To see the other types of publications on this topic, follow the link: Internet of Things.

Dissertations / Theses on the topic 'Internet of Things'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Internet of Things.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Piškula, David. "Internet of Things." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399196.

Full text
Abstract:
This thesis focuses on the Internet of Things and some of the most important problems it faces today. Among these are the overdependence on the Cloud and lack of autonomy, poor security and privacy, complicated initialization and power consumption. The work aims to implement a complex IoT solution that solves the discussed problems. The project is part of a collaboration with NXP Semicondutors and will be used to showcase the company's technologies.
APA, Harvard, Vancouver, ISO, and other styles
2

Vitale, Clemente. "Internet of Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3184/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Poggi, Giovanni. "Internet of Medical Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.

Find full text
Abstract:
In questa tesi, si partirà con un'introduzione generale all'Internet of Things focalizzando l'attenzione sulla struttura generale dell'architettura ed il suo funzionamento di base in una rete con molti altri dispositivi. Seguirà l'analisi del trend di questa tecnologia e la sua evoluzione nel tempo, con particolare attenzione all'architettura ed al suo successo ai giorni nostri. Verrà discussa l'industrializzazione che ha portato alla creazione delle Industrie 4.0, ovvero l'Internet of Things in ambito sensoristica applicato all'industria, alla robotica, ai Big Data che si occupano dell'archiviazione, all'acquisizione e all'analisi dei dati provenienti dai vari dispositivi, ai sistemi ciberfisici, alla connessione di tutti questi oggetti tra loro per la comunicazione e lo scambio delle informazioni ed infine alla realtà aumentata per il supporto nei vari processi industriali. Questi macroargomenti saranno lo spunto per introdurre il concetto di Internet of Medical Things. Con una breve panoramica sugli ospedali al giorno d'oggi, si vuol proporre una nuova concezione di ospedale dove vengono poste al centro dell'attenzione le esigenze del paziente e del personale medico, trattando nello specifico le tecnologie impiegate, i processi chirurgici, clinici e l’erogazione delle prestazioni sanitarie. Il discorso seguirà focalizzando l'attenzione anche su ambienti della medicina come la chirurgia, introducendo un luogo in cui migliaia di dispositivi connessi alla rete comunicano tra di loro. Si vedranno anche tutte le eventuali criticità e le varie sfide che bisognerà risolvere ed intraprendere per arrivare ad un corretto ed efficiente passaggio agli odierni ospedali concepiti per essere ospedali 4.0. Si concluderà con una riflessione su tutte queste tecnologie e la rivoluzione in ambito medico che promette cambiamenti che porteranno al nuovo concetto di Ospedale 4.0 su un’ottica di Internet of Medical Things.
APA, Harvard, Vancouver, ISO, and other styles
4

Carlsson, Simon, and Max Näf. "Internet of Things Hacking." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239366.

Full text
Abstract:
As the Internet of Things is gaining more traction in the market, people are becoming more comfortable with having their daily equipment connected to the internet, fewer are taking the security aspect seriously. By attempting an attack on the Telia Sense, an IoT device connected to a car, it is shown how an attacker could try to compromise this type of system and how developers and engineers in the field can test their devices. Information from the device was obtained, including debug information and program code. Telia Sense was found to be a well secured device with a lot of thought and consideration given towards cyber security, therefore a successful attack was not able to be performed. However, the methods and procedures described in this paper are still valid and does aid in securing a device.
APA, Harvard, Vancouver, ISO, and other styles
5

Ревуцький, Микола Вячеславович. "Internet of Things: What about the Security of Things?" Thesis, Київський національний університет технологій та дизайну, 2017. https://er.knutd.edu.ua/handle/123456789/7329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Song, Yuanjun. "Security in Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142451.

Full text
Abstract:
The Internet of Things (IoT) is emerging the Internet and other networks with wireless technologies to make physical objects interact online. The IoT has developed to become a promising technology and receives significant research attention in recent years because of the development of wireless communications and micro-electronics.  Like other immature technological inventions, although IoT will promise their users a better life in the near future, it is a security risk, especially today the privacy is increasingly concerned by people. The key technologies of IoT are not yet mature. Therefore the researches and applications of the IoT are in the early stage. In order to make the IoT pervade people’s everyday life, the security of the IoT must be strengthened. In this thesis, first, the IoT is compared with the Internet. Though the IoT is based on the Internet, due to the characteristics of the IoT, those mature end-to-end security protocols and protective measures in the Internet can not directly provide the end-to-end data security through the perceptual layer, the transport layer the and application layer. For the IoT security addressing issues (such as the Internet DNS attack), this thesis proposes the IoT addressing security model. The traditional access control and the identity authentication only works in the same layer. The IoT addressing security model designed in this thesis effectively solves the issues of vertically passing the authentication results in the addressing process without changing the protocols for two communication parties. Besides, this thesis provides the object access control and privacy protection from the object application layer addressing, DNS addressing and IP addressing phases. Finally, combining the IoT object addressing security model with practical application scenario, this thesis designs the IoT object security access model. In this model, the access requester can access objects in different domains through a single sign-on. This model provides the protection for the end-to-end communication between the access requester and object.
APA, Harvard, Vancouver, ISO, and other styles
7

Cobârzan, Cosmin. "Internet of highly mobile things." Thesis, Strasbourg, 2015. http://www.theses.fr/2015STRAD037/document.

Full text
Abstract:
La mobilité devienne un partie intégrante de l’Internet des Object d’aujourd’hui, comme beaucoup d’applications (monitorage des animaux sauvage, suivi des cible dans le champs de bataille) sont impossible de mettre en œuvre juste avec des nœuds statiques. L’objective de cette thèse est de définir une nouvelle architecture de communication articule autour de la mobilité dans les réseaux avec pertes et à bas puissance (Low Power and Lossy Networks - LLNs) (réseaux des capteurs sans fils). Tout d’abord, nous avons analysé théoriquement l’auto configuration des adresses IPv6, fait avec toutes les optimisations disponibles dans Neighbor Discovery Optimization for IPv6 over 6LoWPAN. Cette étape est cruciale pour des protocoles qui donnent de support pour la mobilité dans des réseaux IP, comme MIPv6. Les résultats obtenues – taille des paquets trop grande et consumations énergétique importante pour les routeurs qui tournent Neighbor Discovery – n’ont amener a utiliser le IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). RPL est développe d’el debout pour les LLN. Notre deuxième contribution sont améliorer les opérations du RPL pour mieux supporter les nœuds mobiles. Enfin, nous avons développe une mécanisme inter-couche – Mobility Triggered-RPL – qui profite des actions dans le protocole avec préambule X-Machiavel à la couche accès au medium dans le protocole RPL à la couche routage
Mobility is becoming an integrating part of todays Internet of Things, as many applications such as wildlife monitoring or target tracking in the battlefield cannot be done only with the help of static nodes. The goal of this thesis is to provide new communication architecture articulated around providing mobility support in Low Power and Lossy Networks (LLNs). First we analyzed from a theoretical point of view the IPv6 address auto-configuration with all optimizations made in Neighbor Discovery Optimization for IPv6 over 6LoWPAN. This step is of crucial importance for protocols that offer mobility support in IP networks, such as MIPv6. Our findings, increased message size that leads to fragmentation and high energy consumption for routers that are involved in Neighbor Discovery message exchange, have lead us to use the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) in order to provide mobility support. RPL is build from ground up with respect to LLN requirements. Our second contribution enhanced RPL operations to support mobility management. Finally, we proposed a cross-layer protocol – Mobility Triggered-RPL – that leverages actions from the X-Machiavel preamble sampling MAC protocol into RPL
APA, Harvard, Vancouver, ISO, and other styles
8

Sabel, Ida. "Internet of Things & Kommunikationsprotokoll." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-27246.

Full text
Abstract:
Genom att studera olika kommunikationsprotokoll kunna svara på vad det är som gör att ett visst protokoll är bäst anpassat för att användas mellan mobila enheter och IoT-enheter. I arbetet användes en kvalitativ litteraturstudie för att ge en grundlig teoretisk bakgrund samt en experimentell studie där ett par teorier undersökts ifall de stämmer med resultaten ifrån verkligheten. De fem faktorerna kompatibilitet, batteritid, frekvens, räckvidd och tillförlitlighet undersöktes hos kommunikationsprotokollen Bluetooth Low Energy (BLE), Närfältskommunikation (NFC) och Wi-Fi. Dessa tre valdes eftersom de stöds av nyare mobila plattformar idag. Kommunikations-protokollen analyserades sedan gentemot olika användningsområden inom IoT, eftersom påståendet vad som är bäst anpassat beror på vad situationen kräver för egenskaper. En systemutvecklare som ska välja kommunikationsprotokoll till en IoT-tillämpning och läser denna rapport bör själv jämföra de olika protokollen mot varandra inom de fem faktorerna för att kunna avgöra vilket protokoll som passar bäst inom dennes situation. I arbetet utfördes endast experimentella studier på BLE på grund av begränsningar inom utrustningen. Ytterligare experiment inom NFC och Wi-Fi skulle ge ett bredare perspektiv med fler infallsvinklar.
By studying different communication protocols respond to what it is that makes a certain protocol best suited for use between mobile devices and IoT devices. This study used a qualitative literature study to create a proper theoretical background and an experimental study where two theories were investigated in whether they matched wih the results from the reality. The five factors compatibility, battery loss, frequency, range and reliability were investigated in the communication protocols Bluetooth Low Energy (BLE), Near field communication (NFC) and Wi-Fi, these three because they are supported by newer mobile platforms today. The communication protocols were then analysed against various uses in the IoT, since the claim what it is that makes it best suited depends on what the situation requires. A system developer that is about to select the communication protocol to use in an IoT application and reads this study should compare the different protocols to each other within the five factors to determine which protocol is best suited for his situation. This study only performed experimental studies on BLE because of limitations in the equipment. Additional experiments on NFC and Wi-Fi would provide a wider perspective.
APA, Harvard, Vancouver, ISO, and other styles
9

Söderberg, Karl Jakob Emanuel. "INTERNET OF THINGS : Smart välfärdsteknologi." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15793.

Full text
Abstract:
Internet of Things är en utveckling som inte endast sträcker sig till de industriella områdena idag. Det når nu mera även ut till välfärdsteknologin. Både användare och företag påverkas idag av detta faktum. Företag har ett behov, och en plikt att värna om sina kunder, och kunder har ett behov av att göra sin röst hörd. Detta arbete har som syfte att utforska acceptansen hos de äldre till denna smarta välfärdsteknologi, samt vad som krävs för att öka acceptansen. Arbetet tillnärmar sig frågan genom litteratur som bas för enkäter och intervjuer, utförda i Sverige och Norge.Det visar sig att acceptansen beror på många olika faktorer, som alla uppfattas olika från person till person. Men att det i många fall kan koka ned till behovet. De flesta människorna vill helst bo hemma så länge som möjligt, i alla fall i Sverige och Norge. Men innan det har gått så långt så kan det vara oklart hur öppna folk är till teknologi som har möjlighet till att uppfattas som integritetskränkande. Nyckeln ligger i att göra teknologin så anpassningsbar som möjligt, vad gäller både funktion och utseende, samt andra faktorer som säkerhet, förståelse, användbarhet och kostnad.
APA, Harvard, Vancouver, ISO, and other styles
10

Norburg, David, and David Persson. "Internet of Things - Ett användarperspektiv." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Крамаренко, Є. С. "Iнтелектуальна мережа Internet of Things." Master's thesis, Сумський державний університет, 2019. http://essuir.sumdu.edu.ua/handle/123456789/76473.

Full text
Abstract:
Зпроектовано інтелектуальну мережу «розумного будинку» у симуляторі Cisco Packet Tracer_7, яка базується на роботі дротової та бездротової мереж, де усі пристрої звязані зі шлюзом. Доступ контролю та моніторингу забезпечено з планшету та смартфону через зручний веб-інтерфейс. Для налаштування пожежної безпеки було розроблено програму для мікроконтролера на мові JavaScript. Візуальне програмування було використано для забезпечення системи комфорту. Розроблена схема при тестуванні показала високі результати, що говорить про доступність та зрозумілість взаємодії із можливостями симулятора. Вона дає змогу отримати наочне уявлення про функціонування розгалудженої системи «розумного будинку» та навчитися формулювати правила роботи окремих елементів на базі отриманих показників датчиків і сенсорів.
APA, Harvard, Vancouver, ISO, and other styles
12

Sokolenko. "INTERNET OF THINGS IN UKRAINE." Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Okumura, Brandon M. "IoTA: Internet of Things Assistant." DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1769.

Full text
Abstract:
The Internet of Things is the networking of electronic devices, or “Things”, that enables them to collect and share data, as well as interact with their physical surround- ings. Analyzing this collected data allows us to make smarter economic decisions. These interconnected networks are usually driven by low-powered micro-controllers or cheap CPUs that are designed to function optimally with very little hardware. As scale and computational requirements increase, these micro-controllers are unable to grow without being physically replaced. This thesis proposes a system, IoTA, that assists the Internet of Things by pro- viding a shared computational resource for endpoint devices. This solution extends the functionality of endpoint devices without the need of physical replacement. The IoTA system is designed to be easily integrable to any existing IoT network. This system presents a model that allows for seamless processing of jobs submitted by endpoint devices while keeping scalability and flexibility in mind. Additionally, IoTA is built on top of existing IoT protocols. Evaluation shows there is a significant performance benefit in processing computationally heavy algorithms on the IoTA system as compared to processing them locally on the endpoint devices themselves.
APA, Harvard, Vancouver, ISO, and other styles
14

Hrnjez, Tatjana. "Internet of Things på Teknikprogrammet." Thesis, Malmö högskola, Fakulteten för lärande och samhälle (LS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-27618.

Full text
Abstract:
Internet of Things (IoT) är det senaste högaktuella som händer inom den digitala teknik-utvecklingen. Det är ett samlingsbegrepp för den utveckling som innebär att allt från in-frastruktur, fordon och hushållsmaskiner till bohag samt levande varelser (inklusive män-niskor), utrustas med små inbyggda sensorer och datorer och på så sätt kopplas upp i ett virtuellt kommunicerande nätverk. Det talas mycket om smarta hem och smarta städer i sammanhanget. 61 procent av de svenska företagen säger sig arbeta med IoT, 50 miljarder enheter beräknas med hjälp av IoT vara uppkopplade i världen år 2020. Den omfattande digitaliseringen innebär ett paradigmskifte som kommer att påverka hela industrin och samhället, inte minst skolan. Frågan är förberedd skolan är för den senaste stora digitala utmaningen och mer specifikt hur det ser ut på teknikprogrammet. Teknikprogrammet är ett högskoleförberedande program där eleven efter erhållen examen skall ha tillräckliga kunskaper för att bli behörig till högskolestudier.
APA, Harvard, Vancouver, ISO, and other styles
15

Nazim, Umair. "Securing Internet of Things (IoT)." Thesis, The University of Sydney, 2018. http://hdl.handle.net/2123/20275.

Full text
Abstract:
The Internet of Things (IoT) is our future and human life is now entering in to a generation where everyone will be using sensory information and artificial intelligence to make day to day life decisions in real-time. With implementation and enhancements around Internet protocol (IP) now it’s possible to connect and control these devices from anywhere around the globe they can be control by either human or even machines. Security is a critical element and building block for Internet of things (IoT) success. First, we have worked finding out possibility of detecting different types of attacks in Internet of things Wireless networks and identify them based on throughput, delay and energy consumed. Attack that we have work on include DOS attacks and DDOS attacks. Motivated by current use of Blockchain in resolving various problems we have evaluated its implementation to find solutions to secure Internet of Things. This become possible by utilising block chain network and smart contracts to validate any IoT communication . Using Blockchain network allowed IoT to detect securely authenticate without over utilizing device resource keeping in mind the limited hardware and bandwidth. IoT node or nodes communicates to a validator node within Blockchain network to get the most current binary of contracts status and in order to achieve this all the devices required to be in sync with Blockchain version of accounts stored by this validator node. We have worked out how this communication will work in order to ensure security and privacy while doing performance analysis of overheads. In conclusion IoT and Blockchain combine together is very promising solution to solve many current security issues in order to take it to mass scale deployment which allow implementation of Internet of things for a purposeful manner.
APA, Harvard, Vancouver, ISO, and other styles
16

Giannini, Colian <1989&gt. "Internet Of Things and Humans." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8563/1/Giannini_Colian_PhDThesis_v1.1.pdf.

Full text
Abstract:
The never ending demand for capacity and the need for ubiquitous radio coverage requires attention to the design of new radio networks. Incoming paradigms (industry 4.0, machine to machine communication and Internet of Things) will overburden even more cellular networks. Current (4G) and near-future (5G) architecture will not be able to support such traffic increase. Moreover, space-time and content heterogeneity of data should be exploited to improve network performance. However, current networks performance are deteriorated by this heterogeneity. Pico- and femto-cell networks, with cell densification, are proposed as solution. A drawback, is the urgency of high-speed backhaul to connect the cells among themselves and the core network. Current research trends assume that the density of cells will be comparable to user density. In such a situation, deploying high-speed backhaul will be expensive. Moreover, regardless whatever deployment of cells, connectivity is a commodity given as always granted. Modern technologies and services rely on stable networks. Nonetheless, whenever also a basic connectivity fails because of a disaster, not even a basic form of radio communication can be provided. Flexible networks adapting to the environment "on the go", could reduce this problem. A to alleviate the aforementioned problems, My work unfolds starting from a couple of intuitions. 1- Traffic demand is not just a data to be processed, transmitted and answered to. The kind of data producing the traffic matters. Thus, we should treat different traffic streams accordingly. This facet of my work is treated under different points of view in the dissertation. 2- In current networks, users are seen as "passive", being just source and/or destination of a traffic stream. There are reasons to envision that users could be exploited as "active" users participating to the network itself fostering its performance. This considerations are accounted in the so called Delay Tolerant Networks.
APA, Harvard, Vancouver, ISO, and other styles
17

Borrillo, Mattia. "Internet of things e integrazione nel web: Web of things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/9229/.

Full text
Abstract:
Internet of Things (IoT): tre parole che sintetizzano al meglio come la tecnologia abbia pervaso quasi ogni ambito della nostra vita. In questa tesi andrò a esplorare le soluzioni hardware e soprattutto software che si celano dietro allo sviluppo di questa nuova frontiera tecnologica, dalla cui combinazione con il web nasce il Web of Things, ovvero una visione globale, accessibile da qualsiasi utente attraverso i comuni mezzi di navigazione, dei servizi che ogni singolo smart device può offrire. Sarà seguito un percorso bottom-up partendo dalla descrizione fisica dei device e delle tecnologie abilitanti alla comunicazione thing to thing ed i protocolli che instaurano fra i device le connessioni. Proseguendo per l’introduzione di concetti quali middleware e smart gateway, sarà illustrata l’integrazione nel web 2.0 di tali device menzionando durante il percorso quali saranno gli scenari applicativi e le prospettive di sviluppo auspicabili.
APA, Harvard, Vancouver, ISO, and other styles
18

Barretta, Salvatore. "UAV based Narrowband - Internet of things." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22761/.

Full text
Abstract:
in this thesis we simulated via Java and Matlab environments a scenario in which a single drone is exploited to carry the NB-IoT base station over an a-priori known area. More specifically, we examined the performance of a drone flying over a area where IoT devices are grouped in clusters and trying to serve as many nodes as possible, with the trajectory solved exploiting the well-known solution of the Travel Salesman Problem (TSP), through which the UAV, that in this study we consider starting from the center of a cluster, finds the minimum path to subsequently reach the center of all the other clusters before reaching again the starting point, where the flight is considered ended. Starting from this assumption we wanted to find the scenario that can best benefit from joint use of NB-IoT and UAV, analyzing both its network throughput and how resources are scheduled by this standard. Then we want to compare the previous results with the new ones obtained changing the way random access is simulated in the code.
APA, Harvard, Vancouver, ISO, and other styles
19

Vargas, Vargas Fernando. "Cloudlet for the Internet-of- Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191433.

Full text
Abstract:
With an increasing number of people currently living in urban areas, many cities around the globe are faced with issues such as increased pollution and traffic congestion. In an effort to tackle such challenges, governments and city councils are formulating new and innovative strategies. The integration of ICT with these strategies creates the concept of smart cities. The Internet of Things (IoT) is a key driver for smart city initiatives, making it necessary to have an IT infrastructure that can take advantage of the many benefits that IoT can provide. The Cloudlet is a new infrastructure model that offers cloud-computing capabilities at the edge of the mobile network. This environment is characterized by low latency and high bandwidth, constituting a novel ecosystem where network operators can open their network edge to third parties, allowing them to flexibly and rapidly deploy innovative applications and services towards mobile subscribers. In this thesis, we present a cloudlet architecture that leverages edge computing to provide a platform for IoT devices on top of which many smart city applications can be deployed. We first provide an overview of existing challenges and requirements in IoT systems development. Next, we analyse existing cloudlet solutions. Finally, we present our cloudlet architecture for IoT, including design and a prototype solution. For our cloudlet prototype, we focused on a micro-scale emission model to calculate the CO2 emissions per individual trip of a vehicle, and implemented the functionality that allows us to read CO2 data from CO2 sensors. The location data is obtained from an Android smartphone and is processed in the cloudlet. Finally, we conclude with a performance evaluation.
Med en befolkning som ökar i urbana områden, står många av världens städer inför utmaningar som ökande avgaser och trafikstockning. I ett försök att tackla sådana utmaningar, formulerar regeringar och stadsfullmäktige nya och innovativa strategier. Integrationen av ICT med dessa strategier bildar konceptet smart cities. Internet of Things (IoT) är en drivande faktor för smart city initiativ, vilket gör det nödvändigt för en IT infrastruktur som kan ta till vara på de många fördelar som IoT bidrar med. Cloudlet är en ny infrastrukturell modell som erbjuder datormolnskompetens i mobilnätverkets edge. Denna miljö karakteriseras av låg latens och hög bandbredd, utgörande ett nytt ekosystem där nätverksoperatörer kan hålla deras nätverks-edge öppet för utomstående, vilket tillåter att flexibelt och snabbt utveckla innovativa applikationer och tjänster för mobila subskribenter. I denna avhandling presenterar vi en cloudlet-arkitektur som framhäver edge computing, för att förse en plattform för IoT utrustning där många smart city applikationer kan utvecklas. Vi förser er först med en överblick av existerande utmaningar och krav i IoT systemutveckling. Sedan analyserar vi existerande cloudlet lösningar. Slutligen presenteras vår cloudlet arkitektur för IoT, inklusive design och en prototyplösning. För vår cloudlet-prototyp har vi fokuserat på en modell av mikroskala för att räkna ut CO2 emissioner per enskild resa med fordon, och implementerat en funktion som tillåter oss att läsa CO2 data från CO2 sensorer. Platsdata är inhämtad med hjälp av en Android smartphone och behandlas i cloudlet. Det hela sammanfattas med en prestandaevaluering.
APA, Harvard, Vancouver, ISO, and other styles
20

Cooper, Ke'ahi. "Security for the Internet of Things." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172526.

Full text
Abstract:
The Internet of Things (IoT) is an emerging paradigm that will change theway we interact with objects and computers in the future. It envisions a globalnetwork of devices interacting with each other, over the Internet, to perform auseful action. As such, quite a number of useful and benecial applications ofthis technology have been proposed.Although a convenient technology, the use of IoT technology will add additionalrisks to our lives that the traditional Internet did not have. This is primarilybecause IoT technology allows the virtual world to directly aect the physicalworld.Therefore, ensuring security is of paramount importance for IoT technology. Assuch, this thesis has two aims. First, we will identify the security issues for IoTtechnology as well as highlight what approaches academia has developed to resolvethem. This will allow us to see the state of this technology along with whatstill needs to be done in the future. Secondly, we will analyze some security protocolsproposed by academia and evaluate whether they ensure condentialityand authenticity.A literature survey is used to achieve the rst goal and the results show thatalthough a lot of research has been performed regarding security for IoT environments.We still have quite a way to go before a full holistic system isdeveloped which ensures all the security requirements for IoT.The results for the security protocol analysis shows that less than half of theprotocols proposed ensured authenticity and condentiality; despite the factthat their respective papers claim that they did. Therefore, we emphasize thefact that good peer reviews need to be enforced and that protocols need to bevalidated to ensure what is proposed performs as described.
APA, Harvard, Vancouver, ISO, and other styles
21

Verma, Yukti. "Secure system simulation - Internet of Things." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10116148.

Full text
Abstract:

Internet of Things (IoT) can be defined as a collection of smart devices interacting with each other unanimously to fulfill a common goal. The real world data collected from the Internet of Things can be made as an integral part of web known as Web of Things (WoT). With the help of Web of Things architecture, the users can leverage simple web mechanisms such as browsing, searching and caching to interact with the smart devices. This thesis aims to create an entire system simulating the Web of Things architecture including sensors, edge routers, web interfaces, endpoints to the IoT network and access control. Several technologies such as CoAP, 6LoWPAN, IEEE 802.15.4, contiki and DTLS have been evaluated before inclusion in the implementation. A complete web portal utilizing Californium framework and Role Based Access Control has been created for accessing and interacting with the sensors and their data. This thesis provides an end-to-end approach towards IoT device security by implementing Constrained Application Protocol (CoAP) over Datagram Transport Layer Security (DTLS) in the system. The performance of secured system is analyzed in a constrained environment based on which it is observed that DLTS implementation increases the RAM usage, code size, packet overhead and power consumption by a significant value. Finally, the future work that needs to considered in order to iterate towards better security is specified.

APA, Harvard, Vancouver, ISO, and other styles
22

Söderström, Rasmus, and Martin Westman. "Internet of Things : The smart home." Thesis, Uppsala universitet, Institutionen för teknikvetenskaper, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353389.

Full text
Abstract:
This project report treats the basics of the rising phenomenon of Internet of Things, and the devices that can be connected to it. One of the primary goals of the project was to gain greater knowledge in the field of Internet of Things and how it can be approached form an Electrical Engineer point of view.Three types of home devices were chosen to be implemented into the Internet of Things devices. Firstly, a coffeemaker was built so it can be activated from a mobile phone. This was made possible by using cheap electronics in the form of a control board, 433 MHz receiver and a relay.In the second part of the project the window blinders was made controllable from the same application as the coffee machine. This was made possible by using similar devices and small DC servos and stepper motors. The third part of the project was to make a automated irrigation system for a flowerpot. This could be made by measuring the moisture in the soil and thereby pump water from a reservoir in to the soil. Finally a main control device was constructed to handle all the signals from the users smart phone and communicate these signals and commands to the various systems built.
APA, Harvard, Vancouver, ISO, and other styles
23

Valkama, S. (Santeri). "Lämpötilaa mittaava Internet of Things -rele." Bachelor's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201609012678.

Full text
Abstract:
Tässä kandidaatintyössä esitetään internetin välityksellä ohjattavan ja releellä ja lämpösensorilla varustetun Internet of Things -yksikön rakentaminen Digistump Oak- kehitysalustalle ja todistetaan sen toimivuus. Työssä esitetään myös muutamia tapoja todeta internet -pyyntöjen toimivuus. Lisäksi tarkastellaan Internet of Things -tarkoituksiin soveltuvia ohjelmistoja työhön sopivuuden näkökulmasta
The purpose of this bachelor’s work is to present and prove functionality of a basic Internet of Things unit built on the Digistump Oak -development board capable of connections through internet and equipped with a relay and a temperature sensor. A couple of ways to prove the functionality of web requests are also presented. In addition, a few Internet of Things -applicable software were reviewed regarding suitability in this work
APA, Harvard, Vancouver, ISO, and other styles
24

Ahlqvist, Niklas, Jonas Jungåker, and Agnes Perrin. "Internet of things and automated farming." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264453.

Full text
Abstract:
The purpose of this project is to make it easier to grow plants domestically all year round. The objective is to construct a remotely controllable and environmentally independent automated hydroponic system. This would minimize the efforts required by the user to sustain plants in non-native climates. A hydroponic gardening system uses water as a growth medium instead of soil. The system is climate conscious and has benefits compared to conventional agriculture. Hydroponic systems are affected by several factors, this project only focuses on controlling the light intensity by isolating the system, and regulating the nutrient concentration through EC. The system uses a microcontroller for analysis and control. The results are promising, showing that the system works. However, the limitations in time led to a short test period, therefore the data gathered is limited. The discussion based on the results conclude that the system cannot be considered completely automatic but reduces the need of manual labour.
Syftet med detta projekt är att göra det lättare att odla växter inhemskt året runt. Målet är att konstruera ett fjärrstyrbart och miljöoberoende automatiskt hydroponiskt system. Detta ska minimera ansträngningarna från användaren för att underhålla växter i icke-inhemska klimat. Ett hydroponiskt odlingssystem använder vatten som tillväxtmedium istället för jord. Tekniken har fördelar jämfört med konventionell odling vilket gör hydroponi mer miljövänligt. Hydroponiska system påverkas av flera faktorer, men detta projekt fokuserar bara på att kontrollera ljusintensiteten genom att isolera ljuset inom systemet samt att reglera näringsämne-koncentrationen genom att mäta den elektriska ledningsförmågan i vattnet. Systemet använder en mikrokontroll för analys och kontroll. Resultaten är lovande och visar att systemet fungerar. Däremot har begränsningarna i tid lett till en kort testperiod, därför är data som samlas in begränsad. Diskussionen baserad på resultaten drar slutsatsen att systemet inte kan anses vara helt automatiskt men reducerar behovet av manuell arbetskraft.
APA, Harvard, Vancouver, ISO, and other styles
25

Santos, Vasco Alexandre Maia dos. "Secure decentralized internet of things infrastructure." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/18396.

Full text
Abstract:
Mestrado em Engenharia Eletrónica e Telecomunicações
Despite many IoT Infrastructures having been implemented in recent years, none of them is truly prepared for a global deployment, where failure tolerance and scalability are an essential requirement. This dissertation presents an alternative concept for IoT Infrastructures, which focuses on enhancing the traditional centralized architecture, usually operated by a single entity, into a decentralized architecture featuring multiple entities and use cases. We propose a dynamic, community driven and self-configurable infrastructure on top of a structured Peer-to-Peer network, based on a Distributed Hash Table. Moreover, the proposed infrastructure is flexible enough to allow each peer of the overlay to enable a set of different services, according to its capabilities. In addition, a set of communication protocols is provided in order to support heterogeneous devices, as well as data access, streaming and persistence. It is also an important focus of our proposal to have mechanisms that guarantee the privacy and security of the information flow and storage.
Apesar de várias infraestruturas para IoT terem sido implementadas nos últimos anos, nenhuma delas está realmente preparada para ser utilizada a uma escala global, onde a escalabilidade e a tolerância a falhas são um requisito essencial. Esta dissertação apresenta um conceito alternativo de infraestruturas para a IoT, cujo foco consiste em evoluir a tradicional arquitetura centralizada, normalmente utilizada por uma entidade única, para uma arquitetura descentralizada, compatível com múltiplas entidades e casos de uso. Propomos uma infraestrutura auto-configurável, dinâmica e orientada à comunidade, construída em cima de uma rede Peer-to-Peer estruturada, baseada numa Distributed Hash Table. Além disso, a infraestrutura proposta é suficientemente flexível para permitir que cada peer da rede possa ativar diferentes serviços, mediante as suas capacidades. Por outro lado, um conjunto de protocolos de comunicação é providenciado, de modo a suportar dispositivos heterogéneos, bem como o acesso aos dados e a sua transmissão e persistência. Também é um foco importante desta proposta a disponibilização de mecanismos que garantam a privacidade e segurança da informação durante a sua transmissão e o seu armazenamento.
APA, Harvard, Vancouver, ISO, and other styles
26

Elahi, Faizan Ehsan. "CONCURRENT INTERNET OF THINGS PROTOCOL STACKS." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-397010.

Full text
Abstract:
This work presents the design and implementation of a firmware prototype that allows multiple Internet Of Things (IoT) protocols to coexist such that they share a single radio. 6LoWPAN over Time Slotted Channel Hopping (TSCH) and Bluetooth Low Energy (BLE) are the two network protocols that are explored in this work. 6LoWPAN over TSCH forms a mesh network of low power embedded devices so that they are globally accessible through their IPv6 addresses. BLE is suitable for the direct connectivity between devices in short radio ranges. Sharing a single radio between diverse protocols is challenging since protocols access the radio in different modes and with different time patterns. The proposed architecture uses radio abstraction layer for dynamically sharing the radio based on the priority of the requests. Furthermore, concurrent operation of protocols is achieved with the help of priority based multitasking of Micrium operating system. Finally, the time critical operations of the TSCH and the radio abstraction module are handled with nested interrupts. The implementation of the firmware is evaluated with mainly two types of experiments. Overall, it is observed from the experiments that both protocols can coexist concurrently and can maintain their connections. In one set of experiments, periodic data is sent over both protocols every 5 seconds (with small random jitter). Basically these experiments involve small data traffic on both protocols. It is observed that the protocol with lower radio priority degrades in performance. Approximately 10% of the packets need re-transmissions, and thus have more latency for the protocol with lower radio priority. The second set of experiments involve file transfers over 3 hops using 6LoWPAN, while one of the middle nodes (acting as a router for the file transfer) also carries BLE session comprising of 17 BLE activities. It is observed that the mean file transfer time with BLE session is delayed compared to the no BLE case. The delay is less than the duration of the two active TSCH slots. This architecture is suitable for sharing a single radio where the network traffic is sparse. This architecture allows small embedded devices with a single radio to be accessible across many protocols without any modifications to the protocol standards. Although the performance degrades in the simultaneous operations, the protocols still keep their respective connections and complete their operations.
APA, Harvard, Vancouver, ISO, and other styles
27

Sasidharan, Swaytha. "Architecting Evolving Internet of Things Application." Doctoral thesis, Università degli studi di Trento, 2019. https://hdl.handle.net/11572/368820.

Full text
Abstract:
The Internet of Things paradigm has witnessed an unprecedented growth pervading every sector of the societal fabric from homes, cars, health, industry, and business. Given the technological advances witnessed in all the enabling technologies of IoT, it is now possible to connect an increasing number of devices to the internet. The data value chain has slowly risen in prominence. Moving from the vertical solutions to a horizontal architecture has resulted in the development of services which is the culmination of multiple sources of data. The complexity of handling the growing number of connected devices has resulted in active research of architectures and platforms which enable the service providers and data providers to navigate through the maze of technologies. We also look at the data generated by the real world, which is dynamic and non-stationary in nature. The always connected virtual representations of the devices facilitates applications to proactively perceive, comprehend and adapt to the real world situations. Paving the way to integrate learning algorithms, this thesis presents a modular architecture with elements to detect, respond and adapt to the changing data. Given the scope of IoT in different applications, we explore the implementation challenges both the advantages and limitations in two different domains. It includes (i) Smart Asset Management Framework: To provide real time localization of movable medical objects in a hospital. Additionally the movement patterns of the objects in studied and modeled to facilitate predictions. This helps to improve the energy savings of the localization technology. It helps the hospital authorities to understand the usage of the objects for efficient resource planning. (ii)Transitioning to a Industrial4.0 application: To facilitate in the digital transformation of a solar cell research center. With the similar concepts of virtualization (digital twins) and real world knowledge generation, the digital factory vision is conceptualized and implemented in phases.The supporting work including prototypes for smart home environment control, people activity detection and presence detection using bluetooth beacons leading to the development of the architectural components is presented. The implementation details along with results and observations in each of the sections is presented.
APA, Harvard, Vancouver, ISO, and other styles
28

Sasidharan, Swaytha. "Architecting Evolving Internet of Things Application." Doctoral thesis, University of Trento, 2019. http://eprints-phd.biblio.unitn.it/3763/3/Thesis.pdf.

Full text
Abstract:
The Internet of Things paradigm has witnessed an unprecedented growth pervading every sector of the societal fabric from homes, cars, health, industry, and business. Given the technological advances witnessed in all the enabling technologies of IoT, it is now possible to connect an increasing number of devices to the internet. The data value chain has slowly risen in prominence. Moving from the vertical solutions to a horizontal architecture has resulted in the development of services which is the culmination of multiple sources of data. The complexity of handling the growing number of connected devices has resulted in active research of architectures and platforms which enable the service providers and data providers to navigate through the maze of technologies. We also look at the data generated by the real world, which is dynamic and non-stationary in nature. The always connected virtual representations of the devices facilitates applications to proactively perceive, comprehend and adapt to the real world situations. Paving the way to integrate learning algorithms, this thesis presents a modular architecture with elements to detect, respond and adapt to the changing data. Given the scope of IoT in different applications, we explore the implementation challenges both the advantages and limitations in two different domains. It includes (i) Smart Asset Management Framework: To provide real time localization of movable medical objects in a hospital. Additionally the movement patterns of the objects in studied and modeled to facilitate predictions. This helps to improve the energy savings of the localization technology. It helps the hospital authorities to understand the usage of the objects for efficient resource planning. (ii)Transitioning to a Industrial4.0 application: To facilitate in the digital transformation of a solar cell research center. With the similar concepts of virtualization (digital twins) and real world knowledge generation, the digital factory vision is conceptualized and implemented in phases.The supporting work including prototypes for smart home environment control, people activity detection and presence detection using bluetooth beacons leading to the development of the architectural components is presented. The implementation details along with results and observations in each of the sections is presented.
APA, Harvard, Vancouver, ISO, and other styles
29

Khalfaoui, Sameh. "Security bootstrapping for Internet of Things." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT023.

Full text
Abstract:
La demande de services qui se basent sur l'Internet des objets (IoT) augmente de manière exponentielle, ce qui entraîne le déploiement d'un grand nombre de dispositifs. Cependant, ces dispositifs peuvent représenter une menace pour la sécurité du réseau de déploiement et un point d'entrée potentiel pour des adversaires. Il existe donc un besoin imminent de réaliser une approche d'association sécurisée des objets connectés avant qu'ils ne soient rendus opérationnels sur le réseau de l'utilisateur. Cette procédure, appelée "amorçage de la sécurité", garantit en premier lieu la confidentialité et l'intégrité des échanges de données entre l'utilisateur et les dispositifs. Ensuite, ce processus fournit une assurance sur l'identité et l'origine de ces objets. La première phase d'appairage assure l'établissement d'un canal de communication sécurisé entre l'utilisation et l'objet. La phase d'appairage utilise un protocole d'accord de clé symétrique qui est adapté à la nature de ces dispositifs à ressources limitées. L'utilisation de canaux auxiliaires a été proposée comme moyen d'authentifier l'échange de clés, mais elle nécessite un temps relativement long et une participation importante de l'utilisateur pour transférer les bits d'authentification. Cependant, les systèmes basés sur le contexte utilisent l'environnement ambiant pour extraire un secret commun sans intervention importante de l'utilisateur, à condition d'avoir un périmètre sécurisé pendant la phase d'extraction, ce qui est considéré comme une hypothèse de sécurité forte. La deuxième phase du processus d'amorçage est appelée "enrôlement sécurisé" et vise à éviter l'association d'un objet IoT malveillant en authentifiant son identité et son origine. L'utilisation d'éléments de sécurité matériels, tels que les fonctions physiques non clonables (PUF), a été présentée comme une solution prometteuse adaptée à la nature limitée des ressources de ces dispositifs. Un nombre croissant d'architectures PUF ont été démontrées mathématiquement clonables grâce à des techniques de modélisation par apprentissage automatique. L'utilisation de modèles de PUF a été récemment proposée pour authentifier les objets IoT. Néanmoins, le scénario de fuite du modèle PUF vers un adversaire en raison d'une menace interne au sein de l'organisation n'est pas pris en charge par les solutions existantes. Par conséquent, la sécurité de ces propositions d'inscription basées sur le modèle PUF peut être compromise. Dans cette thèse, nous étudions le processus d'amorçage de la sécurité des dispositifs à ressources limitées et nous introduisons deux protocole: - Un protocole hybride d'appairage, appelé COOB, qui combine d'une manière efficace un schéma d'appairage contextuel avec l'utilisation d'un canal auxiliaire. Ce protocole exploite une technique d'exponentiation spécifique des clés publiques Diffie-Hellman en utilisant des nonces pour atteindre l'objectif de secret temporaire nécessaire à l'accord de clé. Notre méthode assure la sécurité même contre un attaquant qui peut contrôler la zone de sécurité (un environnement hostile), ce qui n'est pas pris en charge par les schémas contextuels existants. Cette amélioration de la sécurité a été formellement validée dans le modèle symbolique en utilisant l'outil de vérification formelle TAMARIN. - Une solution d'enrôlement qui exploite un modèle de PUF dans le processus d'authentification, appelé Water-PUF. Notre protocole est basé sur une technique de tatouage numérique spécialement conçue pour les modèles PUF. Cette procédure empêche un adversaire de s'appuyer sur le modèle tatoué ou sur un autre modèle dérivé pour contourner l'authentification. Par conséquent, toute fuite du modèle PUF filigrané utilisé pour l'enrôlement n'affecte pas l'exactitude du protocole. La conception du Water-PUF est validée par un certain nombre de simulations contre de nombreuses attaques de suppression de tatouage numérique afin d'évaluer la robustesse de notre proposition
The demand for internet of Things (IoT) services is increasing exponentially, and a large number of devices are being deployed. However, these devices can represent a serious threat to the security of the deployment network and a potential entry-point when exploited by the adversaries. Thus, there is an imminent need to perform a secure association approach of the IoT objects before being rendered operational on the network of the user. This procedure is referred to as secure bootstrapping, and it primarily guarantees the confidentiality and the integrity of the data exchanges between the user and the devices. Secondly, this process provides an assurance on the identity and the origin of these objects.Due to scalability limitations, the first phase of the bootstrapping process cannot be efficiently conducted using pre-shared security knowledge such as digital certificates. This step is referred to as secure device pairing, and it ensures the establishment of a secure communication channel between the use and the object. The pairing phase uses a symmetric key agreement protocol that is suitable to the resource-constrained nature of these devices. The use of auxiliary channels has been proposed as a way to authenticate the key exchange, but they require a relatively long time and an extensive user involvement to transfer the authentication bits. However, the context-based schemes use the ambient environment to extract a common secret without an extensive user intervention under the requirement of having a secure perimeter during the extraction phase, which is considered a strong security assumption. The second phase of the bootstrapping process is referred to as secure device enrollment, and it aims at avoiding the associating of a malicious IoT object by authenticating its identity. The use of hardware security elements, such as the Physical Unclonable Function (PUF), has been introduced as a promising solution that is suitable for the resource-constraint nature of these devices. A growing number of PUF architectures has been demonstrated mathematically clonable through Machine Learning (ML) modeling techniques. The use of PUF ML models has been recently proposed to authenticate the IoT objects. Nonetheless, the leakage scenario of the PUF model to an adversary due to an insider threat within the organization is not supported by the existing solutions. Hence, the security of these PUF model-based enrollment proposals can be compromised.In this thesis, we study the secure bootstrapping process of resource-constrained devices and we introduce two security schemes:- A hybrid ad-hoc pairing protocol, called COOB, that efficiently combines a state-of-the-art fast context-based scheme with the use of an auxiliary channel. This protocol exploits a nonce exponentiation of the Diffie-Hellman public keys to achieve the temporary secrecy goal needed for the key agreement. Our method provides security even against an attacker that can violate the safe zone requirement, which is not supported by the existing contextual schemes. This security improvement has been formally validated in the symbolic model using the TAMARIN prover.- An enrollment solution that exploits a ML PUF model in the authentication process, called Water-PUF. Our enrollment scheme is based on a specifically designed black-box watermarking technique for PUF models with a binary output response. This procedure prevents an adversary from relying on the watermarked model in question or another derivative model to bypass the authentication. Therefore, any leakage of the watermarked PUF model that is used for the enrollment does not affect the correctness of the protocol. The Water-PUF design is validated by a number of simulations against numerous watermark suppression attacks to assess the robustness of our proposal
APA, Harvard, Vancouver, ISO, and other styles
30

Hamzic, Almira, and Isabel Olofsson. "DNS and the Internet of Things : Outlining the challenges faced by DNS in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202591.

Full text
Abstract:
This thesis work consists of a literature study where different aspects of DNS and the Internet of Things have been researched. A functional naming and service identification method is an essential part in making the IoT global, and DNS is the current method of naming devices on the Internet. The study looks into some challenges DNS will encounter, namely functionality, security and availability. This report concludes that a multicast DNS (mDNS) based solution designed for constrained networks is advantageous. This is despite the limited security that is currently available for such a solution. In the future, it is important that security has top priority, as there are currently limited means of security in DNS. Further study is needed when it comes to availability and how name resolving would work with constrained devices that utilise sleep mode.
Detta examensarbete består av en litteraturstudie där olika aspekter av DNS (Domännamnssystemet, eng. Domain Name System) och Sakernas Internet (eng. Internet of Things) har studerats. En fungerande namngivnings-och serviceidentifieringsmetod är en viktig del för att kunna göra Sakernas Internet globalt, och DNS är den nuvarande metoden för att namnge enheter på Internet. Studien undersöker vissa utmaningar som DNS kan stöta på, nämligen funktionalitet, tillgänglighet och säkerhet. Rapportens slutsats är att en lösning baserad på multisändnings-DNS (eng. multicast DNS, mDNS) som är anpassad för begränsade nätverk (eng. constrained networks) är fördelaktig. Detta trots den begränsade säkerhet som finns tillgänglig just nu för en sådan lösning. I framtiden är det viktigt att säkerheten har högsta prioritet, eftersom säkerheten är begränsad hos DNS. Det behövs ytterligare studier när det gäller tillgänglighet och hur adressöversättning skulle fungera med begänsade enheter (eng. constrained devices) som använder viloläge.
APA, Harvard, Vancouver, ISO, and other styles
31

Camacho, Andersson Emil, and Jonathan Karlsson. "Effekter av Internet of Things : Scenariobaserad studie som beskriver inledande effekter av Internet of Things i en verksamhet." Thesis, Högskolan Dalarna, Informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:du-22582.

Full text
Abstract:
Med begreppet "Internet of Things" menas att ett objekt ur den riktiga världen blir en del av internet. Tunabyggen i Borlänge planerar att implementera ett sådant informationssystem som med hjälp av sensorer och en ständig internetuppkoppling håller uppsikt över temperatur och luftfuktighet i utvalda lokaler. Det är ett enkelt system som till synes inte har så stora effekter på den nuvarande verksamheten. De ekonomiska effekterna går ofta att räkna på i förhand men effekterna på personal, miljö och rutiner kan glömmas bort. Vi har därför med detta examensarbete undersökt vilka inledande effekter som kan tänkas uppkomma efter implementering av ett nytt informationssystem med "Internet of Things" funktionalitet i en verksamhet. Detta sker inom kategorierna ekonomi, arbetsmiljö, miljöpåverkan och systemförvaltning. För att kunna besvara detta har vi gjort en fallstudie baserad på en scenariometodik som består av fyra faser. Fas 1, där vi fick vårt Case och skapade en förståelse för scenariofältet. Fas 2, där vi identifierade nyckelfaktorer. Detta har gjorts genom en litteraturstudie samt intervju med berörd personal på Tunabyggen. Fas 3, där analysen av dessa nyckelfaktorer skedde genom nulägesanalys och framtidsanalys av nyckelfaktorer. Fas 4, där vi genererade scenarier av de analyserade nyckelfaktorerna. Det har sedan gjorts en SWOT-analys för att belysa styrkor, svagheter, möjligheter och hot. Resultatet visar tydliga tecken på att det kommer att bli många effekter för Tunabyggen efter implementering av det nya informationssystemet som yttrar sig i alla kategorier. Slutsatsen är att vid implementation av ett informationssystem som detta är effekterna många. Detta är något som vi anser bör beaktas av alla verksamheter som har tankar på att införskaffa ett nytt informationssystem. De bör inte bara utvärdera informationssystem rent ekonomiskt utan borde ta i beaktning att det finns ett antal andra faktorer som har en avgörande roll om implementation av informationssystem ska bli lyckad.
The term "Internet of Things" refers to when an object from the real world becomes a part of the internet. Tunabyggen in Borlänge plans to implement an information system that will monitor temperature and humidity in selected facilities using a constant internet connection and different sensors. It is a simple system that doesn't seem to have a major impact on the current operations. The economic effects is often possible to calculate in advance, but the impact on staff, environment and routines may be forgotten. We have with this thesis examined the initial effects that may occur after the implementation of a new information system with Internet of Things functionality in a business, within the categories of economy, working environment, environmental impact and system management. To answer this we made a case study which is based on a scenario methodology that consists of four phases. Phase 1, where we got our case and created an understanding of the scenario field. Phase 2, identifying the key factors. It has been done through a literature study and interviews with relevant staff on Tunabyggen. Phase 3, where the analysis of these key factors were made through the situation and future analysis. Phase 4, where we generate scenarios of the analyzed key factors. Finally we have done a SWOT analysis to highlight the strengths, weaknesses, opportunities and threats. The results clearly show signs that there will be many effects for Tunabyggen after the implementation of the new information system, which manifests itself in all categories. The conclusion is that even the implementation of a menial information system like this one, the impacts are many. This is something that we believe should be considered by all companies that are thinking of acquiring a new system so they do not only evaluate IT-systems in economic terms, but also other factors that play a crucial role for the implementation of an information system to be successful.
APA, Harvard, Vancouver, ISO, and other styles
32

Forsby, Filip. "Digital Certificates for the Internet of Things." Thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217120.

Full text
Abstract:
This thesis will investigate the possibility of developing a lightweight digitalcertificate solution for resource constrained embedded systems in 6LoWPANnetworks. Such systems are battery powered or energy harvesting devices whereit is crucial that energy consumption and memory footprints are as minimalas possible. Current solutions for digital certificates are found to be moredemanding than what is desirable and therefore an issue that needs to besolved.The solution that is proposed in this thesis is a profile for the X.509 cer-tificate standard for use with constrained devices and the Internet of Things(IoT). Furthermore, a compression mechanism is designed and implementedfor certificates following this X.509 profile.Results show that compressing certificates is a highly viable solution, de-spite the added complexity it brings.This new lightweight digital certificate solution will allow resource con-strained systems to be able to run for longer without being interrupted orneeding maintenance.
Denna avhandling undersöker möjligheten att utveckla lättviktslösning förinbyggda system med begränsade resurser i 6LoWPAN-nätverk. Eneheter isådanna system drivs på batteri och återvunnen energi från omgivningen därminimal energi- och minnesanvänding är avgörande. Nuvarande lösningar fördigitala certifikat anses vara mer krävande än önskvärt och det är därför ettproblem som behöver lösas.Lösningen som presenteras i denna avhandling är en profil för certifikatstan-darden X.509 för användning med begränsade enheter inom Internet of Things(IoT). Utöver det är en komprimeringsmekanism designad och implementeradför certifikat som följer denna X.509-profil.Resultat visar att det är högst genomförbart att komprimera certifikat,trots den ökade komoplexiteten det medför.Denna nya lösning för digitala certifikat tillåter resursbegränsade enheteratt köras längre utan att behöva avbrytas eller underhållas.
APA, Harvard, Vancouver, ISO, and other styles
33

Reetz, Eike S. "Service testing for the 'Internet of Things'." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/810848/.

Full text
Abstract:
Services that represent sensor and actuator nodes, together with service orchestration, aid in overcoming the heterogeneous structure of the Internet of Things (IoT). Interconnecting different sensor and actuator nodes and exposing them as services is a complex topic which is even more demanding for testing. Further effort is needed to enable common and effcient methodologies for testing IoT-based services. IoT-based services differ from web services since they usually interact with the physical environment via sensor and actuator nodes. This changes how testing can be performed. An open research question is thereby how to apply Model-Based Testing (MBT) approaches for facilitating scalable and ef cient test automation. This thesis introduces a novel test framework to facilitate functional evaluation of IoT- based services based on MBT methodologies. The concept separates the service logic from connected sensor and actuator nodes in a sandbox environment. Furthermore, a new IoT service behaviour model is designed for representing relevant characteristics of IoT-based services and ensuring the automated emulation of sensor nodes. The IoT-behaviour model proves to be automatically transformable into executable Test Cases (TCs). As a proof of concept, the automated test approach is prototypically implemented as a novel test tool. The execution of the TCs reveals, that crucial failures, such as unexpected messages, data types, or data values, can be detected during test execution. Deriving tests from a test model typically result in huge number of TCs, which cannot be executed within a reasonable time and with limited resources. To enhance the diversity of executed TCs, similarity investigation algorithms are proposed and validated. The results show that the proposed Diversity-based Steady State Genetic algorithm can outperform existing solutions up to 11.6 % with less computation time. With regard to verifying the failure detection rate, experiments show that the proposed Group Greedy algorithm can enhance the rate up to 29 %.
APA, Harvard, Vancouver, ISO, and other styles
34

Iqbal, Muhammad Azhar. "Internet of Things (IoT) Industry Gateway Modelling." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28691.

Full text
Abstract:
The Internet of Things (IoT) provide the possibility to build dynamic industrial systems and applications to improve the quality of production in industrial areas. There are many Industrial IoT Gateways (IoTGWs) available on the market, all of which have different functionalities and properties. Here, the different properties of the IIoTGWs were explored, with the researcher’s as well as vendor’s perspective in mind. The most important properties were identified using research papers and technical data sheets, based on this, a model was created. The model showed the best two gateways available in the database. The results show that methods used can be applied in future research.
APA, Harvard, Vancouver, ISO, and other styles
35

Kroon, Cathering, and Louise Myllylä. "Internet of Things - En studie med användarperspektiv." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-48838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Sitenkov, Denis. "Access Control in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177205.

Full text
Abstract:
The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. The global connectivity provides great opportunities for data collection and analysis as well as for interaction of objects that cannot be connected to the same local area network. Many of application scenarios have high requirements to security and privacy of transmitted data. At the same time security solutions that are utilized for general purpose computers are not always applicable for constrained devices. That leaves a room for new solutions that takes into account the technological aspects of the Internet of Things. In this thesis we investigate the access control solution for the IETF standard draft Constrained Application Protocol, using the Datagram Transport Layer Security protocol for transport security. We use the centralized approach to save access control information in the framework. Since the public key cryptography operations might be computationally too expensive for constrained devices we build our solution based on symmetric cryptography. Evaluation results show that the access control framework increases computational effort of the handshake by 6.0%, increases the code footprint of the Datagram Transport Layer Security implementation by 7.9% and has no effect on the overall handshake time. Our novel protocol is not vulnerable to Denial of Service or Drain Battery Attack.
APA, Harvard, Vancouver, ISO, and other styles
37

Zaitov, Alisher. "Internet of things for monitoring grazing animals." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-196213.

Full text
Abstract:
Swedish agricultural industry is well known for it’s fair animal tending and ecological processes, the high standards comes at a cost of tough strict regulations. Laws were introduced to keep a low level usage of antibiotics and toxic products among the agricultural industry. The though competition from products imported from other countries with much less strict laws puts puts Swedish farmers under pressure and pushes them to keep an extra good eye on their animals in order to avoid sickness and injuries of their animals. This master thesis is focusing on investigating the possibility keep the low usage of antibiotics and maintaining the high level of standards by introducing new technology that can help the farmer to monitor their animals and keep them healthy. The goal of this thesis is to develop a system that monitors grazing animals in the pasture land and helps farmer to detect injuries and diseases at an earlier stage. For the system to be viable and useful for the farmer it has to keep low power consumption and come at an affordable price. The implemented system solution consists of a wireless sensor network that collects data about estimated position of the animal in the pasture land , interaction patterns and ambient sensor data of the environment. The data is then propagated using a opportunistic network protocol. Hardware prototype is tested using simulations, indoor tests, and field tests with cows on a farm in northern Sweden. The work is concluded with evaluations of the prototype based on requirements, scalability and cost
Svenska lantbruksndustrin är väl känt för sin rättvisa djurhantering och ekoloiska metoder, den höga standared kommer till en priset av hårda stränga regler. Lagar infördes för att hålla en låg användningsnivå av antibiotika och giftiga ämnen bland jordbruksindustrin. Vilket sätter jordbrukare under press och kräver dem att hålla ett extra gott öga på sina djur för att undvika sjukdom och skador på sina djur. Detta examensarbete fokuserar på att undersöka möjligheten att hålla låg användning av antibiotika men bibehålla den höga standarder genom att införa ny teknik som kan hjälpa bonden att övervaka sina djur och hålla dem friska. Målet med denna examensarbete är att utveckla en system prototyp som övervakar betande djur och hjälper bonden att upptäcka skador och sjukdomar i ett tidigare skede. För att systemet ska vara lönsamt och användbart för jordbrukaren behöver den hålla en låg strömförbrukning och komma till ett överkomligt pris. Den genomförda systemlösningen bygger på ett trådlöst sensornätverk som samlar in data om esitmerad position av djuret i betesmarken, interaktionsmönster och omgivnings sensordata av miljön. Prototypen testas med simuleringar, tester i labmiljö samt fälttester med kor på en gård i norra Sverige. Arbetet avslutas med utvärderingar av prototypen baserat på systemkrav, skalbarhet och kostnad.
APA, Harvard, Vancouver, ISO, and other styles
38

Tuyishimire, Emmanuel. "Internet of Things: Least Interference Beaconing Algorithms." Thesis, University of Cape Town, 2014. http://pubs.cs.uct.ac.za/archive/00000997/.

Full text
Abstract:
The emerging sensor networking applications are predicting the deployment of sensor devices in thousands of computing elements into multi-technology and multi-protocol platforms. Access to information will be available not only anytime and anywhere, but also using anything in a first-mile of the Internet referred to as the internet-of-things (IoT). The management of such a large-scale and heterogeneous network, would benefit from some of the traditional IP-based network management techniques such as load and energy balancing, which can be re-factored to achieve efficient routing of sensor network traffic. Research has shown that minimizing the path interference on nodes was necessary to improve traffic engineering in connection oriented networks. The same principle has been applied in past research in the context of the IoT to reveal that the least interference beaconing protocol (LIBP); a protocol derived from the least interference beaconing algorithm (LIBA) outperforms the Collection Tree Protocol (CTP) and Tiny OS Beaconing (ToB) protocol, in terms of energy efficiency and lifetime of the sensor network. However for the purpose of efficiency and accuracy, it is relevant, useful and critical to revisit or re-examine the LIBA algorithm in terms of correctness and investigate potential avenues for improvement. The main contributions of this research work are threefold. Firstly, we build upon formal methods to verify the correctness of the main principles underlying the LIBA, in terms of energy efficiency and interference minimization. The interference is here defined at each node by the number of routing paths carrying the sensor readings from the motes to the sink of the network that traverse the node. Our findings reveal the limitations in LIBA. Secondly, building upon these limitations, we propose two improvements to the algorithm: an algorithm called LIBA+ that improves the algorithm performance by keeping track of the energy usage of the sensor nodes, and a multi-sink version of the algorithm called LIBAMN that extends the algorithm to account for multiple sinks or gateways. These enhancements present preventive mechanisms to include in IoT platforms in order to improve traffic engineering, the security of network protocols and network stability. Lastly, we present analytical results, which reveal that the LIBA algorithm can be improved by more than 84% in terms of energy balancing. These results reveal that formal methods remain essential in the evaluation and performance improvement of wireless sensor network algorithms and protocols.
APA, Harvard, Vancouver, ISO, and other styles
39

K, C. Sandeep. "Platform Independent Connections to Internet of Things." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-24787.

Full text
Abstract:
In the past few years, technology has been changing by leaps and bounds, within which a new topic has emerged as Internet of Things. These things serve as sensors/actuators, connected to the Internet and enabled to communicate with each other simultaneously in a P2P distributed manner. The sensors/actuators sense and generate contextual data in their surroundings in order to enable real-time context-aware behavior that make them more personalized and intelligent. This contextual information may be useful for human purposes like environment monitoring, home surveillance, elderly care, safety, security surveillance, etc. Moreover, smart mobile devices with incredible features have become hugely popular, the use of the Internet of Things would be much handier using smartphones to interact with sensors and also to generate information with its decorated sensors. The main aim of this thesis work is to create an extension for an add-in layer of the Internet of Things (SensibleThings Platform) architecture that adds functionalities like querying UCI value within the platform, connecting different mobile devices regardless of programming language, which has been done using the REST protocol. Furthermore, the intention is to build a P2P connection between the Java coded SensibleThings platform to a non-Java platform, i.e. iOS, by creating an Objective-C library to support dissemination of contextual information between the discrete platform in a distributed manner using JSON. Two servers have been created using Apache web server and sockets to connect with the Objective-C library to compare the performance of extension and library. The thesis work also presents the implementation of the extension and an Objective-C library, integrated to create proof-of-concept applications by developing an iOS application and Mac OS desktop application that can easily interact with the SensibleThings platform by requests through the REST protocol and getting the UCI value in JSON message format. Moreover, to know the best possible solution for the SensibleThings platform, a hybrid application has also been developed by using PhoneGap and JQueryMobile within XCode, which is compared with the iOS web app, and an evaluation of mobile applications using extension and library with two servers has also been performed. According to the results between the web server and sockets, the sockets act scalable and more stable than the web server when interacting with the SensibleThings platform; when comparing between the iOS and Mac app for performance, there is not much difference. The results also suggest that a hybrid app would be a better solution for the SensibleThings platform; it could be developed with less effort and be useful for a variety of mobile devices, which might be the best solution for the IoT in the future. Lastly, the conclusions includes possible future work to be supplemented, to make the IoT better in future.
APA, Harvard, Vancouver, ISO, and other styles
40

Egel, Jill. "Internet of Things and its Business Models." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80995.

Full text
Abstract:
The Internet of Things (IoT) is the next phase in the evolution of the internet, where everyday objects are connected to the internet, and obtain the capacity to communicate with other devices and sense their environment. Especially the IIoT is one of the most talked about industrial business concepts since the recent years, companies try to focus on business models and operational efficiency. That is why this thesis focuses on researching the industrial Internet of Things (IIoT). There is already a lot of information about the common Internet of Things but still a gap in research in the business perspective, especially surrounding the concept of business models for the IIoT. The goal of this project is to investigate different kinds of business models, how they work and how feasible they are. The need to research possible business models for an IIoT framework, as traditional business models are relevant for this study, such as the Business Model Canvas which has been proposed by Alexander Osterwalder or the Business Model Navigator by Oliver Gassmann. But there is still a lack of literature covering the business models for the IIoT. Therefore, after researching the concept of IIoT from a business perspective, I identified some useful criteria and suitable business models. With a qualitative literature study, I was able to develop an IIoT business model framework, based on the dynamics and complexity of the IIoT concept, which incorporates business strategies and provides companies with a flexible approach. The business model framework can be used in any business which is working in the industrial context. To demonstrate how the business model framework works for the IIoT, I clarified how suitable business models can improve the current business model of the very prominent and successful company Tesla. The results show how the framework of IIoT business models can be used to increase profit and work efficiently as a company. The models can also be formed to only highlight single components of an already existing business model, as it offers great flexibility, which is highly valuable in the fast evolving and innovative IIoT phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
41

Renuka, Venkata Ramani Challa. "Two way Firewall for Internet of Things." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194234.

Full text
Abstract:
The Internet of Things(IoT), an emerging global Internet-based technical architecture impacts the security and privacy of the stakeholders involved. IoT security is the area of endeavour concerned with safeguarding connected devices and networks in the Internet of things. It is of utmost importance to allow protected access to IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) networks and protecting Internet-connected critical infrastructures from wireless hosts within 6LoWPAN network. The security architecture deployed must ensure resilience to attacks, data authentication, integrity, access control to data, resources and client privacy. With increasing technology, there is high probability for hackers and intruders to succeed attacking a network. Hence, security of networks is essential.This solution is to counter the attacks by implementing a two way firewall. This solution makes scientific contribution by adding support for the IoT protocol Constrained Application Protocol(CoAP) and Datagram Transport Layer Security(DTLS) which are widely used for communication in IoT networks. If the packet arrives on CoAP or DTLS port, firewall scans the packet to see that the packet confirms to the message format intended. Devices in 6LoWPAN are memory constrained possessing less RAM and hence another key contribution of this thesis is that the rules, stored in files, are read directly from file facilitating minimal use of additional memory. In addition to this, the decisions of firewall i.e. the blacklisted and whitelisted IP addresses are also saved in files.The firewall is deployed and evaluated within 6LoWPAN. The power consumption and memory consumption are calculated. Security is evaluated analytically and it is seen that the true positive rate ranges from 80-95% for DoS(Denial of Service) attacks and 90-100%for IP spoofing attacks. It can be concluded that firewall can be deployed with very little overhead in terms of memory and power consumption. As an extension to this firewall, multiple IoT protocols parsing such as Message Queuing Telemetry Transport(MQTT), Extensible Messaging and Presence Protocol(XMPP) can be added. Similarly support for other attack detection algorithms like IP Spoofing, Distributed DoS(DDoS) can be added.
Sakernas Internet år en framväxande global Internet-baserad teknisk arkitektur som på-verkar säkerheten och integriteten för inblandade deltagare. IoT-säkerhet är området där man strävar mot att såkra uppkopplade apparater och nätverk i Sakernas Inter-net. Det är av yttersta vikt att tillåta skyddad tillgång till IPv6 över trådlösa och energisnåla lokala nätverk (6LoWPAN), samt att skydda kritisk infrastruktur som har Internet-uppkoppling från trådlösa apparater inom 6LoWPAN-nätverken. Den säker-hetsarkitektur som används måste garantera motståndskraft mot attacker, autentisering och integritet av data, tillgångskontroll för data och resurser, samt användares privatliv. Med ökande användning av teknologi stiger möjligheten för hackare att kunna attackera ett nätverk framgångsrikt. Därför är säkerhet i nätverken av yttersta vikt.I denna rapport visar vi hur man kan motverka angrepp på säkerheten genom att im-plementera en två-vägs-brandvägg. Det vetenskapliga bidraget är att vi lägger till stöd för IoT-protokollet Constrained Application Protocol (CoAP) och Datagram Transport Layer Security (DTLS), vilka används av många för kommunikation inom IoT-nätverk. Om ett paket inkommer på en CoAP- eller DTLS-port, så undersöker brandväggen pa-ketet för att se till så att paketet är formaterat korrekt. Apparater i 6LoWPAN har ofta minnesbegränsningar, varför ett annat centralt bidrag i denna rapport är att brandvägg-sreglerna lagras i filer och inläses direkt vid behov för att minimera minnesanvändningen. Dessutom sparas besluten som tas av brandväggen, dvs. svart- och vitlistningar av IP-adresser, i filer.Brandväggen används och utvärderas inom 6LoWPAN. Energiförbrukningen och min-nesanvändningen beräknas utifrån experimentell data. Säkerheten utvärderas analytiskt, och vi ser att andelen sant positiva beslut är 80-95% för Denial-of-Service (DoS) attacker, samt 90-100% för IP-spoofing attacker. Slutsatsen är att brandväggen kan driftsättas med väldigt lågt minnesbehov och låg energiförbrukning. Brandväggen kan i framti-den utökas med ytterligare IoT-protokoll som Message Queuing Telemetry Transport (MQTT) och Extensible Messaging and Presence Protocol (XMPP). Dessutom vore det önskvärt med stöd för andra detekteringsmekanismer mot attacker, som exempelvis IP-spoofing och Distributed Denial-of-Service (DDoS).
APA, Harvard, Vancouver, ISO, and other styles
42

Hassan, Basma Mostafa. "Monitoring the Internet of Things (IoT) Networks." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS100.

Full text
Abstract:
Les réseaux « Internet des Objets » se composent de plusieurs millions d’objets qui possèdent une adresse IP et qui peuvent connecter sur Internet. En général, ces objets sont supposé d’être autonomes et peuvent résoudre des tâches; mesurer, traiter et fournir des informations pour les systèmes connectés et pour les utilisateurs. Aussi, ces réseaux sont vulnérables (c.-à-d. : les éléments peuvent être mobiles et la topologie du réseau peut changer dynamiquement), les changements peuvent influencer le (bon) fonctionnement du réseau. De plus, ils peuvent être alimentés par des batteries de durée de vie limitée, ce que nécessite la réduction de leur consommation.Ce travail de thèse aborde un sujet important dans le domaine de l’Internet des Objets, qui consiste à savoir comment assurer la robustesse et le fonctionnement tolérant aux pannes du réseau pour répondre aux exigences des missions critiques. Avec le large déploiement des services IdO, ce problème est deventé ou de détection de pannes et de sécurité industriel où l’état des objets communicants doit être constamment vérifié pour le rétablissement rapide en cas de problème particulièrement crucial pour les applications telles que le monitorage intelligent de sames de communication inattendus. On cherche alors de minimiser le coût du monitorage et l’utilisation de l’énergie, et aussi les charges additionnelles sur les réseaux.Nous avons proposé un algorithme qui vise à réaliser un placement distribué des moniteurs avec une complexité minimale pour le calcul. L’algorithme proposé fonctionne avec RPL. L’objectif principal est d’augmenter la robustesse dans les réseaux IdO ciblant les applications critiques en temps réel via le monitorage des liaisons dans les DODAGs construits par RPL. Dans notre première contribution, le problème est modélisé comme un problème de couverture minimale des sommets (VCP) sur le DODAG. Nous avons développé un algorithme à temps polynomial qui transforme le DODAG en une décomposition arborescente (Nice-Tree Decomposition) avec une largeur arborescente (treewidth) d’unité. Cette stratégie profite de la spécificité des DODAG et a abouti à une réduction significative de la complexité de la résolution du VCP sur les DODAG. Elle peut être résolue en temps polynomial.La deuxième proposition est un modèle approché pour l’optimisation de l’ordonnancement du rôle de monitorage des nœuds dans les réseaux IdO, afin de maximiser la durée de vie des dispositifs embarqués à ressources limitées, tout en minimisant le coût global du monitorage de réseau. Le monitorage de réseau est très coûteux, en particulier pour les réseaux à ressources limitées tels que l’IdO. Par conséquent, le monitorage doit être économe en énergie et avec des frais généraux minimaux sur la performance normale du réseau. Notre travail correspondant contient une proposition d’un modèle mathématique en trois phases pour assurer l’exigence d’une couverture des moniteurs tout en minimisant la consommation d’énergie de monitorage et les frais de communication.Notre modèle proposé décompose le problème abordé en trois problèmes d’optimisation bien connus, il s’agit du problème de couverture de sommets, problème d’affectation généralisé multi-objectives et problème de voyageur de commerce.Dans cette troisième partie, une approche exacte est proposée pour résoudre le problème décrit dans (Contribution 2). Comme nous avons vu, la décomposition en trois phases ne donne pas la solution exacte. Nous avons donc proposé une formulation exacte du problème qui consiste en un problème de l'affectation minimum des tâches de surveillance avec un fonctionnement de surveillance cyclique. Pour cela, nous avons formulé un programme en nombres entiers binaires. L'ordonnancement optimal garantit la couverture du graphe pour la surveillance avec une consommation d'énergie minimale
By connecting billions of things to the Internet, IoT created a plethora of applications that touch every aspect of human life. Time-sensitive, mission-critical services, require robust connectivity and strict reliability constraints. On the other hand, the IoT relies mainly on Low-power Lossy Networks, which are unreliable by nature due to their limited resources, hard duty cycles, dynamic topologies, and uncertain radio connectivity. Faults in LLNs are common rather than rare events, therefore, maintaining continuous availability of devices and reliability of communication, are critical factors to guarantee a constant, reliable flow of application data.After a comprehensive literature review, and up to our knowledge, it is clear that there is a call for a new approach to monitoring the unreliable nodes and links in an optimized, energy-efficient, proactive manner, and complete interoperability with IoT protocols. To target this research gap, our contributions address the correct assignment (placement) of the monitoring nodes. This problem is known as the minimum assignment problem, which is NP-hard. We target scalable monitoring by mapping the assignment problem into the well-studied MVC problem, also NP-hard. We proposed an algorithm to convert the DODAG into a nice-tree decomposition with its parameter (treewidth) restricted to the value one. As a result of these propositions, the monitor placement becomes only Fixed-Parameter Tractable, and can also be polynomial-time solvable.To prolong network longevity, the monitoring role should be distributed and balanced between the entire set of nodes. To that end, assuming periodical functioning, we propose in a second contribution to schedule between several subsets of nodes; each is covering the entire network. A three-phase centralized computation of the scheduling was proposed. The proposition decomposes the monitoring problem and maps it into three well-known sub-problems, for which approximation algorithms already exist in the literature. Thus, the computational complexity can be reduced.However, the one major limitation of the proposed three-phase decomposition is that it is not an exact solution. We provide the exact solution to the minimum monitor assignment problem with a duty-cycled monitoring approach, by formulating a Binary Integer Program (BIP). Experimentation is designed using network instances of different topologies and sizes. Results demonstrate the effectiveness of the proposed model in realizing full monitoring coverage with minimum energy consumption and communication overhead while balancing the monitoring role between nodes.The final contribution targeted the dynamic distributed monitoring placement and scheduling. The dynamic feature of the model ensures real-time adaptation of the monitoring schedule to the frequent instabilities of networks, and the distributed feature aims at reducing the communication overhead
APA, Harvard, Vancouver, ISO, and other styles
43

Astistova, T. I., and D. M. Kochuk. "Software development for technology "Internet of Things"." Thesis, Київський національний університет технологій та дизайну, 2021. https://er.knutd.edu.ua/handle/123456789/19193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sabe, Tahir, and Ridom Khan. "Blockchain för att säkra Internet of Things." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-283791.

Full text
Abstract:
I dagsläget finns det fler anslutna enheter till internet, Internet of Things-enheter som det benämns, än vad det finns människor på jorden och produkter är lättillgängliga för den vanliga konsumenten. När fler enheter kopplas upp till internet är det också viktigt att hålla reda på dem. En nackdel med allt ökat antal uppkopplade enheter är en potentiellt ökad sårbarhet och det finns en högre risk för privatpersoner eller företag att bli hackade. Examensarbetet undersöker vilka säkerhetsrisker som finns med att skapa ett IoT-system och hur IoT kan kombineras med blockchainteknik ur ett säkerhetsperspektiv i olika branscher genom att titta på IoT-system inom små företag och för privatpersoner med begränsad IT-kompetens. En riskanalys görs för två användarfall, en floristverksamhet för bevarandet av bland annat känsliga växter och blommor respektive ett kommersiellt smart dörrlås som gör det möjligt för hushåll att kunna låsa samt låsa upp ett dörrlås digitalt med hjälp av mobiltelefoner. Därefter presenteras sårbarheter och tillgångar som behöver skyddas och relaterade arbeten undersöks för att se hur sårbarheter kan undvikas. Resultatet visar teknikernas relevans i nuläget, vilka IoT-modeller det finns och hur blockchain kan användas för att säkra IoT med exempelvis användningen av smarta kontrakt. Tre modeller identifieras där graden för inklusion av blockchain skiljer sig. IoT till IoT-modellen lagrar en del av datat i blockchain medan IoT interaktioner sker utan att använda blockchain. IoT till blockchain-modellen innebär att alla interaktioner sker via blockchain. Den tredje modellen är en hybrid vilket innebär att en del av interaktionen och datat placeras i blockchain och att det går att välja vilka interaktioner som ska ske via blockchain. Resultatet visar att blockchain kan användas för att bevara integritet och konfidentialitet mellan IoT enheter, mer specifikt kan det användas för autentisering och säker dataöverföring.
APA, Harvard, Vancouver, ISO, and other styles
45

Denis, Sitenkov. "Access Control in the Internet of Things." Thesis, SICS, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24325.

Full text
Abstract:
The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. The global connectivity provides great opportunities for data collection and analysis as well as for interaction of objects that cannot be connected to the same local area network. Many of application scenarios have high requirements to security and privacy of transmitted data. At the same time security solutions that are utilized for general purpose computers are not always applicable for constrained devices. That leaves a room for new solutions that takes into account the technological aspects of the Internet of Things. In this thesis we investigate the access control solution for the IETF standard draft Constrained Application Protocol, using the Datagram Transport Layer Security protocol for transport security. We use the centralized approach to save access control information in the framework. Since the public key cryptography operations might be computationally too expensive for constrained devices we build our solution based on symmetric cryptography. Evaluation results show that the access control framework increases computational effort of the handshake by 6.0%, increases the code footprint of the Datagram Transport Layer Security implementation by 7.9% and has no effect on the overall handshake time. Our novel protocol is not vulnerable to Denial of Service or Drain Battery Attack.
Thesis supervised by Shahid Raza (shahid@sics.se) and Ludwig Seitz (ludwig@sics.se)
APA, Harvard, Vancouver, ISO, and other styles
46

Mendes, José Miguel Martins Lopes. "Security techniques for the internet of things." Master's thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/12686.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática
IoT assume que dispositivos limitados, tanto em capacidades computacionais como em energia disponível, façam parte da sua infraestrutura. Dispositivos esses que apresentam menos capacidades e mecanismos de defesa do que as máquinas de uso geral. É imperativo aplicar segurança nesses dispositivos e nas suas comunicações de maneira a prepará-los para as ameaças da Internet e alcançar uma verdadeira e segura Internet das Coisas, em concordância com as visões atuais para o futuro. Esta dissertação pretende ser um pequeno passo nesse sentido, apresentando alternativas para proteger as comunicações de dispositivos restritos numa perspetiva de performance assim como avaliar o desempenho e a ocupação de recursos por parte de primitivas criptográficas quando são aplicadas em dispositivos reais. Dado que a segurança em diversas ocasiões tem de se sujeitar aos recursos deixados após a implementação de funcionalidades, foi colocada uma implementação de exposição de funcionalidades, recorrendo ao uso de CoAP, num dispositivo fabricado com intenção de ser usado em IoT e avaliada de acordo com a sua ocupação de recursos.
IoT comprehends devices constrained in both computational capabilities and available energy to be a part of its infrastructure. Devices which also present less defense capabilities and mechanisms than general purpose machines. It’s imperative to secure such devices and their communications in order to prepare them for the Internet menaces and achieve a true and secure Internet of Things compliant with today’s future visions. This dissertation intends to be a small step towards such future by presenting alternatives to protect constrained device’s communications in a performance related perspective as well as benchmarks and evaluation of resources used by cryptographic primitives when implemented on real devices. Due to security being on multiple occasions subjected to the resources available only after functionalities implementation, a minimalist implementation of functionalities exposure through the use of CoAP was also deployed in an IoT intended device and assessed according to resource overhead.
APA, Harvard, Vancouver, ISO, and other styles
47

Acosta, Padilla Francisco Javier. "Self-adaptation for Internet of things applications." Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S094/document.

Full text
Abstract:
L'Internet des Objets (IdO) couvre peu à peu tous les aspects de notre vie. À mesure que ces systèmes deviennent plus répandus, le besoin de gérer cette infrastructure complexe comporte plusieurs défis. En effet, beaucoup de petits appareils interconnectés fournissent maintenant plus d'un service dans plusieurs aspects de notre vie quotidienne, qui doivent être adaptés à de nouveaux contextes sans l'interruption de tels services. Cependant, ce nouveau système informatique diffère des systèmes classiques principalement sur le type, la taille physique et l'accès des nœuds. Ainsi, des méthodes typiques pour gérer la couche logicielle sur de grands systèmes distribués comme on fait traditionnellement ne peuvent pas être employées dans ce contexte. En effet, cela est dû aux capacités très différentes dans la puissance de calcul et la connectivité réseau, qui sont très contraintes pour les appareils de l'IdO. De plus, la complexité qui était auparavant gérée par des experts de plusieurs domaines, tels que les systèmes embarqués et les réseaux de capteurs sans fil (WSN), est maintenant accrue par la plus grande quantité et hétérogénéité des logiciels et du matériel des nœuds. Par conséquent, nous avons besoin de méthodes efficaces pour gérer la couche logicielle de ces systèmes, en tenant compte les ressources très limitées. Cette infrastructure matérielle sous-jacente pose de nouveaux défis dans la manière dont nous administrons la couche logicielle de ces systèmes. Ces défis peuvent entre divisés en : Intra-nœud, sur lequel nous faisons face à la mémoire limitée et à la puissance de calcul des nœuds IdO, afin de gérer les mises à jour sur ces appareils ; Inter-noeud, sur lequel une nouvelle façon de distribuer les mises à jour est nécessaire, en raison de la topologie réseau différente et le coût en énergie pour les appareils alimentés par batterie ; En effet, la puissance de calcul limitée et la durée de vie de chaque nœud combiné à la nature très distribuée de ces systèmes, ajoute de la complexité à la gestion de la couche logicielle distribuée. La reconfiguration logicielle des nœuds dans l'Internet des objets est une préoccupation majeure dans plusieurs domaines d'application. En particulier, la distribution du code pour fournir des nouvelles fonctionnalités ou mettre à jour le logiciel déjà installé afin de l'adapter aux nouvelles exigences, a un impact énorme sur la consommation d'énergie. La plupart des algorithmes actuels de diffusion du code sur l'air (OTA) sont destinés à diffuser un microprogramme complet à travers de petits fragments, et sont souvent mis en œuvre dans la couche réseau, ignorant ainsi toutes les informations de guidage de la couche applicative. Première contribution : Un moteur de modèles en temps d'exécution représentant une application de l'IdO en cours d'exécution sur les nœuds à ressources limitées. La transformation du méta-modèle Kevoree en code C pour répondre aux contraintes de mémoire spécifiques d'un dispositif IdO a été réalisée, ainsi que la proposition des outils de modélisation pour manipuler un modèle en temps d'exécution. Deuxième contribution : découplage en composants d'un système IdO ainsi qu'un algorithme de distribution de composants efficace. Le découplage en composants d'une application dans le contexte de l'IdO facilite sa représentation sur le modèle en temps d'exécution, alors qu'il fournit un moyen de changer facilement son comportement en ajoutant/supprimant des composants et de modifier leurs paramètres. En outre, un mécanisme pour distribuer ces composants en utilisant un nouvel algorithme appelé Calpulli est proposé
The Internet of Things (IoT) is covering little by little every aspect on our lives. As these systems become more pervasive, the need of managing this complex infrastructure comes with several challenges. Indeed, plenty of small interconnected devices are now providing more than a service in several aspects of our everyday life, which need to be adapted to new contexts without the interruption of such services. However, this new computing system differs from classical Internet systems mainly on the type, physical size and access of the nodes. Thus, typical methods to manage the distributed software layer on large distributed systems as usual cannot be employed on this context. Indeed, this is due to the very different capacities on computing power and network connectivity, which are very constrained for IoT devices. Moreover, the complexity which was before managed by experts on several fields, such as embedded systems and Wireless Sensor Networks (WSN), is now increased by the larger quantity and heterogeneity of the node’s software and hardware. Therefore, we need efficient methods to manage the software layer of these systems, taking into account the very limited resources. This underlying hardware infrastructure raises new challenges in the way we administrate the software layer of these systems. These challenges can be divided into: intra-node, on which we face the limited memory and CPU of IoT nodes, in order to manage the software layer and ; inter-node, on which a new way to distribute the updates is needed, due to the different network topology and cost in energy for battery powered devices. Indeed, the limited computing power and battery life of each node combined with the very distributed nature of these systems, greatly adds complexity to the distributed software layer management. Software reconfiguration of nodes in the Internet of Things is a major concern for various application fields. In particular, distributing the code of updated or new software features to their final node destination in order to adapt it to new requirements, has a huge impact on energy consumption. Most current algorithms for disseminating code over the air (OTA) are meant to disseminate a complete firmware through small chunks and are often implemented at the network layer, thus ignoring all guiding information from the application layer. First contribution: A models@runtime engine able to represent an IoT running application on resource constrained nodes. The transformation of the Kevoree meta-model into C code to meet the specific memory constraints of an IoT device was performed, as well as the proposition of modelling tools to manipulate a model@runtime. Second contribution: Component decoupling of an IoT system as well as an efficient component distribution algorithm. Components decoupling of an application in the context of the IoT facilitates its representation on the model@runtime, while it provides a way to easily change its behaviour by adding/removing components and changing their parameters. In addition, a mechanism to distribute such components using a new algorithm, called Calpulli is proposed
APA, Harvard, Vancouver, ISO, and other styles
48

Xu, Yizhen. "RESOURCE ALLOCATION IN THE INTERNET-OF-THINGS." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/24558.

Full text
Abstract:
The Internet-of-Things (IoT) is widely regarded as a promising paradigm for connecting the ever-growing use of smart devices through various communications protocols. However, despite the popularity and widespread of its applications, the development and deployment of IoT are limited by the efficiency of resource utilization. For instance, the ubiquitous data exchange among numerous IoT devices poses severe issues in terms of spectrum availability. Meanwhile, IoT integration with mobile edge computing brings alongside a number of challenges in terms of computation resource management. Although emerging techniques related to energy harvesting will alleviate IoT devices' energy shortage problem due to limited battery energy supply, the energy for communication and local computation will always be a scarce resource to be handled with care. In this thesis, we introduce different resource allocation strategies for IoT devices to more efficiently utilize scarce resources including spectrum, computation and energy resources. In the first part, we focus on spectrum allocation and propose a new spectrum sensing framework based on Bayesian machine learning. We exploit the mobility of multiple secondary users (SUs) to simultaneously collect spectrum sensing data, and cooperatively derive global spectrum states. We first develop a novel non-parametric Bayesian learning model, referred to as beta process sticky hidden Markov model (BP-SHMM), to capture the spatial-temporal correlation in the collected spectrum data, where SHMM models the latent statistical correlation within each mobile SU's time series data while BP realizes the cooperation among multiple SUs. A Bayesian inference is then used to automatically infer heterogeneous spectrum states. In the second part, we focus on computation resource allocation in a large-scale asynchronous MEC system with random task arrivals, distinct workloads, and diverse deadlines. By exploiting the Whittle index (WI) theory, we rigorously establish the WI indexability and derive a scalable closed-form solution. Consequently, in our WI-based offloading policy, each user only needs to calculate its WI and report it to the BS, and the users with the highest indices are selected to perform task offloading. Furthermore, when the task completion ratio becomes the focus, the shorter slack time less remaining workload priority rule is introduced into the WI-based offloading policy for further performance improvement. When the knowledge of user offloading energy consumption is not available prior to the offloading, we develop Bayesian learning-enabled WI policies accordingly. Lastly, we tackle a general resource allocation problem with the constraints of energy consumption and queue package lengths. Specifically, we formulate it as a constrained deep reinforcement learning (DRL) with a mixed-action space including both discrete channel allocation and continuous energy harvesting time division. Then, we propose a novel DRL algorithm referred to as constrained discrete continuous soft actor critic (CDC-SAC) by redesigning the network architecture and policy learning process. Simulation results show that the proposed algorithm can achieve a significant performance improvement in terms of the total throughput with a strict constraints guarantee.
APA, Harvard, Vancouver, ISO, and other styles
49

Zhang, Rui. "Resource Access in the Internet-of-Things." Thesis, University of Sydney, 2020. https://hdl.handle.net/2123/23211.

Full text
Abstract:
The Internet-of-Things (IoT) refers to the networked interconnection of massive objects in daily life. With the ability of data collection, information sharing, and task computing, the IoT bridges diverse technologies to provide ubiquitous services with intelligence. However, in the coming years, the IoT devices are facing challenges coming from their inherent features. Generally speaking, the IoT devices are deployed massively and usually in mobile scenarios. This makes the wired power supply hard to be implemented. Meanwhile, the small size of IoT devices restricts their computational capability. Furthermore, licensing a certain spectrum bandwidth to the IoT is expensive, thus pushes the IoT devices to share the spectrum resources with licensed users. In this thesis, we introduce several strategies for IoT devices to deal with the shortage of several resources, i.e. the spectrum, computational, and energy resources. In the first part, we propose a learning-based two-stage spectrum sharing strategy, which allow the IoT devices to access the spectrum resource as an unlicensed user. In the second one, we develop a new online algorithm to enable distributed decision making on the task offloading. This enables the vehicular IoT devices to access computational resources of nearby network nodes. Lastly, we propose and analyze a new full-duplex cooperative cognitive radio network, which allows the IoT devices to harvest energy wirelessly from radio frequency signals and cooperate with the licensed users.
APA, Harvard, Vancouver, ISO, and other styles
50

Gu, Wei. "Robustness against interference in Internet of Things." Thesis, Lille 1, 2012. http://www.theses.fr/2012LIL10195/document.

Full text
Abstract:
L'Internet des objets, plus particulièrement les réseaux de capteurs, a attiré beaucoup d'attention ces dernières années. Sa mise en œuvre soulève de nombreuses difficultés, comme la génération d'interférences d'accès multiple (MAI) à caractère impulsif et la consommation d'énergie relativement forte. Les MAI et le bruit thermique doivent être considérés simultanément car ils perturbent fortement les communications. Nous modélisons les MAI et le bruit thermique respectivement par la distribution stable et gaussienne. Nous étudions tout d’abord l’effet des turbo-codes sur le lien direct en utilisant la norme-p comme métrique de décodage. Cette métrique permet une performance de correction d’erreur proche du décodeur optimal. Ensuite nous nous penchons sur les communications coopératives. A l’aide de l’échantillonnage préférentiel, nous estimons les densités de probabilité de la décision statistique du récepteur optimal en présence des bruits stable et gaussien. Cette approche est coûteuse en calcul. Nous proposons donc d’approximer ces densités de probabilité par la distribution gaussienne inverse normale (NIG). Cette solution de calcul est efficace pour approcher le récepteur optimal. Nous montrons également que le récepteur utilisant la norme-p a des performances robustes, quel que soit le type de bruit dominant. A la fin nous combinons les travaux du codage canal et des communications coopératives pour établir une stratégie de codage canal distribué. Basé sur la qualité du lien direct et le niveau de taux d’erreur binaire envisagé, la stratégie d’économie d’énergie peut être mise en place via le choix d’un schéma de codage canal distribué
Internet of Things brought great interests in recent years for its attractive applications and intelligent structure. However, the implementation of sensor networks still presents important challenges such as the generation of Multiple-Access-Interference (MAI) with impulsive nature and the relatively high energy consumption. Both the MAI and the thermal noise should be considered due to their strong impairments each may cause on the communication quality. We employ the stable and Gaussian distributions to model the MAI and the thermal noise respectively. Firstly we study the performance of turbo codes in the direct link and we propose the p-norm as a decoding metric. This metric allows a considerable error correction performance improvement which is close to the optimal decoder. Then we investigate cooperative communications. The probability densities in the decision statistic of the optimal receiver are estimated using importance sampling approach when both the stable and Gaussian noises are present. Such a method is computationally expensive. Hence we develop an approximation approach based on the Normal Inverse Gaussian (NIG) distribution. This solution is efficient for calculation and is proximate to the optimal receiver. In addition we show that the p-norm receiver has robust performance no matter what kind of noise is dominant. At last we combine the channel coding and cooperative communication works to establish a distributed channel coding strategy. Through some simulation assessments, the energy saving strategy can be realized by choosing an appropriate distributed channel coding scheme based on the direct link quality and target bit error rate
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography