Thèses sur le sujet « Networked things »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Networked things ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.
Zhang, Zhi. « Networked RFID Systems for the Internet of Things ». Doctoral thesis, KTH, Elektroniksystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-120056.
Texte intégralQC 20130409
Shingleton, Duncan James. « Negative space of things : a practice-based research approach to understand the role of objects in the Internet of Things ». Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/33221.
Texte intégralTsiftes, Nicolas. « Storage-Centric System Architectures for Networked, Resource-Constrained Devices ». Doctoral thesis, Uppsala universitet, Datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-267628.
Texte intégralMagnússon, Sindri. « Bandwidth Limited Distributed Optimization with Applications to Networked Cyberphysical Systems ». Doctoral thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205682.
Texte intégralQC 20170424
Sili, Marius. « Progettazione ed implementazione di un'applicazione per la condivisione di stream MIDI ». Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/22142/.
Texte intégralKarim, Rafid, et Haidara Al-Fakhri. « Smart Door Lock : A first prototype of a networked power lock controller with an NFC interface ». Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134894.
Texte intégralDet blir allt vanligare med närfältskommunikation (NFC) i dagens samhälle, mobiltelefons-tillverkarna börjar utveckla nya telefoner med NFC teknik inbyggd, samtidigt som användningen av NFC ökat. Det sker även en utveckling inom mobila betalningar och användar-verifiering med användning av NFC, då NFC förenklar detta. Med detta sagt kommer vi att arbeta med detta i detta kandidatexamens-arbete där vi fokuserar på NFC samt Power over Ethernet som använder MSP430 chippet som kärna. Med dessa enheter kombinerade kommer en enkel rörelse med ett NFC kort över en NFC läsare som sedan skall ge åtkomst till en låst dörr. Detta i större kombination med en Internetuppkoppling kunna ge ägaren möjligheten att kunna skicka ut dörrnycklar till andra användare. I detta kandidatexamensarbete gjorde vi det möjligt för ett PoE kretskort bestående av ett MPS430 mikroprocessor att samarbeta med en NFC läsare genom SPI protokollet. Genom att utveckla detta projekt hoppas vi att vårt slutresultat leder till en enklare delning av nycklar med hjälp av denna teknologi.
CUNHA, MARCIO LUIZ COELHO. « CONTEXT DRIVEN THINGS SOCIAL NETWORK ». PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2010. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=29090@1.
Texte intégralCOORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE EXCELENCIA ACADEMICA
A cada dia mais e mais brasileiros possuem um telefone celular de última geração com conexão à internet. Estes novos aparelhos são capazes de ler diferentes tipos de etiquetas usadas para armazenar, recuperar e gerenciar informações, e estão conosco em toda parte para apoiar nossas tarefas diárias. Estes pequenos computadores são conscientes de seu entorno, e propícios à comunicação e colaboração com o mundo real. Devido a sua popularidade, disponibilidade e massa crítica de usuários atingida, novos serviços são desenvolvidos baseados no conceito da computação ubíqua, onde computadores e seres humanos são unificados em torno da noção de ambiente. Estes sistemas pervasivos lidam com questões de interação de contexto e reconhecimento de ambientes, e se adaptam de acordo com as preferências do usuário. Nesta dissertação são descritos o desenvolvimento e testes de usabilidade de uma rede social que é fundamentada nos conceitos da computação ubíqua e Internet das Coisas. Esta rede social, dirigida para o tema da enogastronomia, é acessível por dispositivos móveis e utiliza códigos de duas dimensões colados nas garrafas dos vinhos para através do software e da câmera do celular trazer informações de acordo com o contexto do objeto, lugar e preferência do usuário.
Every day more and more Brazilians have a next generation mobile phone with an internet connection. These new devices are able to read different types of labels used to store, retrieve and manage information; they are with us everywhere to support our daily tasks. These small computers are aware of their surroundings and propitious to communication and collaboration with the real world. Due to their popularity, availability and critical mass of users reached, new services are developed based on the concept of ubiquitous computing, where computers and humans are unified around the concept of environment. These systems deal with issues of pervasive interaction of context, recognition of environments and adapt according to user preferences. This thesis presents a description of the development and usability testing of a social network that is based on the concepts of ubiquitous computing and the Internet of Things. This social network, addressed to the theme of enogastronomy, is accessible by mobile devices and uses twodimensional codes pasted on the bottles of wine for using the software and the phone s camera to bring information in accordance with the context of the object, place and user preference.
Iova, Oana-Teodora. « Standards optimization and network lifetime maximization for wireless sensor networks in the Internet of things ». Thesis, Strasbourg, 2014. http://www.theses.fr/2014STRAD022/document.
Texte intégralNew protocols have been standardized in order to integrate Wireless Sensor Networks (WSN) in the Internet. Among them, the IEEE 802.15.4 MAC layer protocol, and RPL, the IPv6 Routing Protocol for Low-power and Lossy Networks. The goal of this thesis is to improve these protocols, considering the energy constraints of the devices that compose the WSN. First, we proposed a new MAC layer broadcast mechanism in IEEE 802.15.4, to ensure a reliable delivery of the control packets from the upper layers (especially from RPL). Then, we provided an exhaustive evaluation of RPL and highlighted an instability problem. This instability generates a large overhead, consuming a lot of energy. Since the lifetime of WSN is very limited, we proposed a new routing metric that identifies the energy bottlenecks and maximizes the lifetime of the network. Finally, by coupling this metric with a multipath version of RPL, we are able to solve the instability problem previously highlighted
Carlquist, Johan. « Evaluating the use of ICN for Internet of things ». Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-343368.
Texte intégralGUCCIARDO, Michele. « Challenges and opportunities in emerging high-density wireless networks ». Doctoral thesis, Università degli Studi di Palermo, 2020. http://hdl.handle.net/10447/396244.
Texte intégralCobârzan, Cosmin. « Internet of highly mobile things ». Thesis, Strasbourg, 2015. http://www.theses.fr/2015STRAD037/document.
Texte intégralMobility is becoming an integrating part of todays Internet of Things, as many applications such as wildlife monitoring or target tracking in the battlefield cannot be done only with the help of static nodes. The goal of this thesis is to provide new communication architecture articulated around providing mobility support in Low Power and Lossy Networks (LLNs). First we analyzed from a theoretical point of view the IPv6 address auto-configuration with all optimizations made in Neighbor Discovery Optimization for IPv6 over 6LoWPAN. This step is of crucial importance for protocols that offer mobility support in IP networks, such as MIPv6. Our findings, increased message size that leads to fragmentation and high energy consumption for routers that are involved in Neighbor Discovery message exchange, have lead us to use the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) in order to provide mobility support. RPL is build from ground up with respect to LLN requirements. Our second contribution enhanced RPL operations to support mobility management. Finally, we proposed a cross-layer protocol – Mobility Triggered-RPL – that leverages actions from the X-Machiavel preamble sampling MAC protocol into RPL
Hassan, Basma Mostafa. « Monitoring the Internet of Things (IoT) Networks ». Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS100.
Texte intégralBy connecting billions of things to the Internet, IoT created a plethora of applications that touch every aspect of human life. Time-sensitive, mission-critical services, require robust connectivity and strict reliability constraints. On the other hand, the IoT relies mainly on Low-power Lossy Networks, which are unreliable by nature due to their limited resources, hard duty cycles, dynamic topologies, and uncertain radio connectivity. Faults in LLNs are common rather than rare events, therefore, maintaining continuous availability of devices and reliability of communication, are critical factors to guarantee a constant, reliable flow of application data.After a comprehensive literature review, and up to our knowledge, it is clear that there is a call for a new approach to monitoring the unreliable nodes and links in an optimized, energy-efficient, proactive manner, and complete interoperability with IoT protocols. To target this research gap, our contributions address the correct assignment (placement) of the monitoring nodes. This problem is known as the minimum assignment problem, which is NP-hard. We target scalable monitoring by mapping the assignment problem into the well-studied MVC problem, also NP-hard. We proposed an algorithm to convert the DODAG into a nice-tree decomposition with its parameter (treewidth) restricted to the value one. As a result of these propositions, the monitor placement becomes only Fixed-Parameter Tractable, and can also be polynomial-time solvable.To prolong network longevity, the monitoring role should be distributed and balanced between the entire set of nodes. To that end, assuming periodical functioning, we propose in a second contribution to schedule between several subsets of nodes; each is covering the entire network. A three-phase centralized computation of the scheduling was proposed. The proposition decomposes the monitoring problem and maps it into three well-known sub-problems, for which approximation algorithms already exist in the literature. Thus, the computational complexity can be reduced.However, the one major limitation of the proposed three-phase decomposition is that it is not an exact solution. We provide the exact solution to the minimum monitor assignment problem with a duty-cycled monitoring approach, by formulating a Binary Integer Program (BIP). Experimentation is designed using network instances of different topologies and sizes. Results demonstrate the effectiveness of the proposed model in realizing full monitoring coverage with minimum energy consumption and communication overhead while balancing the monitoring role between nodes.The final contribution targeted the dynamic distributed monitoring placement and scheduling. The dynamic feature of the model ensures real-time adaptation of the monitoring schedule to the frequent instabilities of networks, and the distributed feature aims at reducing the communication overhead
Armide, Misikir, et Herbert Ecker. « Combining the Good Things from Vehicle Networks and High-Performance Networks ». Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-657.
Texte intégralThe aim of this Master’s thesis is to develop a solution for combining speed and performance of switched Ethernet with the real time capability and determinism of sophisticated in- vehicle networks. After thorough research in vehicle network standards, their demands and features, the
Flexible Time Division Multiple Access (FTDMA) protocol of FlexRay was chosen to be applied on a switched Ethernet architecture since it can accommodate both hard real time tasks and soft real time tasks. To provide hard real time capability, what this paper focuses on, a media access method was developed by creating static TDMA schedules for each node’s sending and receiving
port according to a certain traffic assumption. To validate the developed media access algorithm several examples with different traffic assumptions and architectures were generated and
investigated based on their sending and receiving utilization. A second method for validating and thus proving the functionality of the algorithm was by simulation. Therefore the Matlab Simulink
media library extension TRUE TIME was used to simulate a simple example with 100% sending and receiving utilization for each node.
KALYONCU, Samet. « Wireless Solutions and Authentication Mechanisms for Contiki Based Internet of Things Networks ». Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27158.
Texte intégralTHEKKE, KANAPRAM DIVYA. « Ego things : Networks Of Self-Aware Intelligent Objects ». Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1048455.
Texte intégralOkumura, Brandon M. « IoTA : Internet of Things Assistant ». DigitalCommons@CalPoly, 2017. https://digitalcommons.calpoly.edu/theses/1769.
Texte intégralRamos, Alex Lacerda. « Network security metrics for the Internet of things ». Universidade de Fortaleza, 2018. http://dspace.unifor.br/handle/tede/108423.
Texte intégralRecent advances in networking technologies, such as the IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) standard, have allowed to interconnect wireless sensor networks (WSNs) to the Internet, thus forming the Internet of Things (IoT). Despite the availability of different message security mechanisms, sensor networks are still vulnerable to several types of attack. To identify such attacks, an Intrusion Detection System (IDS) can be deployed. However, IDSs can generate several false positives and false negatives. Moreover, the alerts raised by IDSs provide no information regarding the impact an attack has on the security of a sensor network. As a consequence, it becomes difficult for WSN administrators and users to take proper responsive actions when attacks occur. To address these issues, this thesis proposes three security metrics. The first metric, called Trust Probability, quantifies by how much an IDS output could be trusted (to be correct). Such metric can help administrators decide which alerts deserve careful attention or which alerts might be safely ignored. Since this type of metric provides a measure of IDS effectiveness, it can also be used to compare different IDSs as well as to fine-tune a given IDS. The second metric, named Damage Level, quantifies the severity of an attack. This metric, when combined with the Trust Probability metric, enables the administrator to correctly prioritize and respond to alerts by evaluating them in terms of accuracy and attack impact. Finally, the third metric, namely Data Security Level, quantifies the degree to which sensor data can be trusted when the sensor is under attack. The security situational awareness provided by this metric helps WSN users make better decisions about the use of the gathered sensor data. Experimental results show that the proposed metrics can accurately quantify security level with low performance overhead and power consumption. Keywords: Network Security Metrics, Quantitative Security Analysis, Security Situational Awareness, Internet of Things, Wireless Sensor Networks.
Recentes avanços nas tecnologias de rede, tais como o padrão IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN), permitiram a interconexão de redes de sensores sem fio (RSSF) à Internet, formando assim a Internet das Coisas (Internet of Things -- IoT). Apesar da disponibilidade de diferentes mecanismos de segurança de mensagens, as redes de sensores ainda são vulneráveis a vários tipos de ataques. Para identificar esses ataques, um Sistema de Detecção de Intrusão (Intrusion Detection System -- IDS) pode ser implantado. No entanto, os IDSs podem gerar vários falsos positivos e falsos negativos. Além disso, os alertas gerados pelos IDSs não fornecem nenhuma informação sobre o impacto de um ataque sobre a segurança de uma RSSF. Consequentemente, torna-se difícil para os administradores e usuários da rede tomarem as devidas ações responsivas quando ataques ocorrerem. Para tratar estas questões, esta tese propõe três métricas de segurança. A primeira delas, chamada Trust Probability, quantifica o quão confiável (correto) é um output de um IDS. Essa métrica pode ajudar os administradores a decidir quais alertas merecem mais atenção ou quais podem ser ignorados com segurança. Já que essa métrica fornece uma medida da efetividade de um IDS, ela também pode ser usada para comparar diferentes IDSs, bem como para otimizar um dado IDS. A segunda métrica, denominada Damage Level, quantifica a gravidade de um ataque. Esta métrica, quando combinada com a Trust Probability, permite ao administrador priorizar e responder corretamente a alertas, avaliando-os em termos de precisão e impacto de ataque. Por fim, a terceira métrica, chamada de Data Security Level, quantifica quão confiáveis os dados dos sensores são quando a rede está sob ataque. Conhecer a informação fornecida por esta métrica ajuda os usuários a tomar melhores decisões sobre o uso dos dados coletados pelos sensores. Os resultados experimentais mostram que as métricas propostas podem quantificar com precisão o nível de segurança da rede, com baixo consumo de energia e sobrecarga de desempenho. Palavras-chave:Métricas de Segurança de Rede, Análise Quantitativa de Segurança, Consciência Situacional de Segurança, Internet das Coisas, Redes de Sensores sem Fio.
Azari, Amin. « Energy Efficient Machine-Type Communications over Cellular Networks : A Battery Lifetime-Aware Cellular Network Design Framework ». Licentiate thesis, KTH, Kommunikationssystem, CoS, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194416.
Texte intégralQC 20161103
Bhebhe, Mbongeni. « Performance of narrow band internet of things (NBIoT) networks ». Master's thesis, Faculty of Engineering and the Built Environment, 2019. http://hdl.handle.net/11427/31533.
Texte intégralBesson, Lilian. « Multi-Players Bandit Algorithms for Internet of Things Networks ». Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0005.
Texte intégralIn this PhD thesis, we study wireless networks and reconfigurable end-devices that can access Cognitive Radio networks, in unlicensed bands and without central control. We focus on Internet of Things networks (IoT), with the objective of extending the devices’ battery life, by equipping them with low-cost but efficient machine learning algorithms, in order to let them automatically improve the efficiency of their wireless communications. We propose different models of IoT networks, and we show empirically on both numerical simulations and real-world validation the possible gain of our methods, that use Reinforcement Learning. The different network access problems are modeled as Multi-Armed Bandits (MAB), but we found that analyzing the realistic models was intractable, because proving the convergence of many IoT devices playing a collaborative game, without communication nor coordination is hard, when they all follow random activation patterns. The rest of this manuscript thus studies two restricted models, first multi-players bandits in stationary problems, then non-stationary single-player bandits. We also detail another contribution, SMPyBandits, our open-source Python library for numerical MAB simulations, that covers all the studied models and more
Tuyishimire, Emmanuel. « Internet of Things : Least Interference Beaconing Algorithms ». Thesis, University of Cape Town, 2014. http://pubs.cs.uct.ac.za/archive/00000997/.
Texte intégralDjamaa, B. « Pervasive service discovery in low-power and lossy networks ». Thesis, Cranfield University, 2016. http://dspace.lib.cranfield.ac.uk/handle/1826/10670.
Texte intégralShahid, Mustafizur Rahman. « Deep learning for Internet of Things (IoT) network security ». Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS003.
Texte intégralThe growing Internet of Things (IoT) introduces new security challenges for network activity monitoring. Most IoT devices are vulnerable because of a lack of security awareness from device manufacturers and end users. As a consequence, they have become prime targets for malware developers who want to turn them into bots. Contrary to general-purpose devices, an IoT device is designed to perform very specific tasks. Hence, its networking behavior is very stable and predictable making it well suited for data analysis techniques. Therefore, the first part of this thesis focuses on leveraging recent advances in the field of deep learning to develop network monitoring tools for the IoT. Two types of network monitoring tools are explored: IoT device type recognition systems and IoT network Intrusion Detection Systems (NIDS). For IoT device type recognition, supervised machine learning algorithms are trained to perform network traffic classification and determine what IoT device the traffic belongs to. The IoT NIDS consists of a set of autoencoders, each trained for a different IoT device type. The autoencoders learn the legitimate networking behavior profile and detect any deviation from it. Experiments using network traffic data produced by a smart home show that the proposed models achieve high performance.Despite yielding promising results, training and testing machine learning based network monitoring systems requires tremendous amount of IoT network traffic data. But, very few IoT network traffic datasets are publicly available. Physically operating thousands of real IoT devices can be very costly and can rise privacy concerns. In the second part of this thesis, we propose to leverage Generative Adversarial Networks (GAN) to generate bidirectional flows that look like they were produced by a real IoT device. A bidirectional flow consists of the sequence of the sizes of individual packets along with a duration. Hence, in addition to generating packet-level features which are the sizes of individual packets, our developed generator implicitly learns to comply with flow-level characteristics, such as the total number of packets and bytes in a bidirectional flow or the total duration of the flow. Experimental results using data produced by a smart speaker show that our method allows us to generate high quality and realistic looking synthetic bidirectional flows
Putchala, Manoj Kumar. « Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network using Gated Recurrent Neural Networks (GRU) ». Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1503680452498351.
Texte intégralAbade, Pedro António Carvalho. « VR-Banway : deploying a body area network gateway on single-board computers and mesh networks ». Master's thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/23569.
Texte intégralInternet of Things (IoT) is a generic category of ICT architectures that includes the use of sensor-based, communication-enabled systems. A common architectural element in IoT is the sensors gateway that collects data from nearby sensors and relays them to higher-order remote services. The VR2Market project, in which this work is integrated, uses two implementations of the gateway, based on Android smartphones and RPI boards. With the new proposed IoT-inspired computing module, it is possible to migrate gateways to a smaller, more efficient hardware, while retaining the high-level programming abstraction. In this work, we propose and implement a new version of the gateway, named VR-Banway, using the Intel Edison compute module, taking into consideration the integration with additional service layers in VR2Market system, especially with respect to the required Ad hoc networks support. VR-Banway proved to be a solution capable of replacing the existing gateway component in the VR2Market system. The new approach uses a smaller module, reduces power consumption and is more portable. VR-Banway has been used in the context of firefighters monitoring, but is ready to be deployed in other domains.
A Internet of Things (IoT) é uma categoria genérica das arquiteturas de TIC que inclui o uso de sistemas baseados em sensores e comunicações. Um elemento comum das arquiteturas IoT é o agregador que recolhe dados de sensores nas proximidades e reencaminha-os para serviços remotos de mais alto nível. O projeto VR2Market, no qual este trabalho está integrado, usa duas implementações do agregador de dados, implementados em Android e RPI. Com o novo módulo proposto, inspirado na IoT, é possível migrar os agregadores de dados para dispositivos mais pequenos e mais eficientes mantendo a abstração de programação de alto nível. Neste trabalho, propomos e implementamos uma nova versão do agregador de dados, chamado VR-Banway, usando o módulo computacional Intel Edison, tendo em consideração a integração de novas camadas de serviços no VR2Market, especialmente no que diz respeito ao suporte de redes Ad hoc. VR-Banway provou ser uma solução capaz de substituir o componente de agregador de dados existente no sistema VR2Market. A nova abordagem usa um módulo mais pequeno, reduz o consumo de energia e é mais portátil. VR-Banway foi usado no contexto de monitorização de bombeiros, mas está preparado para ser implementado noutros domínios.
Seekins, Ryan N. (Ryan Nicholas). « The Internet of things applied to command and control networks ». Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106263.
Texte intégralCataloged from PDF version of thesis.
Includes bibliographical references (pages 92-96).
The number of people and things connected to the Internet continue growing at an exponential rate. This record setting growth along with the reduction in small sensor costs and machine learning enabled a concept called the Internet of Things (IoT) to thrive. With numerous applications in both commercial and government spaces, the IoT has the ability to transform any organizations network capabilities. The Air Force has a unique set of requirements centered on cyberspace superiority and the ability to command and control people and things. This paper leverages the traditional systems engineering "'V" model as a framework to develop and analyze a concept for an Air Force command and control network. Methods and tools such as stakeholder analysis, hierarchical control structures and object-process diagrams are used to develop the concept of operations, system architecture, and the preliminary design. The programs technology readiness is also assessed before outlining key milestones and deliverables required for transitioning the program forward in the acquisition life-cycle.
by Ryan N. Seekins.
S.M. in Engineering and Management
Bragg, Graeme McLachlan. « Standards-based Internet of Things sub-GHz environmental sensor networks ». Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/415864/.
Texte intégralRamezani, Parisa. « Extending Wireless Powered Communication Networks for Future Internet of Things ». Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/16850.
Texte intégralGalanis, Ioannis. « RESOURCE MANAGEMENT IN EDGE COMPUTING FOR INTERNET OF THINGS APPLICATIONS ». OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1871.
Texte intégralYelasani, kailash kumar yadav. « ECONOMIZED SENSOR DATA PROCESSING WITH VEHICLE PLATOONING ». OpenSIUC, 2018. https://opensiuc.lib.siu.edu/theses/2305.
Texte intégralLee, Gilsoo. « Online Optimization for Edge Computing under Uncertainty in Wireless Networks ». Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/97909.
Texte intégralDoctor of Philosophy
Smart cities will rely on an Internet of Things (IoT) system that interconnects cars, drones, sensors, home appliances, and other digital devices. Modern IoT systems are inherently designed to process real-time information such as temperature, humidity, or even car navigational data, at any time and location. A unique challenge in the design of such an IoT is the need to process large volumes of data over a wireless network that consists of heterogeneous IoT devices such as smartphones, vehicles, home access points, robots, and drones. These devices must perform local (on-device or so-called edge) processing of their data without relying on a remote cloud. This vision of a smart city seen as a mobile computing platform gives rise to the emerging concept of edge computing using which smartphones, sensors, vehicles, and drones can exchange and process data locally on their own devices. Edge computing allows overcoming the limitations of centralized cloud computation by enabling distributed, low-latency computation at the network edge. Despite the promising opportunities of edge computing as an enabler for smart city services such as autonomous vehicles, drones, or smart homes, one must address many challenges related to managing time-varying resources such as energy and storage, in a dynamic way. For instance, managing communication, energy, and computing resources in an IoT requires handling many uncertain factors such as the intermittent availability of wireless connectivity and the fact that the devices do not know a priori what type of tasks they need to process. The goal of this dissertation is to address the fundamental challenges in edge computing under uncertainty in an IoT. In particular, this dissertation introduces novel mathematical algorithms and frameworks that exploit ideas from the fields of online optimization, machine learning, and wireless communication to enable future IoT services such as smart factories, virtual reality, and autonomous systems. In this dissertation, holistic frameworks are developed by designing, analyzing, and optimizing wireless communications systems with an emphasize on emerging IoT applications. To this end, various mathematical frameworks and efficient algorithms are proposed by drawing on tools from wireless communications, online optimization, and machine learning to yield key innovations. The results show that the developed solutions can enable an IoT to operate efficiently in presence of uncertainty stemming from time-varying dynamics such as mobility of vehicles or changes in the wireless networking environment. As such, the outcomes of this research can be used as a building block for the large deployment of smart city technologies that heavily rely on the IoT.
Alm, Anton. « Internet of Things mesh network : Using the Thread networking protocol ». Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.
Texte intégralKoutsoumpakis, Iakovos. « An Internet of Things network for proximity based distributed processing ». Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-267865.
Texte intégralNgqakaza, Lutando. « Multi-Layered Security in the Internet of the Things ». Thesis, University of Cape Town, 2014. http://pubs.cs.uct.ac.za/archive/00000998/.
Texte intégralArbiza, Lucas Mendes Ribeiro. « SDN no contexto de IoT : refatoração de middleware para monitoramento de pacientes crônicos baseada em software-defined networking ». reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/134368.
Texte intégralSome words and definitions usually employed when talking about Software-Defined Networking such as programmability, frexibility, or centralized management sound very appropriate to the context of another network paradigm: Internet of Things. The presence of devices designed for security, air conditioning, lighting, health monitoring and some other automation resources have become common in home networks; those devices may be different in many ways, such as the way they operate and communicate, between others. Dealing with this kind of scenario may differ in many ways from what we are familiar regarding networking and services management; the use of traditional management tools and protocols may be hard or even unfeasible. Aiming to enable the health monitoring of patients with chronical illnesses through using off-the-shelf healthcare devices a middleware proposal was developed in a research project to circumvent interoperability, data collecting, management, security and privacy issues found in employed devices. The middleware was designed to run on access points in the homes of the patients. Although hardware and software limitations of the used access points reflect on the development process, because they restrict the use of programming languages and resources that could be employed to expedite the implementation of necessary modules and features. Development related mishaps have motivated the search for alternatives resulting in the middleware refactoring through Software-Defined Networking, based on previous works where that paradigm is used in home networks. This work aims to verify the feasability of the employment of Software- Defined Networking in the Internet of Things context, and its resulting benefits; specifically in the health monitoring of chronic patients service from the previous proposal. After refactoring most of the network and services load was distributed among remote dedicated servers allowing developers to go beyond the limitations imposed by access points constraints, and to make use of resources not available before enabling agility to the development process; it also enables the development of more complex features expanding services possibilities. Additionally Software-Defined Networking employment provides benefits such as the delivering of more than only one service through the same access point; scalability and autonomy to the network and devices monitoring, as to the service deployment through the use of OpenFlow resources; and devices and services cooperation enabling the built of a wider digital representation of the monitored environment.
Ljungblad, Robert. « Blockchain in an Internet-of-Things Network Based on User Participation ». Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75041.
Texte intégralInternet-of-things är ett relativt nytt men snabbt växande koncept som handlar om att koppla upp vardagliga saker till internet. Varje dag kopplas mer och mer enheter upp och det visar inga tecken på att sakta ner. Det görs även framsteg inom andra nya teknologier som blockkedjor, artificiell intelligens, virtuell verklighet och maskininlärning i stort sett varje dag. Dock finns det fortfarande mycket att lära sig om dessa teknologier. Denna rapport utforskar blockkedjeteknologins möjligheter genom att applicera det på ett internet-of-things-nätverk baserat på användarmedverkan. Mer specifikt, det är applicerat på ett användningsfall grundat i Luleå Kommuns önskan att lättare hålla koll på hur fulla deras soptunnor i och runtom staden är. Målet med denna rapport är att lära sig mer om hur blockkedjor kan stödja ett internet-of-things-nätverk och utforska vilka problem som kan uppstå. Metoden tar en explorativ ansats till problemet genom att delta i en workshop tillsammans med Luleå Kommun och genomföra en litteraturstudie. Dessutom tas en kvalitativ ansats genom att skapa en prototyplösning för att få förstahandserfarenhet av teknologin. Den slutliga prototypen och problemen som uppstod under projektets gång är analyserade med hjälp av information och erfarenhet som samlats genom hela projektet. Sammanfattningsvis kan blockkedjeteknologi hjälpa till kommunikationen i ett internet-of-things-nätverk baserat på användarmedverkan. Dock finns det fortfarande mycket att lära sig om denna teknologi i framtida forskning.
Sharma, Aakanksha. « Machine learning-based optimal load balancing in software-defined networks ». Thesis, Federation University Australia, 2022. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/188228.
Texte intégralDoctor of Philosophy
Ainchwar, Arpit. « Determination of Cycle Time Constraints in Case of Link Failure in Closed Loop Control in Internet of Things ». Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36906.
Texte intégralJedda, Ahmed. « Distributed Algorithms for Networks Formation in a Scalable Internet of Things ». Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/30979.
Texte intégralVACCARI, IVAN. « Security aspects about Internet of Things networks, devices and communication protocols ». Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1047169.
Texte intégralPark, Taehyeun. « Distributed Wireless Resource Management in the Internet of Things ». Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99055.
Texte intégralDoctor of Philosophy
The Internet of Things (IoT), which is a network of smart devices such as smart phones, wearable devices, smart appliances, and environment sensors, will transform many aspects of our society with numerous innovative IoT applications. Those IoT applications include interactive education, remote healthcare, smart grids, home automation, intelligent transportation, industrial monitoring, and smart agriculture. With the increasing complexity and scale of an IoT, it becomes more difficult to quickly manage the IoT devices through a cloud, and a centralized management approach may not be viable for certain IoT scenarios. Therefore, distributed solutions are needed for enabling IoT devices to fulfill their services and maintain seamless connectivity. Here, IoT device management refers to the fact that the system needs to decide which devices access the network and using which resources (e.g., frequencies). For distributed management of an IoT, the unique challenge is to allocate scarce communication resources to many IoT devices appropriately. With distributed resource management, diverse IoT devices can share the limited communication resources in a self-organizing manner. Distributed resource management overcomes the limitations of centralized resource management by satisfying strict service requirements in a massive, complex IoT. Despite the advantages and the opportunities of distributed resource management, it is necessary to address the challenges related to an IoT, such as analyzing intricate interaction of heterogeneous devices, designing viable frameworks for constrained devices, and quickly adapting to a dynamic IoT. Furthermore, distributed resource management must enable IoT devices to communicate with high reliability and low delay. In this regard, this dissertation investigates these critical IoT challenges and introduces novel distributed resource management frameworks for an IoT. In particular, the proposed frameworks are tailored to realistic IoT scenarios and consider different performance metrics. To this end, mathematical frameworks and effective algorithms are developed by significantly extending tools from wireless communication, game theory, and machine learning. The results show that the proposed distributed wireless resource management frameworks can optimize key performance metrics and meet strict communication requirements while coping with device heterogeneity, massive scale, dynamic environment, and scarce wireless resources in an IoT.
Крамаренко, Є. С. « Iнтелектуальна мережа Internet of Things ». Master's thesis, Сумський державний університет, 2019. http://essuir.sumdu.edu.ua/handle/123456789/76473.
Texte intégralXu, Ran. « Federated Sensor Network architectural design for the Internet of Things (IoT) ». Thesis, Loughborough University, 2013. https://dspace.lboro.ac.uk/2134/13453.
Texte intégralHsu, Alexander Sirui. « Automatic Internet of Things Device Category Identification using Traffic Rates ». Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/88421.
Texte intégralMaster of Science
IoT (Internet of Things) devices are an exploding field, with many devices being created, manufactured, and utilized per year. With the rise of so many internet capable devices, there is a risk that the devices may have vulnerabilities and exploits able to allow unauthorized users to access. While a problem for a consumer network, this is an increased problem in an enterprise network, since much of the information on the network is sensitive and should be kept confidential and private. While a ban of IoT devices on a network is able to solve this problem, with the rise of machine learning able to characterize and recognize patterns, a smarter approach can be created to distinguish when and which types of IoT devices enter the network. Previous attempts to identify IoT devices used signature schemes specific to a single device, but this paper aims to generalize traffic behaviors and identifying a device category rather than a specific IoT device to ensure future new devices can also be recognized. With device category identification in place on an internet network, smarter approaches can be implemented to ensure the devices remain secure while still able to be used.
Krishna, Ashwin. « Composing and connecting devices in animal telemetry network ». Kansas State University, 2016. http://hdl.handle.net/2097/32882.
Texte intégralDepartment of Computing and Information Sciences
Venkatesh P. Ranganath
As the Internet of Things (IoT) continues to grow, the need for services that span multiple application domains will continue to increase to realise the numerous possibilities enabled by IoT. Today, however, heterogeneity among devices leads to interoperability issues while building a system of systems and often give rise to closed ecosystems. The issues with interoperability are driven by the inability of devices and apps from different vendors to communicate with each other. The interoperability problem forces the users to stick to one particular vendor, leading to vendor lock-in. To achieve interoperability, the users have to do the heavy lifting (at times impossible) of connecting heterogeneous devices. As we slowly move towards system-of-systems and IoT, there is a real need to support heterogeneity and interoperability. A recent effort in Santos Lab developed Medical Device Coordination Framework (MDCF), which was a step to address these issues in the space of human medical systems. Subsequently, we have been wondering if a similar solution can be employed in the area of animal science. In this effort, by borrowing observations from MDCF and knowledge from on-field experience, we have created a demonstration showcasing how a combination of precise component descriptions (via DSL) and communication patterns can be used in software development and deployment to overcome barriers due to heterogeneity, interoperability and to enable an open ecosystem of apps and devices in the space of animal telemetry.
Al-Kashoash, Hayder Ahmed Abdulmohsin. « Congestion control for 6LoWPAN wireless sensor networks : toward the Internet of Things ». Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/18210/.
Texte intégralAloisi, Alessandro. « Integrating wireless sensor networks and internet of things : A coap-based approach ». Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/8034/.
Texte intégralAndersson, Matthew Anders. « Making good things happen : optimism and the range of personal social networks ». Thesis, University of Iowa, 2010. https://ir.uiowa.edu/etd/775.
Texte intégralQuan, Yongyun. « Topology-based Device Self-identification in Wireless Mesh Networks ». Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-261147.
Texte intégralI samband med Internet of Things (IoT) är igångkörning processen att säkert lägga till en ny enhet i ett nätverk. Den täcker många olika uppgifter, inklusive fysisk distribution av enheter och konfigurering av parametrar. Det är nätverksinstallatörer som måste manuellt beställa varje enhet en efter en med hjälp av installationsverktyg. I praktiken är den första uppgiften för en nätverksinstallatör att korrekt identifiera varje enhet innan den konfigureras med lämpliga parametrar. Att identifiera varje enhet speciellt i ett stort nätverk är en mycket tidskrävande process. Detta är också känt som identifieringsproblemet. Detta projekt kommer att ta itu med problemet.En nyhetsidentifieringsmetod presenteras i avhandlingen och det finns ingen mänsklig intervention involverad i identifieringsprocessen. Enheter försöker identifiera sig baserat på fördefinierade regler och information. Tillvägagångssättet kallas därför enhetens självidentifiering och det implementeras i två olika algoritmer, en är centraliserad enhetens självidentifiering och den andra är distribuerad enhetens självidentifiering. Kort sagt, endast en enhet deltar i enhetsidentifieringsprocessen i centraliserat tillvägagångssätt, och i distribuerad motsvarighet är varje enhet en del av identifieringsprocessen.Resultaten av implementationerna visar potentialen för det nya sättet att identifiera enheter i IoT. Enheter i både centraliserat tillvägagångssätt och distribuerat tillvägagångssätt kan identifiera sig med den information som krävs för nätverket. En detaljerad diskussion om de två föreslagna algoritmerna och nätverksinformationen presenteras i avhandlingen.
Corino, Gianni. « Internet of props : a performative ontology and design framework for the Internet of Things ». Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/9511.
Texte intégral