Dissertations / Theses on the topic 'IoT Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'IoT Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Karim, Hawkar. "IoT Networking Using MPTCP Protocol." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48424.
Full textPettersson, William. "An Evaluation of IoT Protocol Efficiency and suitability : For smart vehicles, smart homes & industrial scenarios." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42392.
Full textInternet of things (IoT) is the base topic of this thesis, and it is a rapidly growing area, it can be described as a network of communicating devices sharing information and streamlining tasks in addition to increasing efficiency and security. It is expected to be 24 billion connected devices by year 2050 and with this growth comes an increased demand on understanding the IoT protocols to be able to choose a suitable protocol for a given scenario. This thesis will discuss this area and pick one protocol to evaluate specifically regarding latency, throughput, and scalability. The protocol chosen were MQTT (Message Queuing Telemetry Transport). Based on these values then discuss whether the protocol is a suitable candidate for the scenarios. The data to evaluate this will be gathered by measuring the end-to-end time of the protocol in respect to the number of communicating programs, and to measure the time it takes to communicate a number of messages with respect to the number of programs handling the communication. These tests are performed with a local PC acting as the broker and a Raspberry pi running each of the communicating programs on individual terminals. The results were that latency seem to have a close to liner relation, and that throughput seem to have an exponentially decreasing relation with respect to number of clients cooperating. The measured results are analyzed and discussed and concluded that the protocol is a fitting candidate for most scenarios such as smart cars, smart homes and to some extent industry. The biggest flawed concluded was the protocols high standard deviation for individual messages latency. The outcome of the benchmarks measurement showed that increasing the number of nodes would not result in superior performance. It was noted that an optimal number of nodes was found to be between 1 and 20 for all the tests performed. The study showed that no load balancer could be considered a clear winner, instead, different configurations of load balancers performed varyingly well at different tests.
Bassi, Lorenzo. "Orchestration of a MEC-based multi-protocol IoT environment." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24114/.
Full textFakhraddin, Haider. "Toward IoT : Implementation of WSN based MQTT Data Protocol." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-92453.
Full textShahidi, Hamed. "Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.
Full textSilva, Douglas Simões. "Formal verification and access control approach of an IoT protocol." reponame:Repositório Institucional da UFSC, 2017. https://repositorio.ufsc.br/xmlui/handle/123456789/181251.
Full textMade available in DSpace on 2017-11-21T03:21:45Z (GMT). No. of bitstreams: 1 348588.pdf: 768167 bytes, checksum: 63943b853c6e5069f7f7d2a95f11f8e8 (MD5) Previous issue date: 2017
Protocolos de Segurança estão na nossa rotina diária e exemplos distosão compras utilizando o cartão de crédito, eleição eletrônica, redes sem fio e etc. O primeiro objetivo deste trabalho é a verificação formal dos aspectos de segurança de um protocolo voltado para Wireless Sensor Networks (WSN). O Trustful Space-Time Protocol (TSTP) engloba a maioria das características necessárias para aplicações WSN como por exemplo controle de acesso, roteamento geográfico de pacotes, estimativa de localização, relógio precisamente sincronizado, canais de comunicação segura e um esquema de distribuição de chaves entre o gateway e os sensores. Após a análise formal do protocolo de distribuição de chaves do TSTP usando Proverif, nós encontramos duas falhas de segurança: uma relacionada ao componente de sincronização de tempo e outra relacionada ao método mac-then-encrypt empregado. Com as falhas encontradas nós propómos uma versão melhorada do protocolo de distribuição de chaves. O segundo objetivo é criar um esquema de controle de acesso sensível ao contexto para dispositivos Internet de Coisas(IoC) usando TSTP como canal de comunicação. O esquema da política foi projetado para um cenário Smart Campus e seu contexto. Aproveitamos os recursos do TSTP para adicionar dados de tempo e espaço como contexto para o nosso modelo. Após o desenho do modelo de política, descrevemos seu modelo simbólico e fizemos uma análise formal para ter certeza de que os valores das propriedades de contexto não foram adulterados.
Abstract : Security protocols are included in our every day routine. A few examplesare credit card purchases, e-voting, wireless networks, etc. Thefirst goal of this dissertation is the formal verification of the securityaspects of a cross-layer, application-oriented communication protocolfor Wireless Sensor Networks (WSN). The Trustful Space-Time Protocol(TSTP) encompasses a majority of features recurrently needed byWSN applications like medium access control, geographic routing, locationestimation, precise time synchronization, secure communicationchannels and a key distribution scheme between sensors and the sink.After the security protocol analysis of TSTP?s key distribution protocolusing ProVerif we were able to find two security flaws: one related tothe time synchronization component and another being a bad approachrelated to a mac-then-encrypt method employed. With our findingswe propose an improved version of the key distribution protocol. Thesecond goal is to create a context-aware access control scheme for Internetof Things(IoT) devices using TSTP as a communication channel.The policy?s scheme was designed for a Smart Campus scenario andits context. We take advantage of TSTP?s features to add time andspace data as context for our model too. After the design of the policymodel, we described its symbolic model and we did a formal analysisto be sure that the context properties values were not tampered.
van, Leeuwen Daniel, and Leonel Taku Ayuk. "Security testing of the Zigbee communication protocol in consumer grade IoT devices." Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.
Full textFerrari, Nico. "Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36975.
Full textNguyen, Ngo Minh Thang. "Test case generation for Symbolic Distributed System Models : Application to Trickle based IoT Protocol." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC092.
Full textDistributed systems are composed of many distant subsystems. In order to achieve a common task, subsystems communicate both with the local environment by external messages and with other subsystems by internal messages through a communication network. In practice, distributed systems are likely to reveal many kinds of errors, so that we need to test them before reaching a certain level of confidence in them. However, testing distributed systems is complicated due to their intrinsic characteristics. Without global clocks, subsystems cannot synchronize messages, leading to non-deterministic situations.Model-Based Testing (MBT) aims at checking whether the behavior of a system under test (SUT) is consistent with its model, specifying expected behaviors. MBT is useful for two main steps: test case generation and verdict computation. In this thesis, we are mainly interested in the generation of test cases for distributed systems.To specify the desired behaviors, we use Timed Input Output Symbolic Transition Systems (TIOSTS), provided with symbolic execution techniques to derive behaviors of the distributed system. Moreover, we assume that in addition to external messages, a local test case observes internal messages received and sent by the co-localized subsystem. Our testing framework includes several steps: selecting a global test purpose using symbolic execution on the global system, projecting the global test purpose to obtain a local test purpose per subsystem, deriving unitary test case per subsystem. Then, test execution consists of executing local test cases by submitting data compatible following a local test purpose and computing a test verdict on the fly. Finally, we apply our testing framework to a case study issued from a protocol popular in the context of IoT
Alm, Anton. "Internet of Things mesh network : Using the Thread networking protocol." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.
Full textKara, Dilen, and Zaid Jalil. "IoT-nätverk baserade på LoRaWAN : Informationskvalitet i LoRaWAN." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-41399.
Full textInternet var i begynnelsen uppbyggt kring nätverk baserade på fysiska kablar, nästa steg för att förbättra tillgängligheten till Internet kom med introduktionen av trådlös kommunikation. Ett nytt begrepp dök upp vid millennieskiftet, Internet of Things (IoT). Tanken bakom IoT är att olika typer av produkter, som exempelvis tandborstar och kylskåp trådlöst kopplas upp mot Internet. Eftersom IoT-produkterna är trådlöst uppkopplade behöver de en intern strömkälla i form av ett batteri. Många av de existerande kommunikationsprotokollen lämpar sig därför inte för IoT-lösningar eftersom dessa är strömkrävande. Alternativ till dessa kommunikationsprotokoll har därför tagits fram, till exempel LTE-M, NB-IoT och LoRaWAN. Studien utfördes i samarbete med Etteplan. Etteplan vill satsa på LoRaWAN och vill därmed få en djupare kunskap inom LoRaWAN. Därmed valdes det att undersöka hur olika faktorer påverkar signalstyrkan och sändningstiden i ett LoRaWAN. Studiens fokus har därmed varit på kommunikationen mellan en IoT-nod och en mottagare i ett LoRaWAN, därmed är studiens syfte: Att visa på hur olika datahastigheter, avstånd och miljöer påverkar kvaliteten på informationen som sänds från en IoT-nod till en mottagare i ett LoRaWAN. Design science research användes som forskningsmetod då i design science research konstrueras en artefakt som att sedan undersöks. I studiens fall konstruerades ett LoRaWAN där sedan kommunikationen mellan en IoT-nod och mottagare i detta LoRaWAN studerades. För att studera kommunikationen mellan en IoT-nod och en mottagare utfördes två experiment. Experimenten utfördes samtidigt där skillnaden låg i datat som samlades in, det ena experimentet samlade in signalstyrkan och den andra sändningstiden. Experimentet utfördes i två olika miljöer, en med fri sikt och en med blockeringar. I experimentet positionerades IoT-noden på olika avstånd med olika datahastigheter. Resultatet från studien visar hur olika datahastigheter, avstånd och miljöer påverkade kvaliteten på informationen mellan en IoT-nod och mottagare och hur de relateras till tidigare forskning. Datahastigheten var den faktorn som påverkade kvaliteten på informationen mest. Datahastigheten hade minimal påverkan på signalstyrkan, men stor påverkan på antal förlorade datapaket och sändningstider. De två olika miljöerna hade ingen påverkan på sändningstiden, men signalstyrkan var över 10 dbm lägre i stadsmiljön än med fri sikt. Avståndet hade ingen påverkan på sändningstiden och minimal påverkan på signalstyrkan.
Ralambotiana, Miora. "Key management with a trusted third party using LoRaWAN protocol : A study case for E2E security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230671.
Full textIdag blir Internet av saker (IoT) applikationer allt viktigare i människors vardag. Beroende på användningen (för långeller kortdistanskommunikation, med låga eller höga effektenheter etc.) finns flera standarder. I denna studie ligger fokus på Low Power Wide Area Networks (LPWAN) och i synnerhet ett protokoll som ökar i popularitet för långsiktig lågkapacitetskommunikation i IoT: LoRaWAN. LoRaWAN är fortfarande på ett tidigt stadium och har i huvudsak använts i användarfall där nätverksservern hanterade nycklarna som säkerställer konfidentialitet och integritet av data. Gemalto har tagit upp frågan om intressekonflikter i det fall nätverksoperatören och programleverantören är två separata enheter: Om slutanordningen och applikationsservern utbyter känslig data, ska nätverksservern inte kunna läsa dem. För att lösa detta problem har en arkitektur som använder en betrodd tredje part för att generera och hantera nycklarna implementerats under det här projektet. Följande forskning syftar till att hitta säkerhetshot och svagheter om konfidentialiteten och integriteten hos data och enheternas autentisering i detta studiefall. LoRaWAN-protokollet och nyckelhanteringen i allmänhet kommer att studeras först innan författaren beskriver det studerade systemet och upptäcker de eventuella attacker som undersöker sårbarheten på de nämnda punkterna via ett angreppsträd. Dessa attacker kommer att simuleras för att definiera deras konsekvenser på systemet och enligt dem kommer säkerhetsförbättringar på arkitekturen att föreslås utifrån tidigare arbete med ämnet och undersökning av potentiella motåtgärder
Alatram, Ala'a A. M. "A forensic framework for detecting denial-of-service attacks in IoT networks using the MQTT protocol." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2561.
Full textGirotti, Alessandro. "Piattaforme per lo sviluppo di progetti IoT." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017.
Find full textMo, Yuqi. "Ultra narrow band based IoT networks." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEI069/document.
Full textSigfox rises as a promising candidate dedicated for long-distance and low-power transmissions in the IoT backgrounds. Ultra Narrow Band (UNB), being the communication technology chosen by Sigfox, allows to transmit information through signals whose bandwidth is very limited, typically 100 Hz. Due to the imprecision restraint on electronic devices, it is impossible to transmit UNB signals in orthogonal channels. The natural radio access for this kind of system is thus random ALOHA, in both time and frequency domain. This random access can induce collisions which degrades the networks performance. The aim of this thesis is to characterize the capacity of UNB based networks, as well as to enhance its performance, by considering the randomness in time and frequency. The first contribution of the thesis, is the theoretical and numerical capacity evaluation under idealized and realistic channel conditions, for mono base station (BS) case. Under idealized conditions, we have quantified this capacity for generalized ALOHA case and extended for replications. We highlight the time-frequency duality in UNB systems, and that there exists an optimum replication number for a given network parameter set. Under realistic conditions, we have taken into account the specific spectral interference of UNB systems and propagation path loss (without and with Rayleigh fading) to characterize the performance, with the aid of stochastic geometry. The second contribution is the enhancement of UNB network performance in single BS case. We propose to use successive interference cancellation (SIC) in UNB networks, which allows to mitigate the interference. We have provided a theoretical analysis by considering both SIC and the spectral interference, for mono-BS case. We bring to light the efficiency of SIC in enhancing UNB system performance. The third contribution is the improvement of UNB systems, by exploiting the multiple BS diversity. An analytical performance evaluation considering the simplest selection combining is conducted. In particular, we consider the interference viewed by all the BSs are correlated. Then we apply more complex signal combining technologies such as MRC (max ratio combining) and EGC (equal gain combining), and even interference cancellation across multi-BS in UNB networks. We evaluate the performance improvement that each technology can bring, and compare them with each other. We highlight the efficiency of these multi-BS technologies which allow us to achieve significant performance enhancement compared to mono-BS (e.x. 125 times better performance with global SIC). Last but not least, we experimentally verify the the spectral interference model and network capacity on a cognitive radio testbed
Lucio, Silva Ludmilla. "Internet of Things : Pros and cons of CoAP protocol solution for small devices." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-27677.
Full textLindorin, Axel. "Säkerhet i smarta hem : En litteraturanalys på protokollsäkerhet för det smarta hemmet." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18940.
Full textThis study has examined the problems that arise in connection with the rapid development of the Internet of Things, where the low-energy units lack the power to implement advanced security solutions. Due to the low security and growing area of use, the Internet of Things units have become an attractive target for any attacks. The systematic literature analysis has been carried out by reviewing previously more detailed analyzes of the protocols and their security as well as the developers' specifications. This is to create a wide summary of the security of the protocols and then to compare the protocols to select one or more as the safer protocol for home use. All protocols that are included have some form of security implemented to provide authentication in the form of MAC, key management, integrity in the form of MIC and communication security with encryption. All protocols support AES-128 encryption and the use of IEEE 802.15.4 security suit as additional protection in addition to the protocol's own solutions. The majority of protocols also use Elleptic Curve to safely transport keys. The analysis concludes that Thread and Z-Wave are considered the two most secure home use protocols. It is based on how the protocols handle the various aspects with their noticeable prioritization of security along with the few deficiencies that can damage the smart home. Bluetooth Low Energy and EnOcean are thetwo less secure regarding an IoT environment. The survey also includes a discussion of various areas that emerged during the course of the investigation. Finally, some points that emerged during the review that may be good to consider when developing these protocols with security as focus.
Pielli, Chiara. "Channel Access in Wireless Networks: Protocol Design of Energy-Aware Schemes for the IoT and Analysis of Existing Technologies." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3427305.
Full textFin dalla comparsa delle prime reti wireless, la progettazione di strategie di accesso al canale è stata oggetto di intenso studio, in quanto il livello Medium Access Control (MAC) è responsabile di coordinare le trasmissioni su un canale condiviso e quindi svolge un ruolo fondamentale nelle prestazioni della rete intera. Originariamente la progettazione del livello MAC nelle reti wireless si proponeva di garantire un certo throughput, ma nel corso degli anni l’interesse si è spostato sulla latenza delle comunicazioni, assicurare un certo livello di Quality of Service (QoS), ottimizzare il consumo energetico, garantire efficienza spettrale, e qualsiasi combinazione di questi obiettivi. I meccanismi classici di accesso al canale, come ALOHA, TDMA e FDMA, sono stati introdotte da decenni; ciononostante, la continua evoluzione delle reti wireless e la comparsa di nuovi paradigmi di comunicazione ha richiesto lo sviluppo di nuove strategie per adattare e ottimizzare gli approcci standard così da soddisfare i requisiti di dispositivi e applicazioni. Questa tesi propone diversi schemi di accesso al canale per nuove tecnologie wireless, e in particolare per reti Internet of Things (IoT), per lo standard cellulare Long-Term Evolution (LTE), e lo standard IEEE802.11ad per comunicazione con mmWaves. La prima parte della tesi riguarda schemi di accesso al canale efficienti dal punto di vista energetico per reti IoT, che, di solito, comprendono molti sensori alimentati a batteria. In scenari con restrizioni energetiche i protocolli classici che non prendono in considerazione il consumo di potenza potrebbero portare alla morte prematura della rete e ad aspettative di prestazioni ottimistiche. Gli schemi proposti in questa tesi dimostrano l’importanza di caratterizzare tutte le fonti di consumo energetico (e di apporto energetico, nel caso di energy harvesting), che devono essere incluse nella progettazione del protocollo di comunicazione. In particolare, gli schemi proposti in questa tesi sfruttano tecniche di compressione ed elaborazione dati, le quali consentono di prolungare la vita della rete a discapito di una ridotta QoS. Abbiamo analizzato algoritmi di accesso sia basati sulla contesa del canale che non per diversi scenari e requisiti di applicazione. Mentre gli schemi proposti per le reti IoT non sono basati su tecnologie specifiche, la seconda parte della tesi riguarda gli standard LTE e IEEE802.11ad. Per quanto concerne LTE, lo studio proposto in questa tesi mostra come utilizzare tecniche di machine-learning per stimare il numero di utenti che collidono durante l’accesso al canale; quest’informazione è utilizzata per capire quando la rete è congestionata e migliorare il meccanismo di risoluzione delle collisioni. Questo è particolarmente utile per scenari di accesso massivo: negli utlimi anni, infatti, si è sviluppato un forte interesse verso l’utilizzo di LTE per Machine-Type Communication (MTC). Per quanto riguarda IEEE802.11ad, invece, lo standard prevede un MAC ibrido con allocazioni da predefinire con e senza contesa per l’accesso al canale, e un meccanismo di allocazione dinamica che viene fatta al di sopra dello schema già stabilito. Nonostante ci si aspetti che questo schema ibrido possa soddisfare requisiti eterogenei, non è ancora chiaro come scegliere le allocazioni da usare in base ai vari flussi di traffico e i loro requisiti. Perciò, è necessario un modello matematico per capire le prestazioni e i limiti che possono essere ottenuti con le varie tipologie di accesso al mezzo previste dallo standard e guidare la fase di allocazione delle risorse. In questa tesi, proponiamo un modello per le allocazioni basate sulla contesa del canale di comunicazione che tiene conto della presenza di altre allocazioni di tipo diverso.
Wen, Wen. "Energy Efficient Secure Key Management Schemes for WSNs and IoT." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35257.
Full textNgouakang, Ive Marcial. "Using the MQTT to implement an IoT infrastructure." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21039/.
Full textBen, Khalifa Abderrahman. "Medium access control layer for dedicated IoT networks." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI063.
Full textDedicated networks for the Internet of Things appeared with the promise of connecting thousands of nodes, or even more, to a single base station in a star topology. This new logic represents a fundamental change in the way of thinking about networks, after decades during which research work mainly focused on multi-hop networks. Internet of Things networks are characterized by long transmission range, wide geographic coverage, low energy consumption and low set-up costs. This made it necessary to adapt the protocols at different architectural layers in order to meet the needs of these networks. Several players compete in the Internet of Things market, each trying to establish the most efficient solution. These players are mostly focused on modifying the physical layer, on the hardware part or through proposing new modulations. However, with regard to the channel access control solution (known as the MAC protocol), all the solutions proposed by these players are based on classic approaches such as Aloha and CSMA. The objective of this thesis is to propose a dynamic MAC solution for networks dedicated to the Internet of Things. The proposed solution has the ability to adapt to network conditions. This solution is based on a machine learning algorithm that learns from network history in order to establish the relationship between network conditions, MAC layer parameters and network performance in terms of reliability and energy consumption. The solution also has the originality of making possible the coexistence of nodes using different MAC configurations within the same network. The results of simulations have shown that a MAC solution based on machine learning could take advantage of the good properties of different conventional MAC protocols. The results also show that a cognitive MAC solution always offers the best compromise between reliability and energy consumption, while taking into account the fairness between the nodes of the network. The cognitive MAC solution tested for high density networks has proven better scalability compared to conventional MAC protocols, which is another important advantage of our solution
Amaro, da Cruz Mauro. "An enhanced multi-protocol middleware solution for Internet of things." Thesis, Mulhouse, 2021. https://www.learning-center.uha.fr/.
Full textIn Internet of Things (IoT), data is handled and stored by software known as middleware (located on a server). The evolution of the IoT concept led to the construction of many IoT middleware, software that plays a key role since it supports the communication among devices, users, and applications. Several aspects can impact the performance of a middleware. Based in a deep review of the related literature and in the proposal of a Reference Model for IoT middleware, this thesis proposes a new IoT middleware, called In.IoT, a scalable, secure, and innovative middleware solution based on a deep review of the state of the art and following the reference middleware architecture that was proposed along with this research work. In.IoT addresses the middleware concerns of the most popular solutions (security, usability, and performance) that were evaluated, demonstrated, and validated along this study, and it is ready and available for use. In.IoT architectural recommendations and requirements are detailed and can be replicated by new and available solutions. It supports the most popular application-layer protocols (MQTT, CoAP, and HTTP). Its performance is evaluated in comparison with the most promising solutions available in the literature and the results obtained by the proposed solution are extremely promising. Furthermore, this thesis studies the impact of the underlying programming language in the solution's overall performance through a performance evaluation study that included Java, Python, and Javascript, identifying that globally, Java demonstrates to be the most robust choice for IoT middleware. IoT devices communicate with the middleware through an application layer protocol that may differ from those supported by the middleware, especially when it is considered that households will have various devices from different brands. The thesis offers an alternative for such cases, proposing an application layer gateway, called MiddleBridge. MiddleBridge translates CoAP, MQTT, DDS, and Websockets messages into HTTP (HTTP is supported by most IoT middleware). With MiddleBridge, devices can send a smaller message to an intermediary (MiddleBridge), which restructures it and forwards it to a middleware, reducing the time that a device spends transmitting. The proposed solutions were evaluated in comparison with other similar solutions available in the literature, considering the metrics related to packet size, response times, requests per second, and error percentage, demonstrating their better results and tremendous potential. Furthermore, the study used XGBoost (a machine learning technique) to detect the occurrence of replication attacks where an attacker obtains device credentials, using it to generate false data and disturb the IoT environment. The obtained results are extremely promising. Thus, it is concluded that the proposed approach contributes towards the state of the art of IoT middleware solutions
Cavaletti, Marco. "A Wireless Solution for Industrial IoT Using LoRa at 2.4 GHz." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textKheriji, Sabrine. "Design of an Energy-Aware Unequal Clustering Protocol based on Fuzzy Logic for Wireless Sensor Networks." Universitätsverlag Chemnitz, 2020. https://monarch.qucosa.de/id/qucosa%3A73303.
Full textDer Energieverbrauch ist ein Hauptanliegen in drahtlosen Sensornetzwerken (WSNs), was zu einer starken Nachfrage nach energiebewussten Kommunikationstechnologien führt. In diesem Zusammenhang wurden mehrere ungleiche clusterbasierte Routing-Protokolle vorgeschlagen. Allerdings verwenden nur die wenigsten energetische Analysemodelle für die Berechnung des optimalen Cluster-Radius, und mehrere Protokolle können keine optimale Auslastungsbalance zwischen Sensorknoten realisieren. In diesem Zusammenhang ist es das Ziel der Dissertation, ein clusterbasiertes Routing-Protokoll zur Verbesserung der Energieeffizienz im WSN zu entwickeln. Wir schlagen einen Fuzzy-basierten Energy-Aware Unequal Clustering-Algorithmus (FEAUC) mit zirkulärer Partitionierung vor, um den Energieverbrauch zwischen Sensorknoten auszugleichen und das durch eine Multi-Hop-Kommunikation entstehende Hotspot-Problem zu lösen. Der entwickelte FEAUC umfasst hauptsächlich vier Phasen: Eine Offline-Phase, eine Clusterbildungsphase, eine Kooperationsphase und eine Phase der Datensammlung. Während der Offline-Phase wird eine Energieanalyse durchgeführt, um den Radius jedes Ringes und den optimalen Cluster- Radius pro Ring zu berechnen. Die Clusterbildungsphase basiert auf einem Fuzzy-Logik-Ansatz für die Clusterkopf (CH)-Auswahl. Die Kooperationsphase zielt darauf ab, einen Zwischenknoten als einen Router zwischen verschiedenen CHs zu definieren. In der Datensammelphase wird die Übertragung von Datenpaketen von Sensorknoten zu ihren entsprechenden CHs als eine Intra-Cluster-Kommunikation definiert, während die Übertragung von Daten von einem CH zu einem anderen CH bis zum Erreichen der Basisstation als eine Inter-Cluster-Kommunikation definiert wird. Die Machbarkeit des entwickelten FEAUC wird durch die Ausarbeitung eines Vergleichs mit ausgewählten referenzierten ungleichen Clustering-Algorithmen unter Berücksichtigung verschiedener Parameter demonstriert, hauptsächlich des Energieverbrauchs, der Batterielebensdauer, der Zeit bis zum Abschalten des ersten Knotens (FND), der Zeit, in der die Hälfte der Knoten offline ist (HND) und der Zeit bis zum letzten Knoten stirbt (LND). Obwohl mit dem entwickelten FEAUC die Lebensdauer des Netzwerks erhöht warden soll, indem die große Last der CH-Aufgaben gleichmäßig auf die übrigen Knoten verteilt wird, stellt die Durchführung des Clustering-Prozesses in jeder Runde eine zusätzliche Belastung dar, die die verbleibende Energie erheblich entziehen kann. Aus diesem Grund wurde das auf FEAUC basierende Protokoll zu einem fehlerto-leranten Algorithmus (FEAUC-FT) weiterentwickelt. Er unterstützt die Fehlerto-leranz durch die Verwendung von Backup-CHs zur Vermeidung des Re-Clustering-Prozesses in bestimmten Runden oder durch den Aufbau weiterer Routing-Pfade im Falle eines Verbindungsausfalls zwischen verschiedenen CHs. Die Validierung des entwickelten FEAUC in realen Szenarien ist durchgeführt worden. Einige Sensorknoten, die mit Batterien betrieben werden, sind in einem kreisförmigen Bereich angeordnet und bilden Cluster. Leistungsbewertungen warden anhand realistischer Szenarien durchgeführt und für einen realen Einsatz unter Verwendung des drahtlosen Low-Power-Sensorknoten panStamp getestet. Zur Vervollständigung früherer Arbeiten wird als Schritt des Proof-of-Concept ein intelligentes Bewässerungssystem mit der Bezeichnung Air-IoT entworfen. Darüber hinaus wird eine IoT-basierte Echtzeit-Sensorknotenarchitektur zur Kontrolle derWassermenge in einigen eingesetzten Knoten eingeführt. Zu diesem Zweck wird ein mit der Cloud verbundenes drahtloses Netzwerk zur Überwachung der Bodenfeuchtigkeit und -temperatur gut konzipiert. Im Allgemeinen ist dieser Schritt unerlässlich, um den vorgeschlagenen ungleichen clusterbasierten Routing-Algorithmus in einem realen Demonstrator zu validieren und zu bewerten.Der vorgeschlagene Prototyp garantiert sowohl Echtzeit-Überwachung als auch zuverlässige und kostengünstige Übertragung zwischen jedem Knoten und der Basisstation.:1 Introduction 2 Theoretical background 3 State of the art of unequal cluster-based routing protocols 4 FEAUC: Fuzzy-based Energy-Aware Unequal Clustering 5 Experimental validation of the developed unequal clustering protocol 6 Real application to specific uses cases 7 Conclusions and future research directions
Fredriksson, Tony, and Niklas Ljungberg. "Security in low power wireless networks : Evaluating and mitigating routing attacks in a reactive, on demand ad-hoc routing protocol." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-145362.
Full textЖуравльов, Павло Володимирович. "Сервіс автоматизованого перенесення існуючих рішень для Інтернету речей на Thingspeak." Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26947.
Full textThe thesis contains 76 pages, 19 figures, 19 tables, 25 references. Relevance. The scope of the Thingspeak platform is limited by the need to use the HTTP protocol to interact with client devices. In recent years, alternative protocols have been developed for the Internet of things and devices on their base are becoming increasingly popular, due to the need to expand the Thingspeak platform to add support for these protocols and devices. Purpose. An analysis of approaches to extending the use of the Thingspeak platform, further enabling the use of existing solutions that implement the protocol but are not supported by the platform under consideration. The main task is to study the design of an intermediate application to interoperate devices that use the MQTT protocol with the Thingspeak platform. Results. As a result of the work, a system that transmits MQTT and HTTP protocols with an intermediate data conversion into a format that matches the Thingspeak data model was implemented. This implementation also includes the ability to set the rules for which the conversion is carried out. To manage the data conversion parameters, a web application with a graphical user interface was developed. The system is easy to deploy and can be used as a complement to existing technology with Thingspeak platform. Object of research. Internet of Things. Subject of research. Networking between Internet applications of things. Approaches to creating applications that perform the function of translating application level protocols. Research methods. In order to solve the problem in this work, methods of analysis, synthesis, system analysis, comparison and logical generalization of the results are used. Scientific novelty. The scientific novelty of the work consists in the analysis and implementation of methods that allow the conversion of the Thingspeak-compliant MQTT protocol to HTTP. Practical value. The developed application can be deployed on the existing university infrastructure. It includes a convenient interface for describing configurations and can be used to integrate existing applications supporting the MQTT protocol and the Thingspeak platform.
Общий объем работы 76 страниц, 19 иллюстраций, 19 таблицы, список литературы из 25 наименований. Актуальность темы. Область применения платформы Thingspeak ограничена необходимостью использования протокола HTTP для взаимодействия с клиентскими устройствами. В последние годы приобретают все большую популярность альтернативные протоколы, разработанные для интернета вещей и устройства на их базе, чем обусловлена необходимость расширения платформы Thingspeak для добавления поддержки данных протоколов и устройств. Цель и задачи исследования. Анализ подходов к расширению области использования платформы Thingspeak с последующим обеспечением возможности использования существующих решений, реализующих протокол, но не поддерживаются рассматриваемой платформой. Главной задачей является исследование, заключающееся в проектировании промежуточного приложения для обеспечения взаимодействия устройств, использующих протокол MQTT с платформой Thingspeak. Решение поставленных задач и достигнутые результатах В результате выполнения работы была реализована система, осуществляющая трансляцию протоколов MQTT и HTTP с промежуточной конвертацией данных в формат, соответствующий модели данных платформы Thingspeak. Данная реализация также включает возможность установки правил, по которым происходит конвертация. Для управления параметрами конвертации данных был разработан веб-приложение с графическим интерфейсом администратора. Система проста в развертывании и может быть использована как дополнение к развернутой платформе Thingspeak. Объект исследования. Интернет вещей. Предмет исследования. Сетевое взаимодействие между приложениями Интернета вещей. Подходы к созданию приложений, которые выполняют функцию трансляции протоколов прикладного уровня. Методи исследования. Для решения проблемы в данной работе используются методы анализа, синтеза, системного анализа, сравнения и логического обобщения результатов. Научная новизна. Научная новизна работы заключается в анализе и реализации методов, позволяющих конвертировать неподдерживаемый системой Thingspeak протокол MQTT в HTTP. Практическое значение полученных результатов Разработанное приложение может быть развернуто на кафедральной инфраструктуре. Оно включает в себя удобный интерфейс для описания конфигураций и может быть использован для интеграции существующих приложений с поддержкой протокола MQTT и кафедральной платформы Thingspeak.
Piccinini, Andrea. "Innovative Architecture for Industrial Monitoring System." Doctoral thesis, Università degli studi di Bergamo, 2019. http://hdl.handle.net/10446/128134.
Full textEriksson, Klas-Göran, and Andreas Peterson. "Solbil : Designundersökning av övervakningssystem och automatisk energiförbrukningsprognos för en solbil." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-34898.
Full textJönköping University Solar Team participated in the 2015 edition of World Solar Challenge, which is held every other year in Australia. Teams from all around the world participates in the competition in which they construct a solar car and competes in a 3000 km long race from Darwin to Adelaide. A solar car is an electric car equipped with solar panels to give it a theoretical infinite mileage as long as the car have access to solar energy. Jönköping University came in 15th place in this race and would like to improve their competitiveness in the next race. Because it is a competition and the goal for every team is to use their car as efficiently as possible a system to log and monitor the battery and present the information to the team was needed. It would also be good to have some kind of energy consumption forecast that would be used to decide the speed the solar car should keep. A system that collect, stores and transmits the information from the solar car to an escort vehicle was developed and evaluated. Thus, the pursues of this studies were: Improve Jönköping University Solar Teams competitiveness by provide a decision support which in real time monitor and log the solar car battery level and energy consumption. Design Science Research was used as a method to realize this purpose, which gave the opportunity to develop the system as an artifact and use this to present the result. Three different experiments were constructed to determine the functionality of the wireless communication, how accurate the system was and how well the energy consumption could be predicted. In the results the artifact is described as a whole and together with the experiments it is found that the system will give Jönköping University Solar Team a higher competitiveness in the next race.
Branger, Jakob. "Standardization perspectives of communication infrastructure of future homes : from automated home to sustainable, healthy and manufacturing home." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122134.
Full textMataj, Lukáš. "Aplikace pro ovládání inteligentní elektroinstalace iNELS pro platformu iOS." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236366.
Full textCentenaro, Marco. "On the Support of Massive Machine-to-Machine Traffic in Heterogeneous Networks and Fifth-Generation Cellular Networks." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3426783.
Full textLa diffusione capillare di molti servizi emergenti grazie all’Internet of Things (IoT) passa attraverso la capacità di fornire connettività senza fili a lungo raggio ad un numero massivo di cose, superando le note criticità delle reti ad hoc a corto raggio. Questa visione comporta grandi sfide, a partire dalle preoccupazioni riguardo l’efficienza delle rete di accesso fino alle minacce alla sicurezza delle reti IoT. In questa tesi, ci concentreremo sia sugli standard di comunicazione a lungo raggio per l’IoT sia sulla ricerca di base per le reti IoT. Dopo aver analizzato come vengono supportate le comunicazioni Machine-to-Machine (M2M) oggi, forniremo soluzioni innovative le quali i) soddisfano i requisiti in termini di scalabilità e latenza, ii) utilizzano una combinazione di bande di frequenza licenziate e libere e iii) assicurano efficienza energetica e sicurezza.
Sabel, Ida. "Internet of Things & Kommunikationsprotokoll." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-27246.
Full textBy studying different communication protocols respond to what it is that makes a certain protocol best suited for use between mobile devices and IoT devices. This study used a qualitative literature study to create a proper theoretical background and an experimental study where two theories were investigated in whether they matched wih the results from the reality. The five factors compatibility, battery loss, frequency, range and reliability were investigated in the communication protocols Bluetooth Low Energy (BLE), Near field communication (NFC) and Wi-Fi, these three because they are supported by newer mobile platforms today. The communication protocols were then analysed against various uses in the IoT, since the claim what it is that makes it best suited depends on what the situation requires. A system developer that is about to select the communication protocol to use in an IoT application and reads this study should compare the different protocols to each other within the five factors to determine which protocol is best suited for his situation. This study only performed experimental studies on BLE because of limitations in the equipment. Additional experiments on NFC and Wi-Fi would provide a wider perspective.
Lindén, Erik. "A latency comparison of IoT protocols in MES." Thesis, Linköpings universitet, Programvara och system, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-136904.
Full textLoncar, Loncar, and Ahmed Karic. "BATTERY SENSORY DATA COMPRESSION FOR ULTRANARROW BANDWIDTH IOT PROTOCOLS." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-39733.
Full textPolonelli, Tommaso <1990>. "Ultra-low power IoT applications: from transducers to wireless protocols." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amsdottorato.unibo.it/9604/1/Polonelli_Tommaso_tesi.pdf.
Full textAl-Janabi, Thair. "Design of energy efficient protocols-based optimisation algorithms for IoT networks." Thesis, Brunel University, 2018. http://bura.brunel.ac.uk/handle/2438/17121.
Full textRinaldini, Fabrizio. "Comunicazione tra dispositivi IoT e Cloud tramite protocollo MQTT." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13199/.
Full textRönnholm, Jesper. "Integration of OPC Unified Architecture with IIoT Communication Protocols in an Arrowhead Translator." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70347.
Full textChomyšyn, Maxim. "Dopad bezpečnosti IIoT na proaktivní údržbu firemních aktiv." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417807.
Full textSilva, Adriana Lucia Pastore e. "Estudo comparativo entre dois métodos de reabilitação fisioterapêutica na artroplastia total do joelho: protocolo padrão do IOT x protocolo avançado." Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/5/5140/tde-06022007-090101/.
Full textThe present study compares two physiotherapeutic rehabilitation protocols - one lasting three months (standard IOT protocol), the other lasting two months (advanced protocol) - to assert the actual need of a prolonged rehabilitation period in 31 cases of patients who went through total knee arthroplasty. The study is prospective and randomized; the age group of evaluated patients is between 60 and 76 years-old. In order to compare the two protocols, patients are evaluated before surgery and after treatment, by means of clinical evaluation (pain scale, Knee Society Score, SF-36 and goniometry) and isokinetic strength test. Statistical analyses of results from pain scale, Knee Society Score, movement amplitude, muscular torque peak and quality of life show improvement for all patients between pre- and post-operation, regardless of group. The study concludes the two months physiotherapeutic rehabilitation protocol for total knee arthroplasty is as effective as the three months protocol, as both reached the same goals and results
Alouache, Lylia. "Protocoles de Routage SDN, Multi-critères et Sécurisés Dans un Environnement IoV Collaboratif." Thesis, Cergy-Pontoise, 2019. http://www.theses.fr/2019CERG1041.
Full textNowadays, Big Data, Cloud Computing, and Internet of Things (IoT) have encouraged the generalization of the Vehicular Ad Hoc Networks (VANET) to the Internet of Vehicles (IoV), where vehicles evolve from passive actors of transportation to smart entities with new perception and communication capabilities. Vehicles become active members of a smart city, they provide an omnipresent connectivity, a wide range of applications and services relating to road safety, intelligent transport and the comfort of users. In addition, the large amount of data generated by IoV applications is a major challenge in their management, storage, and manipulation. These services depend greatly on the vehicles in question, which act as transmitters, relays, and receivers. Vehicles carry out their own communications but serve simultaneously as information relays for communication between other vehicles as well. Consequently, reliable dissemination process and connectivity are required. However, the dynamic nature of the IoV entities, the disturbances related to the mobile network as well as the security challenges lead to frequent link failure. In fact, some vehicles
Gebremichael, Teklay. "Lightweight Cryptographic Group Key Management Protocols for the Internet of Things." Licentiate thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-35607.
Full textVid tidpunkten för framläggningen av avhandlingen var följande delarbete opublicerat: delarbete 3 (manuskript).
At the time of the defence the following paper was unpublished: paper 3 (manuscript).
SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
To, Thanh Hai. "Protocoles à économie d'énergie pour l'Internet des Objets." Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALM034.
Full textIn this dissertation, we consider performance aspects of LoRa, one of the promisingtechnologies for lightweight smart sensors for the Internet of Things (IoT). LoRa belongs to a new class of Low Power Wide Area (LPWA) networks and defines a specificradio layer based on the Chirp Spread Spectrum modulation and a simple MediumAccess Control called LoRaWAN. The operation of LoRaWAN is similar to ALOHA: adevice wakes up and sends a packet to a Gateway right away. This choice of the accessmethod highly impacts the capacity of LoRa and its scalability to a large number ofdevices. It results in a high level of packet losses due to collisions as the number ofdevices increases.Motivated by these challenges, we have designed and implemented enhanced access methods to improve LoRa performance. First, we have taken advantage of CarrierSense Multiple Access (CSMA) to lower the collision ratio. We have used the NS-3 simulator to evaluate the scheme and the simulation results show that CSMA considerablylowers the collision ratio while only slightly increasing energy consumption. Second, wehave proposed Timemaps, a new access method for improving the performance of LoRa.The idea is to build a temporal map of all transmissions of IoT devices by a Gatewayand distribute the schedule during join. Schedules admit overlapping transmissions ofdifferent spreading factors and as devices usually allocate a spreading factor in functionof the increasing distance from the Gateway, transmissions will be in fact orthogonal,which leads to increased overall capacity of the network.We have used the NS-3 simulator to evaluate Timemaps in both cases of perfect clocks and clocks with a drift.The simulation takes into account quasi-orthogonality of transmissions with differentspreading factors and the capture effect. The results show that Timemaps benefitsfrom remarkably higher packet delivery ratio and considerably lower the collision ratiocompared to LoRaWAN along with moderately increased energy consumption.To validate both schemes we have developed an NS-3 module that simulates thefine-grain LoRa operation. The module uses an energy framework implemented in NS-3to estimate energy consumption at battery powered nodes and in the whole network
Sannervik, Filip, and Parth Magdum. "Security Assessment of IoT- Devices Grouped by Similar Attributes : Researching patterns in vulnerabilities of IoT- devices by grouping devices based on which protocols are running." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302147.
Full textSakernas internet eller Internet of things (IoT) är ett koncept som fått mycket uppmärksamhet. IoT enheter växer drastisk i popularitet, därför är det mer nödvändigt att skydda dessa enheter från attacker och säkerhetsbrister. Framtida utvecklare och användare av IoT system behöver då veta vilka enheter som är mer troliga att ha säkerhetsbrister. Denna studie har utforskat om det finns något samband mellan kombinationer av aktiva protokoll i enheter och säkerhetsbrister. Femton vanligt använda protokoll valdes som bas för studien, ett artificiellt neuralt nätverk användes sedan för att gruppera enheter baserat på dessa protokoll. Kända sårbarheter i enheterna räknades upp för varje grupp. En korrelation mellan kombinationer av protokoll och trolighet för sårbarheter hittades. Allvarlighetsgraden av säkerhetsbristerna i sårbara enheter analyserades också, men ingen korrelation hittades mellan grupperna.
Hala, Martin. "Ovladač a hardwarový modul protokolu MiWi pro Linux." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-235422.
Full textBondi, Davide. "Protocollo LoRaWAN e IoT: interfacciamento con Java e sperimentazione su comunicazioni indoor." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018.
Find full textFayad, Achraf. "Protocole d’authentification sécurisé pour les objets connectés." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT051.
Full textThe interconnection of private resources on public infrastructure, user mobility and the emergence of new technologies (vehicular networks, sensor networks, Internet of things, etc.) have added new requirements in terms of security on the server side as well as the client side. Examples include the processing time, mutual authentication, client participation in the choice of security settings and protection against traffic analysis. Internet of Things (IoT) is in widespread use and its applications cover many aspects of today's life, which results in a huge and continuously increasing number of objects distributed everywhere.Security is no doubt the element that will improve and strengthen the acceptability of IoT, especially that this large scale deployment of IoT systems will attract the appetite of the attackers. The current cyber-attacks that are operational on traditional networks will be projected towards the Internet of Things. Security is so critical in this context given the underlying stakes; in particular, authentication has a critical importance given the impact of the presence of malicious node within the IoT systems and the harm they can cause to the overall system. The research works in this thesis aim to advance the literature on IoT authentication by proposing three authentication schemes that satisfy the needs of IoT systems in terms of security and performance, while taking into consideration the practical deployment-related concerns. One-Time Password (OTP) is an authentication scheme that represents a promising solution for IoT and smart cities environments. This research work extends the OTP principle and propose a new approach to generate OTP based on Elliptic Curve Cryptography (ECC) and Isogeny to guarantee the security of such protocol. The performance results obtained demonstrate the efficiency and effectiveness of our approach in terms of security and performance.We also rely on blockchains in order to propose two authentication solutions: first, a simple and lightweight blockchain-based authentication scheme for IoT systems based on Ethereum, and second, an adaptive blockchain-based authentication and authorization approach for IoT use cases. We provided a real implementation of our proposed solutions. The extensive evaluation provided, clearly shows the ability of our schemes to meet the different security requirements with a lightweight cost in terms of performance
Melder, Indrek. "Sputum induction literature review and proposal for a protocol." [Tampa, Fla.] : University of South Florida, 2005. http://purl.fcla.edu/fcla/etd/SFE0001290.
Full textCavallero, Sara. "Medium Access Control Protocols for Terahertz Communication." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Find full textNanukuttan, Sreejith V. "Development of a new test protocol for the permit ion migration test." Thesis, Queen's University Belfast, 2007. https://pure.qub.ac.uk/portal/en/theses/development-of-a-new-test-protocol-for-the-permit-ion-migration-test(1c6008d6-3dba-4249-8a11-08e6a61fd295).html.
Full text