Dissertations / Theses on the topic 'Medical Internet of Things'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Medical Internet of Things.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Poggi, Giovanni. "Internet of Medical Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textChisanga, Fredrick. "Medical application of the Internet of Things (IoT): prototyping a telemonitoring system." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/27940.
Full textSayeed, Md Abu. "Epileptic Seizure Detection and Control in the Internet of Medical Things (IoMT) Framework." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1703334/.
Full textUrbini, Elia. "Sviluppo di sistemi interoperabili nell’ambito di internet of medical things basati su standard fhir: un caso di studio." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24307/.
Full textSundaravadivel, Prabha. "Application-Specific Things Architectures for IoT-Based Smart Healthcare Solutions." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157532/.
Full textNan, Yucen. "High-Credibility Edge Analytic System for Early Medical Intervention." Thesis, The University of Sydney, 2022. https://hdl.handle.net/2123/27309.
Full textMaioli, Edoardo. "Internet of Medical Things e Sviluppo di Sistemi Interoperabili basati su Standard FHIR: Un caso di studio basato sull'integrazione di un Dispositivo EGA." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24306/.
Full textЧеботарьова, Д. В., and Я. В. Юр’єв. "Бездротова мережа як засіб зв’язку для пристоїв медичного інтернету речей." Thesis, ФОП Петров В. В, 2021. https://openarchive.nure.ua/handle/document/18671.
Full textDellgren, Emelie. "A case study on how the Apple Watch can benefit medical heart research." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211493.
Full textWu, Longfei. "Designing Effective Security and Privacy Schemes for Wireless Mobile Devices." Diss., Temple University Libraries, 2017. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/469736.
Full textPh.D.
The growing ubiquity of modern wireless and mobile electronic devices has brought our daily lives with more convenience and fun. Today's smartphones are equipped with a variety of sensors and wireless communication technologies, which can support not only the basic functions like phone call and web browsing, but also advanced functions like mobile pay, biometric security, fitness monitoring, etc. Internet-of-Things (IoT) is another category of popular wireless devices that are networked to collect and exchange data. For example, the smart appliances are increasingly deployed to serve in home and office environments, such as smart thermostat, smart bulb, and smart meter. Additionally, implantable medical devices (IMD) is the typical type of modern wireless devices that are implanted within human body for diagnostic, monitoring, and therapeutic purposes. However, these modern wireless and mobile devices are not well protected compared with traditional personal computers (PCs), due to the intrinsic limitations in computation power, battery capacity, etc. In this dissertation, we first present the security and privacy vulnerabilities we discovered. Then, we present our designs to address these issues and enhance the security of smartphones, IoT devices, and IMDs. For smartphone security, we investigate the mobile phishing attacks, mobile clickjacking attacks and mobile camera-based attacks. Phishing attacks aim to steal private information such as credentials. We propose a novel anti-phishing scheme MobiFish, which can detect both phishing webpages and phishing applications (apps). The key idea is to check the consistency between the claimed identity and the actual identity of a webpage/app. The claimed identity can be extracted from the screenshot of login user interface (UI) using the optical character recognition (OCR) technique, while the actual identity is indicated by the secondary-level domain name of the Uniform Resource Locator (URL) to which the credentials are submitted. Clickjacking attacks intend to hijack user inputs and re-route them to other UIs that are not supposed to receive them. To defend such attacks, a lightweight and independent detection service is integrated into the Android operating system. Our solution requires no user or app developer effort, and is compatible with existing commercial apps. Camera-based attacks on smartphone can secretly capture photos or videos without the phone user's knowledge. One advanced attack we discovered records the user's eye movements when entering passwords. We found that it is possible to recover simple passwords from the video containing user eye movements. Next, we propose an out-of-band two-factor authentication scheme for indoor IoT devices (e.g., smart appliances) based on the Blockchain infrastructure. Since smart home environment consists of multiple IoT devices that may share their sensed data to better serve the user, when one IoT device is being accessed, our design utilizes another device to conduct a secondary authentication over an out-of-band channel (light, acoustic, etc.), to detect if the access requestor is a malicious external device. Unlike smartphones and IoT devices, IMDs have the most limited computation and battery resources. We devise a novel smartphone-assisted access control scheme in which the patient's smartphone is used to delegate the heavy computations for authentication and authorization. The communications between the smartphone and the IMD programmer are conducted through an audio cable, which can resist the wireless eavesdropping and other active attacks.
Temple University--Theses
Lu, Andy. "Forensic analysis on wireless medical devices." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2541.
Full textOlokodana, Ibrahim Latunde. "Kriging Methods to Exploit Spatial Correlations of EEG Signals for Fast and Accurate Seizure Detection in the IoMT." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1707311/.
Full textJagtap, Vinayak. "Cyber Physical System for Continuous Evaluation of Fall Risks to Enable Aging-In-Place." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-theses/508.
Full textIngabire, Paula. "Convergence of eco-system technologies : potential for hybrid electronic health record (EHR) systems combining distributed ledgers and the Internet of Medical Things towards delivering value-based Healthcare." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118548.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 64-66).
The Healthcare industry, just like any industry, is constantly racing to stay abreast with pace of technological innovations, especially at such a time where the industry is experiencing a strain on the global healthcare infrastructure. Specifically, the evolution of record management systems in the healthcare system has taken a slow and gradual transformation with each stage of transformation carrying over certain aspects and functions of previous stages. A survey of record management practices reveals that record management begun with paper-based records that have since partially been replaced with centralized Electronic Health Records (EHR). With the advent of Electronic Health Records enabled by distributed ledgers, we continue to see the inclusion of traditional paper-based functions beyond centralized EHR functions. Electronic data sharing in the healthcare ecosystem is constrained by interoperability challenges with different providers choosing to implement systems that respond to increasing their productivity. Prioritizing a patient-focused strategy during implementation of EHRs forces providers to implement systems that are more interoperable. A system engineering approach was adopted to guide the development and valuation of candidate architectures from Stakeholder analysis to concept generation and enumeration. Nine (9) key design decisions were selected with their combinations yielding 512 feasible hybrid architectures. In this paper, we proposed a hybrid EHR solution combining distributed ledger technologies and Internet of Medical Things, which contributes towards providing value-based healthcare. Leveraging properties of distributed ledgers and IoMT, the hybrid solution interconnects various data sources for health records to provide real-time record creation and monitoring whilst enabling data sharing and management in a secure manner.
by Paula Ingabire.
S.M. in Engineering and Management
Olsson, Joel, and Junior Asante. "Using Node-Red to Connect Patient, Staff and Medical Equipment." Thesis, Linköpings universitet, Institutionen för systemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-129781.
Full textJönsson, Mattias. "TempScanner : An application to detect fever." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-40768.
Full textPiškula, David. "Internet of Things." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399196.
Full textVitale, Clemente. "Internet of Things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3184/.
Full textCarlsson, Simon, and Max Näf. "Internet of Things Hacking." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239366.
Full textРевуцький, Микола Вячеславович. "Internet of Things: What about the Security of Things?" Thesis, Київський національний університет технологій та дизайну, 2017. https://er.knutd.edu.ua/handle/123456789/7329.
Full textSong, Yuanjun. "Security in Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142451.
Full textCobârzan, Cosmin. "Internet of highly mobile things." Thesis, Strasbourg, 2015. http://www.theses.fr/2015STRAD037/document.
Full textMobility is becoming an integrating part of todays Internet of Things, as many applications such as wildlife monitoring or target tracking in the battlefield cannot be done only with the help of static nodes. The goal of this thesis is to provide new communication architecture articulated around providing mobility support in Low Power and Lossy Networks (LLNs). First we analyzed from a theoretical point of view the IPv6 address auto-configuration with all optimizations made in Neighbor Discovery Optimization for IPv6 over 6LoWPAN. This step is of crucial importance for protocols that offer mobility support in IP networks, such as MIPv6. Our findings, increased message size that leads to fragmentation and high energy consumption for routers that are involved in Neighbor Discovery message exchange, have lead us to use the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) in order to provide mobility support. RPL is build from ground up with respect to LLN requirements. Our second contribution enhanced RPL operations to support mobility management. Finally, we proposed a cross-layer protocol – Mobility Triggered-RPL – that leverages actions from the X-Machiavel preamble sampling MAC protocol into RPL
Sabel, Ida. "Internet of Things & Kommunikationsprotokoll." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-27246.
Full textBy studying different communication protocols respond to what it is that makes a certain protocol best suited for use between mobile devices and IoT devices. This study used a qualitative literature study to create a proper theoretical background and an experimental study where two theories were investigated in whether they matched wih the results from the reality. The five factors compatibility, battery loss, frequency, range and reliability were investigated in the communication protocols Bluetooth Low Energy (BLE), Near field communication (NFC) and Wi-Fi, these three because they are supported by newer mobile platforms today. The communication protocols were then analysed against various uses in the IoT, since the claim what it is that makes it best suited depends on what the situation requires. A system developer that is about to select the communication protocol to use in an IoT application and reads this study should compare the different protocols to each other within the five factors to determine which protocol is best suited for his situation. This study only performed experimental studies on BLE because of limitations in the equipment. Additional experiments on NFC and Wi-Fi would provide a wider perspective.
Söderberg, Karl Jakob Emanuel. "INTERNET OF THINGS : Smart välfärdsteknologi." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15793.
Full textNorburg, David, and David Persson. "Internet of Things - Ett användarperspektiv." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37712.
Full textКрамаренко, Є. С. "Iнтелектуальна мережа Internet of Things." Master's thesis, Сумський державний університет, 2019. http://essuir.sumdu.edu.ua/handle/123456789/76473.
Full textSokolenko. "INTERNET OF THINGS IN UKRAINE." Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33909.
Full textOkumura, Brandon M. "IoTA: Internet of Things Assistant." DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1769.
Full textHrnjez, Tatjana. "Internet of Things på Teknikprogrammet." Thesis, Malmö högskola, Fakulteten för lärande och samhälle (LS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-27618.
Full textNazim, Umair. "Securing Internet of Things (IoT)." Thesis, The University of Sydney, 2018. http://hdl.handle.net/2123/20275.
Full textBorrillo, Mattia. "Internet of things e integrazione nel web: Web of things." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/9229/.
Full textBarretta, Salvatore. "UAV based Narrowband - Internet of things." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22761/.
Full textVargas, Vargas Fernando. "Cloudlet for the Internet-of- Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191433.
Full textMed en befolkning som ökar i urbana områden, står många av världens städer inför utmaningar som ökande avgaser och trafikstockning. I ett försök att tackla sådana utmaningar, formulerar regeringar och stadsfullmäktige nya och innovativa strategier. Integrationen av ICT med dessa strategier bildar konceptet smart cities. Internet of Things (IoT) är en drivande faktor för smart city initiativ, vilket gör det nödvändigt för en IT infrastruktur som kan ta till vara på de många fördelar som IoT bidrar med. Cloudlet är en ny infrastrukturell modell som erbjuder datormolnskompetens i mobilnätverkets edge. Denna miljö karakteriseras av låg latens och hög bandbredd, utgörande ett nytt ekosystem där nätverksoperatörer kan hålla deras nätverks-edge öppet för utomstående, vilket tillåter att flexibelt och snabbt utveckla innovativa applikationer och tjänster för mobila subskribenter. I denna avhandling presenterar vi en cloudlet-arkitektur som framhäver edge computing, för att förse en plattform för IoT utrustning där många smart city applikationer kan utvecklas. Vi förser er först med en överblick av existerande utmaningar och krav i IoT systemutveckling. Sedan analyserar vi existerande cloudlet lösningar. Slutligen presenteras vår cloudlet arkitektur för IoT, inklusive design och en prototyplösning. För vår cloudlet-prototyp har vi fokuserat på en modell av mikroskala för att räkna ut CO2 emissioner per enskild resa med fordon, och implementerat en funktion som tillåter oss att läsa CO2 data från CO2 sensorer. Platsdata är inhämtad med hjälp av en Android smartphone och behandlas i cloudlet. Det hela sammanfattas med en prestandaevaluering.
Cooper, Ke'ahi. "Security for the Internet of Things." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172526.
Full textVerma, Yukti. "Secure system simulation - Internet of Things." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10116148.
Full textInternet of Things (IoT) can be defined as a collection of smart devices interacting with each other unanimously to fulfill a common goal. The real world data collected from the Internet of Things can be made as an integral part of web known as Web of Things (WoT). With the help of Web of Things architecture, the users can leverage simple web mechanisms such as browsing, searching and caching to interact with the smart devices. This thesis aims to create an entire system simulating the Web of Things architecture including sensors, edge routers, web interfaces, endpoints to the IoT network and access control. Several technologies such as CoAP, 6LoWPAN, IEEE 802.15.4, contiki and DTLS have been evaluated before inclusion in the implementation. A complete web portal utilizing Californium framework and Role Based Access Control has been created for accessing and interacting with the sensors and their data. This thesis provides an end-to-end approach towards IoT device security by implementing Constrained Application Protocol (CoAP) over Datagram Transport Layer Security (DTLS) in the system. The performance of secured system is analyzed in a constrained environment based on which it is observed that DLTS implementation increases the RAM usage, code size, packet overhead and power consumption by a significant value. Finally, the future work that needs to considered in order to iterate towards better security is specified.
Söderström, Rasmus, and Martin Westman. "Internet of Things : The smart home." Thesis, Uppsala universitet, Institutionen för teknikvetenskaper, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353389.
Full textValkama, S. (Santeri). "Lämpötilaa mittaava Internet of Things -rele." Bachelor's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201609012678.
Full textThe purpose of this bachelor’s work is to present and prove functionality of a basic Internet of Things unit built on the Digistump Oak -development board capable of connections through internet and equipped with a relay and a temperature sensor. A couple of ways to prove the functionality of web requests are also presented. In addition, a few Internet of Things -applicable software were reviewed regarding suitability in this work
Ahlqvist, Niklas, Jonas Jungåker, and Agnes Perrin. "Internet of things and automated farming." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264453.
Full textSyftet med detta projekt är att göra det lättare att odla växter inhemskt året runt. Målet är att konstruera ett fjärrstyrbart och miljöoberoende automatiskt hydroponiskt system. Detta ska minimera ansträngningarna från användaren för att underhålla växter i icke-inhemska klimat. Ett hydroponiskt odlingssystem använder vatten som tillväxtmedium istället för jord. Tekniken har fördelar jämfört med konventionell odling vilket gör hydroponi mer miljövänligt. Hydroponiska system påverkas av flera faktorer, men detta projekt fokuserar bara på att kontrollera ljusintensiteten genom att isolera ljuset inom systemet samt att reglera näringsämne-koncentrationen genom att mäta den elektriska ledningsförmågan i vattnet. Systemet använder en mikrokontroll för analys och kontroll. Resultaten är lovande och visar att systemet fungerar. Däremot har begränsningarna i tid lett till en kort testperiod, därför är data som samlas in begränsad. Diskussionen baserad på resultaten drar slutsatsen att systemet inte kan anses vara helt automatiskt men reducerar behovet av manuell arbetskraft.
Santos, Vasco Alexandre Maia dos. "Secure decentralized internet of things infrastructure." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/18396.
Full textDespite many IoT Infrastructures having been implemented in recent years, none of them is truly prepared for a global deployment, where failure tolerance and scalability are an essential requirement. This dissertation presents an alternative concept for IoT Infrastructures, which focuses on enhancing the traditional centralized architecture, usually operated by a single entity, into a decentralized architecture featuring multiple entities and use cases. We propose a dynamic, community driven and self-configurable infrastructure on top of a structured Peer-to-Peer network, based on a Distributed Hash Table. Moreover, the proposed infrastructure is flexible enough to allow each peer of the overlay to enable a set of different services, according to its capabilities. In addition, a set of communication protocols is provided in order to support heterogeneous devices, as well as data access, streaming and persistence. It is also an important focus of our proposal to have mechanisms that guarantee the privacy and security of the information flow and storage.
Apesar de várias infraestruturas para IoT terem sido implementadas nos últimos anos, nenhuma delas está realmente preparada para ser utilizada a uma escala global, onde a escalabilidade e a tolerância a falhas são um requisito essencial. Esta dissertação apresenta um conceito alternativo de infraestruturas para a IoT, cujo foco consiste em evoluir a tradicional arquitetura centralizada, normalmente utilizada por uma entidade única, para uma arquitetura descentralizada, compatível com múltiplas entidades e casos de uso. Propomos uma infraestrutura auto-configurável, dinâmica e orientada à comunidade, construída em cima de uma rede Peer-to-Peer estruturada, baseada numa Distributed Hash Table. Além disso, a infraestrutura proposta é suficientemente flexível para permitir que cada peer da rede possa ativar diferentes serviços, mediante as suas capacidades. Por outro lado, um conjunto de protocolos de comunicação é providenciado, de modo a suportar dispositivos heterogéneos, bem como o acesso aos dados e a sua transmissão e persistência. Também é um foco importante desta proposta a disponibilização de mecanismos que garantam a privacidade e segurança da informação durante a sua transmissão e o seu armazenamento.
Elahi, Faizan Ehsan. "CONCURRENT INTERNET OF THINGS PROTOCOL STACKS." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-397010.
Full textCorrêa, Volpini Bruna. "Development of an Ambient Intelligence Environment to improve Patient Safety in Critical Care." Doctoral thesis, Universitat de Barcelona, 2021. http://hdl.handle.net/10803/673228.
Full textA finales de la década de 1990, cuando las computadoras personales y los dispositivos electrónicos se producían en masa, el concepto de inteligencia en el entorno (AmI – Ambient Intelligence en inglés) surgió. Un entorno que contiene AmI es un espacio con objetos que incluyen tecnologías, invisibles para los usuarios, y que les generan respuestas inteligentes cuando sea necesario. Actualmente, los profesionales sanitarios están trabajando dentro de un sistema complejo adaptativo en el que el entorno clínico y el estado de salud del paciente varían dinámicamente. Esto es especialmente importante en las Unidades de Cuidados Intensivos (UCIs), donde hay pacientes gravemente enfermos que necesitan infraestructuras y equipos avanzados para recibir monitorización de la forma más segura posible. En este contexto, el objetivo principal del trabajo que presento en esta tesis es desarrollar un entorno AmI para mejorar la eficiencia en los procesos relacionados con la seguridad del paciente en las UCIs. He elaborado esta tesis con la colaboración del equipo de la UCI inteligente del Hospital Clínic de Barcelona (HCB). El desarrollo de esta tesis se ha dividido en tres fases. En primer lugar, he diseñado, construido y probado un prototipo para simular el entorno AmI en un escenario de laboratorio considerando los principales problemas de seguridad clínica que ocurren en las UCIs. En segundo lugar, este prototipo ha sido adaptado e implementado en una UCI inteligente del HCB. En tercer lugar, he recogido y analizado los datos generados por el entorno inteligente. En conclusión, mi tesis evalúa la eficiencia del uso de nuevas tecnologías para mejorar los procesos de seguridad clínica en cuidados críticos, mejora los estándares clínicos y educativos sobre los procesos de seguridad del paciente en esta unidad y, finalmente, permite cuantificar los eventos relacionados con la seguridad clínica, así como ganar más conciencia sobre ellos.
Hamzic, Almira, and Isabel Olofsson. "DNS and the Internet of Things : Outlining the challenges faced by DNS in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202591.
Full textDetta examensarbete består av en litteraturstudie där olika aspekter av DNS (Domännamnssystemet, eng. Domain Name System) och Sakernas Internet (eng. Internet of Things) har studerats. En fungerande namngivnings-och serviceidentifieringsmetod är en viktig del för att kunna göra Sakernas Internet globalt, och DNS är den nuvarande metoden för att namnge enheter på Internet. Studien undersöker vissa utmaningar som DNS kan stöta på, nämligen funktionalitet, tillgänglighet och säkerhet. Rapportens slutsats är att en lösning baserad på multisändnings-DNS (eng. multicast DNS, mDNS) som är anpassad för begränsade nätverk (eng. constrained networks) är fördelaktig. Detta trots den begränsade säkerhet som finns tillgänglig just nu för en sådan lösning. I framtiden är det viktigt att säkerheten har högsta prioritet, eftersom säkerheten är begränsad hos DNS. Det behövs ytterligare studier när det gäller tillgänglighet och hur adressöversättning skulle fungera med begänsade enheter (eng. constrained devices) som använder viloläge.
Camacho, Andersson Emil, and Jonathan Karlsson. "Effekter av Internet of Things : Scenariobaserad studie som beskriver inledande effekter av Internet of Things i en verksamhet." Thesis, Högskolan Dalarna, Informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:du-22582.
Full textThe term "Internet of Things" refers to when an object from the real world becomes a part of the internet. Tunabyggen in Borlänge plans to implement an information system that will monitor temperature and humidity in selected facilities using a constant internet connection and different sensors. It is a simple system that doesn't seem to have a major impact on the current operations. The economic effects is often possible to calculate in advance, but the impact on staff, environment and routines may be forgotten. We have with this thesis examined the initial effects that may occur after the implementation of a new information system with Internet of Things functionality in a business, within the categories of economy, working environment, environmental impact and system management. To answer this we made a case study which is based on a scenario methodology that consists of four phases. Phase 1, where we got our case and created an understanding of the scenario field. Phase 2, identifying the key factors. It has been done through a literature study and interviews with relevant staff on Tunabyggen. Phase 3, where the analysis of these key factors were made through the situation and future analysis. Phase 4, where we generate scenarios of the analyzed key factors. Finally we have done a SWOT analysis to highlight the strengths, weaknesses, opportunities and threats. The results clearly show signs that there will be many effects for Tunabyggen after the implementation of the new information system, which manifests itself in all categories. The conclusion is that even the implementation of a menial information system like this one, the impacts are many. This is something that we believe should be considered by all companies that are thinking of acquiring a new system so they do not only evaluate IT-systems in economic terms, but also other factors that play a crucial role for the implementation of an information system to be successful.
Forsby, Filip. "Digital Certificates for the Internet of Things." Thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217120.
Full textDenna avhandling undersöker möjligheten att utveckla lättviktslösning förinbyggda system med begränsade resurser i 6LoWPAN-nätverk. Eneheter isådanna system drivs på batteri och återvunnen energi från omgivningen därminimal energi- och minnesanvänding är avgörande. Nuvarande lösningar fördigitala certifikat anses vara mer krävande än önskvärt och det är därför ettproblem som behöver lösas.Lösningen som presenteras i denna avhandling är en profil för certifikatstan-darden X.509 för användning med begränsade enheter inom Internet of Things(IoT). Utöver det är en komprimeringsmekanism designad och implementeradför certifikat som följer denna X.509-profil.Resultat visar att det är högst genomförbart att komprimera certifikat,trots den ökade komoplexiteten det medför.Denna nya lösning för digitala certifikat tillåter resursbegränsade enheteratt köras längre utan att behöva avbrytas eller underhållas.
Reetz, Eike S. "Service testing for the 'Internet of Things'." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/810848/.
Full textIqbal, Muhammad Azhar. "Internet of Things (IoT) Industry Gateway Modelling." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28691.
Full textKroon, Cathering, and Louise Myllylä. "Internet of Things - En studie med användarperspektiv." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-48838.
Full textSitenkov, Denis. "Access Control in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177205.
Full textZaitov, Alisher. "Internet of things for monitoring grazing animals." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-196213.
Full textSvenska lantbruksndustrin är väl känt för sin rättvisa djurhantering och ekoloiska metoder, den höga standared kommer till en priset av hårda stränga regler. Lagar infördes för att hålla en låg användningsnivå av antibiotika och giftiga ämnen bland jordbruksindustrin. Vilket sätter jordbrukare under press och kräver dem att hålla ett extra gott öga på sina djur för att undvika sjukdom och skador på sina djur. Detta examensarbete fokuserar på att undersöka möjligheten att hålla låg användning av antibiotika men bibehålla den höga standarder genom att införa ny teknik som kan hjälpa bonden att övervaka sina djur och hålla dem friska. Målet med denna examensarbete är att utveckla en system prototyp som övervakar betande djur och hjälper bonden att upptäcka skador och sjukdomar i ett tidigare skede. För att systemet ska vara lönsamt och användbart för jordbrukaren behöver den hålla en låg strömförbrukning och komma till ett överkomligt pris. Den genomförda systemlösningen bygger på ett trådlöst sensornätverk som samlar in data om esitmerad position av djuret i betesmarken, interaktionsmönster och omgivnings sensordata av miljön. Prototypen testas med simuleringar, tester i labmiljö samt fälttester med kor på en gård i norra Sverige. Arbetet avslutas med utvärderingar av prototypen baserat på systemkrav, skalbarhet och kostnad.
Ben, Saied Yosra. "Collaborative security for the internet of things." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00879790.
Full text