enough to reach saturation needed for the research. The author used a deductive approach together with conventional content analysis method to analyze the data and its quality. Results. The research questions of the study focused mainly on learning, maintaining awareness and re-process of the IoT. Re-process of the IoT refers to implementing the IoT with the new information received from user feedback. This enables the IoT to become more user compatible and friendly. When the results of the study were mapped to the research questions, the author deduced that learnability requirements were lacking. The users suggested simpler step by step guidelines would have made their experience with IoT much better. Thus the IoT developers would implement the user feedback through simple online tutorials, an online technician that could guide the users through the IoT application. Conclusions. In comparison to related work, the author concluded that there is still a big knowledge gap between the system requirements and the user requirements of the IoT. Many related papers are more focused on what IoT applications to develop and design than the users of the IoT applications. That is where this paper comes in, to bridge the gap. Without focus on users and their needs, then complex IoT systems will fail to accomplish their goal. The users suggested simple step by step approach on how to use the IoT due to the learnability problem that is faced by the majority of them. The product developers can make simpler and more user friendly IoT applications with these results. In the future, User requirements could further get categorized according to the different types of IoT and users. This would make it simpler for the researcher as the scope is narrowed down and at the same time for the IoT developers, as they know what to implement in the IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
39

Aravind, Meera. "Event-Based Messaging Architecture for Vehicular Internet of Things (IoT) Platforms." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-35905.

Full text
Abstract:
Internet of Things (IoT) has revolutionized transportation systems by connecting vehicles consequently enabling their tracking, as well as monitoring of driver activities. The IoT platform for most vehicles typically consists of 1) an on-board system consisting of the communication unit, sensors and a set of ECU’s that are interconnected using a CAN network, 2) an off-board system consisting of the applications deployed on the servers (e.g., cloud) that processes the data send by the communication unit over the internet, and 3) mobile devices like a mobile phone or a computer that communicates with the on-board and off-board systems. Such an IoT platform requires a significant amount of data to be send from the on-board system to the off-board servers, contributing to high network usage. There are two main architectural paradigms for sending data: 1) interval based architecture, in which data is send at regular intervals and 2) event based architecture, in which data is send whenever relevant events occur. Currently, (e.g., at Scania), the data is being send at regular intervals, i.e., using an interval based approach. In this case, data is send even if it is not relevant for reporting leading to a wastage of network resources, e.g., when the data does not change considerably compared to the previously sent value. Sending data in an event-based manner, when the data is relevant for reporting, e.g., changes significantly, reduces the network usage when compared to the interval based approach.  In this thesis, we investigate the possibility of using an event based architecture to send data from the on-board system to the off-board system in order to reduce network usage and improve the accuracy of the data available off-board. We first propose an event based architecture for data transfer in the context of Internet of vehicles. We then implement a simulator to evaluate our proposed architecture for the specific case of position data. Finally, we perform extensive experiments varying different parameters and compare, for example, average message size per minute and average off-board error distance. The results show that our event based architecture improves the accuracy of data available at the off-board system, by a careful selection of events. Moreover, we found that our event based architecture significantly decreases the frequency of sending messages, particularly during highway driving, leading to reduced average data transfer rates. Our results enable a customer to perform trade-offs between accuracy and data transfer rates. Future work will aim at implementing the event based architecture on a real platform as well as investigating the possibility of using the event based architecture for more accurate prediction by incorporating additional details such as the final destination of the vehicle and odometer values.
APA, Harvard, Vancouver, ISO, and other styles
40

Xu, Ran. "Federated Sensor Network architectural design for the Internet of Things (IoT)." Thesis, Loughborough University, 2013. https://dspace.lboro.ac.uk/2134/13453.

Full text
Abstract:
An information technology that can combine the physical world and virtual world is desired. The Internet of Things (IoT) is a concept system that uses Radio Frequency Identification (RFID), WSN and barcode scanners to sense and to detect physical objects and events. This information is shared with people on the Internet. With the announcement of the Smarter Planet concept by IBM, the problem of how to share this data was raised. However, the original design of WSN aims to provide environment monitoring and control within a small scale local network. It cannot meet the demands of the IoT because there is a lack of multi-connection functionality with other WSNs and upper level applications. As various standards of WSNs provide information for different purposes, a hybrid system that gives a complete answer by combining all of them could be promising for future IoT applications. This thesis is on the subject of `Federated Sensor Network' design and architectural development for the Internet of Things. A Federated Sensor Network (FSN) is a system that integrates WSNs and the Internet. Currently, methods of integrating WSNs and the Internet can follow one of three main directions: a Front-End Proxy solution, a Gateway solution or a TCP/IP Overlay solution. Architectures based on the ideas from all three directions are presented in this thesis; this forms a comprehensive body of research on possible Federated Sensor Network architecture designs. In addition, a fully compatible technology for the sensor network application, namely the Sensor Model Language (SensorML), has been reviewed and embedded into our FSN systems. The IoT as a new concept is also comprehensively described and the major technical issues discussed. Finally, a case study of the IoT in logistic management for emergency response is given. Proposed FSN architectures based on the Gateway solution are demonstrated through hardware implementation and lab tests. A demonstration of the 6LoWPAN enabled federated sensor network based on the TCP/IP Overlay solution presents a good result for the iNET localization and tracking project. All the tests of the designs have verified feasibility and achieve the target of the IoT concept.
APA, Harvard, Vancouver, ISO, and other styles
41

Selvakumaran, Dinesh Kumar. "ENERGY-EFFICIENT AND SECURE HARDWARE FOR INTERNET OF THINGS (IoT) DEVICES." UKnowledge, 2018. https://uknowledge.uky.edu/ece_etds/132.

Full text
Abstract:
Internet of Things (IoT) is a network of devices that are connected through the Internet to exchange the data for intelligent applications. Though IoT devices provide several advantages to improve the quality of life, they also present challenges related to security. The security issues related to IoT devices include leakage of information through Differential Power Analysis (DPA) based side channel attacks, authentication, piracy, etc. DPA is a type of side-channel attack where the attacker monitors the power consumption of the device to guess the secret key stored in it. There are several countermeasures to overcome DPA attacks. However, most of the existing countermeasures consume high power which makes them not suitable to implement in power constraint devices. IoT devices are battery operated, hence it is important to investigate the methods to design energy-efficient and secure IoT devices not susceptible to DPA attacks. In this research, we have explored the usefulness of a novel computing platform called adiabatic logic, low-leakage FinFET devices and Magnetic Tunnel Junction (MTJ) Logic-in-Memory (LiM) architecture to design energy-efficient and DPA secure hardware. Further, we have also explored the usefulness of adiabatic logic in the design of energy-efficient and reliable Physically Unclonable Function (PUF) circuits to overcome the authentication and piracy issues in IoT devices. Adiabatic logic is a low-power circuit design technique to design energy-efficient hardware. Adiabatic logic has reduced dynamic switching energy loss due to the recycling of charge to the power clock. As the first contribution of this dissertation, we have proposed a novel DPA-resistant adiabatic logic family called Energy-Efficient Secure Positive Feedback Adiabatic Logic (EE-SPFAL). EE-SPFAL based circuits are energy-efficient compared to the conventional CMOS based design because of recycling the charge after every clock cycle. Further, EE-SPFAL based circuits consume uniform power irrespective of input data transition which makes them resilience against DPA attacks. Scaling of CMOS transistors have served the industry for more than 50 years in providing integrated circuits that are denser, and cheaper along with its high performance, and low power. However, scaling of the transistors leads to increase in leakage current. Increase in leakage current reduces the energy-efficiency of the computing circuits,and increases their vulnerability to DPA attack. Hence, it is important to investigate the crypto circuits in low leakage devices such as FinFET to make them energy-efficient and DPA resistant. In this dissertation, we have proposed a novel FinFET based Secure Adiabatic Logic (FinSAL) family. FinSAL based designs utilize the low-leakage FinFET device along with adiabatic logic principles to improve energy-efficiency along with its resistance against DPA attack. Recently, Magnetic Tunnel Junction (MTJ)/CMOS based Logic-in-Memory (LiM) circuits have been explored to design low-power non-volatile hardware. Some of the advantages of MTJ device include non-volatility, near-zero leakage power, high integration density and easy compatibility with CMOS devices. However, the differences in power consumption between the switching of MTJ devices increase the vulnerability of Differential Power Analysis (DPA) based side-channel attack. Further, the MTJ/CMOS hybrid logic circuits which require frequent switching of MTJs are not very energy-efficient due to the significant energy required to switch the MTJ devices. In the third contribution of this dissertation, we have investigated a novel approach of building cryptographic hardware in MTJ/CMOS circuits using Look-Up Table (LUT) based method where the data stored in MTJs are constant during the entire encryption/decryption operation. Currently, high supply voltage is required in both writing and sensing operations of hybrid MTJ/CMOS based LiM circuits which consumes a considerable amount of energy. In order to meet the power budget in low-power devices, it is important to investigate the novel design techniques to design ultra-low-power MTJ/CMOS circuits. In the fourth contribution of this dissertation, we have proposed a novel energy-efficient Secure MTJ/CMOS Logic (SMCL) family. The proposed SMCL logic family consumes uniform power irrespective of data transition in MTJ and more energy-efficient compared to the state-of-art MTJ/ CMOS designs by using charge sharing technique. The other important contribution of this dissertation is the design of reliable Physical Unclonable Function (PUF). Physically Unclonable Function (PUF) are circuits which are used to generate secret keys to avoid the piracy and device authentication problems. However, existing PUFs consume high power and they suffer from the problem of generating unreliable bits. This dissertation have addressed this issue in PUFs by designing a novel adiabatic logic based PUF. The time ramp voltages in adiabatic PUF is utilized to improve the reliability of the PUF along with its energy-efficiency. Reliability of the adiabatic logic based PUF proposed in this dissertation is tested through simulation based temperature variations and supply voltage variations.
APA, Harvard, Vancouver, ISO, and other styles
42

Borges, caldas da silva Pedro Victor. "Middleware support for energy awareness in the Internet of Things (IoT)." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS016.

Full text
Abstract:
L'Internet des objets (IoT) se caractérise par une myriade de dispositifs et de composants logiciels géographiquement dispersés ainsi que par une grande hétérogénéité en termes de matériel, de format de données et de protocoles. Au cours des dernières années, les plateformes IoT ont été proposées pour fournir une variété de services aux applications, tels que la découverte de dispositifs, la gestion du contexte et l'analyse des données. Cependant, le manque de standardisation fait que chaque plateforme IoT propose ses propres abstractions, API et patrons d'interactions. Par conséquent, la programmation des interactions entre une application IoT consommatrice de données et une plateforme IoT est complexe, sujette à des erreurs et demande un niveau de connaissance de la plateforme IoT approfondi de la part des développeurs. Les intergiciels IoT peuvent atténuer cette hétérogénéité, ils doivent fournir des services pertinents et ainsi faciliter le développement des applications.L'efficacité énergétique de la technologie numérique devenant une priorité, l'augmentation du nombre de systèmes IoT pose des problèmes énergétiques. Dans ce contexte, il est essentiel de concevoir soigneusement les interactions entre les applications IoT grand public et les plateformes IoT en tenant compte de l'efficacité énergétique. Les intergiciels IoT ne doivent pas uniquement considérer l'efficacité énergétique comme une exigence non fonctionnelle laissée à l'application, Au contraire, parce qu'ils sont utilisés par de nombreuses applications, l'efficacité énergétique doit être au cœur de leur conception.Cette thèse présente trois contributions concernant l'efficacité énergétique et la sensibilisation à l'énergie dans les intergiciels IoT pour les applications IoT consommatrices de données. La première contribution est la proposition d'un intergiciel IoT appelé IoTvar qui abstrait les capteurs virtuels IoT dans des variables IoT qui sont automatiquement mises à jour par l'intergiciel. La deuxième contribution est l'évaluation de la consommation d'énergie des interactions entre les applications IoT grand public et les plateformes IoT via les protocoles HTTP et MQTT. Cette évaluation a conduit à la proposition de lignes directrices pour améliorer l'efficacité énergétique des interactions. La troisième contribution est la proposition de stratégies d'efficacité énergétique pour des middleware IoT. Ces stratégies ont été intégrées dans l'intergiciel IoTvar pour assurer l'efficacité énergétique, mais aussi la sensibilisation à l'énergie par le biais d'un modèle énergétique et la gestion d'un budget énergétique fonction des exigences des utilisateurs. Les implémentations de l'architecture middleware IoT, avec et sans stratégie d'efficacité énergétique, ont été évaluées, et les résultats montrent que nous avons une diminution allant jusqu'à 60% de l'énergie consommée par les applications IoT en appliquant des stratégies pour réduire la consommation d'énergie au niveau du middleware
The Internet of Things (IoT) is characterized by a myriad of geographically dispersed devices and software components as well as high heterogeneity in terms of hardware, data, and protocols. Over the last few years, IoT platforms have been used to provide a variety of services to applications such as device discovery, context management, and data analysis. However, the lack of standardization makes each IoT platform come with its abstractions, APIs, and interactions. As a consequence, programming the interactions between a consuming IoT application and an IoT platform is often time-consuming, error-prone, and depends on the developers' level of knowledge about the IoT platform. IoT middleware are proposed to alleviate such heterogeneity, provide relevant services, and ease application development.As the energy efficiency of digital technology becomes a priority, the increase in IoT systems brings energy concerns. In this context, carefully designing interactions between IoT consumer applications and IoT systems with an energy-efficiency concern becomes essential. IoT middleware should not solely consider energy efficiency as a non-functional requirement. Instead, it needs to be at the solution's core as the middleware is expected to be shared by many applications and offer facilities to ease application development.This work presents three contributions regarding energy-efficiency/awareness in IoT middleware for IoT consumer applications.The first contribution is the proposal of an IoT middleware for IoT consumer applications called IoTVar that abstracts IoT virtual sensors in IoT variables that are automatically updated by the middleware.The second contribution is the evaluation of the energy consumption of the interactions between IoT consumer applications and IoT platforms through the HTTP and MQTT protocols. This evaluation has led to the proposal of guidelines to improve energy efficiency when developing applications.The third contribution is the proposal of strategies for energy efficiency to be integrated into IoT middleware. Those strategies have been integrated into the IoTVar middleware to provide energy efficiency, but also energy awareness through an energy model and the management of an energy budget driven by user requirements. The implementations of the IoT middleware architecture, with and without energy-efficiency strategies, have been evaluated, and the results show that we have a difference of up to 60% the energy used by IoT applications by applying strategies to reduce energy consumption at the middleware level
APA, Harvard, Vancouver, ISO, and other styles
43

Olsson, Alexander. "Meshnetwork of wireless IoT sensors." Thesis, Umeå universitet, Institutionen för fysik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-122908.

Full text
Abstract:
The Internet of things is a scenario where devices such as lighting, household appliances, sensors etc. are connected and communicate with each other via Internet. This puts a demand for a good infrastructure around these devices. One way to handle this is to use radio as a means of communication and let the devices forward each other's traffic in what is known as a mesh network. This thesis explores different radio standards that can be used to create a mesh network for sensors. Two different approaches to mesh networking using Bluetooth Low Energy was implemented and evaluated. One approach works by letting all devices broadcast every message they receive, a rather brute force approach. The other approach worked by letting the network find routes between all the nodes in the network and then establishes a connection between the nodes that want to communicate via intermediate nodes. It was found that the rebroadcast approach in idle mode used 3.36 mAh while the connection approach used 0.47 mAh for the same configuration. Another test was performed where the percentage of successfully delivered messages was measured. For the rebroadcast approach it was 75 % and for connection it was 58 %. Tweaking the connection network to not be able to adapt to changes increased the throughput to 77 %. During the testing numerous ways for improving performance were thought of but not implemented. The need for synchronizing the devices clocks and establishing protocol for when to send and receive became apparent when working with the rebroadcast network. In the connection network there were problems with that the routing maintenance led to unavailable units and reduced performance.
Sakernas internet, Internet of Things är ett scenario där elektriska apparater så som belysning, hushållsmaskiner, sensorer mm är anslutna och kommunicerar med varandra via internet. Men så många anslutna enheter ställer stora krav på infrastrukturen kring enheterna. Ett sätt att lösa problemen kring infrastruktur är att låta enheterna kommunicera via radio och låta dem vidarebefordra varandras datatrafik i en typ av nätverkstopologi som kallas för meshnätverk. Det här examensarbetet utforskar möjliga radiostandarder som kan användas för att skapa ett meshnätverk för just sensorer. Två typer av meshnätverk implementerades med Bluetooth Low Energy och deras styrkor och svagheter utvärderades. En av dessa gick ut på att enheterna i nätverket sände ut meddelanden som alla kunde ta och sedan att de som lyckades ta emot i sin tur sände meddelandena vidare. Det är en enkel metod som är lätt att implementera.Den andra metoden gick ut på att nätverket tog reda på sin konfiguration och vilken rutt som ska tas via andra enheter för att nå den man vill. När enheterna sen vill kommunicera så upprättar de en anslutning via enheterna längs rutten. Två saker som jämfördes mellan metoderna var strömförbrukning och andel lyckade sändningar. För samma nätverk så drog återsändnings nätverket 3.36 mA och anslutningsnätverket 0.47 mA. Antalet lyckade sändningar testades i ett annat scenario och där kom 75 % av meddelanden i återsändningsnätverket fram och motsvarande siffra för anslutningsnätverket var 58\%. Vidare testades det att stänga av utbytet av rutt information och sökningar efter nya enheter i anslutningsnätverket och då kom 77 % av meddelanden fram. I återsändningsnätverket insåg man att det fanns ett behov av att synkronisera klockorna i enheterna och etablera ett protokoll för hur när man ska sända och ta emot.I anslutningsnätverket så uppstod problem med att enheterna blev otillgängliga när de synkroniserade sin konfiguration vilket ledde till försämrad prestanda.
APA, Harvard, Vancouver, ISO, and other styles
44

Vaidian, Iulia, Muhammad Azmat, and Sebastian Kummer. "Impact of Internet of Things on Urban Mobility." HBMSU, 2019. http://epub.wu.ac.at/7101/1/IA%2D12%2DProceedings%2DHealth%2Dand%2DEnvironment%2Dpages%2D1%2C4%2D17.pdf.

Full text
Abstract:
The urban population is predicted to increase to 66% by 2050. The rapid growth of urbanization and increasing congestion are significant challenges faced by the world today. Innovative solutions in urban mobility are key for a successful development and a sustainable future. The new paradigm, Internet of Things (IoT), facilitates the need for new approaches in urban transportation, leading to a modern concept: Smart Mobility. The boom of technology and innovation from recent years allowed a great expansion of IoT. Furthermore, the number of smart devices that communicate, cooperate and complement each other, grows rapidly in every domain broadening the scope of IoT applications. This paper sets to discuss the impact that IoT might have on urban mobility, mentioning its implications, challenges and technical solutions. It further reviews the advancements made in the transport infrastructure along the years that support the emergence of Smart Mobility. Three main research questions stay at the forefront of this paper which are drafted in pursuit of the solutions for the problems and challenges currently faced by urban transportation. Which leads to a sustainable future with efficient and effective urban transportation system. The paper uses a mix-method approach, using on one hand qualitative research for literature review (State of the field) and on the other hand quantitative research to assess public opinion on the research topic, through an online questionnaire. To answer the research questions with proper arguments, both research methods were necessary, which lead to optimal results. The results of the questionnaire were interpreted based on Spearman's correlation and descriptive statistical analysis. They brought an in-depth view on the public opinion regarding IoT and the developments enabled by this paradigm within the urban mobility sphere. The output of the questionnaire highlights the eagerness of participants usually stuck in traffic to see innovation within urban mobility. Over all the results based on the opinions suggest that the public strongly believes in the Internet of Thing's applications and its adaptation will benefit the urban transportation system. Furthermore, new developments in the urban mobility sphere will be largely embraced.
APA, Harvard, Vancouver, ISO, and other styles
45

Nugur, Aditya. "Design and Development of an Internet-Of-Things (IoT) Gateway for Smart Building Applications." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/79960.

Full text
Abstract:
With growing concerns on global energy demand and climate change, it is important to focus on efficient utilization of electricity in commercial buildings, which contribute significantly to the overall electricity consumption. Accordingly, there has been a number of Building Energy Management (BEM) software/hardware solutions to monitor energy consumption and other measurements of individual building loads. BEM software serves as a platform to implement smart control strategies and stores historical data. Although BEM software provides such lucrative benefits to building operators, in terms of energy savings and personalized control, these benefits are not harnessed by most small to mid-sized buildings due to a high cost of deployment and maintenance. A cloud-based BEM system can offer a low-cost solution to promote ease of use and support a maintenance-free installation. In a typical building, a conventional router has a public address and assigns private addresses to all devices connected to it. This led to a network topology, where the router is the only device in the Internet space with all other devices forming an isolated local area network behind the router. Due to this scenario, a cloud-based BEM software needs to pass through the router to access devices in a local area network. To address this issue, some devices, during operation, make an outbound connection to traverse through the router and provide an interface to itself on the Internet. Hence, based on their capability to traverse through the router, devices in a local area network can be distinguished as cloud and non-cloud devices. Cloud-based BEM software with sufficient authorization can access cloud devices. In order to access devices adhering to non-cloud protocols, cloud-based BEM software requires a device in the local area network which can perform traversal through the router on behalf of all non-cloud devices. Such a device acts as an IoT gateway, to securely interconnect devices in a local area network with cloud-based BEM software. This thesis focuses towards architecting, designing and prototyping an Internet-of-Things (IoT) gateway which can perform traversal on behalf of non-cloud devices. This IoT gateway enables cloud-based BEM software to have a comprehensive access to supported non-cloud devices. The IoT gateway has been designed to support BACnet, Modbus and HTTP RESTful, which are the three widely adopted communication protocols in the building automation and control domain. The developed software executes these three communication protocols concurrently to address requests from cloud-based BEM system. The performance of the designed architecture is independent of the number of devices supported by the IoT gateway software.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
46

Lobe, kome Ivan Marco. "Identity and consent in the internet of persons, things and services." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0131/document.

Full text
Abstract:
La course à la miniaturisation des appareils informatiques est en train de transformer notre relation avec ces derniers, ainsi que leurs rôles dans notre société. Le nombre d’ordinateurs miniatures contrôlés à distance augmente considérablement et ces objets connectés - comme ils sont communément appelés - sont de plus en plus sollicités pour effectuer des tâches à la place de l’Homme. La tendance actuelle consiste à créer une place dans Internet pour ces objets connectés, autrement dit, à construire des protocoles adaptés à leurs ressources limitées. Cette tendance est connue comme l’Internet desObjets - ou l’acronyme anglais IoT - qui est différent des protocoles destinés à une utilisation exclusivement par des humains dit Internet des Personnes ou IoP en anglais. Avec l’adoption de cette séparation conceptuelle, comment est-ce qu’une personne échangerait ses informations avec des objets sans sacrifier la sécurité ? Pour aider à réduire cet écart, on a besoin d’un intermédiaire et la mise en réseau de ces intermédiaires amène à construire le concept d’Internet des Services ou IoS en anglais. Les personnes et les objets sont connectés à travers les services. Le réseau dans son ensemble, incluant les personnes, les objets et les services est donc l’Internet des Personnes, des Objets et des Services. Notre travail se situe à l’intersection de ces trois domaines et notre contribution est double. Premièrement, nous assurons que la liaison entre l’identité d’une personne et de ses objets ne se fasse pas au détriment des propriétés de sécurité telles que l'Intégrité, l'Anonymat et la confidentialité. Et deuxièmement, nous abordons la gestion de la confidentialité des données avec les objets dits connectés. Dans la quête d’une meilleure intégration des objets connectés à Internet, nous avons contribué à la définition de protocoles autant sur la couche applicative que sur la couche réseau du modèle OSI, avec pour préoccupations principales les contraintes de l’IoT et la sécurité
The constant efforts of miniaturization of computing machines is transforming our relationships with machines and their role in society. The number of tiny computers remotely controlled is skyrocketing and those connected things are now more and more asked to do things on human behalf. The trend consists in making room for these specific machines into the Internet, in other words, building communication protocols adapted to their limited resources. This trend is commonly known as the Internet of Things (IoT) which consist of appliances and mechanisms different from those meant to be used exclusively by humans, the Internet of Persons (IoP). This conceptual separation being adopted, how would a Person exchange information with Things ?Sorts of brokers can help bridging that gap. The networking of those brokers led to the concept of Internetof Services (IoS). Persons and Things are connected through Services. This global networking is called the Internet of Persons Things and Services (IoPTS). Our work is on the edge of these 3 Internet areas and our contributions are two fold. In the first hand, we tackle the secure biding of devices’ and persons’ identities while preserving the Integrity, Anonymity and Confidentiality security properties. On the other hand, we address the problem of the secrecy of data on constrained Internet-connected devices. Other mechanisms must be created in order to seamlessly bind these conceptual areas of IoP, IoT andIoS. In this quest for a better integration of Internet connected-devices into the Internet of Persons, our work contributes to the definition of protocols on application and network layers, with IoT concerns and security at heart
APA, Harvard, Vancouver, ISO, and other styles
47

Qureshi, Daniyal Akhtar. "Performance Evaluation of IoT Platforms in Green ICT Applications." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-71391.

Full text
Abstract:
With the advent of the Internet of Things (IoT), its deployment and applications have grown exponentially in the past decade. This growth has had led scientists and stakeholders to the prediction that about 30 billion of things (IoT) will be connected by 2020 in diverse applications such as transport, healthcare, utility, education, and home automation. Large data streams generated by sensors; it can be data acquisition, storage, or processing, derived the development of cloud-based middleware (or otherwise known as IoT Platform) for IoT. To date, hundreds of IoT platforms fluxing the market (both open-source and commercial) with various complexities, pricing, and services. In this thesis, we proposed an IoT Platform Benchmarking Methodology comprised of four different evaluations namely; Technical, Usability, Sustainability, and Market Competency. We discussed in detail Technical Evaluation based on TPC-IoT benchmarking to evaluate the performance of any IoT platform. The main objective of this research is to provide insight into key parameters in each layer of the platform affecting the overall performance. A preliminary evaluation of data ingestion of open-source IoT platform will be presented based on benchmarking methodology (TPC-IoT).
APA, Harvard, Vancouver, ISO, and other styles
48

Hsu, Alexander Sirui. "Automatic Internet of Things Device Category Identification using Traffic Rates." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/88421.

Full text
Abstract:
Due to the ever increasing supply of new Internet of Things (IoT) devices being added onto a network, it is vital secure the devices from incoming cyber threats. The manufacturing process of creating and developing a new IoT device allows many new companies to come out with their own device. These devices also increase the network risk because many IoT devices are created without proper security implementation. Utilizing traffic patterns as a method of device type detection will allow behavior identification using only Internet Protocol (IP) header information. The network traffic captured from 20 IoT devices belonging to 4 distinct types (IP camera, on/off switch, motion sensor, and temperature sensor) are generalized and used to identify new devices previously unseen on the network. Our results indicate some categories have patterns that are easier to generalize, while other categories are harder but we are still able recognize some unique characteristics. We also are able to deploy this in a test production network and adapted previous methods to handle streaming traffic and an additional noise categorization capable of identify non-IoT devices. The performance of our model is varied between classes, signifying that much future work has to be done to increase the classification score and overall usefulness.
Master of Science
IoT (Internet of Things) devices are an exploding field, with many devices being created, manufactured, and utilized per year. With the rise of so many internet capable devices, there is a risk that the devices may have vulnerabilities and exploits able to allow unauthorized users to access. While a problem for a consumer network, this is an increased problem in an enterprise network, since much of the information on the network is sensitive and should be kept confidential and private. While a ban of IoT devices on a network is able to solve this problem, with the rise of machine learning able to characterize and recognize patterns, a smarter approach can be created to distinguish when and which types of IoT devices enter the network. Previous attempts to identify IoT devices used signature schemes specific to a single device, but this paper aims to generalize traffic behaviors and identifying a device category rather than a specific IoT device to ensure future new devices can also be recognized. With device category identification in place on an internet network, smarter approaches can be implemented to ensure the devices remain secure while still able to be used.
APA, Harvard, Vancouver, ISO, and other styles
49

Islam, Mohammad. "Measuring trustworthiness of image data in the internet of things environment." Thesis, Federation University Australia, 2021. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/177521.

Full text
Abstract:
Internet of Things (IoT) image sensors generate huge volumes of digital images every day. However, easy availability and usability of photo editing tools, the vulnerability in communication channels and malicious software have made forgery attacks on image sensor data effortless and thus expose IoT systems to cyberattacks. In IoT applications such as smart cities and surveillance systems, the smooth operation depends on sensors’ sharing data with other sensors of identical or different types. Therefore, a sensor must be able to rely on the data it receives from other sensors; in other words, data must be trustworthy. Sensors deployed in IoT applications are usually limited to low processing and battery power, which prohibits the use of complex cryptography and security mechanism and the adoption of universal security standards by IoT device manufacturers. Hence, estimating the trust of the image sensor data is a defensive solution as these data are used for critical decision-making processes. To our knowledge, only one published work has estimated the trustworthiness of digital images applied to forensic applications. However, that study’s method depends on machine learning prediction scores returned by existing forensic models, which limits its usage where underlying forensics models require different approaches (e.g., machine learning predictions, statistical methods, digital signature, perceptual image hash). Multi-type sensor data correlation and context awareness can improve the trust measurement, which is absent in that study’s model. To address these issues, novel techniques are introduced to accurately estimate the trustworthiness of IoT image sensor data with the aid of complementary non-imagery (numeric) data-generating sensors monitoring the same environment. The trust estimation models run in edge devices, relieving sensors from computationally intensive tasks. First, to detect local image forgery (splicing and copy-move attacks), an innovative image forgery detection method is proposed based on Discrete Cosine Transformation (DCT), Local Binary Pattern (LBP) and a new feature extraction method using the mean operator. Using Support Vector Machine (SVM), the proposed method is extensively tested on four well-known publicly available greyscale and colour image forgery datasets and on an IoT-based image forgery dataset that we built. Experimental results reveal the superiority of our proposed method over recent state-of-the-art methods in terms of widely used performance metrics and computational time and demonstrate robustness against low availability of forged training samples. Second, a robust trust estimation framework for IoT image data is proposed, leveraging numeric data-generating sensors deployed in the same area of interest (AoI) in an indoor environment. As low-cost sensors allow many IoT applications to use multiple types of sensors to observe the same AoI, the complementary numeric data of one sensor can be exploited to measure the trust value of another image sensor’s data. A theoretical model is developed using Shannon’s entropy to derive the uncertainty associated with an observed event and Dempster-Shafer theory (DST) for decision fusion. The proposed model’s efficacy in estimating the trust score of image sensor data is analysed by observing a fire event using IoT image and temperature sensor data in an indoor residential setup under different scenarios. The proposed model produces highly accurate trust scores in all scenarios with authentic and forged image data. Finally, as the outdoor environment varies dynamically due to different natural factors (e.g., lighting condition variations in day and night, presence of different objects, smoke, fog, rain, shadow in the scene), a novel trust framework is proposed that is suitable for the outdoor environments with these contextual variations. A transfer learning approach is adopted to derive the decision about an observation from image sensor data, while also a statistical approach is used to derive the decision about the same observation from numeric data generated from other sensors deployed in the same AoI. These decisions are then fused using CertainLogic and compared with DST-based fusion. A testbed was set up using Raspberry Pi microprocessor, image sensor, temperature sensor, edge device, LoRa nodes, LoRaWAN gateway and servers to evaluate the proposed techniques. The results show that CertainLogic is more suitable for measuring the trustworthiness of image sensor data in an outdoor environment.
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
50

Mendes, José Miguel Martins Lopes. "Security techniques for the internet of things." Master's thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/12686.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática
IoT assume que dispositivos limitados, tanto em capacidades computacionais como em energia disponível, façam parte da sua infraestrutura. Dispositivos esses que apresentam menos capacidades e mecanismos de defesa do que as máquinas de uso geral. É imperativo aplicar segurança nesses dispositivos e nas suas comunicações de maneira a prepará-los para as ameaças da Internet e alcançar uma verdadeira e segura Internet das Coisas, em concordância com as visões atuais para o futuro. Esta dissertação pretende ser um pequeno passo nesse sentido, apresentando alternativas para proteger as comunicações de dispositivos restritos numa perspetiva de performance assim como avaliar o desempenho e a ocupação de recursos por parte de primitivas criptográficas quando são aplicadas em dispositivos reais. Dado que a segurança em diversas ocasiões tem de se sujeitar aos recursos deixados após a implementação de funcionalidades, foi colocada uma implementação de exposição de funcionalidades, recorrendo ao uso de CoAP, num dispositivo fabricado com intenção de ser usado em IoT e avaliada de acordo com a sua ocupação de recursos.
IoT comprehends devices constrained in both computational capabilities and available energy to be a part of its infrastructure. Devices which also present less defense capabilities and mechanisms than general purpose machines. It’s imperative to secure such devices and their communications in order to prepare them for the Internet menaces and achieve a true and secure Internet of Things compliant with today’s future visions. This dissertation intends to be a small step towards such future by presenting alternatives to protect constrained device’s communications in a performance related perspective as well as benchmarks and evaluation of resources used by cryptographic primitives when implemented on real devices. Due to security being on multiple occasions subjected to the resources available only after functionalities implementation, a minimalist implementation of functionalities exposure through the use of CoAP was also deployed in an IoT intended device and assessed according to resource overhead.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography