Dissertations / Theses on the topic 'Privacy for smart buildings'

To see the other types of publications on this topic, follow the link: Privacy for smart buildings.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Privacy for smart buildings.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Shirima, Emil. "Privacy Aware Smart Surveillance." Kent State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=kent1563281303729063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Batistic, Kristina. "Privacy in Smart Parking." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-272998.

Full text
Abstract:
The master thesis project will analyze the smart parking solution used in Frederiksberg municipality, focusing on privacy aspects in different data use cases. The current use case will be analyzed with the focus on its privacy aspects. Frederiksberg municipality is using a camera mounted on a car that records parked cars to check whether parking fee has been paid or not. The system recognizes the license plate out of the picture and checks in the system whether the parking for that license plate has been paid or not if it has not been paid it notifies the parking guard to go to the parked car and hand out a parking ticket. Since the license plate is considered personal data, this system has to follow the legal and other obligations for the handling of personal data, i.e., the new European General Data Protection Regulation. Frederiksberg municipality is also considering using data for secondary purposes, such as parking statistics, input for future regulation, analysis to improve the parking system or even making the data public. This thesis will analyze possible secondary use cases and their privacy impacts and recomn measures. The goal is to protect citizens privacy while providing with the best possible service.
Examensarbetet kommer att analysera den smarta parkeringslösningen som används i Frederiksbergs kommun med fokus på sekretessaspekter i olika fall för dataanvändning. Det aktuella användningsfallet kommer att analyseras med fokus på dess integritetsaspekter. Frederiksberg kommun använder en kamera monterad på en bil som registrerar parkerade bilar för att kontrollera om parkeringsavgiften har betalats eller inte. Systemet känner igen registreringsskylten ur bilden och kontrollerar i systemet om parkeringen för den typskylten har betalats eller inte om den inte har betalats, meddelar parkeringsvakten att gå till den parkerade bilen och dela ut en parkeringsbiljett. Eftersom licensskylten betraktas som personuppgifter måste detta system följa de lagliga och andra skyldigheterna för hantering av personuppgifter, dvs. den nya förordningen om europeisk allmän dataskydd. Frederiksberg kommun överväger också att använda data för sekundära ändamål, som parkeringsstatistik, input för framtida reglering, analys för att förbättra parkeringssystemet eller till och med offentliggöra uppgifterna. Denna avhandling kommer att analysera eventuella fall av sekundär användning och deras inverkan på sekretess och rekommendera skyddsåtgärder. Målet skydda medborgarnas integritet samtidigt som de ger bästa möjliga service.
APA, Harvard, Vancouver, ISO, and other styles
3

Falcey, Jonathan M. "Electricity Markets, Smart Grids and Smart Buildings." Thesis, University of Denver, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1536975.

Full text
Abstract:

A smart grid is an electricity network that accommodates two-way power flows, and utilizes two-way communications and increased measurement, in order to provide more information to customers and aid in the development of a more efficient electricity market. The current electrical network is outdated and has many shortcomings relating to power flows, inefficient electricity markets, generation/supply balance, a lack of information for the consumer and insufficient consumer interaction with electricity markets. Many of these challenges can be addressed with a smart grid, but there remain significant barriers to the implementation of a smart grid.

This paper proposes a novel method for the development of a smart grid utilizing a bottom up approach (starting with smart buildings/campuses) with the goal of providing the framework and infrastructure necessary for a smart grid instead of the more traditional approach (installing many smart meters and hoping a smart grid emerges). This novel approach involves combining deterministic and statistical methods in order to accurately estimate building electricity use down to the device level. It provides model users with a cheaper alternative to energy audits and extensive sensor networks (the current methods of quantifying electrical use at this level) which increases their ability to modify energy consumption and respond to price signals

The results of this method are promising, but they are still preliminary. As a result, there is still room for improvement. On days when there were no missing or inaccurate data, this approach has R2 of about 0.84, sometimes as high as 0.94 when compared to measured results. However, there were many days where missing data brought overall accuracy down significantly. In addition, the development and implementation of the calibration process is still underway and some functional additions must be made in order to maximize accuracy. The calibration process must be completed before a reliable accuracy can be determined.

While this work shows that a combination of a deterministic and statistical methods can accurately forecast building energy usage, the ability to produce accurate results is heavily dependent upon software availability, accurate data and the proper calibration of the model. Creating the software required for a smart building model is time consuming and expensive. Bad or missing data have significant negative impacts on the accuracy of the results and can be caused by a hodgepodge of equipment and communication protocols. Proper calibration of the model is essential to ensure that the device level estimations are sufficiently accurate. Any building model which is to be successful at creating a smart building must be able to overcome these challenges.

APA, Harvard, Vancouver, ISO, and other styles
4

Mao, Congcong. "Privacy Issues in IoT : Privacy concerns in smart home." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-90587.

Full text
Abstract:
In a world of the Internet of Things, smart home has shown a great potency and trend. A smart home is a convenient home setup where appliances and devices can be automatically controlled remotely from any internet-connected place in the world using a mobile or other networked device. Smart home has changed the way the residents interacted with their home and realised more convenience. Although this technology also has positive impact on saving energy and resources, privacy issues in it have shown to one of the biggest obstacles to the adaption of this technology. The purpose of this thesis is to study smart home users’ perceptions of smart homes and their privacy awareness and concerns. The research was conducted through interviews and followed an interpretive research paradigm and a qualitative research approach. In this study, 5 smart home owners were interviewed to investigate their reasons for purchasing IoT devices, their perceptions of smart home privacy risks, and actions to protect their privacy, as well as managing IoT devices and/or its data. The research results show that there are privacy risks existing in smart homes. Consumers’ privacy data is collected secretly, which needs to be controlled, and privacy issues have to be addressed in the near future for the smart home to be fully adopted by the society.
APA, Harvard, Vancouver, ISO, and other styles
5

Tilaveridis, Ioannis, and Kirill Narmack. "PID in Smart Buildings." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Regard, Mikael. "PID in Smart Buildings." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ahmed, Shadman, and Oguzhan Ugur. "PID in Smart Buildings." Thesis, KTH, Skolan för teknikvetenskap (SCI), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210829.

Full text
Abstract:
This paper investigates a smart heat control system inside a household using a family of dynamic controllers called PID (Proportional Integrative Derivative), conducted with Wireless Sensor Networks (WSN). The laws of thermodynamics and other physical knowledge was used to model the effect that a heat exchanger has on the temperature of a room. Realistic simulations have been run to illustrate how a PID control system outperforms the traditional on-off approach, in terms of energy efficiency. Simulations shows that the PID controlled system is 28% more energy efficient than an on-off. This can make the future use of PIDs in home automation more common. Lastly a future extension to other systems is discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Grenholm, Sven, and Irini Gionis. "PID in Smart Buildings." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-214702.

Full text
Abstract:
This work details the design and implementationof PID controllers in smart buildings coupled with the useof Wireless Sensor Networks. The main application that isinvestigated is the control of air temperature in a building. Twomathematical models of this system are presented: a simplifiedfirst order system, and a more complex second order system,both based on physical knowledge. Additionally, both modelsare based on a physical implementation to be tested. Three PIDcontrollers have been designed to control this system, two for thefirst order model and one for the second order model. A physicaltest-bed has been implemented with a styrofoam box acting as abuilding. The performance of the controllers and the quality ofthe mathematical description has been investigated by comparingthe simulations and the experimental results. The effect of aconstant feedback delay was simulated using F2 and the systemappeared to be highly resistant to the effects of the delay. Thefirst order system proved to be a better system description,and the second controller F2 had the best performance. Theeffects of packet loss upon the system is also investigated anda well-functioning compensation method is proposed. Finally, afew further areas of applications for PID control in buildingsare discussed, such as ventilation, air humidity, and hydroponicfarming.
APA, Harvard, Vancouver, ISO, and other styles
9

Misagh, Mohammadhadi. "Promoting Privacy in Smart Space." Thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137111.

Full text
Abstract:
The Smart Metering Systems are state of the art technologies and modern services integratedwith legacy metering systems. These systems are one of the most important parts of smart grids.Smart Grids are electrical power infrastructures that make intelligent decisions about the state ofthe electrical power devices. Smart Grids provide a stable electrical power environment. SmartGrids support all functionalities of traditional power systems in addition a Smart Grid bears newfunctionalities of intelligent power systems e.g. self-healing, resisting to attacks, increasingpower quality, motivating consumers to wisely use the electricity, enabling new business toelectrical markets, optimizing assets and operating efficiently and accommodating all generationand storages options. A smart home is usually a modern home that is equipped with some specialstructured wiring or wireless systems to enable inhabitants to remotely control or program any ofhome electronic devices supporting specific types of control functionalities by entering a singlecommand at their remote computer or smart phones. Privacy in smart spaces/environments is notonly confidentiality of data /connections but is the management of the complication of theseenvironments due to decentralised and dynamic nature of these spaces. General model of smarthome and smart metering systems have their specific considerations e.g. assumptions, threats,countermeasures and privacy preserving model. Both security architectures have their specificsecurity policies, considerations, authorization and authentication authorities, and encryption anddecryption strategies. Running two different security architectures in parallel may raise someissues, threats and considerations that are the main purpose of this thesis project. So, theprinciple goal of this research project is to define the secure model of collaboration between twodifferent security architectures in the smart space in which general smart home networkarchitecture is established in parallel to smart metering system architecture. Federatedauthentication systems e.g. SAML and OAuth, OpenID and federated authorization systems likeXACML are most common distributed standard protocols to manage distributed securitysystems. This thesis investigates issues and problems of two parallel security architectures andproposes a secure communication protocol in addition to a proof-of-concept of the final solution.All of most famous available protocols for authentication and authorization will be discussed andfinally will be implemented as a proof of concept. Encryption and decryption as basic securityfunctions is not considered in this project and will be postponed as a future work around thisresearch project.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Jianing. "Shared smart energy storage system for smart homes and smart buildings." Thesis, University of Birmingham, 2016. http://etheses.bham.ac.uk//id/eprint/6728/.

Full text
Abstract:
In recent years, energy crisis and climate changes have raised a significant attention globally. There’s an increasing awareness of maximising the utilisation of distributed energy resources to ease local network congestion, reduce carbon emissions and even support the grid. This thesis presents a shared energy storage system across multiple apartments to reduce investment and operation costs. Both hardware integration solution and software Cloud connected energy management system are designed and implemented. The solution has been deployed and trialled in residential building block running for two years in a pilot project. The performance of is evaluated through data analytics from the deployed systems. The business model for the above system is proposed and explored. The optimisation is enhanced with various energy services based on fuzzy logic rules to manage controllable loads and incorporate with grid tariffs are designed and evaluated. The feasibility and performance of the proposed energy services is validated through simulation platform with load and generation data profiles extracted from the deployed systems. An aggregated energy management services for apartment buildings is proposed. Business models with incentive scheme are exploited to minimise the operation cost. Its performance is conducted in case studies through various scenarios.
APA, Harvard, Vancouver, ISO, and other styles
11

Giaconi, Giulio. "Information-theoretic privacy in smart meters." Thesis, Imperial College London, 2018. http://hdl.handle.net/10044/1/62630.

Full text
Abstract:
Smart grids promise to enhance drastically the efficiency of today's power networks. One of the key components of smart grids is the smart meter, which allows to monitor a user's electricity consumption with much higher resolution compared to conventional energy meters. However, the high resolution of smart meter measurements also entails serious privacy implications for the users, as it makes easier to distinguish the power signature of single appliances from the aggregate household consumption. This would lead an attacker, which may be a thief, a surveillance agency, or the utility provider itself, to gain insights into users' activities and behaviors. In this dissertation we analyze several privacy-preserving techniques that protect users' privacy without diminishing the utility of smart grids. We adopt physical resources that are increasingly available at the users' premises, such as renewable energy sources and rechargeable batteries, and use them to minimize the information leaked about a user's electricity consumption, as well as the cost of energy. We deploy information-theoretic tools to characterize the fundamental limits of smart meter privacy, measuring privacy via mutual information, and characterizing single-letter expressions for the information leaked when considering infinite and zero-capacity rechargeable batteries. These scenarios represent lower and upper bounds on the privacy performance of more realistic settings with finite-capacity rechargeable batteries. When considering a finite-capacity battery, we express the information leakage as an additive quantity, and cast the problem as a stochastic control problem, which can be solved by dynamic programming. We also propose more empirical privacy-preserving strategies, testing their performance against real smart meter measurements and time of use pricing tariffs. In particular, we measure privacy as the squared difference between the smart meter measurements and a target profile, which we consider as a completely private power profile, and characterize the optimal trade-off between privacy and cost of energy.
APA, Harvard, Vancouver, ISO, and other styles
12

Friman, Nelly. "Security Analysis of Smart Buildings." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279423.

Full text
Abstract:
In recent years, buildings have been starting to become more automated to match the demand forenergy efficient and sustainable housing. Subsystems, or so-called Building Management Systems(BMS), such as heating, electricity or access control, are gradually becoming more automated. Thenext step is to integrate all BMS in a building within one system, which is then called a smartbuilding. However, while buildings are becoming more and more automated, the concerns ofcybersecurity grow larger. While integrating a wide range of Internet of Things (IoT) devices withthe system, the attack surfaces is larger, and this, together with the automation of criticalsubsystems in the building leads to that attacks in worse case can harm the occupants of thebuilding.In this paper, the threats and risks are analyzed by using a security threat model. The goal isto identify and analyze potential threats and risks to smart buildings, with the purpose to giveinsight in how to develop secure systems for them. The process of the model includes five phases ofwhich this study focuses on phase one and three, identifying losses after a successful attack, anddetermine goals and intentions of the attackers for specific attacks, respectively.As a result of the security analysis potential threats were defined, in which the ones withhighest threat event frequency included data leaks and disabling the heating system. Somevulnerabilities and recommendations to improv the system is also discussed, which is of importanceso that occupants can continue to live and work in sustainable, reliable and secure facilities.
På senare år har fastigheter utvecklats till att bli mer automatiserade för att matcha efterfrågan påenergieffektiva och hållbara bostäder. Fastighetslösningarna (Building Management Systems,BMS), såsom värme- eller passersystem, blir gradvis mer automatiserade. Nästa steg är att integreraalla BMS i en byggnad till ett gemensamt system, som då kallas för en smart fastighet. Medanbyggnader blir alltmer automatiserade, växer oron kring cybersäkerhet eftersom man delsintegrerar ett stort antal Internet of Things (IoT)-enheter med systemet och samtidigt automatiserarmånga kritiska fastighetslösningar. I värsta fall skulle därför en utomstående attack kunna leda tillfysisk skada på fastigheter eller personer som befinner sig där.I denna studie utförs en säkerhetsanalys där dessa hot och risker analyseras med hjälp av enhotmodellering. Målet är att identifiera och analysera potentiella hot och risker för smartafastigheter, med syftet att ge insikt i hur man bör säkra dessa system. Modelleringen innehåller femfaser, av vilka denna studie fokuserar på fas ett och tre. I första fasen identifieras vilka förluster somfinns för företag och boende efter en framgångsrik attack och i fas tre identifieras angriparnas måloch avsikter för specifika attacker.Ett resultat av säkerhetsanalysen är att av de potentiella hot som definierats, är de medhögsta antalet försök till attack per år (Threat Event Frecquency, TEF) dataläckage och attinaktivera värmesystemet. Några sårbarheter med smarta fastigheter och rekommendationer för attförbättra systemet diskuteras också. Att utveckla säkra system till smarta fastigheter är av störstavikt för att personer kan fortsätta bo och arbeta i hållbara, pålitliga och säkra byggnader.
APA, Harvard, Vancouver, ISO, and other styles
13

Carvalho, Rui Eduardo Lopes. "Camera sensor for smart buildings." Master's thesis, Universidade de Aveiro, 2018. http://hdl.handle.net/10773/23536.

Full text
Abstract:
Mestrado em Engenharia Eletrónica e Telecomunicações
Com o aumento da prevalência das tecnologias IoT e a perseguição constante da automação de todas as ações simples do nosso dia-a-dia, a existência sensores simples e com pouco consumo de energia no nosso mundo tem tendência a tornar-se omnipresente. Uma área de estudo interessante seria como controlar eficientemente a luminosidade e a temperatura de uma sala. A solução mais óbvia seria dispersar vários sensores equidistantes pela área a examinar, contudo a rede seria demasiado complexa do que seria expectável para um problema desta dimensão. Neste caso quantidade não é uma resposta adequada para um problema com esta dinâmica. Um sensor único capaz de analisar uma área extensa é a solução ideal. Felizmente, com uma câmara é possível monitorizar a luminosidade e se tiver capacidade de deteção de infravermelhos também é possível controlar a temperatura. Este documento examina a possibilidade e viabilidade de produção de um sensor único baseado numa câmara com tecnologia CCD ou CMOS com o objetivo de automatizar e regular a luminosidade e a temperatura de uma sala.
With the increase in the prevalence of IoT technologies and constant pursue of automation of all simple actions in our day-to-day life, the existence of simple sensors and with little energy consumption have a tendency of becoming omnipresent. An interesting field of study would be how to efficiently control the lighting and the temperature of a room. The most obvious solution would be to disperse several equidistant sensors through the area, however the network demand for such a task is too complex for a problem of this dimension. In this case, quantity is not an adequate answer for a problem with this dynamic. A unique sensor capable of analyzing an extended area is the ideal solution. Fortunately, with a camera it is possible to monitor lighting, and should it have infrared detection capabilities is also possible to control the temperature. This document examines the possibility and production viability of a unique sensor based on a camera with either CCD or CMOS technology with the objective of automate and regulate the luminosity and temperature of a room.
APA, Harvard, Vancouver, ISO, and other styles
14

Mustafa, Mustafa Asan. "Smart Grid security : protecting users' privacy in smart grid applications." Thesis, University of Manchester, 2015. https://www.research.manchester.ac.uk/portal/en/theses/smart-grid-security-protecting-users-privacy-in-smart-grid-applications(565d4c36-8c83-4848-a142-a6ff70868d93).html.

Full text
Abstract:
Smart Grid (SG) is an electrical grid enhanced with information and communication technology capabilities, so it can support two-way electricity and communication flows among various entities in the grid. The aim of SG is to make the electricity industry operate more efficiently and to provide electricity in a more secure, reliable and sustainable manner. Automated Meter Reading (AMR) and Smart Electric Vehicle (SEV) charging are two SG applications tipped to play a major role in achieving this aim. The AMR application allows different SG entities to collect users’ fine-grained metering data measured by users’ Smart Meters (SMs). The SEV charging application allows EVs’ charging parameters to be changed depending on the grid’s state in return for incentives for the EV owners. However, both applications impose risks on users’ privacy. Entities having access to users’ fine-grained metering data may use such data to infer individual users’ personal habits. In addition, users’ private information such as users’/EVs’ identities and charging locations could be exposed when EVs are charged. Entities may use such information to learn users’ whereabouts, thus breach their privacy. This thesis proposes secure and user privacy-preserving protocols to support AMR and SEV charging in an efficient, scalable and cost-effective manner. First, it investigates both applications. For AMR, (1) it specifies an extensive set of functional requirements taking into account the way liberalised electricity markets work and the interests of all SG entities, (2) it performs a comprehensive threat analysis, based on which, (3) it specifies security and privacy requirements, and (4) it proposes to divide users’ data into two types: operational data (used for grid management) and accountable data (used for billing). For SEV charging, (1) it specifies two modes of charging: price-driven mode and price-control-driven mode, and (2) it analyses two use-cases: price-driven roaming SEV charging at home location and price-control-driven roaming SEV charging at home location, by performing threat analysis and specifying sets of functional, security and privacy requirements for each of the two cases. Second, it proposes a novel Decentralized, Efficient, Privacy-preserving and Selective Aggregation (DEP2SA) protocol to allow SG entities to collect users’ fine-grained operational metering data while preserving users’ privacy. DEP2SA uses the homomorphic Paillier cryptosystem to ensure the confidentiality of the metering data during their transit and data aggregation process. To preserve users’ privacy with minimum performance penalty, users’ metering data are classified and aggregated accordingly by their respective local gateways based on the users’ locations and their contracted suppliers. In this way, authorised SG entities can only receive the aggregated data of users they have contracts with. DEP2SA has been analysed in terms of security, computational and communication overheads, and the results show that it is more secure, efficient and scalable as compared with related work. Third, it proposes a novel suite of five protocols to allow (1) suppliers to collect users accountable metering data, and (2) users (i) to access, manage and control their own metering data and (ii) to switch between electricity tariffs and suppliers, in an efficient and scalable manner. The main ideas are: (i) each SM to have a register, named accounting register, dedicated only for storing the user’s accountable data, (ii) this register is updated by design at a low frequency, (iii) the user’s supplier has unlimited access to this register, and (iv) the user cancustomise how often this register is updated with new data. The suite has been analysed in terms of security, computational and communication overheads. Fourth, it proposes a novel protocol, known as Roaming Electric Vehicle Charging and Billing, an Anonymous Multi-User (REVCBAMU) protocol, to support the priced-driven roaming SEV charging at home location. During a charging session, a roaming EV user uses a pseudonym of the EV (known only to the user’s contracted supplier) which is anonymously signed by the user’s private key. This protocol protects the user’s identity privacy from other suppliers as well as the user’s privacy of location from its own supplier. Further, it allows the user’s contracted supplier to authenticate the EV and the user. Using two-factor authentication approach a multi-user EV charging is supported and different legitimate EV users (e.g., family members) can be held accountable for their charging sessions. With each charging session, the EV uses a different pseudonym which prevents adversaries from linking the different charging sessions of the same EV. On an application level, REVCBAMU supports fair user billing, i.e., each user pays only for his/her own energy consumption, and an open EV marketplace in which EV users can safely choose among different remote host suppliers. The protocol has been analysed in terms of security and computational overheads.
APA, Harvard, Vancouver, ISO, and other styles
15

Azoidou, Eva, and Evelina Jakobsson. "Real-time communications in smart buildings." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Alm, Erik, and Lilian Gren. "Real-time Scheduling in Smart Buildings." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Musalam, Dina, and Paulina Nicodemus. "Security and Privacy methods in Smart Home: Case Study in Smart Meters." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20273.

Full text
Abstract:
Homes with integrated state of the art technology are considered Smart Homes. A smart home has special systems which enable remote control via remote computer or smart phones. These modern integrated services are supported by electrical power infrastructures called Smart Grids, which provides a stable electrical power environment to support all functionalities, with intelligent power systems that provide increased power quality. Inside a Smart home, a legacy metering system called Smart Meters are installed offering new functionalities such as remote readings of power consumption, and different time usage of tariffs.Preliminary research has already indicated vulnerability attacks on smart meters which affect the security and privacy in smart meters. Security issues in this system include vulnerabilities and privacy issues includes information leakage in real-time consumption data that is recorded by the smart meters.Enhancing both security and privacy in the smart meters are the main purpose of this thesis. The principle goal of this research is to provide more understanding about the smart meters from a security and privacy perspective. This thesis investigates issues and problems in smart meters and proposes a secure communication protocol in the application layer, in addition to a proof-of-concept of the final solution. In this research we introduce the solution by means of two scenarios, we highlight the effects of an attack on the smart meters on levels of simulation and theory. The first scenario is to "take control over the smart meter to access the data consumptions in the smart meters". The proposed solution of using the Smart Phone as a third part to protect the smart meters has been evaluated using a network simulation tool. The result shows that the data captured by attacking node is encrypted and can't be used for any useful operation. In the second scenario, "monitoring the data consumptions to harm the user's privacy", in other words, stealing the user's devices. The proposed solution is using the home electrical power routing to moderate the home's load signature in order to hide appliance usage information. Data clusters are implemented as a proof of concept to evaluate the data. The results show that there is only 99.5 % correct clustered data with good quality.
APA, Harvard, Vancouver, ISO, and other styles
18

Fong, Michael Chih Huong. "A privacy-preserving authentication protocol for smart tags." [Ames, Iowa : Iowa State University], 2010. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1476293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bergquist, Jonatan. "Blockchain Technology and Smart Contracts: Privacy-preserving Tools." Thesis, Uppsala universitet, Avdelningen för datalogi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-323826.

Full text
Abstract:
The purpose of this Master's thesis is to explore blockchain technology and smart contracts as a way of building privacy-sensitive applications. The main focus is on a medication plan containing prescriptions, built on a blockchain system of smart contracts. This is an example use case, but the results can be transferred to other ones where sensitive data is being shared and a proof of validity or authentication is needed. First the problem is presented, why medication plans are in need of digitalisation and why blockchain technology is a fitting technology for implementing such an application. Then blockchain technology is explained, since it is a very new and relatively unfamiliar IT construct. Thereafter, a design is proposed for solving the problem. A system of smart contracts was built to prove how such an application can be built, and suggested guidelines for how a blockchain system should be designed to fulfil the requirements that were defined. Finally, a discussion is held regarding the applicability of different blockchain designs to the problem of privacy-handling applications.
Syftet med detta examensarbete är att utforska blockkedje teknologi och s.k. smarta kontrakt för att bygga applikationer där känslig information hanteras. Huvudsakligen ligger fokus på att utveckla en struktur baserad på blockkedje teknologi och smarta kontrakt för en medikationsplan. Detta är ett typ-exempel för att visa hur en sådan applikation kan byggas, men resultaten kan överföras till andra områden där känslig data delas mellan parter, eller där ett bevis för korrekthet krävs. Först presenteras problemet, varför medikationsplaner behöver digitaliseras och varför blockkedje teknologi är väl anpassat för att implementera en sådan applikation. Sedan förklaras blockkedje teknologi något djupare i detalj, eftersom det är ett relativt nytt koncept. Därefter föreslås en design för att lösa problemet.  Ett system av smarta kontrakt är byggt för att visa hur en medikationsplan kan byggas, och riktlinjer ges för hur ett blockkedje system bör se ut för att stödja systemet av smarta kontrakt. Till slut hålls en kortare diskussion om hur olika blockkedje-designer kan användas för att appliceras på problemet med känslig information.

Presentation held externally at Technical University Munich on the 29-5-2017 10.50.

APA, Harvard, Vancouver, ISO, and other styles
20

Lundgren, Tony, and Wenjia Xu. "Evaluation of Privacy-Preserving Methods for Smart Grids." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Shao, Huijuan. "Temporal Mining Approaches for Smart Buildings Research." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/84349.

Full text
Abstract:
With the advent of modern sensor technologies, significant opportunities have opened up to help conserve energy in residential and commercial buildings. Moreover, the rapid urbanization we are witnessing requires optimized energy distribution. This dissertation focuses on two sub-problems in improving energy conservation; energy disaggregation and occupancy prediction. Energy disaggregation attempts to separate the energy usage of each circuit or each electric device in a building using only aggregate electricity usage information from the meter for the whole house. The second problem of occupancy prediction can be accomplished using non-invasive indoor activity tracking to predict the locations of people inside a building. We cast both problems as temporal mining problems. We exploit motif mining with constraints to distinguish devices with multiple states, which helps tackle the energy disaggregation problem. Our results reveal that motif mining is adept at distinguishing devices with multiple power levels and at disentangling the combinatorial operation of devices. For the second problem we propose time-gap constrained episode mining to detect activity patterns followed by the use of a mixture of episode generating HMM (EGH) models to predict home occupancy. Finally, we demonstrate that the mixture EGH model can also help predict the location of a person to address non-invasive indoor activities tracking.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
22

Babbitt, Ryan Michael. "A service-oriented privacy model for smart home environments." [Ames, Iowa : Iowa State University], 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ivancevic, Dean. "Privacy and security of IoT : A smart home perspective." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-99071.

Full text
Abstract:
In a world where technological progress is constant, understanding the views and experiences of users is essential. With the use of technology, there are many dangers. Issues with privacy and security are among them. This thesis deals with understanding the perception of privacy and security of smart home IoT devices. The literature review consists of understanding concepts of trust, possible ways of intrusion, and prevention and elaborating more about the Internet of Things technology and smart homes. The review also contains notes on previous findings of the user's perception. The review of the literature also connects possible ways of intrusion with the underlying IoT architecture as well as explains notions of privacy by design, compliance, and GDPR. To understand the phenomenon of privacy and security in the context of a smart home, a simple qualitative study was conducted. Sixteen participants who are part of the general public were interviewed. The collected information was analyzed using a general inductive approach, and answers were grouped into categories as suggested by Thematic Analysis. Interviews were done online and a transcript summary can be found in the last Appendix. The findings from the interviews suggest that privacy and convenience matter most to the users. Participants demonstrated a willingness to purchase if they perceived a device as something that will increase their quality of life and were willing to share data such as location but they were not willing to lose anonymity. What type of data and for what purpose was mentioned as most important. When it comes to security attacks, participants were less worried about how it might happen and more worried about what might happen to them and what are the consequences for them. In the conclusion of the study, I present advice for students and academia, device manufacturers, and service providers as well as the general public as the last main stakeholder. Since technology is not static, it would be of importance to revisit topics of privacy and security of IoT.
APA, Harvard, Vancouver, ISO, and other styles
24

Peng, Ge. "Enhancing Energy Efficiency and Privacy Protection of Smart Devices." W&M ScholarWorks, 2017. https://scholarworks.wm.edu/etd/1499450047.

Full text
Abstract:
Smart devices are experiencing rapid development and great popularity. Various smart products available nowadays have largely enriched people’s lives. While users are enjoying their smart devices, there are two major user concerns: energy efficiency and privacy protection. In this dissertation, we propose solutions to enhance energy efficiency and privacy protection on smart devices. First, we study different ways to handle WiFi broadcast frames during smartphone suspend mode. We reveal the dilemma of existing methods: either receive all of them suffering high power consumption, or receive none of them sacrificing functionalities. to address the dilemma, we propose Software Broadcast Filter (SBF). SBF is smarter than the “receive-none” method as it only blocks useless broadcast frames and does not impair application functionalities. SBF is also more energy efficient than the “receive-all” method. Our trace driven evaluation shows that SBF saves up to 49.9% energy consumption compared to the “receive-all” method. Second, we design a system, namely HIDE, to further reduce smartphone energy wasted on useless WiFi broadcast frames. With the HIDE system, smartphones in suspend mode do not receive useless broadcast frames or wake up to process use- less broadcast frames. Our trace-driven simulation shows that the HIDE system saves 34%-75% energy for the Nexus One phone when 10% of the broadcast frames are useful to the smartphone. Our overhead analysis demonstrates that the HIDE system has negligible impact on network capacity and packet round-trip time. Third, to better protect user privacy, we propose a continuous and non-invasive authentication system for wearable glasses, namely GlassGuard. GlassGuard discriminates the owner and an imposter with biometric features from touch gestures and voice commands, which are all available during normal user interactions. With data collected from 32 users on Google Glass, we show that GlassGuard achieves a 99% detection rate and a 0.5% false alarm rate after 3.5 user events on average when all types of user events are available with equal probability. Under five typical usage scenarios, the system has a detection rate above 93% and a false alarm rate below 3% after less than 5 user events.
APA, Harvard, Vancouver, ISO, and other styles
25

Stoner, Eliza V. "Commodifying convenience, cleanliness, and privacy American public restroom design since 1851 /." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 7.26 Mb., 112 p, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:1435845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Burgas, Nadal Llorenç. "Multivariate statistical modelling and monitoring of smart buildings." Doctoral thesis, Universitat de Girona, 2019. http://hdl.handle.net/10803/669279.

Full text
Abstract:
In order to reduce mismatches between real and expected consumption, this thesis explores the use of PCA (Principal Component Analysis) as a modelling tool for buildings. PCA is a statistical technique that allows complex systems to be modelled, and, subsequently, to monitor them to detect abnormal behaviours with respect to the conditions initially modelled. The work in this thesis includes adapting PCA to take full advantage of its potential in buildings. Such adaption is also verified by applying it to various use cases
Per tal de reduir els desajustos entre el consum real i l’esperat, en aquesta tesi s’explora l’ús de PCA (les sigles en Angles d’Anàlisi de Components Principals) com a eina de modelat per edificis. PCA és una tècnica estadística que permet modelar sistemes complexes i posteriorment monitoritzar-los per detectar comportaments anòmals respecte a les condicions modelades inicialment. Els treballs d’aquesta tesi inclouen l’adaptació de PCA per poder aprofitar tot el seu potencial en edificis i la verificació de l’adaptació realitzada mitjançant l’aplicació en diversos casos d’ús
APA, Harvard, Vancouver, ISO, and other styles
27

Zhou, Li. "Vibration control of buildings using smart magnetorheological dampers /." View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?CIVL%202002%20ZHOU.

Full text
Abstract:
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2002.
Includes bibliographical references (leaves 163-177). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
28

Güneş, Ş. (Şan). "Viewpoint manipulations for 3D visualizations of smart buildings." Master's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201906062473.

Full text
Abstract:
Abstract. This thesis covers the design and implementation of a new single-input viewpoint manipulation technique aimed for a specific use case. The design of the technique is made based on previous literature. The objective of the research is to assess whether a single-input viewpoint manipulation technique can be as efficient as a multi-input viewpoint manipulation technique when used for observing a three dimensional (3D) model of a smart building. After checking the existing literature about basics of viewpoint manipulation, it was decided to design a single-input viewpoint manipulation technique that can be used on a wide range of hardware including touch screen devices not capable of multi-touch input and personal computers with a regular mouse. A 3D visualization of a nursing home was implemented to be viewed with the new technique. The nursing home in question is a smart house with sensors deployed in it, and sensor data is visualized in the 3D model. Aside from the new single-touch technique, a commonly used multi-touch technique was also implemented in order to compare the single-touch technique against it. Participants were recruited and user tests were made to find issues with the system. The yielded results indicate some clear points in the new technique that can be improved for future research.Tiivistelmä. Tämä työ kuvaa suunnittelu- ja implementaatioprosessin kuvakulmien manipulointiin tarkoitetulle uudenlaiselle yhden sormen (single-touch) syöttöjärjestelmälle. Suunnittelu pohjautuu aiempaan tutkimukseen. Tutkimuksen tarkoituksena on arvioida, onko yhden sormen järjestelmä yhtä tehokas monen sormen (multi-touch) järjestelmään verrattuna, kun kohteena on kolmiulotteinen (3D) malli älykkäästä rakennuksesta. Aiempiin tutkimuksiin nojaten yhden sormen järjestelmään päädyttiin, koska se tukisi suurempaa laitekantaa monen sormen järjestelmiin verrattuna. Työssä kehitettiin hoitokotia esittävä älyrakennuksen 3D-malli, jota käytettiin järjestelmän tarkastelemiseen. Kyseinen hoitokoti on anturointia sisältävä älykäs rakennus; 3D-mallia käytettiin anturidatan visualisoimiseen. Koejärjestelyissä käytettiin tavanomaista monen sormen järjestelmää vertailukohtana kehitettyyn järjestelmään. Vertailu tehtiin koehenkilöiden ja käyttäjätestien avulla. Tuloksista paljastui ominaisuuksia, joita tulisi parantaa järjestelmän tulevissa versioissa.
APA, Harvard, Vancouver, ISO, and other styles
29

Sgrò, Giuseppe. "Smart Buildings: ICT as a driving energy-efficient solution for retrofitting of existing buildings." Thesis, KTH, Energiteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-244985.

Full text
Abstract:
It is widely recognized how energy efficiency can contribute to decreasing GHG emissions, especially in the building sector, where buildings will play an increasingly important role for the future energy system, being both the largest energy consumers and becoming one of the greatest producers of renewable energy. In this new energy context, where renewable sources will be the main supplier for the production of electricity, there will be a growing need for dynamic control as well as intelligent and interconnected systems, which will lead to the creation of a new ICT architecture based on the interaction between Smart Buildings and Smart Grid, where buildings will take the role of proactive participants in the smart electricity network, facilitating the reduction of energy consumption and GHG emissions as well as other societal benefits. However, in order to fully reach the ICT architecture model and at the same time achieving the energy savings targets, the main effort should be pointed towards the existing building stock, since it represents the urban dwelling type with the lowest energy efficiency and therefore it should be upgraded to the extent possible into an energy efficient smart building stock. The aim of the thesis is to identify and analyse the potential energy saving which can be obtained through ICT solutions in an existing Swedish single-family household built during the ‘record years’ (1961-1975), without the need for extensive change or renovation. In a first place, it will be created the building energy model representative of the Swedish residential building stock built between 1961 and 1975. This energy model will be defined according to the European project TABULA and based on secondary data sources. Then, the potential energy saving will be identified through the IDA ICE software, in which it will be analyzed the most energy-efficient combination of smart controls and connected devices to achieve energy performance improvement, under a set of constraints and limitations. Finally, this energy saving, obtained merely through the introduction of ICT technologies, will be complemented with on-site renewable source generation.
Det är allmänt vedertaget att effektiv energianvändning kan bidra till minskade koldioxidutsläpp, framför allt inom byggsektorn. Påverkan från byggnader väntas öka i framtidens energisystem där de både är de största konsumenterna och är på god väg att bli de största producenterna av förnybar energi. I denna nya kontext, där förnybara källor blir de största leverantörerna av el, kommer det skapas ett växande behov av dynamisk kontroll såväl som smarta och sammanlänkade system. Det kommer i sin tur leda till skapandet av ny ICT-arkitektur som grundar sig i interaktionen mellan så kallade Smart Buildings och Smart Grid, där byggnader antar en mer proaktiv roll i det smarta elnätet vilket möjliggör minskad energikonsumtion och minskade utsläpp av växthusgaser, bland andra samhälleliga fördelar.  För att uppnå den framtida modellen för ICT-arkitektur fullt ut samtidigt som målsättningen för energisparande bibehålls, behöver dock den huvudsakliga satsningen ägnas åt befintliga byggnader. Befintliga byggnader utgör den andel urbana bostäder med lägst energiprestanda, därför bör de i största möjliga grad uppgraderas till att möta målbilden av energieffektiva smarta byggnader. Arbetet ämnar identifiera och utvärdera den potentiella energibesparingen som kan uppnås genom ICT-lösningar i befintliga svenska enfamiljshus, byggda under Rekordåren (främst 1961 till 1975), utan omfattande förändringar eller renovering. I första hand framförs en modell som visar energibehovet av de svenska bostadshusen byggda mellan 1961 och 1975. Modellen definieras enligt det europeiska projektet TABULA och baseras på sekundära datakällor. Därefter identifieras den potentiella energibesparingen med hjälp av mjukvaran IDA ICE, där den mest energieffektiva kombinationen av smarta kontrollanordningar och sammanlänkad utrustning för att uppnå en förbättrad energiprestanda fastställs under framförda bivillkor och avgränsningar. Slutligen kombineras energibesparingen som uppstår genom ICT-teknologi med tillbyggnaden av förnybara energikällor.
APA, Harvard, Vancouver, ISO, and other styles
30

Shivakumar, Shyam. "Use of smart buildings technology to optimize indoor climate control in local government buildings." Thesis, Shivakumar, Shyam (2021) Use of smart buildings technology to optimize indoor climate control in local government buildings. Masters by Coursework thesis, Murdoch University, 2021. https://researchrepository.murdoch.edu.au/id/eprint/63974/.

Full text
Abstract:
Activities done as part of everyday life are being aided by modern tools and systems that are ‘smart’, thanks to the rapid growth of science and technology. Climate change is one matter of concern for the world, and everyone needs to act to reverse it or limit its repercussions. A part of the solution to fight climate change would be to integrate these ‘smart’ technologies in the energy sector to curb GHG emissions associated with energy generation. The technology of Internet of Things (or IoT) is increasingly being used in many applications across many sectors. The IoT, an iconic concept of the modern era, is nowadays proving to be a capable driver to achieve energy efficiency, which is considered to be the first line of defense to climate change. This dissertation aims to be a part of revamping the indoor climate control devices in commercial facilities of the City of Melville, a local government area of Western Australia. The study for achieving such an objective is done to set a foundation for the city council to work on optimizing the currently operating HVAC and other climate control setups. The dissertation encompasses a background of smart building technologies, with the overview of the City of Melville and its trial facility for undertaking the demonstration project for such systems, the Piney Lakes Environmental Education Centre (PLEEC). It is then followed by the results of a detailed literature review of papers that have demonstrated designs and features of IoT based smart climate control systems, analysis of the baseline behaviour of the PLEEC for identifying the opportunities for optimizing climate control with the help of monitoring the power consumption and the usage and behavioural patterns with the help of a monitoring dashboard and surveys and log books and then finally, the proposal of designs capable of handling the indoor climate of the various commercial facilities under the city’s operational control. Two types of designs have been put forth wherein one is meant to control HVAC systems in general and the other is solely meant for controlling reverse-cycle air conditioners. These designs were based on the reviewed papers. The concept of control which is apt for this purpose is called Model Predictive Control with the addition of Predictive Mean Vote for including thermal comfort into the optimization process. The experimental results of the system (based on those papers) have shown their capability to increase energy savings, without compromising on human thermal comfort.
APA, Harvard, Vancouver, ISO, and other styles
31

Jawurek, Marek [Verfasser], and Felix C. [Akademischer Betreuer] Freiling. "Privacy in Smart Grids / Marek Jawurek. Gutachter: Felix C. Freiling." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2013. http://d-nb.info/1065377843/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Nicanfar, Hasen. "Security and privacy in smart grid context : problems and solutions." Thesis, University of British Columbia, 2015. http://hdl.handle.net/2429/55190.

Full text
Abstract:
In order to improve the power grid and provision the Smart Grid concept, one well-defined approach would be to utilize new information and communication technology. Live power consumption data in addition to the time base power consumption rate are essential requirements in this context. These communications are supposed to be bi-directional between consumers, providers and smart grid administrations (market, operators, etc.). However, one of the most essential requirements that should be preserved is to address communication security and privacy. There are many opportunities for adversaries to attack the smart grid system, even remotely anywhere in the world, that could result in costly issues and damages in the system, even jeopardize user privacy. In the first part of this thesis, we concentrate on improving the efficiency of security mechanism and present our tailored authentication and key management mechanisms. We propose two solutions, one for communications between home appliances and a home gateway (smart meter), while the second solution aims at communications between the home smart meter and an appropriate server located in the smart grid utility network.We then propose enhancements on key management by developing two key construction mechanisms based on the Password Authentication Key Exchange (PAKE) protocol. The first is a cluster-based group key mechanism between smart grid entities, e.g. consumers in a neighbourhood area network. The second enhancement is a multi-layer key mechanism motivated by controlling the home smart appliances using different smart grid controllers located in different layers of the controlling hierarchy network. The second part of the thesis concentrates on Privacy. In this part, we present a privacy mechanism based on enhanced network coding for communications between smart meters and utility servers via a mesh topology. Finally, we propose a privacy-aware security solution for mobile devices. For example, to support electric vehicles in buying and selling the power from and to the grid, or in case of the smart phones in the heterogeneous network (4G and/or 5G), to support handover between the access points.
Applied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
33

Shaikh, Yasir Saleem. "Privacy preserving internet of things recommender systems for smart cities." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS001.

Full text
Abstract:
Au cours de la dernière décennie, la technologie Internet des objets (IoT) a révolutionné presque tous les domaines de la vie quotidienne et a dynamisé les villes intelligentes. Les villes intelligentes utilisent la technologie IoT pour collecter divers types de données de capteurs, puis les utilisent pour offrir diverses applications. Comme les applications des villes intelligentes sont utilisées par les citoyens, donc leur fournir des services de recommandation personnalisés en fonction de leurs préférences, de leurs localisations et de leurs profils ainsi que l'exploitation des données IoT (par exemple, la congestion du trafic et l'occupation du parking) est d'une grande importance qui pourrait être fournie par un recommandateur IoT. Cependant, comme le recommandateur IoT utilise les données privées des citoyens (profils, préférences et habitudes, par exemple), il viole la vie privée des utilisateurs car il pourrait suivre les routines et les habitudes des utilisateurs en analysant la base de données historique ou en analysant les services de recommandation réguliers qu'il offre. Par conséquent, il est important de préserver la confidentialité des utilisateurs du programme de recommandation IoT. Dans cette thèse, nous proposons un nouveau système de recommandation IoT préservant la confidentialité pour les villes intelligentes, qui fournit des recommandations en exploitant les données IoT des capteurs et en tenant compte de diverses métriques. Notre approche est organisée en trois parties. Tout d'abord, nous développons un système de recommandation IoT conforme au règlement européen sur la protection des données (GDPR) pour les systèmes de stationnement intelligent. Ces systèmes fournissent des recommandations sur les emplacements et les itinéraires de stationnement en exploitant les données des capteurs de stationnement et de circulation. Par conséquence, nous proposons d’abord une approche pour la cartographie des capteurs de trafic avec les coordonnées d’itinéraires afin d’analyser les conditions de trafic (par exemple le niveau de congestion) sur les routes. Ensuite, nous avons mis en place un dispositif de recommandation IoT. Le recommandateur IoT a été intégré au scénario d'utilisation du stationnement intelligent d'un projet H2020 EU-KR WISE-IoT et a été évalué par les citoyens de Santander, en Espagne, à l'aide d'un prototype. De plus, nous développons un recommendateur IoT pour le ski intelligent qui fournit des itinéraires de ski comprenant des types de pistes spécifiques, ainsi que la piste la plus proche. Pour les itinéraires de ski, il n’existe aucun moteur de calcul stable. Par conséquent, un nouveau moteur de routage pour les itinéraires de ski a été développé. Ce travail a également été intégré dans le cas d'utilisation du ski intelligent du projet WISE-IoT. Deuxièmement, bien que le recommandateur IoT développé pour le stationnement intelligent soit conforme au GDPR, il ne protège toutefois pas totalement la vie privée des utilisateurs. En effet, le partage sans discernement des données des utilisateurs avec un système tiers de recommandation de stationnement IoT non approuvé ou semi-fiable provoque une violation de la vie privée. En effet, le comportement et les schémas de mobilité des utilisateurs pouvant être déduits en analysant l'historique de leurs déplacements. Par conséquent, nous préservons la confidentialité des utilisateurs contre le système de recommandation de stationnement tout en analysant leur historique de stationnement en utilisant des techniques de k-anonymat et de confidentialité différentielle. Enfin, étant donné que les applications de villes intelligentes sont développées de manière verticale et ne se parlent pas. Par conséquent, nous avons proposé deux cadres pour les services de recommandation parmi les applications de villes intelligentes utilisant l'IdO social
During the past decade, the Internet of Things (IoT) technology has revolutionized almost all the fields of daily life and has boosted smart cities. Smart cities use IoT technology to collect various types of sensors’ data and then use such data to offer a variety of applications. Since the smart cities’ applications are used by the citizens, therefore providing the customized recommendation services to the citizens based on their preferences, locations and profiles, as well as by exploiting the IoT data (e.g., traffic congestion and parking occupancy) is of great importance which could be provided by an IoT recommender. However, since the IoT recommender utilizes the private data of citizens (e.g., profiles, preferences and habits), it breaches the privacy of the users because the IoT recommender could track the routines and habits of the users by analyzing the historical database or by analyzing the regular recommendation services it offers. Therefore, it is important to preserve the privacy of the users from the IoT recommender. In this thesis, we propose a novel privacy preserving IoT recommender system for smart cities that provides recommendations by exploiting the IoT data of sensors and by considering various metrics. Our approach is organized in three parts. Firstly, we develop an EU General Data Protection Regulation (GDPR)-compliant IoT recommender system for smart parking system that provides recommendations of parking spots and routes by exploiting the data of parking and traffic sensors. For this, we first propose an approach for the mapping of traffic sensors with route coordinates in order to analyze the traffic conditions (e.g., the level of congestion) on the roadways and then developed an IoT recommender. The IoT recommender has been integrated into the smart parking use case of an H2020 EU-KR WISE-IoT project and has been evaluated by the citizens of Santander, Spain through a prototype. Additionally, we develop an IoT recommender for smart skiing that provides skiing routes comprised of specific types of slopes, as well as the nearest slope. For skiing routes, there does not exist any stable routing engine. Therefore, a novel routing engine for skiing routes was developed. This work has also been integrated into the smart skiing use case of WISE-IoT project. Secondly, although the developed IoT recommender for smart parking is GDPR-compliant, however, it does not fully protect the privacy of users. Because, an indiscriminately sharing of users’ data with untrusted third-party IoT parking recommender system causes a breach of privacy, as user’s behavior and mobility patterns can be inferred by analyzing the past travelling history of users. Therefore, we preserve privacy of users against parking recommender system while analyzing their past parking history using k-anonymity and differential privacy techniques. Lastly, since the smart cities applications are developed in a vertical manner and do not talk/communicate with each other, i.e., each application is developed for a certain scenario which generally does not share data with other smart cities applications. Therefore, we proposed two frameworks for the recommendation services across smart cities applications using social IoT. Firstly, on how social IoT can be used for the recommendation services across smart cities applications, and secondly, we propose another type of communication of social IoT at a global level, i.e., social cross-domain application-to-application communications, that enables smart cities applications to communicate with each other and establish social relationships between them
APA, Harvard, Vancouver, ISO, and other styles
34

HUANG, Kefan. "Data Mining For Residential Buildings Using Smart WiFi Thermostats." University of Dayton / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1619797961458334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hashemi, Arshan. "Fingerprinting the Smart Home: Detection of Smart Assistants Based on Network Activity." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1958.

Full text
Abstract:
As the concept of the Smart Home is being embraced globally, IoT devices such as the Amazon Echo, Google Home, and Nest Thermostat are becoming a part of more and more households. In the data-driven world we live in today, internet service providers (ISPs) and companies are collecting large amounts of data and using it to learn about their customers. As a result, it is becoming increasingly important to understand what information ISPs are capable of collecting. IoT devices in particular exhibit distinct behavior patterns and specific functionality which make them especially likely to reveal sensitive information. Collection of this data provides valuable information and can have some serious privacy implications. In this work I present an approach to fingerprinting IoT devices behind private networks while only examining last-mile internet traffic . Not only does this attack only rely on traffic that would be available to an ISP, it does not require changes to existing infrastructure. Further, it does not rely on packet contents, and therefore works despite encryption. Using a database of 64 million packets logged over 15 weeks I was able to train machine learning models to classify the Amazon Echo Dot, Amazon Echo Show, Eufy Genie, and Google Home consistently. This approach combines unsupervised and supervised learning and achieves a precision of 99.95\%, equating to one false positive per 2,000 predictions. Finally, I discuss the implication of identifying devices within a home.
APA, Harvard, Vancouver, ISO, and other styles
36

Alamatsaz, Navid Reza. "Towards an analytical framework for privacy-preserving aggregation in smart grid." Thesis, Wichita State University, 2014. http://hdl.handle.net/10057/10947.

Full text
Abstract:
Recent changes to the power grid are expected to influence the way energy is provided and consumed by customers. Advanced Metering Infrastructure (AMI) is a tool to incorporate these changes for modernizing the electricity grid. However, this information-based power grid can reveal sensitive private information from the user's perspective as it can gather highly-granular power consumption data. This has led to limited consumer acceptance and proliferation of the smart grid. Hence, it is crucial to design a mechanism to prevent the leakage of such sensitive consumer usage information. Among different solutions for preserving consumer privacy in Smart Grid Networks (SGN), private data aggregation techniques have received a tremendous focus from security researches. In this work, a novel and efficient CDMA-based approach to privacy-preserving aggregation in SGNs, utilizing random perturbation of power consumption data, with limited use of traditional cryptography has been presented. The efficiency and performance of the proposed privacy-preserving data aggregation scheme is evaluated and validated through extensive statistical analyses and simulations. In the past few years, only limited work has been done on quantifying the privacy leakage of the smart grid due to the deployment of the smart meters. The goal of such quantification is to provide a formal framework to show how much privacy is lost in smart metering systems and to what extent the proposed solutions reduce this loss of privacy. As a second research direction, we study the existing metrics for quantifying privacy in various domains. Then, we present four information theoretic metrics to represent the privacy gained by utilizing different Smart grid Privacy Preserving Mechanisms (SPPMs). We investigate the applicability of the theory of information entropy as a potential privacy metric and suggest using conditional entropy, joint entropy, and relative entropy to further analyze the privacy-leakage in smart metering systems.
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
37

Nelte, Michael Andrew. "Distributed authentication to preserve privacy through smart card based biometric matching." Master's thesis, University of Cape Town, 2000. http://hdl.handle.net/11427/6424.

Full text
Abstract:
Bibliography: pages 135-139.
This thesis focuses on privacy concerns, specifically those relating to the storage and use of biometrics. These concerns result from the fact that biometric information is unique. This uniqueness makes the biometric a very strong identifier increasing the possibility that it could be used to monitor an individual's activities. An expert can extract considerable information from a biometric scan, ranging from the age or gender to whether the individual has certain diseases.
APA, Harvard, Vancouver, ISO, and other styles
38

Tang, Xinyao. "Privacy-preserving Sensing and Wireless Communications for IoT-enabled Smart Environments." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1607713752973587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Beussink, Andrew. "Preserving Consumer Privacy on IEEE 802.11s-Based Smart Grid AMI Networks." OpenSIUC, 2014. https://opensiuc.lib.siu.edu/theses/1383.

Full text
Abstract:
While the newly envisioned smart grid will result in a more efficient and reliable power grid, its use of fine-grained meter data has widely raised concerns of consumer privacy. This thesis implements a data obfuscation approach to preserve consumer privacy and assesses its feasibility on a large-scale advanced metering infrastructure (AMI) network built upon the new IEEE 802.11s wireless mesh standard. This obfuscation approach preserves consumer privacy from eavesdroppers and the utility companies while preserving the utility companies' ability to use the fine-grained meter data for state estimation. The impact of this privacy approach is assessed based on its impact on data throughput and delay performance. Simulation results have shown that the approach is feasible to be used even when the network size grows. Additional adaptations to the approach are analyzed for their feasibility in further research.
APA, Harvard, Vancouver, ISO, and other styles
40

Richardson, Christopher. "A privacy preserving approach to security analytics within a smart city." Thesis, Lancaster University, 2017. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747982.

Full text
Abstract:
An architecture was developed which concentrates on the addition of Privacy Enhancing Technologies to a security analytics architecture. In order to validate the efficacy of such an architecture an implementation involving a smart city (a city which makes extensive use of technology to improve aspects such as efficiency) was developed based on the architecture, which is capable of detecting attacks in a privacy preserving manner. It is important to protect the privacy of people whose data is being captured, therefore Privacy Enhancing Technologies were used to accomplish this. A subset of a smart city was chosen for the implementation and evaluation, namely a smart grid, which represents an important area of a smart city. The architecture was evaluated through this implementation in terms of performance and accuracy metrics as well as via a qualitative evaluation.
APA, Harvard, Vancouver, ISO, and other styles
41

Sala, Cardoso Enric. "Advanced energy management strategies for HVAC systems in smart buildings." Doctoral thesis, Universitat Politècnica de Catalunya, 2019. http://hdl.handle.net/10803/668528.

Full text
Abstract:
The efficacy of the energy management systems at dealing with energy consumption in buildings has been a topic with a growing interest in recent years due to the ever-increasing global energy demand and the large percentage of energy being currently used by buildings. The scale of this sector has attracted research effort with the objective of uncovering potential improvement avenues and materializing them with the help of recent technological advances that could be exploited to lower the energetic footprint of buildings. Specifically, in the area of heating, ventilating and air conditioning installations, the availability of large amounts of historical data in building management software suites makes possible the study of how resource-efficient these systems really are when entrusted with ensuring occupant comfort. Actually, recent reports have shown that there is a gap between the ideal operating performance and the performance achieved in practice. Accordingly, this thesis considers the research of novel energy management strategies for heating, ventilating and air conditioning installations in buildings, aimed at narrowing the performance gap by employing data-driven methods to increase their context awareness, allowing management systems to steer the operation towards higher efficiency. This includes the advancement of modeling methodologies capable of extracting actionable knowledge from historical building behavior databases, through load forecasting and equipment operational performance estimation supporting the identification of a building’s context and energetic needs, and the development of a generalizable multi-objective optimization strategy aimed at meeting these needs while minimizing the consumption of energy. The experimental results obtained from the implementation of the developed methodologies show a significant potential for increasing energy efficiency of heating, ventilating and air conditioning systems while being sufficiently generic to support their usage in different installations having diverse equipment. In conclusion, a complete analysis and actuation framework was developed, implemented and validated by means of an experimental database acquired from a pilot plant during the research period of this thesis. The obtained results demonstrate the efficacy of the proposed standalone contributions, and as a whole represent a suitable solution for helping to increase the performance of heating, ventilating and air conditioning installations without affecting the comfort of their occupants.
L’eficàcia dels sistemes de gestió d’energia per afrontar el consum d’energia en edificis és un tema que ha rebut un interès en augment durant els darrers anys a causa de la creixent demanda global d’energia i del gran percentatge d’energia que n’utilitzen actualment els edificis. L’escala d’aquest sector ha atret l'atenció de nombrosa investigació amb l’objectiu de descobrir possibles vies de millora i materialitzar-les amb l’ajuda de recents avenços tecnològics que es podrien aprofitar per disminuir les necessitats energètiques dels edificis. Concretament, en l’àrea d’instal·lacions de calefacció, ventilació i climatització, la disponibilitat de grans bases de dades històriques als sistemes de gestió d’edificis fa possible l’estudi de com d'eficients són realment aquests sistemes quan s’encarreguen d'assegurar el confort dels seus ocupants. En realitat, informes recents indiquen que hi ha una diferència entre el rendiment operatiu ideal i el rendiment generalment assolit a la pràctica. En conseqüència, aquesta tesi considera la investigació de noves estratègies de gestió de l’energia per a instal·lacions de calefacció, ventilació i climatització en edificis, destinades a reduir la diferència de rendiment mitjançant l’ús de mètodes basats en dades per tal d'augmentar el seu coneixement contextual, permetent als sistemes de gestió dirigir l’operació cap a zones de treball amb un rendiment superior. Això inclou tant l’avanç de metodologies de modelat capaces d’extreure coneixement de bases de dades de comportaments històrics d’edificis a través de la previsió de càrregues de consum i l’estimació del rendiment operatiu dels equips que recolzin la identificació del context operatiu i de les necessitats energètiques d’un edifici, tant com del desenvolupament d’una estratègia d’optimització multi-objectiu generalitzable per tal de minimitzar el consum d’energia mentre es satisfan aquestes necessitats energètiques. Els resultats experimentals obtinguts a partir de la implementació de les metodologies desenvolupades mostren un potencial important per augmentar l'eficiència energètica dels sistemes de climatització, mentre que són prou genèrics com per permetre el seu ús en diferents instal·lacions i suportant equips diversos. En conclusió, durant aquesta tesi es va desenvolupar, implementar i validar un marc d’anàlisi i actuació complet mitjançant una base de dades experimental adquirida en una planta pilot durant el període d’investigació de la tesi. Els resultats obtinguts demostren l’eficàcia de les contribucions de manera individual i, en conjunt, representen una solució idònia per ajudar a augmentar el rendiment de les instal·lacions de climatització sense afectar el confort dels seus ocupants
APA, Harvard, Vancouver, ISO, and other styles
42

Hellbe, Anton, and Gustaf Bohlin. "Evaluating IoT cloud platforms in the context of smart buildings." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20027.

Full text
Abstract:
Smarta byggnader är ett vanligt användningsområde för både Internet of Things (IoT)enheter och molntjänster. På senare tid har molntjänstleverantörer som Amazon, Googleoch Microsoft börjat erbjuda IoT-molnplattformar. Dessa består av en klass av tjänstersom utgör en bas för molnapplikationer som används av IoT-enheter. Idag finns det mångaolika leverantörer som tillhandahåller denna tjänsten och att välja en för en IoT-lösning ärsvårt. I denna rapport beskrivs utvecklingen av ett system som är vanligt förekommandei en smart byggnad. I denna rapport utvärderas IoT-molnplattformar för användninginom området smarta byggnader som en del av ett uppdrag från Sigma Lundinova. Förutvärderingen implementeras ett vanligt scenario i en smart byggnad som en prototyp medhjälp av två olika IoT-molnplattformar. Syftet med detta är att utvärdera och jämföra hurväl IoT-molnplattformarna stödjer utveckling av systemet beskrivet av scenariot. Genomatt implementera en prototyp insamlas underlag i form av kunskap och erfarenhet somanvänds i utvärderingen. Utvärderingen kan användas som ett hjälpmedel för att göradet lättare att välja en IoT-molnplattform när man utvecklar IoT-lösningar för smartabyggnader.
Smart buildings is a common application for both Internet of Things (IoT) devices andcloud services. Recently cloud service providers such as Amazon, Google and Microsofthave started to offer IoT cloud platforms which consist of a class of services that providea base for cloud applications utilized by IoT devices. However, there are many differentproviders of IoT cloud platforms and selecting one for an IoT solution for a smart buildingis difficult. In this thesis two IoT cloud platforms are evaluated in the context of smartbuildings as part of an assignment given by Sigma Lundinova. To evaluate the IoT cloudplatforms a common smart building scenario is realized by implementing a prototype usingtwo different IoT cloud platforms. The development process makes it possible to evaluatehow well the platforms support the development of the system that the scenario describes.The evaluation is based on information and experience from the process of developing thesystem using the IoT cloud platforms. The evaluation can be used as a guidance whenselecting IoT cloud platform for an IoT solution intended for a smart building.
APA, Harvard, Vancouver, ISO, and other styles
43

Zhong, Wanyun. "Chilled Water Storage for Effective Energy Management in Smart Buildings." University of Toledo / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1396146461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Agarwal, Rahul. "Graph-Based Simulation for Cyber-Physical Attacks on Smart Buildings." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/103614.

Full text
Abstract:
As buildings evolve towards the envisioned smart building paradigm, smart buildings' cyber-security issues and physical security issues are mingling. Although research studies have been conducted to detect and prevent physical (or cyber) intrusions to smart building systems(SBS), it is still unknown (1) how one type of intrusion facilitates the other, and (2) how such synergic attacks compromise the security protection of whole systems. To investigate both research questions, the author proposes a graph-based testbed to simulate cyber-physical attacks on smart buildings. The testbed models both cyber and physical accesses of a smart building in an integrated graph, and simulates diverse cyber-physical attacks to assess their synergic impacts on the building and its systems. In this thesis, the author presents the testbed design and the developed prototype, SHSIM. An experiment is conducted to simulate attacks on multiple smart home designs and to demonstrate the functions and feasibility of the proposed simulation system.
Master of Science
A smart home/building is a residence containing multiple connected devices which enable remote monitoring, automation, and management of appliances and systems, such as lighting, heating, entertainment, etc. Since the early 2000s, this concept of a smart home has becomequite popular due to rapid technological improvement. However, it brings with it a lot of security issues. Typically, security issues related to smart homes can be classified into two types - (1) cybersecurity and (2) physical security. The cyberattack involves hacking into a network to gain remote access to a system. The physical attack deals with unauthorized access to spaces within a building by damaging or tampering with access control. So far the two kinds of attacks on smart homes have been studied independently. However, it is still unknown (1) how one type of attack facilitates the other, and (2) how the combination of two kinds of attacks compromises the security of the whole smart home system. Thus, to investigate both research questions, we propose a graph-based approach to simulate cyber-physical attacks on smart homes/buildings. During the process, we model the smart home layout into an integrated graph and apply various cyber-physical attacks to assess the security of the smart building. In this thesis, I present the design and implementation of our tool, SHSIM. Using SHSIM we perform various experiments to mimic attacks on multiple smart home designs. Our experiments suggest that some current smart home designs are vulnerable to cyber-physical attacks
APA, Harvard, Vancouver, ISO, and other styles
45

Lindqvist, Anna. "Threats to smart buildings : Securing devices in a SCADA network." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176723.

Full text
Abstract:
This paper examines the possibilities of performing tests with the aim to ensure that devices in a SCADA network can be deemed secure before deployment. SCADA systems are found in most industries and have recently seen an increased use in building automation, most importantly the healthcare sector, which means that a successful attack toward such a system could endanger lives of patients and healthcare professionals.The method of testing was created to examine whether devices conflicted with the security flaws identified by OWASP IoT Top 10 list, meaning that OWASP IoT Top 10 was the foundation for the methodology used in this paper.Results of the tests show that the devices used in testing are not in conflict with the OWASP IoT Top 10 list when using the default settings. However, some settings that can be enabled on the devices would constitute a security risk if enabled.
APA, Harvard, Vancouver, ISO, and other styles
46

Aguilar, Ramon Luis Miguel, and Casafranca Sebastian Alejandro Peralta. "Arquitectura tecnológica para la implementación de smart buildings con IoT." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/656671.

Full text
Abstract:
La sociedad está siendo testigo de una revolución digital que ha generado cambios en diversos ámbitos, entre los cuales se encuentra la construcción o transformación de edificios comunes a Smart Buildings (SB), lo que puede conseguir que varios aspectos como la seguridad, el consumo energético, entre otros, se gestionen con mayor eficiencia. El desarrollo de SBs es acompañado del desarrollo de las tecnologías IoT (Internet of Things), las cuales son una opción de soporte para convertir un edificio en inteligente. Sin embargo, la implementación de SBs está sujeta a varios riesgos que no se han cubierto en conjunto, destacando tres de ellos que son la incapacidad de escalar el SB para que se adapte a nuevos requisitos (escalabilidad), que los dispositivos IoT (sensores y actuadores) no sean compatibles entre ellos (incompatibilidad), y que la transmisión de datos en el sistema sea vulnerada por agentes maliciosos (seguridad en la transmisión de datos). Siendo así, el presente proyecto propone una arquitectura tecnológica para las implementaciones de SBs con IoT que brinde a las organizaciones un diseño guía que les permita cambiar sus componentes según la complejidad y exigencia de sus requerimientos, y que solucione en conjunto los tres riesgos previamente mencionados. Finalmente, el resultado del proyecto es una arquitectura tecnológica para las implementaciones de SBs validada en el cumplimiento de los requisitos planteados.
Society is witnessing a digital revolution that has generated changes in various areas, among which is the construction or transformation of common buildings to Smart Buildings (SB), which can achieve that various aspects such as security, energy consumption, among other things, are managed more efficiently. The development of SBs is accompanied by the development of IoT (Internet of Things) technologies, which can support the transformation of a regular building into an SB. However, the implementation of SBs is subject to several risks that have not been covered together, highlighting three of them which are the inability to scale the SB to adapt to new requirements (scalability), that IoT devices (sensors and actuators) are not compatible with each other (incompatibility), and that the data transmission inside the system is compromised by malicious agents (security in data transmission). Thus, this project proposes a technological architecture for the implementations of SBs with IoT that provides organizations with a guiding design that allows them to change their components according to the complexity and demand of their requirements, and that jointly solves the three previously mentioned risks. Finally, the result of the project is a technological architecture for the implementations of SBs validated in the fulfillment of the raised requirements.
Tesis
APA, Harvard, Vancouver, ISO, and other styles
47

López, Rodríguez-Roselló Jorge. "Stability of Networked Control Systems with Applications in Smart Buildings." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-214700.

Full text
Abstract:
Wireless sensor networks (WSNs) appeared in themiddle of the last century for military purposes although nowadaysthey are used in multiple areas. This paper focuses on smartbuildings, where WSNs play a key role. The aim of this studyis to obtain and examine the stability conditions of networkedcontrol systems (NCSs). More specifically, the thermal control ofa room is analyzed using classical control- and hybrid- theory.Communication between system and controller is established witha not-reliable network, inducing uncertainties. The cases herebystudied are: i) constant and time-varying delays, ii) data loss insystem’s output; and iii) quantization on system’s measurement.These three cases are compared with three benchmark controlstrategies, namely: PID, state feedback, and time stamp MPC.In all these systems, the most critical aspect is the temperatureovershoot. This study, by running several simulations, concludesthat time stamp MPC performs, under high probability of dataloss or high delays, better than any other analyzed system.
APA, Harvard, Vancouver, ISO, and other styles
48

Skandhakumar, Nimalaprakasan. "Integrated access control for smart buildings using building information models." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/72922/1/Nimalaprakasan_Skandhakumar_Thesis.pdf.

Full text
Abstract:
This thesis investigates the use of building information models for access control and security applications in critical infrastructures and complex building environments. It examines current problems in security management for physical and logical access control and proposes novel solutions that exploit the detailed information available in building information models. The project was carried out as part of the Airports of the Future Project and the research was modelled based on real-world problems identified in collaboration with our industry partners in the project.
APA, Harvard, Vancouver, ISO, and other styles
49

Poolla, Chaitanya. "A Prediction and Decision Framework for Energy Management in Smart Buildings." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/729.

Full text
Abstract:
By 2040, global CO2 emissions and energy consumption are expected to increase by 40%. In the US, buildings account for 40% of national CO2 emissions and energy consumption, of which 75% is met by fossil fuels. Reducing this impact on the environment requires both improved building energy efficiency and increased renewable utilization. To this end, this dissertation presents a demand-supplystorage- based decision framework to enable strategic energy management in smart buildings. This framework includes important but largely unaddressed aspects pertaining to building demand and supply such as occupant plugloads and the integration of weather forecast-based solar prediction, respectively. We devote the first part of our work to study occupant plugloads, which account for up to 50% of demand in high performance buildings. We investigate the impact of plugload control mechanisms based on the analysis of real-world data from experiments we conducted at NASA Ames sustainability base and Carnegie Mellon University (SV campus). Our main contribution is in extending existing demand response approaches to an occupant-in-the-loop paradigm. In the second part of this work, we describe methods to develop weather forecastbased solar prediction models using both local sensor measurements and global weather forecast data from the National Ocean and Atmospheric Administration (NOAA).We contribute to the state-of-the-art solar prediction models by proposing the incorporation of both local and global weather characteristics into their predictions. This weather forecast-based solar model plus the plugload-integrated demand model, along with an energy storage model constitutes the weather-driven plugloadintegrated decision-making framework for energy management. To demonstrate the utility of this framework, we apply it to solve an optimal decision problem with the objective of minimizing the energy-related operating costs associated with a smart building. The findings indicate that the optimal decisions can result in savings of up to 74% in the expected operational costs. This framework enables inclusive energy management in smart buildings by accounting for occupants-in-the-loop. Results are presented and discussed in the context of commercial office buildings.
APA, Harvard, Vancouver, ISO, and other styles
50

Khan, Md Sakib Nizam. "Privacy in the Age of Autonomous Systems." Licentiate thesis, KTH, Teoretisk datalogi, TCS, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-285909.

Full text
Abstract:
Autonomous systems have progressed from theory to application especially in the last decade, thanks to the recent technological evolution. The number of autonomous systems in our surroundings is increasing rapidly. Since these systems in most cases handle privacy-sensitive data, the privacy concerns are also increasing at a similar rate. However, privacy research has not been in sync with these developments. Moreover, the systems are heterogeneous in nature and continuously evolving which makes the privacy problem even more challenging. The domain poses some unique privacy challenges which are not always possible to solve using existing solutions from other related fields. In this thesis, we identify open privacy challenges of autonomous systems and later propose solutions to some of the most prominent challenges. We investigate the privacy challenges in the context of smart home-based systems including Ambient Assisted Living (AAL) systems as well as autonomous vehicles. In the case of smart home, we propose a framework to enhance the privacy of owners during ownership change of IoT devices and conduct a systematic literature review to identify the privacy challenges of home-based health monitoring systems. For autonomous vehicles, we quantify, improve, and tune the privacy utility trade-off of the image de-identification process. Our investigation reveals that there is a lack of consideration when it comes to the privacy of autonomous systems and there are several open research questions in the domain regarding, for instance, privacy-preserving data management, quantification of privacy utility trade-off, and compliance with privacy laws. Since the field is evolving, this work can be seen as a step towards privacy preserving autonomous systems. The identified privacy concerns and their corresponding solutions presented in this thesis will help the research community to identify and address existing privacy concerns of autonomous systems. Solving the concerns will encourage the end-users to adopt the systems and enjoy the benefits without bothering about privacy.

QC 20201116

APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography