Thèses sur le sujet « IoT Protocol »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : IoT Protocol.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleures thèses pour votre recherche sur le sujet « IoT Protocol ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

Karim, Hawkar. « IoT Networking Using MPTCP Protocol ». Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-48424.

Texte intégral
Résumé :
The progress of technology is moving in a rapid pace forward, with new solutions and improvements being developed each year. Internet of Things (IoT) is one area of computer science that seen a growing interest from the population leading to more deployments of the technology. IoT devices often operate in low-power lossy networks making them depend upon low energy consumption but also high reliability. As the devices become more mobile this also exposes several challenges, one being connectivity in regard to mobility. Our proposed solution to this problem use Multipath Transmission Control Protocol (MPTCP) as a way of delivering high level of performance and connectivity and thereby high reliability. There has been research and implementations of MPTCP in different networks, however in low power radio networks, such as the ones IoT devices resides in, it is still a novel idea.  We reproduced and tested an implementation of MPTCP, against a similar network that is using regular TCP and compared the results. The MPTCP network showed a higher throughput and data transfer, proving to be more efficient while also providing a higher level of reliability in regard to connectivity. However, MPTCP showed a higher rate of packet retransmission compared to regular TCP. To be able to fully deploy MPTCP in low energy IoT devices there needs to be more improvements to accommodate the needs that such networks depend upon. There are use cases, such as for mobile cellular devices where MPTCP would make an impactful difference.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Pettersson, William. « An Evaluation of IoT Protocol Efficiency and suitability : For smart vehicles, smart homes & ; industrial scenarios ». Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42392.

Texte intégral
Résumé :
Internet of things (IoT) är det överläggande området i denna rapport. IoT är ett väldigt intressant I nuläget och är snabbt växande. IoT kan beskrivas som ett nätverk av kommunicerande enheter som delar information och automatiserar eller försimplar uppgifter och därav ökar effektivitet och säkerhet. Området växer så pass fort att det förväntas vara 24 miljarder anslutna enheter vid år 2050, denna utökning leder i sin tur till ett ökat behov av förståelse för IoT protokollen som hanterar kommunikationen emellan enheterna. Detta för att kunna välja det mest optimala protokollet för ett givet scenario. Detta arbete kommer att välja ett lovande protokoll för undersökning samt evaluering gällande dess prestation berörande fördröjning, dataöverföringshastighet och skalbarhet.  Protokollet som valdes var MQTT (Message Queuing Telemetry Transport). Baserat på dessa evaluerade värden föra en diskussion gällande protokollets lämplighet inom scenariona. Värdena kommer att tas fram via tidmätningar start till slut för kommunikationen samt tid för att skicka en mängd meddelanden, båda i respekt till antalet samtidigt kommunicerande program. Testen körs med en lokal PC som agerar Broker och en Raspberry Pi som kör samtliga programmen i individuella terminaler. Resultaten var att fördröjningen verkar ha en näst intill linjär relation och dataöverföringshastighet ett exponentiellt avtagande beteende i respekt till samtidigt kommunicerande enheter. Dem mätta resultaten analyseras och diskuteras, och kommer till slutsatsen att protokollet är en lämplig kandidat för de flesta scenarion, så som smarta bilar, smarta hem och till viss del industriell användning. Den största nackdelen med protokollet var dess höga standardavvikelse gällande individuella meddelandens fördröjning.
Internet of things (IoT) is the base topic of this thesis, and it is a rapidly growing area, it can be described  as a network of communicating devices sharing information and streamlining tasks in addition to increasing efficiency and security. It is expected to be 24 billion connected devices by year 2050 and with this growth comes an increased demand on understanding the IoT protocols to be able to choose a suitable protocol for a given scenario. This thesis will discuss this area and pick one protocol to evaluate specifically regarding latency, throughput, and scalability. The protocol chosen were MQTT (Message Queuing Telemetry Transport). Based on these values then discuss whether the protocol is a suitable candidate for the scenarios. The data to evaluate this will be gathered by measuring the end-to-end time of the protocol in respect to the number of communicating programs, and to measure the time it takes to communicate a number of messages with respect to the number of programs handling the communication. These tests are performed with a local PC acting as the broker and a Raspberry pi running each of the communicating programs on individual terminals. The results were that latency seem to have a close to liner relation, and that throughput seem to have an exponentially decreasing relation with respect to number of clients cooperating. The measured results are analyzed and discussed and concluded that the protocol is a fitting candidate for most scenarios such as smart cars, smart homes and to some extent industry. The biggest flawed concluded was the protocols high standard deviation for individual messages latency. The outcome of the benchmarks measurement showed that increasing the number of nodes would not result in superior performance. It was noted that an optimal number of nodes was found to be between 1 and 20 for all the tests performed. The study showed that no load balancer could be considered a clear winner, instead, different configurations of load balancers performed varyingly well at different tests.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Bassi, Lorenzo. « Orchestration of a MEC-based multi-protocol IoT environment ». Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24114/.

Texte intégral
Résumé :
Nowadays we are witnessing to a continuous increasing of the number of IoT devices that must be configured and supported by modern networks. Considering an industrial environment, there is a huge number of these devices that need to coexist at the same time. Each one of them is using its own communication/transport protocol, and a huge effort needs to be done during the setup of the system. In addition, there are also different kind of architectures that can be used. That’s why the network setup is not so easy in this kind of heterogeneous environment. The answer to all these problems can be found in the emerging cloud and edge computing architectures, allowing new opportunities and challenges. They are capable of enable on-demand deployment of all the IoT services. In this thesis is proposed a Multi-access Edge Computing (MEC) approach to face all the possible multi-protocol scenarios. All the services are transformed into MEC-based services, even if they are running over multiple technological domains. As result, was proved that this kind of solution is effective and can simplify the deployment of IoT services by using some APIs defined by the MEC standard. As above mentioned, one of the most important tasks of these new generation’s networks is to be self-configurable in very low amount of time and this will be the scope of my research. The aim of this thesis is to try to reduce as much as possible the time that a certain network requires to be self-configured in an automatic way considering an Industrial IoT as a Service (IIoTaaS) scenario.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Fakhraddin, Haider. « Toward IoT : Implementation of WSN based MQTT Data Protocol ». Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-92453.

Texte intégral
Résumé :
Human seeks the maximum profits with least efforts in each and every single life aspect. The development of technology starting with the machine-to-machine concept to reduce human interface with manufacturing processes, hence reducing errors, cost and time. The development enters a new era of connecting those machines and devices to internet, and furthermore make part of data processing and analysis at those machine or devices parts. This concept is what is known nowadays as the Internet of Things (IoT). In this thesis, design for a proposed system is introduced. MQTT messaging protocol used as the data exchange protocol to aggregate the data from WSN that incorporated local and remote sensor. ATmega 328 microcontroller unit, NodeMCU development board, SIM800L GSM module and DHT11 sensor modules where used to implement the nodes while Raspberry Pi 3B was used to implement a gateway that acts as the MQTT broker in order to aggregate the data. The proposed system has been implemented and tested successfully. The power consumption for the remote sensor nodes consumed only 20 mWh and the response time for the data transferred within the system’s network from the remote sensor node to the server is about 7 milliseconds with a total error of 0.11%. The system shows an excellent performance and provide a simple solution to link remote sensors which are out of the gateway’s local network coverage.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Shahidi, Hamed. « Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices ». Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40113.

Texte intégral
Résumé :
This research studies the security challenges in IoT devices. At first, security challenges have been described and then specifically the security of communication protocols in the IoT has been addressed. Finally, among different communication protocols, ZigBee and Z-Wave protocols have been chosen for this study. The criterion for choosing these two protocols is the level of security they provide for IoT devices to protect them against unauthorized access and hacking. Security, frequency, power consumption and data rate are the characteristics that have been discussed in the review of these two protocols. In the end, a comparison of the various features of these two protocols clarified that the security of IoT devices in each of these protocols depends on the type of the IoT device, the required range and other requirements, however, in most cases the ZigBee protocol showed more security than Z-Wave.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Silva, Douglas Simões. « Formal verification and access control approach of an IoT protocol ». reponame:Repositório Institucional da UFSC, 2017. https://repositorio.ufsc.br/xmlui/handle/123456789/181251.

Texte intégral
Résumé :
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Ciência da Computação, Florianópolis, 2017.
Made available in DSpace on 2017-11-21T03:21:45Z (GMT). No. of bitstreams: 1 348588.pdf: 768167 bytes, checksum: 63943b853c6e5069f7f7d2a95f11f8e8 (MD5) Previous issue date: 2017
Protocolos de Segurança estão na nossa rotina diária e exemplos distosão compras utilizando o cartão de crédito, eleição eletrônica, redes sem fio e etc. O primeiro objetivo deste trabalho é a verificação formal dos aspectos de segurança de um protocolo voltado para Wireless Sensor Networks (WSN). O Trustful Space-Time Protocol (TSTP) engloba a maioria das características necessárias para aplicações WSN como por exemplo controle de acesso, roteamento geográfico de pacotes, estimativa de localização, relógio precisamente sincronizado, canais de comunicação segura e um esquema de distribuição de chaves entre o gateway e os sensores. Após a análise formal do protocolo de distribuição de chaves do TSTP usando Proverif, nós encontramos duas falhas de segurança: uma relacionada ao componente de sincronização de tempo e outra relacionada ao método mac-then-encrypt empregado. Com as falhas encontradas nós propómos uma versão melhorada do protocolo de distribuição de chaves. O segundo objetivo é criar um esquema de controle de acesso sensível ao contexto para dispositivos Internet de Coisas(IoC) usando TSTP como canal de comunicação. O esquema da política foi projetado para um cenário Smart Campus e seu contexto. Aproveitamos os recursos do TSTP para adicionar dados de tempo e espaço como contexto para o nosso modelo. Após o desenho do modelo de política, descrevemos seu modelo simbólico e fizemos uma análise formal para ter certeza de que os valores das propriedades de contexto não foram adulterados.
Abstract : Security protocols are included in our every day routine. A few examplesare credit card purchases, e-voting, wireless networks, etc. Thefirst goal of this dissertation is the formal verification of the securityaspects of a cross-layer, application-oriented communication protocolfor Wireless Sensor Networks (WSN). The Trustful Space-Time Protocol(TSTP) encompasses a majority of features recurrently needed byWSN applications like medium access control, geographic routing, locationestimation, precise time synchronization, secure communicationchannels and a key distribution scheme between sensors and the sink.After the security protocol analysis of TSTP?s key distribution protocolusing ProVerif we were able to find two security flaws: one related tothe time synchronization component and another being a bad approachrelated to a mac-then-encrypt method employed. With our findingswe propose an improved version of the key distribution protocol. Thesecond goal is to create a context-aware access control scheme for Internetof Things(IoT) devices using TSTP as a communication channel.The policy?s scheme was designed for a Smart Campus scenario andits context. We take advantage of TSTP?s features to add time andspace data as context for our model too. After the design of the policymodel, we described its symbolic model and we did a formal analysisto be sure that the context properties values were not tampered.
Styles APA, Harvard, Vancouver, ISO, etc.
7

van, Leeuwen Daniel, et Leonel Taku Ayuk. « Security testing of the Zigbee communication protocol in consumer grade IoT devices ». Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.

Texte intégral
Résumé :
With the ever increasing number of Internet of Things devices going out on the market for consumers that are Zigbee certified there is a need for security testing. This is to make sure that security standards are upheld and improved upon in order to make sure networks are protected from unauthorized users. Even though a lot of research and testing has been done on the Zigbee key exchange mechanism, called Zigbee commissioning, improvements have still not been enough with severe vulnerabilities in consumer grade devices still existing today. The devices tested in this study use EZ-mode commissioning in order to exchange the network key between a Zigbee coordinator and a Zigbee end device in order to encrypt later communication after being paired.  By using a simple radio receiver and a packet capturing program such as Wireshark an eavesdropping attack was conducted in order to capture the network key. The experiment demonstrates that this is still a weak point as the network key was successfully captured using eavesdropping. The analysis of the results show that previous criticisms of Zigbee commissioning have still not fully been addressed and can be a potential weak point in networks that use Zigbee certified IoT products.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Ferrari, Nico. « Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices ». Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36975.

Texte intégral
Résumé :
The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. The integration of Wireless Sensor Networks in the Internet of Things creates new obstacles due to the necessity of finding a balance between the resources utilization and the applied security solutions. In multicast group communications, the energy consumption, bandwidth and processing overhead at the nodes are minimized in comparison to a point-to-point communication system. To securely transmit a message in order to maintain confidentiality of the data and the user’s privacy, usually involves human interaction or the pre-agreement upon some key, the latter unknown to an external attacker. In this thesis, the author proposed an authentication protocol based on the similar context between the correct devices and lightweight computationally secure group-key establishment, avoiding any kind of human involvement. The goal is achieved by having the devices calculate a fingerprint from their ambient context and through a fuzzy commitment scheme generating a commitment respectively opening value which is used to generate a common secret key between them. The tests are effected on real world data accumulated from different environments. The proposed scheme is based on elliptic curve cryptography and cryptographic one-way accumulators. Its feasibility is analyzed by implementing the group key establishment phase in the Contiki operating system and by simulating it with the Cooja simulator. Furthermore, the applicability of the protocol is analyzed and justified by an analysis of the storage overhead, communication overhead, and energy consumption. The simulator shows an energy consumption of only 112 mJ per node for group key establishment. The results obtained in this thesis demonstrate the feasibility of the scheme, it’s computational, and communication costs are further comparable to other similar approaches.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Nguyen, Ngo Minh Thang. « Test case generation for Symbolic Distributed System Models : Application to Trickle based IoT Protocol ». Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC092.

Texte intégral
Résumé :
Les systèmes distribués sont composés de nombreux sous-systèmes distants les uns des autres. Afin de réaliser une même tâche, les sous-systèmes communiquent à la fois avec l’environnement par des messages externes et avec d’autres sous-systèmes par des messages internes, via un réseau de communication. En pratique, les systèmes distribués mettent en jeu plusieurs types d’erreurs, propres aux sous-systèmes les constituant, ou en lien avec les communications internes. Afin de s’assurer de leur bon fonctionnement, savoir tester de tels systèmes est essentiel. Cependant, il est très compliqué de les tester car sans horloge globale, les sous-systèmes ne peuvent pas facilement synchroniser leurs envois de messages, ce qui explique l’existence des situations non déterministes. Le test à base de modèles (MBT) est une approche qui consiste à vérifier si le comportement d’un système sous test (SUT) est conforme à son modèle, qui spécifie les comportements souhaités. MBT comprend deux étapes principales: la génération de cas de test et le calcul de verdict. Dans cette thèse, nous nous intéressons à la génération de cas de test dans les systèmes distribués. Nous utilisons les systèmes de transition symbolique temporisé à entrées et sorties (TIOSTS) et les analysons à l’aide des techniques d’exécution symbolique pour obtenir les comportements symboliques du système distribué. Dans notre approche, l’architecture de test permet d’observer au niveau de chaque soussystème à la fois les messages externes émis vers l’environnement et les messages internes reçus et envoyés. Notre framework de test comprend plusieurs étapes: sélectionner un objectif de test global, défini comme un comportement particulier exhibé par exécution symbolique, projeter l’objectif de test global sur chaque sous-système pour obtenir des objectifs de test locaux, dériver des cas de test unitaires pour chacun des sous-systèmes. L’exécution du test consiste à exécuter des cas de test locaux sur les sous-systèmes paramétrés par les objectifs de tests en calculant à la volée les données de test à soumettre au sous-système en fonction de données observées. Enfin, nous mettons en œuvre notre approche sur un cas d’étude décrivant un protocole utilisé dans le contexte de l’IoT
Distributed systems are composed of many distant subsystems. In order to achieve a common task, subsystems communicate both with the local environment by external messages and with other subsystems by internal messages through a communication network. In practice, distributed systems are likely to reveal many kinds of errors, so that we need to test them before reaching a certain level of confidence in them. However, testing distributed systems is complicated due to their intrinsic characteristics. Without global clocks, subsystems cannot synchronize messages, leading to non-deterministic situations.Model-Based Testing (MBT) aims at checking whether the behavior of a system under test (SUT) is consistent with its model, specifying expected behaviors. MBT is useful for two main steps: test case generation and verdict computation. In this thesis, we are mainly interested in the generation of test cases for distributed systems.To specify the desired behaviors, we use Timed Input Output Symbolic Transition Systems (TIOSTS), provided with symbolic execution techniques to derive behaviors of the distributed system. Moreover, we assume that in addition to external messages, a local test case observes internal messages received and sent by the co-localized subsystem. Our testing framework includes several steps: selecting a global test purpose using symbolic execution on the global system, projecting the global test purpose to obtain a local test purpose per subsystem, deriving unitary test case per subsystem. Then, test execution consists of executing local test cases by submitting data compatible following a local test purpose and computing a test verdict on the fly. Finally, we apply our testing framework to a case study issued from a protocol popular in the context of IoT
Styles APA, Harvard, Vancouver, ISO, etc.
10

Alm, Anton. « Internet of Things mesh network : Using the Thread networking protocol ». Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.

Texte intégral
Résumé :
This thesis summarizes my project in setting up a Thread network. The idea of this project was presented by the company ÅF in Karlstad, Sweden. ÅF wishes to upgrade their current demonstrator for IoT. The current demonstrator includes Azure Cloud component, Raspberry Pi, Bluetooth and Arduino components. The upgrade includes implementing Thread technology together with Thread verified hardware from Nordic semiconductor and the Raspberry Pi Foundation. Thread is an IoT mesh networking protocol that was released year 2014. Compared to Bluetooth it offers IP communication (including IPv6) combined with higher reliability, performance and security. The process of installing, compiling and configuring the Thread network is explained. The result is an operational thread network that has sensor devices sending data to an HTTP web server, where the data is stored and monitored. Though, there are many improvements and functions that can be implemented to make this demonstrator more appealing.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Kara, Dilen, et Zaid Jalil. « IoT-nätverk baserade på LoRaWAN : Informationskvalitet i LoRaWAN ». Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-41399.

Texte intégral
Résumé :
The Internet was initially built around networks based on physical cables, the next step to improve the accessibility of the Internet came with the introduction of wireless communication. the next step to improving accessibility to the Internet came with the introduction of wireless communication. Because the IoT products are wirelessly connected, they need an internal power source in the form of a battery. Many of the existing communication protocols are therefore not suitable for IoT solutions because they are power consuming. Alternatives to these communication protocols have therefore been developed, for example LTE-M, NB-IoT and LoRaWAN. The study was conducted in cooperation with Etteplan. Etteplan want to invest in LoRaWAN and thus want to gain deeper knowledge within LoRaWAN. Thus, it was chosen to investigate how different factors affect the signal strength transmission time in a LoRaWAN. The focus of the study has thus been on the communication between an IoT node and a receiver in a LoRaWAN, thus the purpose of the study: To show how different data rates, distances and environments affect the quality of information sent from an IoT node to a receiver in LoRaWAN. Design science research was used as a research method, in design science research an artefact is constructed and then studied. In this study, a LoRaWAN was constructed and the communication between an IoT node and receiver in this LoRaWAN was studied. To study the communication between the IoT node and the receiver, two experiments were performed. The experiments were performed simultaneously where the difference was in the data collected, one experiment collected the signal strength and the second the transmission time. The experiment was conducted in two different environments, one with a clear view and one with blockages. In the experiment, the IoT node was positioned at different distances with different data rates. The result of the study shows how different data rates, distances and environments affected the quality of information between an IoT node and receiver and how they relate to previous research. Data rate was the factor that affected the quality of the information most. Data rate had minimal impact on signal strength, but great impact on number of lost data packet and transmission times. The two different environments had no effect on the transmission time, but the signal strength was over 10 dbm lower in the urban environment than with clear view. The distance had no effect on transmission time and minimal impact on signal strength.
Internet var i begynnelsen uppbyggt kring nätverk baserade på fysiska kablar, nästa steg för att förbättra tillgängligheten till Internet kom med introduktionen av trådlös kommunikation. Ett nytt begrepp dök upp vid millennieskiftet, Internet of Things (IoT). Tanken bakom IoT är att olika typer av produkter, som exempelvis tandborstar och kylskåp trådlöst kopplas upp mot Internet. Eftersom IoT-produkterna är trådlöst uppkopplade behöver de en intern strömkälla i form av ett batteri. Många av de existerande kommunikationsprotokollen lämpar sig därför inte för IoT-lösningar eftersom dessa är strömkrävande. Alternativ till dessa kommunikationsprotokoll har därför tagits fram, till exempel LTE-M, NB-IoT och LoRaWAN. Studien utfördes i samarbete med Etteplan. Etteplan vill satsa på LoRaWAN och vill därmed få en djupare kunskap inom LoRaWAN. Därmed valdes det att undersöka hur olika faktorer påverkar signalstyrkan och sändningstiden i ett LoRaWAN. Studiens fokus har därmed varit på kommunikationen mellan en IoT-nod och en mottagare i ett LoRaWAN, därmed är studiens syfte: Att visa på hur olika datahastigheter, avstånd och miljöer påverkar kvaliteten på informationen som sänds från en IoT-nod till en mottagare i ett LoRaWAN. Design science research användes som forskningsmetod då i design science research konstrueras en artefakt som att sedan undersöks. I studiens fall konstruerades ett LoRaWAN där sedan kommunikationen mellan en IoT-nod och mottagare i detta LoRaWAN studerades. För att studera kommunikationen mellan en IoT-nod och en mottagare utfördes två experiment. Experimenten utfördes samtidigt där skillnaden låg i datat som samlades in, det ena experimentet samlade in signalstyrkan och den andra sändningstiden. Experimentet utfördes i två olika miljöer, en med fri sikt och en med blockeringar. I experimentet positionerades IoT-noden på olika avstånd med olika datahastigheter. Resultatet från studien visar hur olika datahastigheter, avstånd och miljöer påverkade kvaliteten på informationen mellan en IoT-nod och mottagare och hur de relateras till tidigare forskning. Datahastigheten var den faktorn som påverkade kvaliteten på informationen mest. Datahastigheten hade minimal påverkan på signalstyrkan, men stor påverkan på antal förlorade datapaket och sändningstider. De två olika miljöerna hade ingen påverkan på sändningstiden, men signalstyrkan var över 10 dbm lägre i stadsmiljön än med fri sikt. Avståndet hade ingen påverkan på sändningstiden och minimal påverkan på signalstyrkan.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Ralambotiana, Miora. « Key management with a trusted third party using LoRaWAN protocol : A study case for E2E security ». Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230671.

Texte intégral
Résumé :
Nowadays, Internet of Things (IoT) applications are gaining more importance in people’s everyday life. Depending of their usage (for long or short distance communications, using low or high power devices, etc.), several standards exist. In this study, the focus is on Low Power Wide Area Networks (LPWAN) and particularly a protocol which is raising in popularity for long-range low-power communications in IoT: LoRaWAN. LoRaWAN is still at an early stage and has been mainly used in use cases where the network server was managing the keys ensuring confidentiality and integrity of the data. Gemalto has raised the issue of interest conflicts in the case where the network operator and the application provider are two distinct entities: if the end-device and the application server are exchanging sensitive data, the network server should not be able to read them. In order to solve this problem, an architecture using a trusted third party to generate and manage the keys has been implemented during this project. The following research aims at finding security threats and weaknesses on the confidentiality and integrity of the data and devices’ authentication in this study case. The LoRaWAN protocol and key management in general were studied first before describing the studied system and finding the possible attacks exploring its vulnerabilities on the mentioned points via an attack tree. These attacks were simulated in order to define their consequences on the system and according to them, security improvements on the architecture was proposed based on previous work on the topic and exploration on potential countermeasures.
Idag blir Internet av saker (IoT) applikationer allt viktigare i människors vardag. Beroende på användningen (för långeller kortdistanskommunikation, med låga eller höga effektenheter etc.) finns flera standarder. I denna studie ligger fokus på Low Power Wide Area Networks (LPWAN) och i synnerhet ett protokoll som ökar i popularitet för långsiktig lågkapacitetskommunikation i IoT: LoRaWAN. LoRaWAN är fortfarande på ett tidigt stadium och har i huvudsak använts i användarfall där nätverksservern hanterade nycklarna som säkerställer konfidentialitet och integritet av data. Gemalto har tagit upp frågan om intressekonflikter i det fall nätverksoperatören och programleverantören är två separata enheter: Om slutanordningen och applikationsservern utbyter känslig data, ska nätverksservern inte kunna läsa dem. För att lösa detta problem har en arkitektur som använder en betrodd tredje part för att generera och hantera nycklarna implementerats under det här projektet. Följande forskning syftar till att hitta säkerhetshot och svagheter om konfidentialiteten och integriteten hos data och enheternas autentisering i detta studiefall. LoRaWAN-protokollet och nyckelhanteringen i allmänhet kommer att studeras först innan författaren beskriver det studerade systemet och upptäcker de eventuella attacker som undersöker sårbarheten på de nämnda punkterna via ett angreppsträd. Dessa attacker kommer att simuleras för att definiera deras konsekvenser på systemet och enligt dem kommer säkerhetsförbättringar på arkitekturen att föreslås utifrån tidigare arbete med ämnet och undersökning av potentiella motåtgärder
Styles APA, Harvard, Vancouver, ISO, etc.
13

Alatram, Ala'a A. M. « A forensic framework for detecting denial-of-service attacks in IoT networks using the MQTT protocol ». Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2561.

Texte intégral
Résumé :
In the domain of the Internet of Things (IoT), The Message Queueing Telemetry Protocol (MQTT) is the most widely used protocol for applications across a wide range of realms, including industrial automation, healthcare, smart homes, and smart cities; MQTT is also used in many other critical real-world applicastions. An example is BMW’s Car Sharing application, that uses MQTT to provide reliable connectivity. However, due to a lack of security considerations during the design of the MQTT protocol, all the networks implementing it are prone to cyberattacks, such as denial-of-service (DoS) attacks. While the research community has a primary focus on MQTT vulnerabilities from the perspective of intrusion detection, digital forensic considerations of the protocol have yet to be addressed. This work attempts to address this issue, specifically by generating a novel dataset based on data captured from a testbed in an IoT setting, and the application of optimised Machine Learning (ML) algorithms to differentiate between cyberattacks and benign network traffic. The philosophical assumptions guiding the conduct of this research are Positivist Paradigm, Quantitative Methodology, Experimental Research Mode, and Quasi-Experimental as a Sub-category. As a result of the IoT testbed construction, a substantial quantity of IoT data was produced, including standard MQTT data and ten different DoS and DDoS attack scenarios. In addition, a network forensic analysis of the collected data shows specific information that can be extracted and the differences between attacks and normal data. Also, eight different ML algorithms were compared, resulting in the suggestions of Random Forest (RF), XGBoost, and Artificial Neural Network (ANN) for use in the proposed framework. Gray Wolf Optimiser (GWO) was selected to combine RF and ANN in a core component of the framework. It has been demonstrated that RF with GWO and ANN with GWO can optimise results. The output of this research can have a potential impact on the implementations of MQTT-powered networks globally, thereby improving the security of modern networks that use this protocol.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Girotti, Alessandro. « Piattaforme per lo sviluppo di progetti IoT ». Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017.

Trouver le texte intégral
Résumé :
In questo lavoro viene introdotto il concetto di Internet of Things, soffermandosi sugli obiettivi che tale tecnologia si prefigge di raggiungere e analizzandone i domini applicativi. In seguito saranno discusse le principali tecnologie abilitanti IoT, descrivendo in particolare il principio di comunicazione Machine-to-Machine che le caratterizza e proseguendo con l’analisi dei principali protocolli utilizzati in questo ambito. Successivamente verranno analizzati i problemi di sicurezza e di privacy legati all’aumento di dispositivi connessi alla rete che fanno parte di IoT. Sarà inoltre effettuata un’analisi sull'impiego della tecnologia di Internet of Things in Italia e verranno analizzate le manovre di governo per favorirne lo sviluppo. In seguito sarà analizzato il processo di sviluppo di un dispositivo IoT, descrivendo anche le caratteristiche hardware e software richieste. Infine saranno discusse le principali piattaforme per lo sviluppo di progetti IoT e i servizi da esse offerti allo sviluppatore e all’utente.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Mo, Yuqi. « Ultra narrow band based IoT networks ». Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEI069/document.

Texte intégral
Résumé :
La compagnie Sigfox est reconnue comme un acteur prometteur pour des transmissions de longue-distance et faible consommation, dans le contexte de l'IoT. La modulation à bande ultra étroite (Ultra Narrow Band (UNB)), la technologie de communication choisie par Sigfox, permet de transmettre des informations dans des bandes de signal très étroites (typiquement 100 Hz). A cause de l'imprécision fréquentielle causée par les oscillateurs générateurs de fréquence, il n'est pas réaliste de transmettre des signaux UNB dans des canaux parfaitement orthogonaux. L'accès naturel au canal radio pour le système de UNB est de type ALOHA, avec un aspect aléatoire à la fois en en temps et en fréquence. Cet accès aléatoire peut introduire des collisions qui dégradent la performance du réseau. Le but de cette thèse est de caractériser la capacité des réseaux basés sur UNB, ainsi que d’améliorer la performance en considérant l'aspect aléatoire en temps et en fréquence. La première contribution de cette thèse, est une évaluation de la capacité en théorie et en simulation pour une seule station de base (BS), sous des conditions de canal idéaliste ou réaliste. En conditions idéalistes, nous avons exprimé la capacité pour le cas de l'ALOHA généralisé, et l'avons étendu aux cas de réplications. Pour les conditions réalistes, nous avons pris en compte l'interférence spectrale d'UNB et le path loss (sans et avec Rayleigh fading) afin de caractériser la performance des réseaux UNB, avec l'outil géométrie stochastique. La deuxième contribution est d'appliquer l’annulation successive d'interférence (SIC), qui nous permet d'atténuer les interférences, dans des réseaux de UNB. Nous avons fourni une analyse théorique de la performance des réseaux en considérant le SIC et l'interférence spectrale de UNB, pour le cas de mono-BS. La troisième contribution est l'amélioration de la performance des réseaux UNB, en exploitant la diversité de multi-BS. Nous avons fait une analyse théorique de performance en considérant multi-BS et selection combining (SC). En particulier, nous avons considéré que l’interférence vue par chaque BS est corrélée. Nous avons ainsi démontré mathématiquement que cette corrélation ne peut pas être supprimée dans des systèmes UNB. Ensuite, nous avons appliqué les technologies de la combinaison des signaux plus complexes comme MRC (max ratio combining) et EGC (equal gain combining), ainsi que le SIC à travers multi-BS. Nous avons évalué l'amélioration de performance que chaque technologie apporte, et les avons comparées. Nous avons souligné l'efficacité de ces technologies qui nous permettent d’obtenir des gains importants comparés au cas mono-BS (e.x. 125 fois plus de réduction d'erreur avec SIC globale). La dernière contribution est une validation expérimentale du modèle d'interférence spectrale de UNB, ainsi que la capacité des réseaux UNB, sur un testbed de radio FIT/Cortexlab
Sigfox rises as a promising candidate dedicated for long-distance and low-power transmissions in the IoT backgrounds. Ultra Narrow Band (UNB), being the communication technology chosen by Sigfox, allows to transmit information through signals whose bandwidth is very limited, typically 100 Hz. Due to the imprecision restraint on electronic devices, it is impossible to transmit UNB signals in orthogonal channels. The natural radio access for this kind of system is thus random ALOHA, in both time and frequency domain. This random access can induce collisions which degrades the networks performance. The aim of this thesis is to characterize the capacity of UNB based networks, as well as to enhance its performance, by considering the randomness in time and frequency. The first contribution of the thesis, is the theoretical and numerical capacity evaluation under idealized and realistic channel conditions, for mono base station (BS) case. Under idealized conditions, we have quantified this capacity for generalized ALOHA case and extended for replications. We highlight the time-frequency duality in UNB systems, and that there exists an optimum replication number for a given network parameter set. Under realistic conditions, we have taken into account the specific spectral interference of UNB systems and propagation path loss (without and with Rayleigh fading) to characterize the performance, with the aid of stochastic geometry. The second contribution is the enhancement of UNB network performance in single BS case. We propose to use successive interference cancellation (SIC) in UNB networks, which allows to mitigate the interference. We have provided a theoretical analysis by considering both SIC and the spectral interference, for mono-BS case. We bring to light the efficiency of SIC in enhancing UNB system performance. The third contribution is the improvement of UNB systems, by exploiting the multiple BS diversity. An analytical performance evaluation considering the simplest selection combining is conducted. In particular, we consider the interference viewed by all the BSs are correlated. Then we apply more complex signal combining technologies such as MRC (max ratio combining) and EGC (equal gain combining), and even interference cancellation across multi-BS in UNB networks. We evaluate the performance improvement that each technology can bring, and compare them with each other. We highlight the efficiency of these multi-BS technologies which allow us to achieve significant performance enhancement compared to mono-BS (e.x. 125 times better performance with global SIC). Last but not least, we experimentally verify the the spectral interference model and network capacity on a cognitive radio testbed
Styles APA, Harvard, Vancouver, ISO, etc.
16

Lucio, Silva Ludmilla. « Internet of Things : Pros and cons of CoAP protocol solution for small devices ». Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-27677.

Texte intégral
Résumé :
The growing number and integration of sensors and smart objects to the Internet is pushing the development of the Internet of Things (IoT) and with it the need for standardized applications protocols for the Web that is also suited to the constrained devices joining it. The IETF Constrained RESTful Environment (CoRE) working group has been working on the Constrained Application Protocol (CoAP) an application protocol that is aimed at machine-to-machine (M2M) communication. The main objective of this thesis is to evaluate this protocol solution for constrained nodes, observing its key features and functionalities and the way that those can improve the performance of nodes in IoT environments. The CoAP protocol will also be compared and analysed to other existing web protocols operating in similar conditions.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Lindorin, Axel. « Säkerhet i smarta hem : En litteraturanalys på protokollsäkerhet för det smarta hemmet ». Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18940.

Texte intégral
Résumé :
Denna undersökning har granskat det problem som uppstår i samband med den snabba utvecklingen utav Internet of Things där de lågenergienheter saknar kraft för att utföra avancerade säkerhetslösningar. På grund av den låga säkerheten och växande användningsområdet så har Internet of Things enheterna blivit ett lockande mål för eventuella attacker. Den systematiska litteraturanalysen har genomförts genom att granska tidigare mer detaljerade analyser av protokollen och dess säkerhet samt utvecklarnas specifikationer. Detta för att bland annat skapa en sammanfattning utav protokollens säkerhet men också för att sedan jämföra protokollen för att kunna ta fram det säkrare protokollet för hemanvändning. Alla protokoll som tas upp har någon form av säkerhet implementerad för att förse med autentisering i form av MAC (i vissa fall HMAC), nyckelhantering, integritet i form av MIC och kommunikationssäkerhet med kryptering. Alla protokoll har stöd för AES-128 kryptering samt användning av IEEE 802.15.4 säkerhetsserie som ytterligare skydd utöver protokollens egna lösningar. Flertalen av protokollen använder sig också av Elleptic Curve för att säkert transportera nycklar. Analysens slutsats visar att Thread och Z-Wave anses som de två säkraste protokollen för hemmaanvändning. Det baserat på hur protokollen hanterar de olika aspekterna med sin märkbara prioritering av säkerhet tillsammans med det få antalet brister som kan skada det smarta hemmet. Bluetooth Low Energy och EnOcean är de två mindre säkra gällande en IoT miljö. Undersökningen tar också med en diskussion kring olika områden som dykt upp under undersökningens gång. Slutligen tas några punkter som dök upp under granskningen som kan vara bra att tänka på vid utveckling av dessa protokoll men säkerhet i tanken.
This study has examined the problems that arise in connection with the rapid development of the Internet of Things, where the low-energy units lack the power to implement advanced security solutions. Due to the low security and growing area of use, the Internet of Things units have become an attractive target for any attacks. The systematic literature analysis has been carried out by reviewing previously more detailed analyzes of the protocols and their security as well as the developers' specifications. This is to create a wide summary of the security of the protocols and then to compare the protocols to select one or more as the safer protocol for home use. All protocols that are included have some form of security implemented to provide authentication in the form of MAC, key management, integrity in the form of MIC and communication security with encryption. All protocols support AES-128 encryption and the use of IEEE 802.15.4 security suit as additional protection in addition to the protocol's own solutions. The majority of protocols also use Elleptic Curve to safely transport keys. The analysis concludes that Thread and Z-Wave are considered the two most secure home use protocols. It is based on how the protocols handle the various aspects with their noticeable prioritization of security along with the few deficiencies that can damage the smart home. Bluetooth Low Energy and EnOcean are thetwo less secure regarding an IoT environment. The survey also includes a discussion of various areas that emerged during the course of the investigation. Finally, some points that emerged during the review that may be good to consider when developing these protocols with security as focus.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Pielli, Chiara. « Channel Access in Wireless Networks : Protocol Design of Energy-Aware Schemes for the IoT and Analysis of Existing Technologies ». Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3427305.

Texte intégral
Résumé :
The design of channel access policies has been an object of study since the deployment of the first wireless networks, as the Medium Access Control (MAC) layer is responsible for coordinating transmissions to a shared channel and plays a key role in the network performance. While the original target was the system throughput, over the years the focus switched to communication latency, Quality of Service (QoS) guarantees, energy consumption, spectrum efficiency, and any combination of such goals. The basic mechanisms to use a shared channel, such as ALOHA, TDMA- and FDMA-based policies, have been introduced decades ago. Nonetheless, the continuous evolution of wireless networks and the emergence of new communication paradigms demand the development of new strategies to adapt and optimize the standard approaches so as to satisfy the requirements of applications and devices. This thesis proposes several channel access schemes for novel wireless technologies, in particular Internet of Things (IoT) networks, the Long-Term Evolution (LTE) cellular standard, and mmWave communication with the IEEE802.11ad standard. The first part of the thesis concerns energy-aware channel access policies for IoT networks, which typically include several battery-powered sensors. In scenarios with energy restrictions, traditional protocols that do not consider the energy consumption may lead to the premature death of the network and unreliable performance expectations. The proposed schemes show the importance of accurately characterizing all the sources of energy consumption (and inflow, in the case of energy harvesting), which need to be included in the protocol design. In particular, the schemes presented in this thesis exploit data processing and compression techniques to trade off QoS for lifetime. We investigate contention-free and contention-based chanel access policies for different scenarios and application requirements. While the energy-aware schemes proposed for IoT networks are based on a clean-slate approach that is agnostic of the communication technology used, the second part of the thesis is focused on the LTE and IEEE802.11ad standards. As regards LTE, the study proposed in this thesis shows how to use machine-learning techniques to infer the collision multiplicity in the channel access phase, information that can be used to understand when the network is congested and improve the contention resolution mechanism. This is especially useful for massive access scenarios; in the last years, in fact, the research community has been investigating on the use of LTE for Machine-Type Communication (MTC). As regards the standard IEEE802.11ad, instead, it provides a hybrid MAC layer with contention-based and contention-free scheduled allocations, and a dynamic channel time allocation mechanism built on top of such schedule. Although this hybrid scheme is expected to meet heterogeneous requirements, it is still not clear how to develop a schedule based on the various traffic flows and their demands. A mathematical model is necessary to understand the performance and limits of the possible types of allocations and guide the scheduling process. In this thesis, we propose a model for the contention-based access periods which is aware of the interleaving of the available channel time with contention-free allocations.
Fin dalla comparsa delle prime reti wireless, la progettazione di strategie di accesso al canale è stata oggetto di intenso studio, in quanto il livello Medium Access Control (MAC) è responsabile di coordinare le trasmissioni su un canale condiviso e quindi svolge un ruolo fondamentale nelle prestazioni della rete intera. Originariamente la progettazione del livello MAC nelle reti wireless si proponeva di garantire un certo throughput, ma nel corso degli anni l’interesse si è spostato sulla latenza delle comunicazioni, assicurare un certo livello di Quality of Service (QoS), ottimizzare il consumo energetico, garantire efficienza spettrale, e qualsiasi combinazione di questi obiettivi. I meccanismi classici di accesso al canale, come ALOHA, TDMA e FDMA, sono stati introdotte da decenni; ciononostante, la continua evoluzione delle reti wireless e la comparsa di nuovi paradigmi di comunicazione ha richiesto lo sviluppo di nuove strategie per adattare e ottimizzare gli approcci standard così da soddisfare i requisiti di dispositivi e applicazioni. Questa tesi propone diversi schemi di accesso al canale per nuove tecnologie wireless, e in particolare per reti Internet of Things (IoT), per lo standard cellulare Long-Term Evolution (LTE), e lo standard IEEE802.11ad per comunicazione con mmWaves. La prima parte della tesi riguarda schemi di accesso al canale efficienti dal punto di vista energetico per reti IoT, che, di solito, comprendono molti sensori alimentati a batteria. In scenari con restrizioni energetiche i protocolli classici che non prendono in considerazione il consumo di potenza potrebbero portare alla morte prematura della rete e ad aspettative di prestazioni ottimistiche. Gli schemi proposti in questa tesi dimostrano l’importanza di caratterizzare tutte le fonti di consumo energetico (e di apporto energetico, nel caso di energy harvesting), che devono essere incluse nella progettazione del protocollo di comunicazione. In particolare, gli schemi proposti in questa tesi sfruttano tecniche di compressione ed elaborazione dati, le quali consentono di prolungare la vita della rete a discapito di una ridotta QoS. Abbiamo analizzato algoritmi di accesso sia basati sulla contesa del canale che non per diversi scenari e requisiti di applicazione. Mentre gli schemi proposti per le reti IoT non sono basati su tecnologie specifiche, la seconda parte della tesi riguarda gli standard LTE e IEEE802.11ad. Per quanto concerne LTE, lo studio proposto in questa tesi mostra come utilizzare tecniche di machine-learning per stimare il numero di utenti che collidono durante l’accesso al canale; quest’informazione è utilizzata per capire quando la rete è congestionata e migliorare il meccanismo di risoluzione delle collisioni. Questo è particolarmente utile per scenari di accesso massivo: negli utlimi anni, infatti, si è sviluppato un forte interesse verso l’utilizzo di LTE per Machine-Type Communication (MTC). Per quanto riguarda IEEE802.11ad, invece, lo standard prevede un MAC ibrido con allocazioni da predefinire con e senza contesa per l’accesso al canale, e un meccanismo di allocazione dinamica che viene fatta al di sopra dello schema già stabilito. Nonostante ci si aspetti che questo schema ibrido possa soddisfare requisiti eterogenei, non è ancora chiaro come scegliere le allocazioni da usare in base ai vari flussi di traffico e i loro requisiti. Perciò, è necessario un modello matematico per capire le prestazioni e i limiti che possono essere ottenuti con le varie tipologie di accesso al mezzo previste dallo standard e guidare la fase di allocazione delle risorse. In questa tesi, proponiamo un modello per le allocazioni basate sulla contesa del canale di comunicazione che tiene conto della presenza di altre allocazioni di tipo diverso.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Wen, Wen. « Energy Efficient Secure Key Management Schemes for WSNs and IoT ». Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35257.

Texte intégral
Résumé :
Secret sharing is critical to most applications making use of security and remains one of the most challenging research areas in modern cryptography. In this thesis, we propose a novel efficient multi-secret sharing scheme based on the Chinese remainder theorem (CRT) with two verification methods, while the previous works are mostly based on the Lagrange polynomial. Key management schemes play an important role in communication security in Wireless Sensor Networks (WSNs). While the previous works mainly targeting on two different types of WSNs: distributed and hieratical, in this thesis, we propose our flexible WSN key management scheme, which is based on (n,t,n) multi-secret sharing technique, to provide a key management solution for heterogeneous architecture. The powerful key managers are responsible for most of the communicational and computational workload. They can provide Peer-to-Peer pair-wise keys for a pair of sensors to establish a secure communication session, and in the same time, they can also form communication clusters as cluster heads according to different application requirements. Internet of Things (IoT) becomes more and more popular and practical in recent years. Considering the diversity of the devices and the application scenarios, it is extremely hard to couple two devices or sub-networks with different communication and computation resources. In this thesis, we propose novel key agreement schemes based on (n,t,n) multi-secret sharing techniques for IoT in order to achieve light weighted key exchange while using Host Identity Protocol (HIP). We refer the new schemes as HIP-MEXs with different underlying multi-secret sharing techniques. We analyzed the computational and communication costs of the extremely resource constrained device which is referred to as Initiator, and CRT based HIP-MEX successfully outsource the heavy workload to the proxy, which are considered more powerful, when establishing new secret key.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Ngouakang, Ive Marcial. « Using the MQTT to implement an IoT infrastructure ». Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21039/.

Texte intégral
Résumé :
In this thesis we investigated the MQTT protocol, which results in being a valid solution for data transmission in an IoT solution. After having explored the main communication protocols, we focused on the main features of the MQTT that has been selected for our application. To this purpose, a MQTT broker has been created on Node-RED, while the remaining elements of the application have been developed on MATLAB. In particular, we exploited the MQTT and the Database toolboxes: the former is used to exchange data between two PCs through the MQTT protocol, while the latter is necessary to insert data into a database. Before describing the application, we discussed the relevance of databases and the one we have chosen for our need. The application we implemented showed how to transmit smart data between different devices on the same network through the MQTT protocol, with the aim to store information in a central database on PostgreSQL. The architecture built could be easily generalized and therefore applied in a real industrial case, as the possibility to centralize data generated from several machine controllers is becoming a fundamental requirement for industries. In summary, the aim of this paper is to create a new communication exchange information data between machines in an industry, home or any other domain by using the lightweight protocol communication call MQTT. Although Node-Red, MatLAb, Postgres can be written in different program language, they can share each other information, data to manage, control and monitoring entire system without using any cable to link the machine but only an Internet connection. IIoT becomes more popular nowadays.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Ben, Khalifa Abderrahman. « Medium access control layer for dedicated IoT networks ». Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI063.

Texte intégral
Résumé :
Les réseaux dédiés pour l’Internet des Objets sont apparus avec la promesse de connecter des milliers de nœuds, voire plus, à une seule station de base dans une topologie en étoile. Cette nouvelle logique représente un changement fondamental dans la façon de penser les réseaux, après des décennies pendant lesquelles les travaux de recherche se sont focalisés sur les réseaux multi-sauts. Les réseaux pour l’Internet des Objets se caractérisent par la longue portée des transmissions, la vaste couverture géographique, une faible consommation d’énergie et un bas coût de mise en place. Cela a rendu nécessaire des adaptations à tous les niveaux protocolaires afin de satisfaire les besoins de ces réseaux. Plusieurs acteurs sont en concurrence sur le marché de l’Internet des Objets, essayant chacun d’établir la solution la plus efficiente. Ces acteurs se sont concentrés sur la modification de la couche physique, soit au niveau de la partie matérielle, soit par la proposition de nouvelles techniques de modulation. Toutefois, en ce qui concerne la solution de contrôle d’accès au canal (connue sous le nom de couche MAC), toutes les solutions proposées par ces acteurs se fondent sur des approches classiques, tel que Aloha et CSMA. L'objectif de cette thèse est de proposer une solution MAC dynamique pour les réseaux dédiés à l’Internet des Objets. La solution proposée a la capacité de s'adapter aux conditions du réseau. Cette solution est basée sur un algorithme d'apprentissage automatique, qui apprend de l'historique du réseau afin d'établir la relation entre les conditions du réseau, les paramètres de la couche MAC et les performances du réseau en termes de fiabilité et de consommation d'énergie. La solution possède également l'originalité de faire coexister des nœuds utilisant de différentes configurations MAC au sein du même réseau. Les résultats de simulations ont montré qu'une solution MAC basée sur l'apprentissage automatique pourrait tirer profit des avantages des différents protocoles MAC classiques. Les résultats montrent aussi qu'une solution MAC cognitive offre toujours le meilleur compromis entre fiabilité et consommation d'énergie, tout en prenant en compte l'équité entre les nœuds du réseau. La solution MAC cognitive testée pour des réseaux à haute densité a prouvé des bonnes propriétés de passage à l’échelle par rapport aux protocoles MACs classiques, ce qui constitue un autre atout important de notre solution
Dedicated networks for the Internet of Things appeared with the promise of connecting thousands of nodes, or even more, to a single base station in a star topology. This new logic represents a fundamental change in the way of thinking about networks, after decades during which research work mainly focused on multi-hop networks. Internet of Things networks are characterized by long transmission range, wide geographic coverage, low energy consumption and low set-up costs. This made it necessary to adapt the protocols at different architectural layers in order to meet the needs of these networks. Several players compete in the Internet of Things market, each trying to establish the most efficient solution. These players are mostly focused on modifying the physical layer, on the hardware part or through proposing new modulations. However, with regard to the channel access control solution (known as the MAC protocol), all the solutions proposed by these players are based on classic approaches such as Aloha and CSMA. The objective of this thesis is to propose a dynamic MAC solution for networks dedicated to the Internet of Things. The proposed solution has the ability to adapt to network conditions. This solution is based on a machine learning algorithm that learns from network history in order to establish the relationship between network conditions, MAC layer parameters and network performance in terms of reliability and energy consumption. The solution also has the originality of making possible the coexistence of nodes using different MAC configurations within the same network. The results of simulations have shown that a MAC solution based on machine learning could take advantage of the good properties of different conventional MAC protocols. The results also show that a cognitive MAC solution always offers the best compromise between reliability and energy consumption, while taking into account the fairness between the nodes of the network. The cognitive MAC solution tested for high density networks has proven better scalability compared to conventional MAC protocols, which is another important advantage of our solution
Styles APA, Harvard, Vancouver, ISO, etc.
22

Amaro, da Cruz Mauro. « An enhanced multi-protocol middleware solution for Internet of things ». Thesis, Mulhouse, 2021. https://www.learning-center.uha.fr/.

Texte intégral
Résumé :
Dans l'Internet des objets (IoT), les données sont gérées et stockées par un logiciel appelé middleware (situé sur un serveur). L'évolution du concept IoT a conduit à la construction de nombreux intergiciels IoT, des logiciels qui jouent un rôle clé car ils prennent en charge la communication entre les appareils, les utilisateurs et les applications. Plusieurs aspects peuvent impacter les performances d'un middleware. Basée sur une revue approfondie de la littérature associée et sur la proposition d'un modèle de référence pour le middleware IoT, cette thèse propose un nouveau middleware IoT, appelé In.IoT, une solution middleware évolutive, sécurisée et innovante basée sur une revue approfondie du état de l'art et suivant l'architecture middleware de référence proposée dans le cadre de ce travail de recherche. In.IoT répond aux préoccupations middleware des solutions les plus populaires (sécurité, convivialité et performances) qui ont été évaluées, démontrées et validées tout au long de cette étude, et il est prêt et disponible à l'utilisation. Les recommandations et les exigences architecturales d'In.IoT sont détaillées et peuvent être reproduites par des solutions nouvelles et disponibles. Il prend en charge les protocoles de couche application les plus populaires (MQTT, CoAP et HTTP). Ses performances sont évaluées en comparaison avec les solutions les plus prometteuses disponibles dans la littérature et les résultats obtenus par la solution proposée sont extrêmement prometteurs. De plus, cette thèse étudie l'impact du langage de programmation sous-jacent sur les performances globales de la solution grâce à une étude d'évaluation des performances incluant Java, Python et Javascript, identifiant que globalement, Java s'avère être le choix le plus robuste pour le middleware IoT. Les appareils IoT communiquent avec le middleware via un protocole de couche application qui peut différer de ceux pris en charge par le middleware, en particulier lorsque l'on considère que les ménages auront divers appareils de différentes marques. La thèse offre une alternative pour de tels cas, en proposant une passerelle de couche application, appelée MiddleBridge. MiddleBridge traduit les messages CoAP, MQTT, DDS et Websockets en HTTP (HTTP est pris en charge par la plupart des intergiciels IoT). Avec MiddleBridge, les appareils peuvent envoyer un message plus petit à un intermédiaire (MiddleBridge), qui le restructure et le transmet à un middleware, réduisant ainsi le temps qu'un appareil passe à transmettre. Les solutions proposées ont été évaluées par rapport à d'autres solutions similaires disponibles dans la littérature, en tenant compte des métriques liées à la taille des paquets, aux temps de réponse, aux requêtes par seconde et au pourcentage d'erreur, démontrant leurs meilleurs résultats et leur énorme potentiel. En outre, l'étude a utilisé XGBoost (une technique d'apprentissage automatique) pour détecter l'occurrence d'attaques de réplication lorsqu'un attaquant obtient les informations d'identification de l'appareil, en l'utilisant pour générer de fausses données et perturber l'environnement IoT. Les résultats obtenus sont extrêmement prometteurs. Ainsi, il est conclu que l'approche proposée contribue à l'état de l'art des solutions middleware IoT
In Internet of Things (IoT), data is handled and stored by software known as middleware (located on a server). The evolution of the IoT concept led to the construction of many IoT middleware, software that plays a key role since it supports the communication among devices, users, and applications. Several aspects can impact the performance of a middleware. Based in a deep review of the related literature and in the proposal of a Reference Model for IoT middleware, this thesis proposes a new IoT middleware, called In.IoT, a scalable, secure, and innovative middleware solution based on a deep review of the state of the art and following the reference middleware architecture that was proposed along with this research work. In.IoT addresses the middleware concerns of the most popular solutions (security, usability, and performance) that were evaluated, demonstrated, and validated along this study, and it is ready and available for use. In.IoT architectural recommendations and requirements are detailed and can be replicated by new and available solutions. It supports the most popular application-layer protocols (MQTT, CoAP, and HTTP). Its performance is evaluated in comparison with the most promising solutions available in the literature and the results obtained by the proposed solution are extremely promising. Furthermore, this thesis studies the impact of the underlying programming language in the solution's overall performance through a performance evaluation study that included Java, Python, and Javascript, identifying that globally, Java demonstrates to be the most robust choice for IoT middleware. IoT devices communicate with the middleware through an application layer protocol that may differ from those supported by the middleware, especially when it is considered that households will have various devices from different brands. The thesis offers an alternative for such cases, proposing an application layer gateway, called MiddleBridge. MiddleBridge translates CoAP, MQTT, DDS, and Websockets messages into HTTP (HTTP is supported by most IoT middleware). With MiddleBridge, devices can send a smaller message to an intermediary (MiddleBridge), which restructures it and forwards it to a middleware, reducing the time that a device spends transmitting. The proposed solutions were evaluated in comparison with other similar solutions available in the literature, considering the metrics related to packet size, response times, requests per second, and error percentage, demonstrating their better results and tremendous potential. Furthermore, the study used XGBoost (a machine learning technique) to detect the occurrence of replication attacks where an attacker obtains device credentials, using it to generate false data and disturb the IoT environment. The obtained results are extremely promising. Thus, it is concluded that the proposed approach contributes towards the state of the art of IoT middleware solutions
Styles APA, Harvard, Vancouver, ISO, etc.
23

Cavaletti, Marco. « A Wireless Solution for Industrial IoT Using LoRa at 2.4 GHz ». Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.

Trouver le texte intégral
Résumé :
This thesis was carried out in the context of a project developed by the university of Bologna upon commission of GD SpA, aimed at providing a new proprietary solution for a Industrial Internet of Things monitoring application. The focus is on the definition and implementation of a wireless communication protocol, which has been called LoRaIN, based on LoRa technology at 2,4 GHz and suitable for Industry 4.0 applications. LoraIN proposes a centralized approach to Network management, with a single entity keeping synchronization among devices and scheduling all the transmissions according to separated time slots, in order to avoid collisions. Distinctive features of the protocol are also its multi-hopping functionality and the possibility to deploy batteryless devices, charged via Wireless Power Transfer technology. Numerical results reported in the thesis demonstrate how LoRaIN protocol meets the application requirements.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Kheriji, Sabrine. « Design of an Energy-Aware Unequal Clustering Protocol based on Fuzzy Logic for Wireless Sensor Networks ». Universitätsverlag Chemnitz, 2020. https://monarch.qucosa.de/id/qucosa%3A73303.

Texte intégral
Résumé :
Energy consumption is a major concern in Wireless Sensor Networks (WSNs) resulting in a strong demand for energy-aware communication technologies. In this context, several unequal cluster-based routing protocols have been proposed. However, few of them adopt energetic analysis models for the calculation of the optimal cluster radius and several protocols can not realize an optimal workload balance between sensor nodes. In this scope, the aim of the dissertation is to develop a cluster-based routing protocol for improving energy efficiency in WSN. We propose a Fuzzy-based Energy-Aware Unequal Clustering algorithm (FEAUC) with circular partitioning to balance the energy consumption between sensor nodes and solve the hotspot problem created by a multi-hop communication. The developed FEAUC involves mainly four phases: An off-line phase, a cluster formation phase, a cooperation phase and data collection phase. During the off-line phase, an energy analysis is performed to calculate the radius of each ring and the optimal cluster radius per ring. The cluster formation phase is based on a fuzzy logic approach for the cluster head (CH) selection. The cooperation phase aims to define an intermediate node as a router between different CHs. While, in the data collection phase, transmitting data packet from sensor nodes to their appropriate CHs is defined as an intra-cluster communication, and transmitting data from one CH to another until reaching the base station, is defined as an inter-cluster communication. The feasibility of the developed FEAUC is demonstrated by elaborating comparison with selected referred unequal clustering algorithms considering different parameters, mainly, the energy consumption, battery lifetime, time to first node shuts down (FND), time of half of nodes off-line (HND) and time to last node dies (LND). Although, the developed FEAUC is intended to enhance the network lifetime by distributing the large load of CH tasks equally among the normal nodes, running the clustering process in each round is an additional burden, which can significantly drain the remaining energy. For this reason, the FEAUC based protocol has been further developed to become a fault tolerant algorithm (FEAUC-FT). It supports the fault tolerance by using backup CHs to avoid the re-clustering process in certain rounds or by building further routing paths in case of a link failure between different CHs. The validation of the developed FEAUC in real scenarios has been performed. Some sensor nodes, powered with batteries, are deployed in a circular area forming clusters. Performance evaluations are carried out by realistic scenarios and tested for a real deployment using the low-power wireless sensor node panStamp. To complete previous works, as a step of proof of concept, a smart irrigation system is designed, called Air-IoT. Furthermore, a real-time IoT-based sensor node architecture to control the quantity of water in some deployed nodes is introduced. To this end, a cloud-connected wireless network to monitor the soil moisture and temperature is well-designed. Generally, this step is essential to validate and evaluate the proposed unequal cluster-based routing algorithm in a real demonstrator. The proposed prototype guarantees both real-time monitoring and reliable and cost-effective transmission between each node and the base station.:1 Introduction 2 Theoretical background 3 State of the art of unequal cluster-based routing protocols 4 FEAUC: Fuzzy-based Energy-Aware Unequal Clustering 5 Experimental validation of the developed unequal clustering protocol 6 Real application to specific uses cases 7 Conclusions and future research directions
Der Energieverbrauch ist ein Hauptanliegen in drahtlosen Sensornetzwerken (WSNs), was zu einer starken Nachfrage nach energiebewussten Kommunikationstechnologien führt. In diesem Zusammenhang wurden mehrere ungleiche clusterbasierte Routing-Protokolle vorgeschlagen. Allerdings verwenden nur die wenigsten energetische Analysemodelle für die Berechnung des optimalen Cluster-Radius, und mehrere Protokolle können keine optimale Auslastungsbalance zwischen Sensorknoten realisieren. In diesem Zusammenhang ist es das Ziel der Dissertation, ein clusterbasiertes Routing-Protokoll zur Verbesserung der Energieeffizienz im WSN zu entwickeln. Wir schlagen einen Fuzzy-basierten Energy-Aware Unequal Clustering-Algorithmus (FEAUC) mit zirkulärer Partitionierung vor, um den Energieverbrauch zwischen Sensorknoten auszugleichen und das durch eine Multi-Hop-Kommunikation entstehende Hotspot-Problem zu lösen. Der entwickelte FEAUC umfasst hauptsächlich vier Phasen: Eine Offline-Phase, eine Clusterbildungsphase, eine Kooperationsphase und eine Phase der Datensammlung. Während der Offline-Phase wird eine Energieanalyse durchgeführt, um den Radius jedes Ringes und den optimalen Cluster- Radius pro Ring zu berechnen. Die Clusterbildungsphase basiert auf einem Fuzzy-Logik-Ansatz für die Clusterkopf (CH)-Auswahl. Die Kooperationsphase zielt darauf ab, einen Zwischenknoten als einen Router zwischen verschiedenen CHs zu definieren. In der Datensammelphase wird die Übertragung von Datenpaketen von Sensorknoten zu ihren entsprechenden CHs als eine Intra-Cluster-Kommunikation definiert, während die Übertragung von Daten von einem CH zu einem anderen CH bis zum Erreichen der Basisstation als eine Inter-Cluster-Kommunikation definiert wird. Die Machbarkeit des entwickelten FEAUC wird durch die Ausarbeitung eines Vergleichs mit ausgewählten referenzierten ungleichen Clustering-Algorithmen unter Berücksichtigung verschiedener Parameter demonstriert, hauptsächlich des Energieverbrauchs, der Batterielebensdauer, der Zeit bis zum Abschalten des ersten Knotens (FND), der Zeit, in der die Hälfte der Knoten offline ist (HND) und der Zeit bis zum letzten Knoten stirbt (LND). Obwohl mit dem entwickelten FEAUC die Lebensdauer des Netzwerks erhöht warden soll, indem die große Last der CH-Aufgaben gleichmäßig auf die übrigen Knoten verteilt wird, stellt die Durchführung des Clustering-Prozesses in jeder Runde eine zusätzliche Belastung dar, die die verbleibende Energie erheblich entziehen kann. Aus diesem Grund wurde das auf FEAUC basierende Protokoll zu einem fehlerto-leranten Algorithmus (FEAUC-FT) weiterentwickelt. Er unterstützt die Fehlerto-leranz durch die Verwendung von Backup-CHs zur Vermeidung des Re-Clustering-Prozesses in bestimmten Runden oder durch den Aufbau weiterer Routing-Pfade im Falle eines Verbindungsausfalls zwischen verschiedenen CHs. Die Validierung des entwickelten FEAUC in realen Szenarien ist durchgeführt worden. Einige Sensorknoten, die mit Batterien betrieben werden, sind in einem kreisförmigen Bereich angeordnet und bilden Cluster. Leistungsbewertungen warden anhand realistischer Szenarien durchgeführt und für einen realen Einsatz unter Verwendung des drahtlosen Low-Power-Sensorknoten panStamp getestet. Zur Vervollständigung früherer Arbeiten wird als Schritt des Proof-of-Concept ein intelligentes Bewässerungssystem mit der Bezeichnung Air-IoT entworfen. Darüber hinaus wird eine IoT-basierte Echtzeit-Sensorknotenarchitektur zur Kontrolle derWassermenge in einigen eingesetzten Knoten eingeführt. Zu diesem Zweck wird ein mit der Cloud verbundenes drahtloses Netzwerk zur Überwachung der Bodenfeuchtigkeit und -temperatur gut konzipiert. Im Allgemeinen ist dieser Schritt unerlässlich, um den vorgeschlagenen ungleichen clusterbasierten Routing-Algorithmus in einem realen Demonstrator zu validieren und zu bewerten.Der vorgeschlagene Prototyp garantiert sowohl Echtzeit-Überwachung als auch zuverlässige und kostengünstige Übertragung zwischen jedem Knoten und der Basisstation.:1 Introduction 2 Theoretical background 3 State of the art of unequal cluster-based routing protocols 4 FEAUC: Fuzzy-based Energy-Aware Unequal Clustering 5 Experimental validation of the developed unequal clustering protocol 6 Real application to specific uses cases 7 Conclusions and future research directions
Styles APA, Harvard, Vancouver, ISO, etc.
25

Fredriksson, Tony, et Niklas Ljungberg. « Security in low power wireless networks : Evaluating and mitigating routing attacks in a reactive, on demand ad-hoc routing protocol ». Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-145362.

Texte intégral
Résumé :
Using low energy devices to communicate over the air presents many challenges to reach security as resources in the world of Internet Of Things (IoT) are limited. Any extra overhead of computing or radio transmissions that extra security might add affects cost of both increased computing time and energy consumption which are all scarce resources in IoT. This thesis details the current state of security mechanisms built into the commercially available protocol stacks Zigbee, Z-wave, and Bluetooth Low Energy, and collects implemented and proposed solutions to common ways of attacking systems built on these protocol stacks. Attacks evaluated are denial of service/sleep, man-in-the-middle, replay, eavesdropping, and in mesh networks, sinkhole, black hole, selective forwarding, sybil, wormhole, and hello flood. An intrusion detection system is proposed to detect sinkhole, selective forwarding, and sybil attacks in the routing protocol present in the communication stack Rime implemented in the operating system Contiki. The Sinkhole and Selective forwarding mitigation works close to perfection in larger lossless networks but suffers an increase in false positives in lossy environments. The Sybil Detection is based on Received Signal Strength and strengthens the blacklist used in the sinkhole and selective forwarding detection, as a node changing its ID to avoid the blacklist will be detected as in the same geographical position as the blacklisted node.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Журавльов, Павло Володимирович. « Сервіс автоматизованого перенесення існуючих рішень для Інтернету речей на Thingspeak ». Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26947.

Texte intégral
Résumé :
Загальний обсяг роботи: 76 сторінок, 19 ілюстрацій, 17 таблиць, перелік посилань із X найменувань. Актуальність теми. Область використання платформи Thingspeak обмежена необхідністю використання протоколу HTTP для взаємодії з клієнтськими пристроями. В останні роки набувають все більшої популярності альтернативні протоколи, спроектовані для інтернету речей і пристрої на їх базі, чим обумовлена необхідність розширення платформи Thingspeak для додавання підтримки даних протоколів і пристроїв. Мета та задачі дослідження Аналіз підходів до розширення області використання платформи Thingspeak з подальшим забезпеченням можливості використання існуючих рішень, які взаємодіють, використовуючи протокол який не підтримуються розглянутою платформою. Головним завданням є дослідження, що полягає у проектуванні проміжного додатку для забезпечення взаємодії пристроїв, які використовують протокол MQTT з платформою Thingspeak. Вирішення поставлених завдань та досягнуті результати В результаті виконання роботи була реалізована система, що здійснює трансляцію протоколів MQTT та HTTP з проміжною конвертацією даних у формат, що відповідає моделі даних платформи Thingspeak. Дана реалізація також включає можливість встановлення правил, за якими відбувається конвертація. Для керування параметрами конвертації даних було розроблено веб-додаток з графічним інтерфейсом адміністратора. Система проста у розгортанні та може бути використана як доповнення до розгорнутої платформи Thingspeak. Об’єкт дослідження. Інтернет речей. Предмет дослідження. Мережева взаємодія між додатками Інтернету речей. Підходи до створення додатків, які виконують функцію трансляції протоколів прикладного рівня. Методи дослідження. Для вирішення проблеми в даній роботі використовуються методи аналізу, синтезу, системного аналізу, порівняння та логічного узагальнення результатів. Наукова новизна. Наукова новизна роботи полягає у аналізі та реалізації методів, що дозволяють конвертувати не підтримуваний системою Thingspeak протокол MQTT у HTTP. Практичне значення одержаних результатів. Розроблений додаток може бути розгорнутий на кафедральній інфраструктурі. Він включає в собі зручний користувацький інтерфейс для встановлення конфігурацій та може бути використаний для інтеграції існуючих додатків з підтримкую протоколу MQTT та кафедральної платформи Thingspeak.
The thesis contains 76 pages, 19 figures, 19 tables, 25 references. Relevance. The scope of the Thingspeak platform is limited by the need to use the HTTP protocol to interact with client devices. In recent years, alternative protocols have been developed for the Internet of things and devices on their base are becoming increasingly popular, due to the need to expand the Thingspeak platform to add support for these protocols and devices. Purpose. An analysis of approaches to extending the use of the Thingspeak platform, further enabling the use of existing solutions that implement the protocol but are not supported by the platform under consideration. The main task is to study the design of an intermediate application to interoperate devices that use the MQTT protocol with the Thingspeak platform. Results. As a result of the work, a system that transmits MQTT and HTTP protocols with an intermediate data conversion into a format that matches the Thingspeak data model was implemented. This implementation also includes the ability to set the rules for which the conversion is carried out. To manage the data conversion parameters, a web application with a graphical user interface was developed. The system is easy to deploy and can be used as a complement to existing technology with Thingspeak platform. Object of research. Internet of Things. Subject of research. Networking between Internet applications of things. Approaches to creating applications that perform the function of translating application level protocols. Research methods. In order to solve the problem in this work, methods of analysis, synthesis, system analysis, comparison and logical generalization of the results are used. Scientific novelty. The scientific novelty of the work consists in the analysis and implementation of methods that allow the conversion of the Thingspeak-compliant MQTT protocol to HTTP. Practical value. The developed application can be deployed on the existing university infrastructure. It includes a convenient interface for describing configurations and can be used to integrate existing applications supporting the MQTT protocol and the Thingspeak platform.
Общий объем работы 76 страниц, 19 иллюстраций, 19 таблицы, список литературы из 25 наименований. Актуальность темы. Область применения платформы Thingspeak ограничена необходимостью использования протокола HTTP для взаимодействия с клиентскими устройствами. В последние годы приобретают все большую популярность альтернативные протоколы, разработанные для интернета вещей и устройства на их базе, чем обусловлена необходимость расширения платформы Thingspeak для добавления поддержки данных протоколов и устройств. Цель и задачи исследования. Анализ подходов к расширению области использования платформы Thingspeak с последующим обеспечением возможности использования существующих решений, реализующих протокол, но не поддерживаются рассматриваемой платформой. Главной задачей является исследование, заключающееся в проектировании промежуточного приложения для обеспечения взаимодействия устройств, использующих протокол MQTT с платформой Thingspeak. Решение поставленных задач и достигнутые результатах В результате выполнения работы была реализована система, осуществляющая трансляцию протоколов MQTT и HTTP с промежуточной конвертацией данных в формат, соответствующий модели данных платформы Thingspeak. Данная реализация также включает возможность установки правил, по которым происходит конвертация. Для управления параметрами конвертации данных был разработан веб-приложение с графическим интерфейсом администратора. Система проста в развертывании и может быть использована как дополнение к развернутой платформе Thingspeak. Объект исследования. Интернет вещей. Предмет исследования. Сетевое взаимодействие между приложениями Интернета вещей. Подходы к созданию приложений, которые выполняют функцию трансляции протоколов прикладного уровня. Методи исследования. Для решения проблемы в данной работе используются методы анализа, синтеза, системного анализа, сравнения и логического обобщения результатов. Научная новизна. Научная новизна работы заключается в анализе и реализации методов, позволяющих конвертировать неподдерживаемый системой Thingspeak протокол MQTT в HTTP. Практическое значение полученных результатов Разработанное приложение может быть развернуто на кафедральной инфраструктуре. Оно включает в себя удобный интерфейс для описания конфигураций и может быть использован для интеграции существующих приложений с поддержкой протокола MQTT и кафедральной платформы Thingspeak.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Piccinini, Andrea. « Innovative Architecture for Industrial Monitoring System ». Doctoral thesis, Università degli studi di Bergamo, 2019. http://hdl.handle.net/10446/128134.

Texte intégral
Résumé :
This thesis aims to develop a new innovative architecture for monitoring and SCADA systems able to centralize data and support data analytics for ideally every kind of productions. The core of the innovation is the definition and management inside the platform of a JSON configuration which describe the machine or the plant to be monitored. The state of the art gives a complete landscape about how technologies have evolved since the born of web and which of them have been applied in distributed system such as web monitoring systems. One of the most important topics here are the communication protocols, new generation of high performance databases and the purpose of machine learning algorithms in order to improve maintenance activities and support decision making process. Then the architecture of the system has been presented paying attention on the concept of reconfigurability and customization of the platform. This is done by configuring the machines by means a JSON descriptor that indicates which data collect in the system. An appendix explains in deep how the JSON configuration works and which parameters the user can manipulate in order to increase the precision and the performance of the system. Systems like the one proposed can be used in vary different ways and the thesis wants to analyze some of them and proposing solutions describing real case studies. These case studies regard quality check on the production line (online or offline), data collection for production scheduling and whole monitoring systems for textile application.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Eriksson, Klas-Göran, et Andreas Peterson. « Solbil : Designundersökning av övervakningssystem och automatisk energiförbrukningsprognos för en solbil ». Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-34898.

Texte intégral
Résumé :
Jönköping University Solar Team deltog år 2015 i tävlingen World Solar Challenge som körs vartannat år i Australien. Team från hela världen deltar i denna tävling där de konstruerar solbilar som de sedan tävlar med i ett race på ca 3000 km från Darwin till Adelaide. En solbil är en elbil som även är utrustad med solpaneler för att ge en teoretiskt oändlig körsträcka så länge bilen har tillgång till solenergi. Jönköping University kom på 15 plats i detta race och ville till nästa race förbättra sin konkurrenskraft. Eftersom det var ett race och varje teams mål var att använda sin bil så effektivt som möjligt behövdes ett system för att övervaka och logga batteridata och presentera det för teamet. Det var även fördelaktigt om teamet kunde få någon form av energiprognos för att kunna bestämma vilken hastighet som solbilen bör hålla. Ett system som loggar och överför denna information från solbilen till en följebil utvecklades och utvärderades. Syftet med denna studie var således: Öka Jönköping University Solar Teams konkurrenskraft genom att förse följebilen med ett beslutsstöd som i realtid övervakar och loggar solbilens batterinivå och energiförbrukning. Design Science Research användes som metod för att genomföra detta syfte, vilket gav möjligheten att utveckla systemet som en artefakt och använda denna för att presentera resultatet. Tre olika experiment utfördes för att konstatera funktionaliten på den trådlösa kommunikationen, hur rättvisande systemet var samt hur väl energiförbrukningen kunde förutsägas. I resultatet beskrivs hela artefakten och tillsammans med experimenten konstaterades att systemet kommer att ge Jönköping University Solar Team en högre konkurrenskraft i nästa race.
Jönköping University Solar Team participated in the 2015 edition of World Solar Challenge, which is held every other year in Australia. Teams from all around the world participates in the competition in which they construct a solar car and competes in a 3000 km long race from Darwin to Adelaide. A solar car is an electric car equipped with solar panels to give it a theoretical infinite mileage as long as the car have access to solar energy. Jönköping University came in 15th place in this race and would like to improve their competitiveness in the next race. Because it is a competition and the goal for every team is to use their car as efficiently as possible a system to log and monitor the battery and present the information to the team was needed. It would also be good to have some kind of energy consumption forecast that would be used to decide the speed the solar car should keep. A system that collect, stores and transmits the information from the solar car to an escort vehicle was developed and evaluated. Thus, the pursues of this studies were: Improve Jönköping University Solar Teams competitiveness by provide a decision support which in real time monitor and log the solar car battery level and energy consumption. Design Science Research was used as a method to realize this purpose, which gave the opportunity to develop the system as an artifact and use this to present the result. Three different experiments were constructed to determine the functionality of the wireless communication, how accurate the system was and how well the energy consumption could be predicted. In the results the artifact is described as a whole and together with the experiments it is found that the system will give Jönköping University Solar Team a higher competitiveness in the next race.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Branger, Jakob. « Standardization perspectives of communication infrastructure of future homes : from automated home to sustainable, healthy and manufacturing home ». Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122134.

Texte intégral
Résumé :
Driven by the Internet of Things, devices and appliances will be increasingly connected to each other and the people within the home. In order for the communication to be possible a standard for communication is needed. In many cases there are too many standards, and for other cases there may instead be an absence of standard. This thesis provides a contemporary view of future developments of homes and the current standardization progress. Four domains in homes are investigated: the automated home domain, the sustainable home domain, the healthy home domain and the manufacturing home domain. Trends and technologies are identified that drive a change in homes. Services are described that may be provided in homes. The thesis discusses how services from different domains may be integrated, with a further investigation of the networked manufacturing service and its underlying communication infrastructure. Finally standards are identified and analyzed in regard to the communication infrastructure of the networked manufacturing service. The standardization development is progressing for each home domain. However, potential standard gaps are still present for many of the cross domain device communication. No standard has been identified for integration of services and integration of the business ecosystem in the manufacturing home domain. Similarly there is no standard for the software of 3D printing. New standards or further development of existing standards is needed to realize the networked manufacturing service.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Mataj, Lukáš. « Aplikace pro ovládání inteligentní elektroinstalace iNELS pro platformu iOS ». Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236366.

Texte intégral
Résumé :
This masther's thesis aims at familiarization with the development of mobile application that can control intelligent electrical installation iNELS and its multimedia superstructure iMM. The thesis also describes the common development for the iOS platform and explore the possibility of communication with both controlled systems. Two important communication protocols will be described - EPSNET and XML-RPC. The resulting product is evaluated at the end and its behavior in full operation is described too.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Centenaro, Marco. « On the Support of Massive Machine-to-Machine Traffic in Heterogeneous Networks and Fifth-Generation Cellular Networks ». Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3426783.

Texte intégral
Résumé :
The widespread availability of many emerging services enabled by the Internet of Things (IoT) paradigm passes through the capability to provide long-range connectivity to a massive number of things, overcoming the well-known issues of ad-hoc, short-range networks. This scenario entails a lot of challenges, ranging from the concerns about the radio access network efficiency to the threats about the security of IoT networks. In this thesis, we will focus on wireless communication standards for long-range IoT as well as on fundamental research outcomes about IoT networks. After investigating how Machine-Type Communication (MTC) is supported nowadays, we will provide innovative solutions that i) satisfy the requirements in terms of scalability and latency, ii) employ a combination of licensed and license-free frequency bands, and iii) assure energy-efficiency and security.
La diffusione capillare di molti servizi emergenti grazie all’Internet of Things (IoT) passa attraverso la capacità di fornire connettività senza fili a lungo raggio ad un numero massivo di cose, superando le note criticità delle reti ad hoc a corto raggio. Questa visione comporta grandi sfide, a partire dalle preoccupazioni riguardo l’efficienza delle rete di accesso fino alle minacce alla sicurezza delle reti IoT. In questa tesi, ci concentreremo sia sugli standard di comunicazione a lungo raggio per l’IoT sia sulla ricerca di base per le reti IoT. Dopo aver analizzato come vengono supportate le comunicazioni Machine-to-Machine (M2M) oggi, forniremo soluzioni innovative le quali i) soddisfano i requisiti in termini di scalabilità e latenza, ii) utilizzano una combinazione di bande di frequenza licenziate e libere e iii) assicurano efficienza energetica e sicurezza.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Sabel, Ida. « Internet of Things & ; Kommunikationsprotokoll ». Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-27246.

Texte intégral
Résumé :
Genom att studera olika kommunikationsprotokoll kunna svara på vad det är som gör att ett visst protokoll är bäst anpassat för att användas mellan mobila enheter och IoT-enheter. I arbetet användes en kvalitativ litteraturstudie för att ge en grundlig teoretisk bakgrund samt en experimentell studie där ett par teorier undersökts ifall de stämmer med resultaten ifrån verkligheten. De fem faktorerna kompatibilitet, batteritid, frekvens, räckvidd och tillförlitlighet undersöktes hos kommunikationsprotokollen Bluetooth Low Energy (BLE), Närfältskommunikation (NFC) och Wi-Fi. Dessa tre valdes eftersom de stöds av nyare mobila plattformar idag. Kommunikations-protokollen analyserades sedan gentemot olika användningsområden inom IoT, eftersom påståendet vad som är bäst anpassat beror på vad situationen kräver för egenskaper. En systemutvecklare som ska välja kommunikationsprotokoll till en IoT-tillämpning och läser denna rapport bör själv jämföra de olika protokollen mot varandra inom de fem faktorerna för att kunna avgöra vilket protokoll som passar bäst inom dennes situation. I arbetet utfördes endast experimentella studier på BLE på grund av begränsningar inom utrustningen. Ytterligare experiment inom NFC och Wi-Fi skulle ge ett bredare perspektiv med fler infallsvinklar.
By studying different communication protocols respond to what it is that makes a certain protocol best suited for use between mobile devices and IoT devices. This study used a qualitative literature study to create a proper theoretical background and an experimental study where two theories were investigated in whether they matched wih the results from the reality. The five factors compatibility, battery loss, frequency, range and reliability were investigated in the communication protocols Bluetooth Low Energy (BLE), Near field communication (NFC) and Wi-Fi, these three because they are supported by newer mobile platforms today. The communication protocols were then analysed against various uses in the IoT, since the claim what it is that makes it best suited depends on what the situation requires. A system developer that is about to select the communication protocol to use in an IoT application and reads this study should compare the different protocols to each other within the five factors to determine which protocol is best suited for his situation. This study only performed experimental studies on BLE because of limitations in the equipment. Additional experiments on NFC and Wi-Fi would provide a wider perspective.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Lindén, Erik. « A latency comparison of IoT protocols in MES ». Thesis, Linköpings universitet, Programvara och system, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-136904.

Texte intégral
Résumé :
Many industries are now moving several of their processes into the cloud computing sphere. One important process is to collect machine data in an effective way. Moving signal collection processes to the cloud instead of on premise raises many questions about performance, scalability, security and cost.This thesis focuses on some of the market leading and cutting edge protocols appropriate for industrial production data collection. It investigates and compares the pros and cons of the protocols with respect to the demands of industrial systems. The thesis also presents examples of how the protocols can be used to collect data all the way to a higher-level system such as ERP or MES.The protocols focused on are MQTT and AMQP (in OPC-UA). The possibilities of OPC-UA in cloud computing is of extra interest to investigate in this thesis due to its increasing usage and development.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Loncar, Loncar, et Ahmed Karic. « BATTERY SENSORY DATA COMPRESSION FOR ULTRANARROW BANDWIDTH IOT PROTOCOLS ». Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-39733.

Texte intégral
Résumé :
Internet of Things (IoT) communication technology is an essential parameter in modern embedded systems. Demand for data throughput drastically increases, as well as the request for transmission over considerable distance. Considering cost-eficiency in the form of power consumption is unavoidable, it usually requires nu-merous optimization and trade-os. This research tends to oer a solution basedon data compression techniques. In this way, problems caused by data through-put are mostly eliminated, still varying with the eld of application. Regardless ofhaving both lossy and lossless techniques, the focus is on lossy algorithms due toimmensely larger compression ratio (CR) factor, which is not the only but usuallythe most crucial factor. There are also numerous other quality metrics described.In the experiment part, LoRa long-range wireless communication protocol is used,with an accent on battery sensory data transmission. Temperature and current are the signals of interest. The research oers detailed information of the impact on compression parameters by four target algorithms: fractal resampling (FR), critical aperture (CA), fast Fourier transform (FFT) and discrete cosine transform (DCT).
Styles APA, Harvard, Vancouver, ISO, etc.
35

Polonelli, Tommaso <1990&gt. « Ultra-low power IoT applications : from transducers to wireless protocols ». Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amsdottorato.unibo.it/9604/1/Polonelli_Tommaso_tesi.pdf.

Texte intégral
Résumé :
This dissertation aims to explore Internet of Things (IoT) sensor nodes in various application scenarios with different design requirements. The research provides a comprehensive exploration of all the IoT layers composing an advanced device, from transducers to on-board processing, through low power hardware schemes and wireless protocols for wide area networks. Nowadays, spreading and massive utilization of wireless sensor nodes pushes research and industries to overcome the main limitations of such constrained devices, aiming to make them easily deployable at a lower cost. Significant challenges involve the battery lifetime that directly affects the device operativity and the wireless communication bandwidth. Factors that commonly contrast the system scalability and the energy per bit, as well as the maximum coverage. This thesis aims to serve as a reference and guideline document for future IoT projects, where results are structured following a conventional development pipeline. They usually consider communication standards and sensing as project requirements and low power operation as a necessity. A detailed overview of five leading IoT wireless protocols, together with custom solutions to overcome the throughput limitations and decrease the power consumption, are some of the topic discussed. Low power hardware engineering in multiple applications is also introduced, especially focusing on improving the trade-off between energy, functionality, and on-board processing capabilities. To enhance these features and to provide a bottom-top overview of an IoT sensor node, an innovative and low-cost transducer for structural health monitoring is presented. Lastly, the high-performance computing at the extreme edge of the IoT framework is addressed, with special attention to image processing algorithms running on state of the art RISC-V architecture. As a specific deployment scenario, an OpenCV-based stack, together with a convolutional neural network, is assessed on the octa-core PULP SoC.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Al-Janabi, Thair. « Design of energy efficient protocols-based optimisation algorithms for IoT networks ». Thesis, Brunel University, 2018. http://bura.brunel.ac.uk/handle/2438/17121.

Texte intégral
Résumé :
The increased globalisation of information and communication technologies has transformed the world into the internet of things (IoT), which is accomplished within the resources of wireless sensor networks (WSNs). Therefore, the future IoT networks will consist of high density of connected nodes that suffer from resource limitation, especially the energy one, and distribute randomly in a harsh and large-scale areas. Accordingly, the contributions in this thesis are focused on the development of energy efficient design protocols based on optimisation algorithms, with consideration of the resource limitations, adaptability, scalability, node density and random distribution of node density in the geographical area. One MAC protocol and two routing protocols, with both a static and mobile sink, are proposed. The first proposed protocol is an energy efficient hybrid MAC protocol with dynamic sleep/wake-up extension to the IEEE 802.15.4 MAC, namely, HSW-802.15.4. The model automates the network by enabling it to work exibly in low and high-density networks with a lower number of collisions. A frame structure that offers an enhanced exploitation for the TDMA time slots (TDMAslots) is provided. To implement these enhanced slots exploitation, this hybrid protocol rst schedules the TDMAsslots, and then allocates each slot to a group of devices. A three-dimensional Markov chain is developed to display the proposed model in a theoretical manner. Simulation results show an enhancement in the energy conservation by 40% - 60% in comparison to the IEEE 802.15.4 MAC protocol. Secondly, an efficient centralised clustering-based whale optimisation algorithm (CC- WOA) is suggested, which employs the concept of software de ned network (SDN) in its mechanism. The cluster formulation process in this algorithm considers the random di- versi cation of node density in the geographical area and involves both sensor resource restrictions and the node density in the tness function. The results offer an efficient con- servation of energy in comparison to other protocols. Another clustering algorithm, called centralised load balancing clustering algorithm (C-LBCA), is also developed that uses par- ticle swarm optimisation (PSO) and presents robust load-balancing for data gathering in IoT. However, in large scale networks, the nodes, especially the cluster heads (CHs), suffer from a higher energy exhaustion. Hence, in this thesis, a centralised load balanced and scheduling protocol is proposed utilising optimisation algorithms for large scale IoT net- works, named, optimised mobile sink based load balancing (OMS-LB). This model connects the impact of the Optimal Path for the MS (MSOpath) determination and the adjustable set of data aggregation points (SDG) with the cluster formulation process to de ne an op- timised routing protocol suitable for large scale networks. Simulation results display an improvement in the network lifespan of up to 54% over the other approaches.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Rinaldini, Fabrizio. « Comunicazione tra dispositivi IoT e Cloud tramite protocollo MQTT ». Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13199/.

Texte intégral
Résumé :
Panoramica sull'Internet delle Cose. Introduzione, studio e contestualizzazione del protocollo MQTT. Analisi di una comunicazione di tra dispositivi IoT e Cloud tramite protocollo MQTT. Ricerca su soluzioni IoT preconfigurate. Confronto tra MQTT e HTTP, con metodo Post.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Rönnholm, Jesper. « Integration of OPC Unified Architecture with IIoT Communication Protocols in an Arrowhead Translator ». Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-70347.

Texte intégral
Résumé :
This thesis details the design of a protocol translator between the industrial-automation protocol OPC UA, and HTTP. The design is based on the architecture of the protocol translator of the Arrowhead framework, and is interoperable with all of its associated protocols. The design requirements are defined to comply with a service-oriented architecture (SOA) and RESTful interaction through HTTP, with minimal requirement of the consuming client to be familiar with OPC UA semantics. Effort is put into making translation as transparent as possible, but limits the scope of this work to exclude a complete semantic translation. The solution presented in this thesis satisfies structural- and foundational interoperability, and bridges interaction to be independent of OPC UA services. The resulting translator is capable of accessing the content of any OPC UA server with simple HTTP-requests, where addressing is oriented around OPC UA nodes.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Chomyšyn, Maxim. « Dopad bezpečnosti IIoT na proaktivní údržbu firemních aktiv ». Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417807.

Texte intégral
Résumé :
This work examines possible safety risks associated with the operation of IIoT technologies in industrial production. The content of this document is an analysis of used IIoT technologies, their purpose and method of implementation into production processes and the company's technology strategy. The outcome of this analysis will serve to develop possible risk scenarios and their associated impacts. Finally, I recommend possible changes that either eliminate these risks completely or at least minimize them.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Silva, Adriana Lucia Pastore e. « Estudo comparativo entre dois métodos de reabilitação fisioterapêutica na artroplastia total do joelho : protocolo padrão do IOT x protocolo avançado ». Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/5/5140/tde-06022007-090101/.

Texte intégral
Résumé :
Este estudo compara dois protocolos de reabilitação fisioterapêutica - um com três meses de duração (protocolo padrão IOT) e outro com dois meses (protocolo avançado) - para evidenciar a real necessidade de um tempo prolongado de reabilitação em 31 pacientes submetidas a artroplastia total do joelho. O estudo é prospectivo e randomizado e a faixa etária avaliada está entre 60 e 76 anos. As pacientes são avaliadas no pré-operatório e após o tratamento com avaliação clínica (escala de dor, Knee Society Score, SF-36 e goniometria) e avaliação de força (avaliação isocinética) para comparação dos protocolos. A análise estatística dos valores da escala de dor, do Knee Society Score, da amplitude de movimento, do pico de torque muscular e da avaliação da qualidade de vida (SF-36) demonstra que todas as pacientes obtêm melhora quando comparamos o pré e pós-operatório, independente do grupo. Conclui-se que o protocolo de reabilitação fisioterapêutica com dois meses de duração para o pós-operatório de artroplastia total do joelho mostra ser eficaz, alcançando os mesmos objetivos e resultados que o protocolo com três meses de duração
The present study compares two physiotherapeutic rehabilitation protocols - one lasting three months (standard IOT protocol), the other lasting two months (advanced protocol) - to assert the actual need of a prolonged rehabilitation period in 31 cases of patients who went through total knee arthroplasty. The study is prospective and randomized; the age group of evaluated patients is between 60 and 76 years-old. In order to compare the two protocols, patients are evaluated before surgery and after treatment, by means of clinical evaluation (pain scale, Knee Society Score, SF-36 and goniometry) and isokinetic strength test. Statistical analyses of results from pain scale, Knee Society Score, movement amplitude, muscular torque peak and quality of life show improvement for all patients between pre- and post-operation, regardless of group. The study concludes the two months physiotherapeutic rehabilitation protocol for total knee arthroplasty is as effective as the three months protocol, as both reached the same goals and results
Styles APA, Harvard, Vancouver, ISO, etc.
41

Alouache, Lylia. « Protocoles de Routage SDN, Multi-critères et Sécurisés Dans un Environnement IoV Collaboratif ». Thesis, Cergy-Pontoise, 2019. http://www.theses.fr/2019CERG1041.

Texte intégral
Résumé :
Aujourd'hui, le Big Data, le Cloud Computing et l’Internet des Objets (IoT) encouragent l'évolution des Réseaux ad hoc Véhiculaires (VANET) vers l’Internet des véhicules (IoV), où les véhicules, n’étant plus acteurs passifs, disposent de nouvelles capacités de perception et de communication. Les véhicules deviennent des membres actifs d'une ville intelligente, ils fournissent une connectivité omniprésente, un large éventail d'applications et de services liés à la sécurité routière, au transport intelligent et au confort des utilisateurs. En outre, la grande quantité de données générées par les applications IoV constitue un défi majeur quant à leur gestion, leur stockage et leur manipulation. Ces services dépendent fortement des véhicules en question, qui servent d’émetteurs, de relais et de récepteurs. Chaque véhicule gère ses propres communications ainsi que celles des autres véhicules. Par conséquent, un processus de diffusion et une connectivité fiables sont nécessaires. Cependant, la nature dynamique des entités IoV, les perturbations liées au réseau mobile et les problèmes de sécurité entraînent de fréquentes défaillances des liaisons et provoquent ainsi l’isolement de certains véhicules. Comme conséquence, certains véhicules se retrouvent isolés. L'objectif de cette thèse est de garantir la fiabilité et la robustesse des communications inter véhiculaires pour fournir aux conducteurs et aux passagers, des services de communication ininterrompus, et répondre ainsi à la demande croissante de qualité de service dans l'environnement IoV. Pour ce faire, quatre contributions sont proposées. Premièrement, une nouvelle taxonomie adaptée aux exigences et aux caractéristiques IoV est élaborée. Deuxièmement, pour combler les lacunes des protocoles de routage existants, une nouvelle solution de routage multi-métriques appelée protocole de routage géographique basée sur l'architecture construit sur l'architecture Software Defined Networking (SDN) hybride appelée (HSDN-GRA) est proposée. Ce protocole utilise en entrée trois métriques : la fenêtre de durée du contact, le paramètre d'équilibrage de charge et l'historique des erreurs de communication. Il vise à optimiser ces trois objectifs et à assurer un routage stable. Troisièmement, un protocole de routage, Secure HSDN-GRA, basé sur un modèle de confiance distribué est proposé comme amélioration afin de rendre la solution développée plus fiable et robuste en présence de nœuds malicieux. Enfin, un système d’incitation à la collaboration est ajouté à la solution Secure HSDN-GRA pour palier le problème des véhicules égoïstes, ceux qui ne collaborent pas et qui refusent d’être des relais de données dans un réseau totalement distribué. Des scenarios de simulations approfondies ont été mis en œuvre sous le système multi-agents JADE pour prouver l'efficacité de HSDN-GRA, en définissant un profil de mobilité des véhicules. Dans un second temps, HSDN-GRA et Secure HSDN-GRA ont été implémentés sous l’environnement de simulation Network Simulator (NS2) associé au générateur de modèle de mobilité VanetMobiSim. Une analyse approfondie a montré des performances satisfaisantes de HSDN-GRA en termes d’overhead de messages, de retard des paquets et de taux de perte de ces derniers (sous JADE) en comparaison avec des protocoles de routage de référence. Sous NS2, Secure HSDN-GRA présente également des performances satisfaisantes en termes de taux de livraison de paquets et de leurs retards. À partir de ces résultats, nous avons déduit les facteurs d’influence pour HSDN-GRA et Secure HSDN-GRA, tels que le nombre de véhicules dans le réseau, la vitesse des véhicules, le nombre de nœuds malveillants dans le réseau et la densité des clusters
Nowadays, Big Data, Cloud Computing, and Internet of Things (IoT) have encouraged the generalization of the Vehicular Ad Hoc Networks (VANET) to the Internet of Vehicles (IoV), where vehicles evolve from passive actors of transportation to smart entities with new perception and communication capabilities. Vehicles become active members of a smart city, they provide an omnipresent connectivity, a wide range of applications and services relating to road safety, intelligent transport and the comfort of users. In addition, the large amount of data generated by IoV applications is a major challenge in their management, storage, and manipulation. These services depend greatly on the vehicles in question, which act as transmitters, relays, and receivers. Vehicles carry out their own communications but serve simultaneously as information relays for communication between other vehicles as well. Consequently, reliable dissemination process and connectivity are required. However, the dynamic nature of the IoV entities, the disturbances related to the mobile network as well as the security challenges lead to frequent link failure. In fact, some vehicles
Styles APA, Harvard, Vancouver, ISO, etc.
42

Gebremichael, Teklay. « Lightweight Cryptographic Group Key Management Protocols for the Internet of Things ». Licentiate thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-35607.

Texte intégral
Résumé :
The Internet of Things (IoT) is increasingly becoming an integral component of many applications in consumer, industrial and other areas. Notions such as smart industry, smart transport, and smart world are, in large part, enabled by IoT. At its core, the IoT is underpinned by a group of devices, such as sensors and actuators, working collaboratively to provide a required service. One of the important requirements most IoT applications are expected to satisfy is ensuring the security and privacy of users. Security is an umbrella term that encompasses notions such as confidentiality, integrity and privacy, that are typically achieved using cryptographic encryption techniques. A special form of communication common in many IoT applications is group communication, where there are two or more recipients of a given message. In or-der to encrypt a message broadcast to a group, it is required that the participating parties agree on a group key a priori. Establishing and managing a group key in IoT environments, where devices are resources-constrained and groups are dynamic, is a non-trivial problem. The problem presents unique challenges with regard to con-structing protocols from lightweight and secure primitives commensurate with the resource-constrained nature of devices and maintaining security as devices dynamically leave or join a group. This thesis presents lightweight group key management protocols proposed to address the aforementioned problem, in a widely adopted model of a generic IoT network consisting of a gateway with reasonable computational power and a set of resource-constrained nodes. The aim of the group key management protocols is to enable the gateway and the set of resource-constrained devices to establish and manage a group key, which is then used to encrypt group messages. The main problems the protocols attempt to solve are establishing a group key among participating IoT devices in a secure and computationally feasible manner; enabling additionor removal of a device to the group in a security preserving manner; and enabling generation of a group session key in an efficient manner without re-running the protocol from scratch. The main challenge in designing such protocols is ensuring that the computations that a given IoT device performs as part of participating in the protocol are computationally feasible during initial group establishment, group keyupdate, and adding or removing a node from the group. The work presented in this thesis shows that the challenge can be overcome by designing protocols from lightweight cryptographic primitives. Specifically, protocols that exploit the lightweight nature of crypto-systems based on elliptic curves and the perfect secrecy of the One Time Pad (OTP) are presented. The protocols are designed in such a way that a resource-constrained member node performs a constant number of computationally easy computations during all stages of the group key management process. To demonstrate that the protocols are practically feasible, implementation resultof one of the protocols is also presented, showing that the protocol outperforms similar state-of-the-art protocols with regard to energy consumption, execution time, memory usage and number of messages generated.

Vid tidpunkten för framläggningen av avhandlingen var följande delarbete opublicerat: delarbete 3 (manuskript).

At the time of the defence the following paper was unpublished: paper 3 (manuscript).


SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
Styles APA, Harvard, Vancouver, ISO, etc.
43

To, Thanh Hai. « Protocoles à économie d'énergie pour l'Internet des Objets ». Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALM034.

Texte intégral
Résumé :
Dans cette thèse, nous explorons des aspects performances de LoRa, l’une des technologies prometteuses pour des équipments IoT. LoRa appartient à une nouvelle classede réseaux appelés “Low Power Wide Area Networks” (LPWAN) et définit une couchede radio spécifique basée sur la modulation “Chirp Spread Spectrum” et une méthodesimple d’accès appelée LoRaWAN. Le fonctionnement de LoRaWAN est similaire àALOHA: un appareil se réveille et envoie immédiatement un paquet à une passerelle.Ce choix de la méthode d’accès a un impact important sur la capacité de LoRa et sonévolutivité vers un grand nombre d’appareils. Il en résulte un niveau élevé de paquetsperdus suite aux collisions à mesure que le nombre d’appareils augmente.Motivés par ces défis, nous avons conçu et mis en œuvre deux méthodes d’accèsaméliorées pour LoRa. Tout d’abord, nous avons proposé d’appliquer la technique“Carrier Sense Multiple Access” (CSMA) à LoRa pour diminuer le nombre de collisions. Nous avons utilisé le simulateur NS-3 pour évaluer le schéma et les résultatsde la simulation montrent que CSMA réduit considérablement le taux de collisionstout en n’augmentant que légèrement la consommation d’énergie. Ensuite, nous avonsproposé Timemaps, une nouvelle méthode d’accès pour améliorer les performances deLoRa. L’idée est de construire une carte temporelle de toutes les transmissions dans lapasserelle et distribuer le planning de transmission lors de l’opération d’attachementd’un équipement au réseau. La carte temporelle permet un chevauchement des transmissions effectués avec des facteurs d’étalement différents. Comme des appareils allouent un facteur d’étalement en fonction de l’éloignement croissant de la passerelle,les transmissions deviennent orthogonales, ce qui conduit à une augmentation globalede la capacité du réseau.Nous avons utilisé le simulateur NS-3 pour évaluer la méthode de Timemaps dansdeux cas: des horloges parfaites et des horloges avec une dérive. La simulation prend encompte la quasi-orthogonalité des transmissions avec différents facteurs d’étalement etl’effet de capture. Les résultats montrent que Timemaps bénéficie d’un taux de livraison de paquets remarquablement plus élevé et du taux de collisions considérablementplus faible par rapport à LoRaWAN avec une consommation d’énergie modérémentaugmentée.Pour valider les deux schémas proposés, nous avons développé un module NS-3qui simule l’opération de LoRa à grain fin. Le module utilise un cadre énergétiqueimplémenté dans NS-3 pour estimer la consommation d’énergie par nœuds et dansl’ensemble du réseau
In this dissertation, we consider performance aspects of LoRa, one of the promisingtechnologies for lightweight smart sensors for the Internet of Things (IoT). LoRa belongs to a new class of Low Power Wide Area (LPWA) networks and defines a specificradio layer based on the Chirp Spread Spectrum modulation and a simple MediumAccess Control called LoRaWAN. The operation of LoRaWAN is similar to ALOHA: adevice wakes up and sends a packet to a Gateway right away. This choice of the accessmethod highly impacts the capacity of LoRa and its scalability to a large number ofdevices. It results in a high level of packet losses due to collisions as the number ofdevices increases.Motivated by these challenges, we have designed and implemented enhanced access methods to improve LoRa performance. First, we have taken advantage of CarrierSense Multiple Access (CSMA) to lower the collision ratio. We have used the NS-3 simulator to evaluate the scheme and the simulation results show that CSMA considerablylowers the collision ratio while only slightly increasing energy consumption. Second, wehave proposed Timemaps, a new access method for improving the performance of LoRa.The idea is to build a temporal map of all transmissions of IoT devices by a Gatewayand distribute the schedule during join. Schedules admit overlapping transmissions ofdifferent spreading factors and as devices usually allocate a spreading factor in functionof the increasing distance from the Gateway, transmissions will be in fact orthogonal,which leads to increased overall capacity of the network.We have used the NS-3 simulator to evaluate Timemaps in both cases of perfect clocks and clocks with a drift.The simulation takes into account quasi-orthogonality of transmissions with differentspreading factors and the capture effect. The results show that Timemaps benefitsfrom remarkably higher packet delivery ratio and considerably lower the collision ratiocompared to LoRaWAN along with moderately increased energy consumption.To validate both schemes we have developed an NS-3 module that simulates thefine-grain LoRa operation. The module uses an energy framework implemented in NS-3to estimate energy consumption at battery powered nodes and in the whole network
Styles APA, Harvard, Vancouver, ISO, etc.
44

Sannervik, Filip, et Parth Magdum. « Security Assessment of IoT- Devices Grouped by Similar Attributes : Researching patterns in vulnerabilities of IoT- devices by grouping devices based on which protocols are running ». Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302147.

Texte intégral
Résumé :
The Internet of Things (IoT) is a concept that is getting a lot of attention. IoT devices are growing in popularity and so is the need to protect these devices from attacks and vulnerabilities. Future developers and users of IoT devices need to know what type of devices need extra care and which are more likely to be vulnerable. Therefore this study has researched the correlations between combinations of protocols and software vulnerabilities. Fifteen protocols used by common services over the internet were selected to base the study around. Then an artificial neural network was used to group the devices into 4 groups based on which of these fifteen protocols were running. Publicly disclosed vulnerabilities were then enumerated for all devices in each group. It was found that the percentage of vulnerable devices in each group differed meaning there is some correlation between running combinations of protocols and how likely a device is vulnerable. The severity of the vulnerabilities in the vulnerable devices were also analyzed but no correlation was found between the groups.
Sakernas internet eller Internet of things (IoT) är ett koncept som fått mycket uppmärksamhet. IoT enheter växer drastisk i popularitet, därför är det mer nödvändigt att skydda dessa enheter från attacker och säkerhetsbrister. Framtida utvecklare och användare av IoT system behöver då veta vilka enheter som är mer troliga att ha säkerhetsbrister. Denna studie har utforskat om det finns något samband mellan kombinationer av aktiva protokoll i enheter och säkerhetsbrister. Femton vanligt använda protokoll valdes som bas för studien, ett artificiellt neuralt nätverk användes sedan för att gruppera enheter baserat på dessa protokoll. Kända sårbarheter i enheterna räknades upp för varje grupp. En korrelation mellan kombinationer av protokoll och trolighet för sårbarheter hittades. Allvarlighetsgraden av säkerhetsbristerna i sårbara enheter analyserades också, men ingen korrelation hittades mellan grupperna.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Hala, Martin. « Ovladač a hardwarový modul protokolu MiWi pro Linux ». Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-235422.

Texte intégral
Résumé :
The master's thesis is about a communication element - a hardware module, its design and implementation. The communication is to be maintained between a Linux embedded device and the sensors elements, using the MiWi protocol. The task is part of the IoT project, developed at FIT BUT. Furthermore, the paper describes design of a driver for the module, its likely solution, as well as the very implementation. Finally, the obtained experience is discussed in a summary, along the next step options on how to proceed further with the driver development.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Bondi, Davide. « Protocollo LoRaWAN e IoT : interfacciamento con Java e sperimentazione su comunicazioni indoor ». Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018.

Trouver le texte intégral
Résumé :
L'obiettivo di questa tesi è lo studio di LoRaWAN, un protocollo di comunicazione per IoT, adatto a trasmissioni poste nel raggio di chilometri a basso consumo di energia. In questa tesi sono state descritte le proprietà, l'architettura e i limiti del protocollo. Successivamente sono stati presentati gli strumenti con cui è stato svolto i lavoro e sono state misurate le prestazioni di LoRaWAN a corto raggio, in particolare la percentuale di trasmissioni andate a buon fine. Infine si è costruito un prototipo per la gestione di un sistema di comunicazione LoRaWAN usando tecniche di programmazione ad oggetti.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Fayad, Achraf. « Protocole d’authentification sécurisé pour les objets connectés ». Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT051.

Texte intégral
Résumé :
L’interconnexion de ressources privées sur une infrastructure publique, la mobilité des utilisateurs et l’émergence des nouvelles technologies (réseaux véhiculaires, réseaux de capteurs, Internet des objets, etc) ont ajouté des nouvelles exigences en terme de sécurité du coté serveur et celui du client. L’Internet des objets ou IoT (Internet of Things) semble répondre à des usages bien accueillis par le grand public. On trouve ainsi les applications de l’IoT dans tous les domaines de la vie du quotidien. Les objets Internet sont ainsi prévus en très grand nombre et ceci à une très grande échelle. La sécurité est l’élément majeur qui renforcera d’une manière certaine une acceptation encore plus grande des IoT par les citoyens et les entreprises. Par ailleurs, le déploiement à grande échelle des objets connectés, sera convoité par les attaques de tout bord. Les cyberattaques opérationnelles sur les réseaux traditionnels seront projetées vers l’internet des objets. La sécurité est ainsi critique dans ce contexte au vu les enjeux sous-jacents. Les travaux de recherche menés dans cette thèse visent à faire avancer la littérature sur l'authentification IoT en proposant trois schémas d'authentification qui répondent aux besoins des systèmes IoT en termes de sécurité et de performances, tout en prenant en compte les aspects pratiques liées au déploiement. L'OTP (One-Time Password) est une méthode d’authentification qui représente une solution prometteuse pour les environnements des objets connectés et les villes intelligentes. Ce travail de recherche étend le principe OTP et propose une méthode d’authentification légère utilisant une nouvelle approche de la génération OTP qui s’appuie sur la cryptographie à courbe elliptique (ECC) et l’isogénie pour garantir la sécurité. Les résultats de performance obtenus démontrent l’efficacité de notre approche en termes de sécurité et de performance.Nous nous appuyons sur la blockchain pour proposer deux solutions d’authentification: premièrement, une solution d’authentification simple et légère basée sur Ethereum, et deuxiemement, une approche adaptative d’authentification et d’autorisation basée sur la blockchain pour les cas d’utilisation de l’IoT. Nous avons fourni une véritable implémentation de ses approches. L’évaluation approfondie fournie montre clairement la capacité de nos systèmes à répondre aux différentes exigences de sécurité, avec un coût léger en terme de performance
The interconnection of private resources on public infrastructure, user mobility and the emergence of new technologies (vehicular networks, sensor networks, Internet of things, etc.) have added new requirements in terms of security on the server side as well as the client side. Examples include the processing time, mutual authentication, client participation in the choice of security settings and protection against traffic analysis. Internet of Things (IoT) is in widespread use and its applications cover many aspects of today's life, which results in a huge and continuously increasing number of objects distributed everywhere.Security is no doubt the element that will improve and strengthen the acceptability of IoT, especially that this large scale deployment of IoT systems will attract the appetite of the attackers. The current cyber-attacks that are operational on traditional networks will be projected towards the Internet of Things. Security is so critical in this context given the underlying stakes; in particular, authentication has a critical importance given the impact of the presence of malicious node within the IoT systems and the harm they can cause to the overall system. The research works in this thesis aim to advance the literature on IoT authentication by proposing three authentication schemes that satisfy the needs of IoT systems in terms of security and performance, while taking into consideration the practical deployment-related concerns. One-Time Password (OTP) is an authentication scheme that represents a promising solution for IoT and smart cities environments. This research work extends the OTP principle and propose a new approach to generate OTP based on Elliptic Curve Cryptography (ECC) and Isogeny to guarantee the security of such protocol. The performance results obtained demonstrate the efficiency and effectiveness of our approach in terms of security and performance.We also rely on blockchains in order to propose two authentication solutions: first, a simple and lightweight blockchain-based authentication scheme for IoT systems based on Ethereum, and second, an adaptive blockchain-based authentication and authorization approach for IoT use cases. We provided a real implementation of our proposed solutions. The extensive evaluation provided, clearly shows the ability of our schemes to meet the different security requirements with a lightweight cost in terms of performance
Styles APA, Harvard, Vancouver, ISO, etc.
48

Melder, Indrek. « Sputum induction literature review and proposal for a protocol ». [Tampa, Fla.] : University of South Florida, 2005. http://purl.fcla.edu/fcla/etd/SFE0001290.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

Cavallero, Sara. « Medium Access Control Protocols for Terahertz Communication ». Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Trouver le texte intégral
Résumé :
This thesis proposes and studies a Medium Access Control (MAC) protocol for networks of tags deployed over an industrial machine using THz communications. Despite the great advantages of these frequencies, there are drawbacks that cannot be ignored, such as propagation delays that, even at small distances, are of the same order of magnitude as packet transmission times. For this reason, the mathematical models developed for Contention-Free and Contention-Based protocols take into account the propagation delay. The main focus of this thesis is on the CSMA/CA protocol, which introduces channel sensing to reduce collisions and increase performance. The performance of the protocol are compared with two benchmarks, based on Polling and Aloha, considering an industrial machine scenario and accounting for physical and MAC layers features.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Nanukuttan, Sreejith V. « Development of a new test protocol for the permit ion migration test ». Thesis, Queen's University Belfast, 2007. https://pure.qub.ac.uk/portal/en/theses/development-of-a-new-test-protocol-for-the-permit-ion-migration-test(1c6008d6-3dba-4249-8a11-08e6a61fd295).html.

Texte intégral
Résumé :
Chloride induced corrosion of steel in concrete is one of the most common reasons for the deterioration of reinforced concrete in both marine and transportation structures. In order to assess the chloride penetration resistance of concrete, the common practice is to remove cores from the structure and test them in a laboratory to determine the chloride diffusion coefficient using the steady state diffusion test. This test is not popular due to its long test duration to achieve a steady state of flow of chlorides through the test specimen, which is used to calculate the diffusion coefficient. Therefore, applied voltage tests (known as migration tests) have become quite common, in which the transport of chlorides ions through the test specimens is accelerated by applying a potential difference across them. The measurements during either the non-steady state condition or the steady state condition are used to calculate a chloride migration coefficient, which has been reported to correlate well with the corresponding coefficient from the diffusion based tests. The chloride diffusion coefficient of concrete can also be predicted more rapidly using other indirect methods, such as the electrical resistivity test. By following the principle of the migration test, a new in situ migration test (called the Permit ion migration test) was developed at Queen's University Belfast in the late 90s. The validity of this test was established for concretes containing normal Portland cement, by comparing the in situ migration coefficient with both the coefficient of diffusion (from both steady state and non-steady state diffusion tests) and the migration coefficient from the steady state migration test. However, it was considered to be necessary to broaden its applicability for testing concretes containing supplementary cementitious materials, by repeating the validation study on concretes containing such materials. Furthermore, there was a need to redesign the apparatus to make it more reliable and user-friendly for site applications. Therefore, a detailed investigation was carried out, initially as part of a European Round Robin Test programme (viz. EU FP5 Growth Programme - Chlortest) to identify the most reliable laboratory-based methods for assessing the chloride diffusivity of concretes which are commonly used in practice. This was followed by a detailed laboratory study on concretes containing supplementary cementitious materials, such as microsilica (ms), pulverised fuel ash (pfa) and ground granulated blast furnace slag (ggbs), in addition to normal Portland cement (ope) as a control. In this investigation, not only the tests identified in the initial investigation were used, but also were additional tests such as the new Permit ion migration test and the Wenner four probe resistivity test. The results from these investigations were used to establish the validity of the Permit ion migration test for testing concretes containing supplementary cementitious materials and to improve its test protocol. As part of the Chlortest programme, a non-steady state diffusion test (to act as a reference method), a non-steady state migration test, a steady state migration test and a resistivity test were selected and a comparative (reliability) study was carried out using concretes, manufactured by four different EU countries, containing ope, pfa,ggbs and ms as binders. The results indicated that both the non-steady state migration test and the bulk resistivity test are the most reliable tests in assessing the chloride diffusivity of these. The results from the steady state migration test were found to be affected by the use of a thickness of the test sample less than the maximum size of the coarse aggregate. In the validation study that was carried out using the Permit ion migration test, the insitu migration coefficient correlated well with the non-steady state migration coefficient, the steady state migration coefficient and the bulk resistivity for a range of concrete mixes containing different types of binders, such as ope, ms, pfa andggbs. For the determination of the onset of the steady state condition and the estimation of the steady state chloride flux, it was found that the conductivity of the anolyte could effectively be used, which in turn could eliminate the need for sampling chloride solutions from the anolyte periodically. Further, there existed an excellent degree of correlation between the peak current and the steady state migration coefficient from both the steady state migration test and the Permit ion migration test, which indicated that the former could be used to predict the latter, with much lesser effort and complexity of the test protocol. On the basis of the findings from both sets of investigation, a new test protocol was developed for the Permit ion migration test and the Permit was redesigned. The new test protocol used conductivity of the anolyte instead of the chloride concentration to identify the onset of the steady state condition and there is the option to calculate the chloride migration coefficient from either the peak current or the steady state of chloride flux. The new Permit was designed to work as a stand-alone instrument onsite, with little interference from the operation once the test had been started, but at any stage a computer could be connected to view the progress of the test.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie