Dissertations / Theses on the topic 'IoT (Internet of Things)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'IoT (Internet of Things).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Nazim, Umair. "Securing Internet of Things (IoT)." Thesis, The University of Sydney, 2018. http://hdl.handle.net/2123/20275.
Full textVitale, Clemente. "Internet of Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3184/.
Full textIqbal, Muhammad Azhar. "Internet of Things (IoT) Industry Gateway Modelling." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28691.
Full textHassan, Basma Mostafa. "Monitoring the Internet of Things (IoT) Networks." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS100.
Full textBy connecting billions of things to the Internet, IoT created a plethora of applications that touch every aspect of human life. Time-sensitive, mission-critical services, require robust connectivity and strict reliability constraints. On the other hand, the IoT relies mainly on Low-power Lossy Networks, which are unreliable by nature due to their limited resources, hard duty cycles, dynamic topologies, and uncertain radio connectivity. Faults in LLNs are common rather than rare events, therefore, maintaining continuous availability of devices and reliability of communication, are critical factors to guarantee a constant, reliable flow of application data.After a comprehensive literature review, and up to our knowledge, it is clear that there is a call for a new approach to monitoring the unreliable nodes and links in an optimized, energy-efficient, proactive manner, and complete interoperability with IoT protocols. To target this research gap, our contributions address the correct assignment (placement) of the monitoring nodes. This problem is known as the minimum assignment problem, which is NP-hard. We target scalable monitoring by mapping the assignment problem into the well-studied MVC problem, also NP-hard. We proposed an algorithm to convert the DODAG into a nice-tree decomposition with its parameter (treewidth) restricted to the value one. As a result of these propositions, the monitor placement becomes only Fixed-Parameter Tractable, and can also be polynomial-time solvable.To prolong network longevity, the monitoring role should be distributed and balanced between the entire set of nodes. To that end, assuming periodical functioning, we propose in a second contribution to schedule between several subsets of nodes; each is covering the entire network. A three-phase centralized computation of the scheduling was proposed. The proposition decomposes the monitoring problem and maps it into three well-known sub-problems, for which approximation algorithms already exist in the literature. Thus, the computational complexity can be reduced.However, the one major limitation of the proposed three-phase decomposition is that it is not an exact solution. We provide the exact solution to the minimum monitor assignment problem with a duty-cycled monitoring approach, by formulating a Binary Integer Program (BIP). Experimentation is designed using network instances of different topologies and sizes. Results demonstrate the effectiveness of the proposed model in realizing full monitoring coverage with minimum energy consumption and communication overhead while balancing the monitoring role between nodes.The final contribution targeted the dynamic distributed monitoring placement and scheduling. The dynamic feature of the model ensures real-time adaptation of the monitoring schedule to the frequent instabilities of networks, and the distributed feature aims at reducing the communication overhead
Okumura, Brandon M. "IoTA: Internet of Things Assistant." DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1769.
Full textMuhonen, T. (Tiia). "Standardization of Industrial internet and IoT (IoT — Internet of Things):perspective on condition-based maintenance." Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201504081319.
Full textElektronisten laitteiden kustannusten lasku, tietokoneiden laskentatehojen kasvu ja kehittyneet sensoriteknologiat ovat mahdollistaneet internetin leviämisen täysin uudelle alueelle. Lähitulevaisuudessa yhä useammat älykkäät esineet ovat yhteydessä internetiin, ja uusia liiketoimintoja luodaan niiden ympärille. Teollinen internet ja esineiden internet (IoT — Internet of Things) ovat ajankohtaisia aiheita tällä hetkellä ja molemmat laajalti tutkittuja kirjallisuudessa. Silti ajankohtaista tutkimusta niiden tämän hetkisestä standardoinnin tilasta on vaikea löytää. Tämän tutkimuksen tavoitteena on selvittää Teollisen internetin ja IoT:n standardoinnin nykytila. Näin ollen tutkimuksen tulokset hyödyttävät toimijoita näillä aloilla. Myös eri standardointiorganisaatioita, alliansseja ja yhteenliittymiä tarkastellaan. Lisäksi epävirallisia teollisuusstandardeja ja niiden mahdollista kehitystä ja vaikutuksia arvioidaan. Tutkimuksen näkökulma on rajattu erityisesti ennakoivaan kunnossapitoon. Tutkimuksen teoriaosuus on kirjallisuuskatsaus, joka muodostaa perustan empirialle. Kirjallisuuskatsaus tarkastelee tutkimuksen teeman kannalta relevantteja aihepiirejä: Teollinen internet, M2M (Machine to Machine), IoT, standardointi ja ennakoiva kunnossapito. Kvalitatiivista case-tutkimusmenetelmää sovelletaan tutkimuksen empiriaosiossa, ja tiedon keräämistä varten haastatellaan kymmenen tarkoin valittua haastateltavaa. Case-analyysi osoittaa, että standardointia pidetään tärkeänä laitteiden jakaessa tietoa toisilleen. Kuitenkaan suurin osa haastateltavista ei ota osaa standardointitoimintaan, ja käsitys standardoinnin nykytilasta on heille vielä melko epäselvä. Johtopäätökset pohjautuvat kirjallisuuskatsauksen ja case-analyysin perusteella saatuihin löydöksiin. Tutkimustulokset osoittavat, että Teollisen internetin ja IoT:n standardointi on vasta kehittymässä. Standardeja luovia organisaatioita, sekä virallisia että epävirallisia, on suuri määrä, ja sovelluskenttä on laaja. Monet kehittymässä olevat sovellukset hyödyntävät omia standardejaan, ja useat standardit ovat yhä kehitysasteella. Ratkaisut perustuvat erilaisiin yhtä aikaa olemassa oleviin protokolliin, rajapintoihin ja sovellusalustoihin, niin patentoituihin kuin standardeihinkin. Osa Teollisen internetin ja IoT:n standardeista tulevat olemaan virallisia standardeja, kun taas osa tulee olemaan de facto standardeja, jotka on hyväksytty forumeissa ja alliansseissa tai ratkaisevassa roolissa olevissa yrityksissä. Tutkimustulokset osoittavat, että standardointi on tärkeässä roolissa Teollisessa internetissä ja IoT:ssä, sillä se vaikuttaa yhteensopivuuteen, yhdenmukaisuuteen, luotettavuuteen, turvallisuuteen ja tehokkaaseen toimintaan hajanaisten teknisten sovellusten välillä globaalisti. Siitä syystä yhteistyö eri organisaatioiden välillä on tärkeää ja tarpeellista
Eriksson, Fredrik. "Internet of Things (IoT): avskalad plattform i Java." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34066.
Full textBehovet för smarta enheter som använder sensorer har aldrig varit högre och det är trott att vid år 2020 kommer mer än 50 miljarder enheter vara uppkopplad mot internet. Alla dessa enheter med sensorer som är anslutna mot internet går under namnet Internet of Things. Syftet med denna studie har därför varit att skapa en avskalad IoT plattform som inte använder externa bibliotek för att hålla ned kostnaderna för de mindre företagen som inte behöver de mer avancerade och dyrare plattformarna. Efter att plattformen blivit implementerad skulle stresstester utförs för att avgöra hur bra den presterar. Studien har genomförts med hjälp av webbaserade källor och programmeringen av plattformen har utförts i programmeringsmiljön NetBeans i språket Java och databasen är skapad i MySQL workbench. Resultatet av studien har gett en plattform som använder REST för att skicka till och hämta data från databasen. Att göra implementeringen utan att använda externa bibliotek gick inte då biblioteket mysql-connector-java-5.1.45 var essentiellt för uppkoppling mot databasen. Stresstesterna gav att plattformen presterade stabilt och kunde hantera åtminstone 500 REST förfrågningar per sekund med endast en liten ökning i svarstiden, dock blev standardavvikelsen för svarstiden betydligt högre. Slutsatsen av studien blev att eftersom plattformen fungerar stabilt för 50 – 250 förfrågningar per sekund och då den tar upp lite processorkraft kan flera plattformar användas i ett företag för att då fördela arbetskraften emellan dem vilket resulterar i en lösning som både är skalbar samt stabil.
Leonardi, S. "INTERNET OF THINGS (IOT) AND DAIRY FARM AUTOMATION." Doctoral thesis, Università degli Studi di Milano, 2015. http://hdl.handle.net/2434/262453.
Full textWernersson, Henrik Wernersson, and Yassin Atwa. "Resource constrained Industrial IoT device." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31252.
Full textGoad, David Douglas. "Barriers to IoT Benefits Realization." Thesis, University of Sydney, 2021. https://hdl.handle.net/2123/24520.
Full textHamzic, Almira, and Isabel Olofsson. "DNS and the Internet of Things : Outlining the challenges faced by DNS in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202591.
Full textDetta examensarbete består av en litteraturstudie där olika aspekter av DNS (Domännamnssystemet, eng. Domain Name System) och Sakernas Internet (eng. Internet of Things) har studerats. En fungerande namngivnings-och serviceidentifieringsmetod är en viktig del för att kunna göra Sakernas Internet globalt, och DNS är den nuvarande metoden för att namnge enheter på Internet. Studien undersöker vissa utmaningar som DNS kan stöta på, nämligen funktionalitet, tillgänglighet och säkerhet. Rapportens slutsats är att en lösning baserad på multisändnings-DNS (eng. multicast DNS, mDNS) som är anpassad för begränsade nätverk (eng. constrained networks) är fördelaktig. Detta trots den begränsade säkerhet som finns tillgänglig just nu för en sådan lösning. I framtiden är det viktigt att säkerheten har högsta prioritet, eftersom säkerheten är begränsad hos DNS. Det behövs ytterligare studier när det gäller tillgänglighet och hur adressöversättning skulle fungera med begänsade enheter (eng. constrained devices) som använder viloläge.
Steinkjer, Ole Marius. "Routing and load balancing in Internet of Things (IoT)." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9089.
Full textThe assignment includes the following tasks 1. Study the Telenor Connected Object (COOS) infrastructure 2. Study existing load balancing techniques that are relevant for COOS 3. Make a model of COOS in order to investigate load balancing techniques 4. Propose usage scenarios for COOS which need performance differentiation and load balancing 5. Conduct load balancing experiments on scenarios with different techniques 6. Propose principles for load balancing in COOS • How can you achieve effective routing across different (access) network technologies? Load balancing of traffic – optimised for node performance (e.g. battery and/or bandwidth limitations, least cost routing). How can one distribute load across different networks (e.g. wifi, bluetooth, 3G...) in an effective manner?
Thomas, Darshana. "Optimal wireless technologies for the Internet of Things (IoT)." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=28633.
Full textShahid, Mustafizur Rahman. "Deep learning for Internet of Things (IoT) network security." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS003.
Full textThe growing Internet of Things (IoT) introduces new security challenges for network activity monitoring. Most IoT devices are vulnerable because of a lack of security awareness from device manufacturers and end users. As a consequence, they have become prime targets for malware developers who want to turn them into bots. Contrary to general-purpose devices, an IoT device is designed to perform very specific tasks. Hence, its networking behavior is very stable and predictable making it well suited for data analysis techniques. Therefore, the first part of this thesis focuses on leveraging recent advances in the field of deep learning to develop network monitoring tools for the IoT. Two types of network monitoring tools are explored: IoT device type recognition systems and IoT network Intrusion Detection Systems (NIDS). For IoT device type recognition, supervised machine learning algorithms are trained to perform network traffic classification and determine what IoT device the traffic belongs to. The IoT NIDS consists of a set of autoencoders, each trained for a different IoT device type. The autoencoders learn the legitimate networking behavior profile and detect any deviation from it. Experiments using network traffic data produced by a smart home show that the proposed models achieve high performance.Despite yielding promising results, training and testing machine learning based network monitoring systems requires tremendous amount of IoT network traffic data. But, very few IoT network traffic datasets are publicly available. Physically operating thousands of real IoT devices can be very costly and can rise privacy concerns. In the second part of this thesis, we propose to leverage Generative Adversarial Networks (GAN) to generate bidirectional flows that look like they were produced by a real IoT device. A bidirectional flow consists of the sequence of the sizes of individual packets along with a duration. Hence, in addition to generating packet-level features which are the sizes of individual packets, our developed generator implicitly learns to comply with flow-level characteristics, such as the total number of packets and bytes in a bidirectional flow or the total duration of the flow. Experimental results using data produced by a smart speaker show that our method allows us to generate high quality and realistic looking synthetic bidirectional flows
Cooper, Ke'ahi. "Security for the Internet of Things." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172526.
Full textPavlíček, Tomáš. "Potenciál IoT v Smart city." Master's thesis, Vysoká škola ekonomická v Praze, 2016. http://www.nusl.cz/ntk/nusl-261976.
Full textEgel, Jill. "Internet of Things and its Business Models." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80995.
Full textVargas, Vargas Fernando. "Cloudlet for the Internet-of- Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191433.
Full textMed en befolkning som ökar i urbana områden, står många av världens städer inför utmaningar som ökande avgaser och trafikstockning. I ett försök att tackla sådana utmaningar, formulerar regeringar och stadsfullmäktige nya och innovativa strategier. Integrationen av ICT med dessa strategier bildar konceptet smart cities. Internet of Things (IoT) är en drivande faktor för smart city initiativ, vilket gör det nödvändigt för en IT infrastruktur som kan ta till vara på de många fördelar som IoT bidrar med. Cloudlet är en ny infrastrukturell modell som erbjuder datormolnskompetens i mobilnätverkets edge. Denna miljö karakteriseras av låg latens och hög bandbredd, utgörande ett nytt ekosystem där nätverksoperatörer kan hålla deras nätverks-edge öppet för utomstående, vilket tillåter att flexibelt och snabbt utveckla innovativa applikationer och tjänster för mobila subskribenter. I denna avhandling presenterar vi en cloudlet-arkitektur som framhäver edge computing, för att förse en plattform för IoT utrustning där många smart city applikationer kan utvecklas. Vi förser er först med en överblick av existerande utmaningar och krav i IoT systemutveckling. Sedan analyserar vi existerande cloudlet lösningar. Slutligen presenteras vår cloudlet arkitektur för IoT, inklusive design och en prototyplösning. För vår cloudlet-prototyp har vi fokuserat på en modell av mikroskala för att räkna ut CO2 emissioner per enskild resa med fordon, och implementerat en funktion som tillåter oss att läsa CO2 data från CO2 sensorer. Platsdata är inhämtad med hjälp av en Android smartphone och behandlas i cloudlet. Det hela sammanfattas med en prestandaevaluering.
Astistova, T. I., and D. M. Kochuk. "Software development for technology "Internet of Things"." Thesis, Київський національний університет технологій та дизайну, 2021. https://er.knutd.edu.ua/handle/123456789/19193.
Full textDeserranno, Allen Ronald. "Enhancing the Internet of Things Architecture with Flow Semantics." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/7016.
Full textAlsén, Caroline. "Kostnadsfördelar med IoT för hissystem." Thesis, KTH, Data- och elektroteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188482.
Full textInternet of things is today a development that is strongly moving forward to make society more con-trolled by technology, modern and it will be easier for many people. This technology can be used in many diffrent industries and work areas, such as elevator monitoring. This report evaluates the benefits with Internet of things within elevator monitoring. The company Safeline Sweden AB has developed a product that will make it easier to monitor elevators from a distance. An investigation of this product has been done and what their advantages were. After that, a buisness model was formed for Safelines new product IMS. By interviewing potential customers, the information about the sitaution today and the approach for new technology was discovered. The information from the interviews was then used to create a good and sustainable business model for Safeline.A buisness model was created for Safeline Sweden AB and the produkt IMS. The business model describes how the company should launch the new product, how the customer relations should be created, developed and retained. The information from the interviews made it clear that the IMS should be sold as a system solution because it is considered to be more attractive and be more valu-able for the customers.
Song, Yuanjun. "Security in Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142451.
Full textPoggi, Giovanni. "Internet of Medical Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textSabel, Ida. "Internet of Things & Kommunikationsprotokoll." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-27246.
Full textBy studying different communication protocols respond to what it is that makes a certain protocol best suited for use between mobile devices and IoT devices. This study used a qualitative literature study to create a proper theoretical background and an experimental study where two theories were investigated in whether they matched wih the results from the reality. The five factors compatibility, battery loss, frequency, range and reliability were investigated in the communication protocols Bluetooth Low Energy (BLE), Near field communication (NFC) and Wi-Fi, these three because they are supported by newer mobile platforms today. The communication protocols were then analysed against various uses in the IoT, since the claim what it is that makes it best suited depends on what the situation requires. A system developer that is about to select the communication protocol to use in an IoT application and reads this study should compare the different protocols to each other within the five factors to determine which protocol is best suited for his situation. This study only performed experimental studies on BLE because of limitations in the equipment. Additional experiments on NFC and Wi-Fi would provide a wider perspective.
Girotti, Alessandro. "Piattaforme per lo sviluppo di progetti IoT." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017.
Find full textDing, Yuxia. "Internet of Things : Quantitative Evaluation on Microsoft Azure IoT Suite." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31006.
Full textKalashnikov, A., H. Zhang, J. Jennings, and M. Abramriuk. "Remote laboratory: using Internet-of-Things (IoT) for E-learning." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/55781.
Full textMateus, Márcio Filipe Caetano. "Measuring data transfer in heterogeneous IoT environments." Master's thesis, Faculdade de Ciências e Tecnologia, 2012. http://hdl.handle.net/10362/7580.
Full textInternet of Things (IoT) is characterised by the heterogeneity of the used devices, which leads to information exchange problems. To address these problems, the Plug’n’Interoperate approach is used, where the steps needed to perform the information exchange between devices are described by interoperability specifications (IS) and are operated by the devices. However, more than one IS can exist to describe the information exchange between each pair of devices, so to choose the suitable IS, there is the need to measure the information exchange described by each one. To do this, there already exist some methods. But, they rely on a deep understanding of the IS and the data formats involved. To overcome this, an advanced measurement method is presented. This method advances by measuring the data transfer provided by an IS, without the need of specific knowledge about it. This measurement does that, by relying only on an abstract view of the data transfer and providing results that allows the benchmarking of the entire interoperability performance of the IoT environment. Thus allowing the comparison of different IS without the need of being specialized on them.
Sabe, Tahir, and Ridom Khan. "Blockchain för att säkra Internet of Things." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-283791.
Full textDovile, Trepkeviciute. "Internet of Things (IoT) driven media recommendations for television viewers. The concept of IoT TV." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209574.
Full textI dagens överbelastade medielandskap stöter tv-tittare ständigt på frågan om vilket medieinnehåll de ska välja. Denna medieöverbelastning väcker teorier om begränsad rationalitet när tittarna kämpar för att förstå alla tillgängliga valmöjligheter. Denna uppsats presenterar ett rekommendationskoncept för medier drivna av sakernas internet (IoT-tv), som skulle kunna underlätta tittarnas beslutsfattande genom att ge mer personaliserade medieinnehållsrekommendationer. Studien utvärderar konceptet genom tre fokusgrupper för att förstå vilka aspekter av IoT-tv som är viktiga för tittare. Konceptet IoT-tv tar i beaktande sådana faktorer som tajmning och känslor som kan påverka medievalet betydligt. Den utförda tematiska analysen pekar ut följande fyra teman: tidsbesparing och -passning, människo- och enhetsövervakning, medieval samt integritet. Dessa teman behandlas som studiens resultat eftersom de beskriver viktiga aspekter som bör beaktas innan IoT-tv lanseras. IoT-tv kommer att underlätta val av medieinnehåll genom att spara tid och synkronisera innehållet med aktuella känslor hos tittaren. Således skulle smarta tv-enheter med IoT-anslutning som delar data om tittarens tid och känslor, lösa problemet med medieöverbelastning.
Westman, Andreas, and Filip Wilén. "IoT-lang : Hotmodellering av sakernas internet." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295619.
Full textUnder det senaste årtiondet, har Internet of Things (IoT) haft en snabb framfart. De flesta hem i vårt moderna samhälle innehåller numera ett flertal IoT-produkter, för att automatisera och förenkla vardagen. Trots att IoT-enheter förenklar vardagen för många människor utgör de ofta även ett stort säkerhetshot. Systemens enkelhet bidrar till att de ofta är lätta måltavlor för hackers och andra typer av skadlig aktivitet. För att förbättra säkerheten i dessa typer av system är målet med detta projekt att förenkla processen att hitta och motarbeta säkerhetsbrister. Genom att skapa en programmerbar modell som kan användas för att simulera attacker mot IoTsystem kunde detta göras. Resultaten från valideringen visar att modellen kan användas för att simulera attacker med god precision för enklare system.
Kandidatexjobb i elektroteknik 2020, KTH, Stockholm
Barretta, Salvatore. "UAV based Narrowband - Internet of things." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22761/.
Full textAïssaoui, François. "Autonomic Approach based on Semantics and Checkpointing for IoT System Management." Thesis, Toulouse 1, 2018. http://www.theses.fr/2018TOU10061/document.
Full textBude, Cristian, and Bergstrand Andreas Kervefors. "Internet of Things : Exploring and Securing a Future Concept." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516.
Full textInternet of Things (IoT) är ett koncept som omfattar olika objekt och kommunikationsmetoder för utbyte av information. Idag är IoT mer en beskrivande term av den framtidsvision som finns att allting ska vara uppkopplat på internet. IoT kommer vara fundamentalt i framtiden eftersom konceptet öppnar upp möjligheter för nya tjänster samt nya innovationer. Då alla objekt ska vara uppkopplade och kunna kommunicera med varandra samtidigt som de skall kunna operera i oskyddade miljöer, bidrar detta till stora säkerhetsutmaningar. Dagens IoT är i stort behov av standardisering och klara strukturer för hur tekniken ska implementeras samt samverka med varandra på ett säkert sätt. Utmaningarna ligger i att säkra tekniken samt informationen som tekinken bidrar med. Denna rapport ger en introduktion till vad IoT är och hur det kan användas samt vilka hot som IoT kan möta i avseende till informationssäkerhet. Utöver detta så förser rapporten läsaren med förslag om hur man eventuellt kan lösa de fundamentala behoven av autentisering och säker kommunikation. Lösningarna som läggs fram är baserade på både nutida lösningar och teknik som är under utveckling inför framtiden. Nutida lösningar är baserade på säkerhetsprotokoll som IPsec och DTLS som används i en miljö som sträcker över internet och in i ett 6LoWPAN nätverk. Den autentiseringslösning som tagits fram grundar sig på PKI och förtroendemodeller för certifikathantering. För framtida arbete presenteras flertalet vidare fördjupningsområden där denna rapport kan användas som grund. Dessa fördjupningsområden inkluderar vidare analys av sårbarheter och implementation av de lösningar som tagits fram.
Jonsson, Måns, and Johannes Sandberg. "Reducing food waste in the Swedish household using IoT." Thesis, Blekinge Tekniska Högskola, Institutionen för maskinteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-19671.
Full textThe reason for this thesis is to investigate how an innovative Internet of Things based system can be beneficial in reducing food waste. It´s considered important to find new ways and solutions to the growing problem of food waste. The purpose of this study is to find new possible solutions to reduce food waste in Sweden. To develop a solution, a greater understanding of how Swedes handle food waste today is required. The thesis will be based on real needs and carefully examine how a solution can be developed in the best way. The Design Thinking process will be carried out in this study. To approach and investigate the needs of today, a survey and interviews will be conducted together with article research with similar solutions in the field of food waste. A prototype has been developed, and different features have been created according to the needs that existed. The developed prototype has also been in contact with potential users to collect feedback about the prototype. The result of this work is that it´s possible to develop a technical and innovative solution for the problem of food waste. It can also be seen that there is a great development potential regarding the Internet of Things in this area. A well-developed prototype with multiple features has been created and can show the direction for other innovative solutions for food waste. Food waste is a huge problem in the world today, and solutions are required. There are people around the world that are starving to death, and still, 30% of the produced eatable food is thrown away. New technical and innovative solutions are needed in this area, and more research should be conducted. Internet of Things will continue its development in the near future and has big potential to help reducing food waste.
Huang, Guanglei, and Christensen Joacim Ahlin. "Harnessing the power of the Internet of Things : A Performance-impact model for Companies´adoption of the Internet of Things." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353860.
Full textNamirimu, Victoria. "User Requirements for Internet Of Things (IoT) Applications : An Observational study." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-11025.
Full textAravind, Meera. "Event-Based Messaging Architecture for Vehicular Internet of Things (IoT) Platforms." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-35905.
Full textXu, Ran. "Federated Sensor Network architectural design for the Internet of Things (IoT)." Thesis, Loughborough University, 2013. https://dspace.lboro.ac.uk/2134/13453.
Full textSelvakumaran, Dinesh Kumar. "ENERGY-EFFICIENT AND SECURE HARDWARE FOR INTERNET OF THINGS (IoT) DEVICES." UKnowledge, 2018. https://uknowledge.uky.edu/ece_etds/132.
Full textBorges, caldas da silva Pedro Victor. "Middleware support for energy awareness in the Internet of Things (IoT)." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS016.
Full textThe Internet of Things (IoT) is characterized by a myriad of geographically dispersed devices and software components as well as high heterogeneity in terms of hardware, data, and protocols. Over the last few years, IoT platforms have been used to provide a variety of services to applications such as device discovery, context management, and data analysis. However, the lack of standardization makes each IoT platform come with its abstractions, APIs, and interactions. As a consequence, programming the interactions between a consuming IoT application and an IoT platform is often time-consuming, error-prone, and depends on the developers' level of knowledge about the IoT platform. IoT middleware are proposed to alleviate such heterogeneity, provide relevant services, and ease application development.As the energy efficiency of digital technology becomes a priority, the increase in IoT systems brings energy concerns. In this context, carefully designing interactions between IoT consumer applications and IoT systems with an energy-efficiency concern becomes essential. IoT middleware should not solely consider energy efficiency as a non-functional requirement. Instead, it needs to be at the solution's core as the middleware is expected to be shared by many applications and offer facilities to ease application development.This work presents three contributions regarding energy-efficiency/awareness in IoT middleware for IoT consumer applications.The first contribution is the proposal of an IoT middleware for IoT consumer applications called IoTVar that abstracts IoT virtual sensors in IoT variables that are automatically updated by the middleware.The second contribution is the evaluation of the energy consumption of the interactions between IoT consumer applications and IoT platforms through the HTTP and MQTT protocols. This evaluation has led to the proposal of guidelines to improve energy efficiency when developing applications.The third contribution is the proposal of strategies for energy efficiency to be integrated into IoT middleware. Those strategies have been integrated into the IoTVar middleware to provide energy efficiency, but also energy awareness through an energy model and the management of an energy budget driven by user requirements. The implementations of the IoT middleware architecture, with and without energy-efficiency strategies, have been evaluated, and the results show that we have a difference of up to 60% the energy used by IoT applications by applying strategies to reduce energy consumption at the middleware level
Olsson, Alexander. "Meshnetwork of wireless IoT sensors." Thesis, Umeå universitet, Institutionen för fysik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-122908.
Full textSakernas internet, Internet of Things är ett scenario där elektriska apparater så som belysning, hushållsmaskiner, sensorer mm är anslutna och kommunicerar med varandra via internet. Men så många anslutna enheter ställer stora krav på infrastrukturen kring enheterna. Ett sätt att lösa problemen kring infrastruktur är att låta enheterna kommunicera via radio och låta dem vidarebefordra varandras datatrafik i en typ av nätverkstopologi som kallas för meshnätverk. Det här examensarbetet utforskar möjliga radiostandarder som kan användas för att skapa ett meshnätverk för just sensorer. Två typer av meshnätverk implementerades med Bluetooth Low Energy och deras styrkor och svagheter utvärderades. En av dessa gick ut på att enheterna i nätverket sände ut meddelanden som alla kunde ta och sedan att de som lyckades ta emot i sin tur sände meddelandena vidare. Det är en enkel metod som är lätt att implementera.Den andra metoden gick ut på att nätverket tog reda på sin konfiguration och vilken rutt som ska tas via andra enheter för att nå den man vill. När enheterna sen vill kommunicera så upprättar de en anslutning via enheterna längs rutten. Två saker som jämfördes mellan metoderna var strömförbrukning och andel lyckade sändningar. För samma nätverk så drog återsändnings nätverket 3.36 mA och anslutningsnätverket 0.47 mA. Antalet lyckade sändningar testades i ett annat scenario och där kom 75 % av meddelanden i återsändningsnätverket fram och motsvarande siffra för anslutningsnätverket var 58\%. Vidare testades det att stänga av utbytet av rutt information och sökningar efter nya enheter i anslutningsnätverket och då kom 77 % av meddelanden fram. I återsändningsnätverket insåg man att det fanns ett behov av att synkronisera klockorna i enheterna och etablera ett protokoll för hur när man ska sända och ta emot.I anslutningsnätverket så uppstod problem med att enheterna blev otillgängliga när de synkroniserade sin konfiguration vilket ledde till försämrad prestanda.
Vaidian, Iulia, Muhammad Azmat, and Sebastian Kummer. "Impact of Internet of Things on Urban Mobility." HBMSU, 2019. http://epub.wu.ac.at/7101/1/IA%2D12%2DProceedings%2DHealth%2Dand%2DEnvironment%2Dpages%2D1%2C4%2D17.pdf.
Full textNugur, Aditya. "Design and Development of an Internet-Of-Things (IoT) Gateway for Smart Building Applications." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/79960.
Full textMaster of Science
Lobe, kome Ivan Marco. "Identity and consent in the internet of persons, things and services." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0131/document.
Full textThe constant efforts of miniaturization of computing machines is transforming our relationships with machines and their role in society. The number of tiny computers remotely controlled is skyrocketing and those connected things are now more and more asked to do things on human behalf. The trend consists in making room for these specific machines into the Internet, in other words, building communication protocols adapted to their limited resources. This trend is commonly known as the Internet of Things (IoT) which consist of appliances and mechanisms different from those meant to be used exclusively by humans, the Internet of Persons (IoP). This conceptual separation being adopted, how would a Person exchange information with Things ?Sorts of brokers can help bridging that gap. The networking of those brokers led to the concept of Internetof Services (IoS). Persons and Things are connected through Services. This global networking is called the Internet of Persons Things and Services (IoPTS). Our work is on the edge of these 3 Internet areas and our contributions are two fold. In the first hand, we tackle the secure biding of devices’ and persons’ identities while preserving the Integrity, Anonymity and Confidentiality security properties. On the other hand, we address the problem of the secrecy of data on constrained Internet-connected devices. Other mechanisms must be created in order to seamlessly bind these conceptual areas of IoP, IoT andIoS. In this quest for a better integration of Internet connected-devices into the Internet of Persons, our work contributes to the definition of protocols on application and network layers, with IoT concerns and security at heart
Qureshi, Daniyal Akhtar. "Performance Evaluation of IoT Platforms in Green ICT Applications." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-71391.
Full textHsu, Alexander Sirui. "Automatic Internet of Things Device Category Identification using Traffic Rates." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/88421.
Full textMaster of Science
IoT (Internet of Things) devices are an exploding field, with many devices being created, manufactured, and utilized per year. With the rise of so many internet capable devices, there is a risk that the devices may have vulnerabilities and exploits able to allow unauthorized users to access. While a problem for a consumer network, this is an increased problem in an enterprise network, since much of the information on the network is sensitive and should be kept confidential and private. While a ban of IoT devices on a network is able to solve this problem, with the rise of machine learning able to characterize and recognize patterns, a smarter approach can be created to distinguish when and which types of IoT devices enter the network. Previous attempts to identify IoT devices used signature schemes specific to a single device, but this paper aims to generalize traffic behaviors and identifying a device category rather than a specific IoT device to ensure future new devices can also be recognized. With device category identification in place on an internet network, smarter approaches can be implemented to ensure the devices remain secure while still able to be used.
Islam, Mohammad. "Measuring trustworthiness of image data in the internet of things environment." Thesis, Federation University Australia, 2021. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/177521.
Full textDoctor of Philosophy
Mendes, José Miguel Martins Lopes. "Security techniques for the internet of things." Master's thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/12686.
Full textIoT assume que dispositivos limitados, tanto em capacidades computacionais como em energia disponível, façam parte da sua infraestrutura. Dispositivos esses que apresentam menos capacidades e mecanismos de defesa do que as máquinas de uso geral. É imperativo aplicar segurança nesses dispositivos e nas suas comunicações de maneira a prepará-los para as ameaças da Internet e alcançar uma verdadeira e segura Internet das Coisas, em concordância com as visões atuais para o futuro. Esta dissertação pretende ser um pequeno passo nesse sentido, apresentando alternativas para proteger as comunicações de dispositivos restritos numa perspetiva de performance assim como avaliar o desempenho e a ocupação de recursos por parte de primitivas criptográficas quando são aplicadas em dispositivos reais. Dado que a segurança em diversas ocasiões tem de se sujeitar aos recursos deixados após a implementação de funcionalidades, foi colocada uma implementação de exposição de funcionalidades, recorrendo ao uso de CoAP, num dispositivo fabricado com intenção de ser usado em IoT e avaliada de acordo com a sua ocupação de recursos.
IoT comprehends devices constrained in both computational capabilities and available energy to be a part of its infrastructure. Devices which also present less defense capabilities and mechanisms than general purpose machines. It’s imperative to secure such devices and their communications in order to prepare them for the Internet menaces and achieve a true and secure Internet of Things compliant with today’s future visions. This dissertation intends to be a small step towards such future by presenting alternatives to protect constrained device’s communications in a performance related perspective as well as benchmarks and evaluation of resources used by cryptographic primitives when implemented on real devices. Due to security being on multiple occasions subjected to the resources available only after functionalities implementation, a minimalist implementation of functionalities exposure through the use of CoAP was also deployed in an IoT intended device and assessed according to resource overhead.
Buurman, Benjamin. "Intelligent sewer blockage detection system using Internet of Things." Thesis, Federation University Australia, 2019. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/169289.
Full textMasters by Research