To see the other types of publications on this topic, follow the link: Internet of things based smart systems.

Dissertations / Theses on the topic 'Internet of things based smart systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Internet of things based smart systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Sundaravadivel, Prabha. "Application-Specific Things Architectures for IoT-Based Smart Healthcare Solutions." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157532/.

Full text
Abstract:
Human body is a complex system organized at different levels such as cells, tissues and organs, which contributes to 11 important organ systems. The functional efficiency of this complex system is evaluated as health. Traditional healthcare is unable to accommodate everyone's need due to the ever-increasing population and medical costs. With advancements in technology and medical research, traditional healthcare applications are shaping into smart healthcare solutions. Smart healthcare helps in continuously monitoring our body parameters, which helps in keeping people health-aware. It provides the ability for remote assistance, which helps in utilizing the available resources to maximum potential. The backbone of smart healthcare solutions is Internet of Things (IoT) which increases the computing capacity of the real-world components by using cloud-based solutions. The basic elements of these IoT based smart healthcare solutions are called "things." Things are simple sensors or actuators, which have the capacity to wirelessly connect with each other and to the internet. The research for this dissertation aims in developing architectures for these things, focusing on IoT-based smart healthcare solutions. The core for this dissertation is to contribute to the research in smart healthcare by identifying applications which can be monitored remotely. For this, application-specific thing architectures were proposed based on monitoring a specific body parameter; monitoring physical health for family and friends; and optimizing the power budget of IoT body sensor network using human body communications. The experimental results show promising scope towards improving the quality of life, through needle-less and cost-effective smart healthcare solutions.
APA, Harvard, Vancouver, ISO, and other styles
2

Khamphanchai, Warodom. "An Agent-based Platform for Demand Response Implementation in Smart Buildings." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/70869.

Full text
Abstract:
The efficiency, security and resiliency are very important factors for the operation of a distribution power system. Taking into account customer demand and energy resource constraints, electric utilities not only need to provide reliable services but also need to operate a power grid as efficiently as possible. The objective of this dissertation is to design, develop and deploy the Multi-Agent Systems (MAS) - together with control algorithms - that enable demand response (DR) implementation at the customer level, focusing on both residential and commercial customers. For residential applications, the main objective is to propose an approach for a smart distribution transformer management. The DR objective at a distribution transformer is to ensure that the instantaneous power demand at a distribution transformer is kept below a certain demand limit while impacts of demand restrike are minimized. The DR objectives at residential homes are to secure critical loads, mitigate occupant comfort violation, and minimize appliance run-time after a DR event. For commercial applications, the goal is to propose a MAS architecture and platform that help facilitate the implementation of a Critical Peak Pricing (CPP) program. Main objectives of the proposed DR algorithm are to minimize power demand and energy consumption during a period that a CPP event is called out, to minimize occupant comfort violation, to minimize impacts of demand restrike after a CPP event, as well as to control the device operation to avoid restrikes. Overall, this study provides an insight into the design and implementation of MAS, together with associated control algorithms for DR implementation in smart buildings. The proposed approaches can serve as alternative solutions to the current practices of electric utilities to engage end-use customers to participate in DR programs where occupancy level, tenant comfort condition and preference, as well as controllable devices and sensors are taken into account in both simulated and real-world environments. Research findings show that the proposed DR algorithms can perform effectively and efficiently during a DR event in residential homes and during the CPP event in commercial buildings.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
3

GIUSTO, EDOARDO. "Sensor-based ICT Systems for Smart Societies." Doctoral thesis, Politecnico di Torino, 2021. http://hdl.handle.net/11583/2925002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sigwele, Tshiamo, Yim Fun Hu, M. Ali, Jiachen Hou, M. Susanto, and H. Fitriawan. "An intelligent edge computing based semantic gateway for healthcare systems interoperability and collaboration." IEEE, 2018. http://hdl.handle.net/10454/17552.

Full text
Abstract:
Yes<br>The use of Information and Communications Technology (ICTs) in healthcare has the potential of minimizing medical errors, reducing healthcare cost and improving collaboration between healthcare systems which can dramatically improve the healthcare service quality. However interoperability within different healthcare systems (clinics/hospitals/pharmacies) remains an issue of further research due to a lack of collaboration and exchange of healthcare information. To solve this problem, cross healthcare system collaboration is required. This paper proposes a conceptual semantic based healthcare collaboration framework based on Internet of Things (IoT) infrastructure that is able to offer a secure cross system information and knowledge exchange between different healthcare systems seamlessly that is readable by both machines and humans. In the proposed framework, an intelligent semantic gateway is introduced where a web application with restful Application Programming Interface (API) is used to expose the healthcare information of each system for collaboration. A case study that exposed the patient's data between two different healthcare systems was practically demonstrated where a pharmacist can access the patient's electronic prescription from the clinic.<br>British Council Institutional Links grant under the BEIS-managed Newton Fund.
APA, Harvard, Vancouver, ISO, and other styles
5

Johansson, Oscar, and Gustav Andersson. "Smart Greenhouse : A microcontroller based architecture for autonomous and remote control." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42284.

Full text
Abstract:
Expensive and complex automated systems for greenhouses are frequently utilized in the horticulture industry. In parallel, smart systems for home automation has recently seen a rapid increase in popularity. This project aims to combine the climate optimization capabilities of industrial systems with the convenience of home automation systems. More specifically, this project is focused on the design and implementation of electrical and mechanical requirements of a smart greenhouse system. This involved the selection of hardware components, such as sensors, actuators and controllers. It also involved the interconnection between these components and the development of measurement and control systems to autonomously manage the greenhouse. The system is based on a WiFi-connected microcontroller. Parameters monitored include; temperature, humidity and wind-speed. Irrigation is controlled by a solenoid valve and can be scheduled to desired intervals. Ventilation and temperature optimization is done by controlling the roof-hatch with a linear actuator and control of a heater. The results demonstrate a accurate and reliable system with low power consumption. The resulting prototype can be installed in new and existing greenhouses. Functionalities can be remotely controlled and monitored by the convenience of an android application. The total cost of the components used was around 4 500 SEK. Further development could be done to enable seamless scalability with additional components and functionalities. Climate optimization by incorporation of weather forecast as a parameter could be implemented to further reduce energy consumption.<br>Dyra och komplexa automatiserade växthussystem är vanligt förekommande inom industrin för hortikultur. Parallellt har populariteten för "Smart Home" system för hemautomatisering radikalt ökat. Målet med detta projekt är att kombinera klimatoptimiseringsmöjligheterna hos industriella system med lättanvändligheten hos system för hemautomatisering. Detta projekt fokuserar specifikt på designen och implementationen av de elektriska och mekaniska krav som ställs på ett "smart greenhouse system". Detta innefattar; val av komponenter såsom sensorer, aktuatorer samt styrenhet men även sammankopplingen mellan dessa komponenter och utvecklingen av mjukvara till reglersystemet, som i sin tur syftar till automatiseringen i växthuset. Systemet är baserat på en WiFi-uppkopplad mikrokontroller. Parametrar som monitoreras är; temperatur, luftfuktighet och vindhastighet. Bevattning kontrolleras av en magnetventil och kan schemaläggas för bevattning i önskade intervall. Ventilering och temperaturoptimisering sker genom kontroll av taklucka med hjälp av ett linjärt ställdon samt kontroll av ett värmeelement. Resultatet demonstrerar ett pålitligt och punktligt system med låg energiförbrukning. Prototypen som utvecklats kan installeras i både nya och befintliga växthus. Funktionaliteterna kan smidigt fjärrkontrolleras och monitoreras från en android applikation. Den totala kostnaden för de komponenter som använts var runt 4500 kr. Vidareutveckling vad gäller skalbarhet för att sömlöst lägga till komponenter och funktionaliteter bör övervägas. För ytterligare minskad energiförbrukning med hjälp av klimatoptimering kan väderprognos adderas som en parameter.
APA, Harvard, Vancouver, ISO, and other styles
6

Zichichi, Mirko. "A Distributed Ledger based infrastructure for Intelligent Transportation Systems." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/18440/.

Full text
Abstract:
Intelligent Transportation Systems (ITS) are proposed as an efficient way to improve performances in transportation systems applying information, communication, and sensor technologies to vehicles and transportation infrastructures. The great amount of vehicles produced data, indeed, can potentially lead to a revolution in ITS development, making them more powerful multifunctional systems. To this purpose, the use of Vehicular Ad-hoc Networks (VANETs) can provide comfort and security to drivers through reliable communications. Meanwhile, distributed ledgers have emerged in recent years radically evolving the way that we used to consider finance, trust in communication and even renewing the concept of data sharing and allowing to establish autonomous, secured, trusted and decentralized systems. In this work an ITS infrastructure based on the combination of different emerging Distributed Ledger Technologies (DLTs) and VANETs is proposed, resulting in a transparent, self-managed and self-regulated system, that is not fully managed by a central authority. The intended design is focused on the user ability to use any type of DLT-based application and to transact using Smart Contracts, but also on the access control and verification over user’s vehicle produced data. Users "smart" transactions are achieved thanks to the Ethereum blockchain, widely used for distributed trusted computation, whilst data sharing and data access is possible thanks to the use of IOTA, a DLT fully designed to operate in the Internet of Things landscape, and IPFS, a protocol and a network that allows to work in a distributed file system. The aim of this thesis is to create a ready-to-work infrastructure based on the hypothesis that every user in the ITS must be able to participate. To evaluate the proposal, an infrastructure implementation is used in different real world use cases, common in Smart Cities and related to the ITS, and performance measurements are carried out for DLTs used.
APA, Harvard, Vancouver, ISO, and other styles
7

Horyachyy, Oleh. "Comparison of Wireless Communication Technologies used in a Smart Home : Analysis of wireless sensor node based on Arduino in home automation scenario." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14845.

Full text
Abstract:
Context. Internet of Things (IoT) is an extension of the Internet, which now includes physical objects of the real world. The main purpose of Internet of Things is to increase a quality of people’s daily life. A smart home is one of the promising areas in the Internet of Things which increases rapidly. It allows users to control their home devices anytime from any location in the world using Internet connectivity and automate their work based on the physical environment conditions and user preferences. The main issues in deploying the architecture of IoT are the security of the communication between constrained low-power devices in the home network and device performance. Battery lifetime is a key QoS parameter of a battery-powered IoT device which limits the level of security and affects the performance of the communication. These issues have been deepened with the spread of cheap and easy to use microcontrollers which are used by electronic enthusiasts to build their own home automation projects. Objectives. In this study, we investigated wireless communication technologies used in low-power and low-bandwidth home area networks to determine which of them are most suitable for smart home applications. We also investigated the correlation between security, power consumption of constrained IoT device, and performance of wireless communication based on a model of a home automation system with a sensor node. Sensor node was implemented using Arduino Nano microcontroller and RF 433 MHz wireless communication module. Methods. To achieve the stated objectives of this research following methods were chosen: literature review to define common applications and communication technologies used in a smart home scenario and their requirements, comparison of wireless communication technologies in smart home, study of Arduino microcontroller technology, design and simulation of a part of  home automation project based on Arduino, experimental measurements  of execution time and power consumption of Arduino microcontroller with RF 433 MHz wireless module when transmitting data with different levels of security, and analysis of experimental results. Results. In this research, we presented a detailed comparison of ZigBee, WiFi, Bluetooth, Z-Wave, and ANT communication technologies used in a smart home in terms of the main characteristics. Furthermore, we considered performance, power consumption, and security. A model of a home automation system with a sensor node based on Arduino Nano was described with sleep management and performance evaluation. The results show that the battery lifetime of Arduino in a battery-powered sensor node scenario is determined by the communication speed, sleep management, and affected by encryption. Conclusions. The advanced communication strategy can be used to minimize the power consumption of the device and increase the efficiency of the communication. In that case, our security measures will reduce the productivity and lifetime of the sensor node not significantly. It’s also possible to use symmetric encryption with smaller block size.
APA, Harvard, Vancouver, ISO, and other styles
8

Raffa, Viviana. "Edge/cloud virtualization techniques and resources allocation algorithms for IoT-based smart energy applications." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22864/.

Full text
Abstract:
Nowadays, the installation of residential battery energy storage (BES) has increased as a consequence of the decrease in the cost of batteries. The coupling of small-scale energy generation (residential PV) and residential BES promotes the integration of microgrids (MG), i.e., clusters of local energy sources, energy storages, and customers which are represented as a single controllable entity. The operations between multiple grid-connected MGs and the distribution network can be coordinated by controlling the power exchange; however, in order to achieve this level of coordination, a control and communication MG interface should be developed as an add-on DMS (Distribution Management System) functionality to integrate the MG energy scheduling with the network optimal power flow. This thesis proposes an edge-cloud architecture that is able to integrate the microgrid energy scheduling method with the grid constrained power flow, as well as providing tools for controlling and monitoring edge devices. As a specific case study, we consider the problem of determining the energy scheduling (amount extracted/stored from/in batteries) for each prosumer in a microgrid with a certain global objective (e.g. to make a few energy exchanges as possible with the main grid). The results show that, in order to have better optimization of the BES scheduling, it is necessary to evaluate the composition of a microgrid in such a way as to have balanced deficits and surpluses, which can be performed with Machine Learning (ML) techniques based on past production and consumption data for each prosumer.
APA, Harvard, Vancouver, ISO, and other styles
9

Söderberg, Karl Jakob Emanuel. "INTERNET OF THINGS : Smart välfärdsteknologi." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15793.

Full text
Abstract:
Internet of Things är en utveckling som inte endast sträcker sig till de industriella områdena idag. Det når nu mera även ut till välfärdsteknologin. Både användare och företag påverkas idag av detta faktum. Företag har ett behov, och en plikt att värna om sina kunder, och kunder har ett behov av att göra sin röst hörd. Detta arbete har som syfte att utforska acceptansen hos de äldre till denna smarta välfärdsteknologi, samt vad som krävs för att öka acceptansen. Arbetet tillnärmar sig frågan genom litteratur som bas för enkäter och intervjuer, utförda i Sverige och Norge.Det visar sig att acceptansen beror på många olika faktorer, som alla uppfattas olika från person till person. Men att det i många fall kan koka ned till behovet. De flesta människorna vill helst bo hemma så länge som möjligt, i alla fall i Sverige och Norge. Men innan det har gått så långt så kan det vara oklart hur öppna folk är till teknologi som har möjlighet till att uppfattas som integritetskränkande. Nyckeln ligger i att göra teknologin så anpassningsbar som möjligt, vad gäller både funktion och utseende, samt andra faktorer som säkerhet, förståelse, användbarhet och kostnad.
APA, Harvard, Vancouver, ISO, and other styles
10

Shaikh, Yasir Saleem. "Privacy preserving internet of things recommender systems for smart cities." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS001.

Full text
Abstract:
Au cours de la dernière décennie, la technologie Internet des objets (IoT) a révolutionné presque tous les domaines de la vie quotidienne et a dynamisé les villes intelligentes. Les villes intelligentes utilisent la technologie IoT pour collecter divers types de données de capteurs, puis les utilisent pour offrir diverses applications. Comme les applications des villes intelligentes sont utilisées par les citoyens, donc leur fournir des services de recommandation personnalisés en fonction de leurs préférences, de leurs localisations et de leurs profils ainsi que l'exploitation des données IoT (par exemple, la congestion du trafic et l'occupation du parking) est d'une grande importance qui pourrait être fournie par un recommandateur IoT. Cependant, comme le recommandateur IoT utilise les données privées des citoyens (profils, préférences et habitudes, par exemple), il viole la vie privée des utilisateurs car il pourrait suivre les routines et les habitudes des utilisateurs en analysant la base de données historique ou en analysant les services de recommandation réguliers qu'il offre. Par conséquent, il est important de préserver la confidentialité des utilisateurs du programme de recommandation IoT. Dans cette thèse, nous proposons un nouveau système de recommandation IoT préservant la confidentialité pour les villes intelligentes, qui fournit des recommandations en exploitant les données IoT des capteurs et en tenant compte de diverses métriques. Notre approche est organisée en trois parties. Tout d'abord, nous développons un système de recommandation IoT conforme au règlement européen sur la protection des données (GDPR) pour les systèmes de stationnement intelligent. Ces systèmes fournissent des recommandations sur les emplacements et les itinéraires de stationnement en exploitant les données des capteurs de stationnement et de circulation. Par conséquence, nous proposons d’abord une approche pour la cartographie des capteurs de trafic avec les coordonnées d’itinéraires afin d’analyser les conditions de trafic (par exemple le niveau de congestion) sur les routes. Ensuite, nous avons mis en place un dispositif de recommandation IoT. Le recommandateur IoT a été intégré au scénario d'utilisation du stationnement intelligent d'un projet H2020 EU-KR WISE-IoT et a été évalué par les citoyens de Santander, en Espagne, à l'aide d'un prototype. De plus, nous développons un recommendateur IoT pour le ski intelligent qui fournit des itinéraires de ski comprenant des types de pistes spécifiques, ainsi que la piste la plus proche. Pour les itinéraires de ski, il n’existe aucun moteur de calcul stable. Par conséquent, un nouveau moteur de routage pour les itinéraires de ski a été développé. Ce travail a également été intégré dans le cas d'utilisation du ski intelligent du projet WISE-IoT. Deuxièmement, bien que le recommandateur IoT développé pour le stationnement intelligent soit conforme au GDPR, il ne protège toutefois pas totalement la vie privée des utilisateurs. En effet, le partage sans discernement des données des utilisateurs avec un système tiers de recommandation de stationnement IoT non approuvé ou semi-fiable provoque une violation de la vie privée. En effet, le comportement et les schémas de mobilité des utilisateurs pouvant être déduits en analysant l'historique de leurs déplacements. Par conséquent, nous préservons la confidentialité des utilisateurs contre le système de recommandation de stationnement tout en analysant leur historique de stationnement en utilisant des techniques de k-anonymat et de confidentialité différentielle. Enfin, étant donné que les applications de villes intelligentes sont développées de manière verticale et ne se parlent pas. Par conséquent, nous avons proposé deux cadres pour les services de recommandation parmi les applications de villes intelligentes utilisant l'IdO social<br>During the past decade, the Internet of Things (IoT) technology has revolutionized almost all the fields of daily life and has boosted smart cities. Smart cities use IoT technology to collect various types of sensors’ data and then use such data to offer a variety of applications. Since the smart cities’ applications are used by the citizens, therefore providing the customized recommendation services to the citizens based on their preferences, locations and profiles, as well as by exploiting the IoT data (e.g., traffic congestion and parking occupancy) is of great importance which could be provided by an IoT recommender. However, since the IoT recommender utilizes the private data of citizens (e.g., profiles, preferences and habits), it breaches the privacy of the users because the IoT recommender could track the routines and habits of the users by analyzing the historical database or by analyzing the regular recommendation services it offers. Therefore, it is important to preserve the privacy of the users from the IoT recommender. In this thesis, we propose a novel privacy preserving IoT recommender system for smart cities that provides recommendations by exploiting the IoT data of sensors and by considering various metrics. Our approach is organized in three parts. Firstly, we develop an EU General Data Protection Regulation (GDPR)-compliant IoT recommender system for smart parking system that provides recommendations of parking spots and routes by exploiting the data of parking and traffic sensors. For this, we first propose an approach for the mapping of traffic sensors with route coordinates in order to analyze the traffic conditions (e.g., the level of congestion) on the roadways and then developed an IoT recommender. The IoT recommender has been integrated into the smart parking use case of an H2020 EU-KR WISE-IoT project and has been evaluated by the citizens of Santander, Spain through a prototype. Additionally, we develop an IoT recommender for smart skiing that provides skiing routes comprised of specific types of slopes, as well as the nearest slope. For skiing routes, there does not exist any stable routing engine. Therefore, a novel routing engine for skiing routes was developed. This work has also been integrated into the smart skiing use case of WISE-IoT project. Secondly, although the developed IoT recommender for smart parking is GDPR-compliant, however, it does not fully protect the privacy of users. Because, an indiscriminately sharing of users’ data with untrusted third-party IoT parking recommender system causes a breach of privacy, as user’s behavior and mobility patterns can be inferred by analyzing the past travelling history of users. Therefore, we preserve privacy of users against parking recommender system while analyzing their past parking history using k-anonymity and differential privacy techniques. Lastly, since the smart cities applications are developed in a vertical manner and do not talk/communicate with each other, i.e., each application is developed for a certain scenario which generally does not share data with other smart cities applications. Therefore, we proposed two frameworks for the recommendation services across smart cities applications using social IoT. Firstly, on how social IoT can be used for the recommendation services across smart cities applications, and secondly, we propose another type of communication of social IoT at a global level, i.e., social cross-domain application-to-application communications, that enables smart cities applications to communicate with each other and establish social relationships between them
APA, Harvard, Vancouver, ISO, and other styles
11

Chen, Diliang. "Internet of Smart Wearable Things for Healthcare and Safety Management." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1585059497920229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Pradeep, Kumar Harshvardhan. "Multi-sensor-based occupancy monitoring for energy efficient smart buildings based on internet of things." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10096079.

Full text
Abstract:
<p> The Internet of Things (IoT) is the network of physical objects embedded with sensors and connectivity. The ubiquitous nature of IoT nodes will allow the deployment of embedded sensors, actuators, cameras, mobile phones, and Radio Frequency Identification Devices (RFID) in buildings for monitoring the condition of the building and the well being of the occupants. The current project presents the design and implementation of a sensor network within the IoT framework, using infrared (IR) sensors to monitor the number of visitors in the building and their distribution across predetermined zones. Using IR sensor data the Demand-Controlled Ventilation (DCV) units on each floor are controlled based on zone occupancies. The occupancy data are displayed on a mobile phone or PC using a Wireless Fidelity (WiFi) module. The devices in the experimental implementation of this network include IR, temperature, and CO2 sensors, interfaced to a microcontroller. Experimental testing shows that the network performs flawlessly and reliably.</p>
APA, Harvard, Vancouver, ISO, and other styles
13

Pincheira, Caro Miguel Rodrigo. "A trustless architecture for blockchain-based IoT applications using constrained devices." Doctoral thesis, Università degli studi di Trento, 2021. http://hdl.handle.net/11572/304533.

Full text
Abstract:
Despite the increasing interest in blockchain as a possible solution to replace centralized IoT architectures, previous work failed to provide a direct role for the sensing devices, i.e., direct interaction with the blockchain without additional components. Moreover, few studies focus on permissionless blockchains, even if it is the most secure platform for developing blockchain-based applications. This thesis presents an architecture that considers constrained sensing devices as direct actors on a public blockchain network. A public blockchain network allows the seamless inclusion of several unknown actors, and smart contracts provide a platform to develop complex IoT applications. The research followed an iterative DSR approach; designing, building, and evaluating new IT artifacts using two case studies in the agricultural IoT domain. These cases fostered two exploratory studies that diverged from the main IoT domain; however, they also provide novel contributions to blockchain-based applications. Thus, the novel architecture tackles three problems of current blockchain-based IoT systems i) constrained sensing devices as direct actors on a blockchain system, ii) permissionless blockchain networks and iii) smart contracts as an IoT application platform. Furthermore, the exploratory analyses examine two challenges of blockchain-based applications i) user experience and monetary costs and ii) data sharing and decentralized storage.
APA, Harvard, Vancouver, ISO, and other styles
14

Pincheira, Caro Miguel Rodrigo. "A trustless architecture for blockchain-based IoT applications using constrained devices." Doctoral thesis, Università degli studi di Trento, 2021. http://hdl.handle.net/11572/304533.

Full text
Abstract:
Despite the increasing interest in blockchain as a possible solution to replace centralized IoT architectures, previous work failed to provide a direct role for the sensing devices, i.e., direct interaction with the blockchain without additional components. Moreover, few studies focus on permissionless blockchains, even if it is the most secure platform for developing blockchain-based applications. This thesis presents an architecture that considers constrained sensing devices as direct actors on a public blockchain network. A public blockchain network allows the seamless inclusion of several unknown actors, and smart contracts provide a platform to develop complex IoT applications. The research followed an iterative DSR approach; designing, building, and evaluating new IT artifacts using two case studies in the agricultural IoT domain. These cases fostered two exploratory studies that diverged from the main IoT domain; however, they also provide novel contributions to blockchain-based applications. Thus, the novel architecture tackles three problems of current blockchain-based IoT systems i) constrained sensing devices as direct actors on a blockchain system, ii) permissionless blockchain networks and iii) smart contracts as an IoT application platform. Furthermore, the exploratory analyses examine two challenges of blockchain-based applications i) user experience and monetary costs and ii) data sharing and decentralized storage.
APA, Harvard, Vancouver, ISO, and other styles
15

Liu, Yu. "A Data-centric Internet of Things Framework Based on Public Cloud." Licentiate thesis, Linköpings universitet, Fysik, elektroteknik och matematik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159770.

Full text
Abstract:
The pervasive application of Internet of Things (IoT) has been seen in many aspects in human daily life and industrial production. The concept of IoT originates from traditional machine-to-machine (M2M) communications which aimed at solving domain-specific and applicationspecific problems. Today, the rapid progress of communication technologies, the maturation of Internet infrastructures, the continuously reduced cost of sensors, and emergence of more open standards, have witnessed the approaching of the expected IoT era, which envisions full connectivity between the physical world and the digital world via the Internet protocol. The popularity of cloud computing technology has enhanced this IoT transform, benefiting from the superior computing capability and flexible data storage, let alone the security, reliability and scalability advantages. However, there are still a series of obstacles confronted by the industry in deployment of IoT services. First, due to the heterogeneity of hardware devices and application scenarios, the interoperability and compatibility between link-layer protocols, sub-systems and back-end services are significantly challenging. Second, the device management requires a uniform scheme to implement the commissioning, communication, authorization and identity management to guarantee security. Last, the heterogeneity of data format, speed and storage mechanism for different services pose a challenge to further data mining. This thesis aims to solve these aforementioned challenges by proposing a data-centric IoT framework based on public cloud platforms. It targets at providing a universal architecture to facilitate the deployment of IoT services in massive IoT and broadband IoT categories. The framework involves three representative communication protocols, namely WiFi, Thread and Lo-RaWAN, to enable support for local, personal, and wide area networks. A security assessment taxonomy for wireless communications in building automation networks is proposed as a tool to evaluate the security performance of adopted protocols, so as to mitigate potential network flaws and guarantee the security. Azure cloud platform is adopted in the framework to provide device management, data processing and storage, visualization, and intelligent services, thanks to the mature cloud infrastructure and the uniform device model and data model. We also exhibit the value of the study by applying the framework into the digitalization procedure of the green plant wall industry. Based on the framework, a remote monitoring and management system for green plant wall is developed as a showcase to validate the feasibility. Furthermore, three specialized visualization methods are proposed and a neuron network-based anomaly detection method is deployed in the project, showing the potential of the framework in terms of data analytics and intelligence.
APA, Harvard, Vancouver, ISO, and other styles
16

Sylvan, Andreas. "Internet of Things in Surface Mount TechnologyElectronics Assembly." Thesis, KTH, Medieteknik och interaktionsdesign, MID, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209243.

Full text
Abstract:
Currently manufacturers in the European Surface Mount Technology (SMT) industry seeproduction changeover, machine downtime and process optimization as their biggestchallenges. They also see a need for collecting data and sharing information betweenmachines, people and systems involved in the manufacturing process. Internet of Things (IoT)technology provides an opportunity to make this happen. This research project gives answers tothe question of what the potentials and challenges of IoT implementation are in European SMTmanufacturing. First, key IoT concepts are introduced. Then, through interviews with expertsworking in SMT manufacturing, the current standpoint of the SMT industry is defined. The studypinpoints obstacles in SMT IoT implementation and proposes a solution. Firstly, local datacollection and sharing needs to be achieved through the use of standardized IoT protocols andAPIs. Secondly, because SMT manufacturers do not trust that sensitive data will remain securein the Cloud, a separation of proprietary data and statistical data is needed in order take a stepfurther and collect Big Data in a Cloud service. This will allow for new services to be offered byequipment manufacturers.<br>I dagsläget upplever tillverkare inom den europeiska ytmonteringsindustrin för elektronikproduktionsomställningar, nedtid för maskiner och processoptimering som sina störstautmaningar. De ser även ett behov av att samla data och dela information mellan maskiner,människor och system som som är delaktiga i tillverkningsprocessen.Sakernas internet, även kallat Internet of Things (IoT), erbjuder teknik som kan göra dettamöjligt. Det här forskningsprojektet besvarar frågan om vilken potential som finns samt vilkautmaningar en implementation av sakernas internet inom europeisk ytmonteringstillverkning avelektronik innebär. Till att börja med introduceras nyckelkoncept inom sakernas internet. Sedandefinieras utgångsläget i elektroniktillverkningsindustrin genom intervjuer med experter.Studien belyser de hinder som ligger i vägen för implementation och föreslår en lösning. Dettainnebär först och främst att datainsamling och delning av data måste uppnås genomanvändning av standardiserade protokoll för sakernas internet ochapplikationsprogrammeringsgränssnitt (APIer). På grund av att elektroniktillverkare inte litar påatt känslig data förblir säker i molnet måste proprietär data separeras från statistisk data. Dettaför att möjliggöra nästa steg som är insamling av så kallad Big Data i en molntjänst. Dettamöjliggör i sin tur för tillverkaren av produktionsmaskiner att erbjuda nya tjänster.
APA, Harvard, Vancouver, ISO, and other styles
17

Edlund, Fredrik, and Saqib Sarker. "Smart Kitchen : Automatisk inventering av föremål." Thesis, KTH, Data- och elektroteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-183583.

Full text
Abstract:
Internet of Things växer fort och förutspås bli en del av vardagen. Detta öppnar möjligheter för att skapa produkter som förenklar vardagslivet. Automatisk objektsidentifiering kombinerad med en automatiserad lagerstatus kan underlätta inventering, något som kan användas till exempel i smarta kylskåp för att göra vardagen enklare genom Internet of Things.Detta examensarbete studerar metoder inom objektsidentifikation för att ta fram ett system som automatiskt kan identifiera objekt och hantera lagerstatus. En prototyp framställdes och testades för att se vilka möjligheter som finns. Systemet använder en Raspberry Pi som basenhet, vilken använder Dlib-bibliotek för att identifiera objekt som har blivit fördefinierade. Vid okända objekt identifierar användaren objekt i en mobilapplikation, systemet kan genom detta lära sig identifiera nya objekt. Samma applikation används för att se lagerstatusen på de olika objekt som har registrerats av systemet. Prototypen klarar av att identifiera kända objekt samt att lära sig nya, enligt projektets mål.<br>Internet of Things is growing fast and is predicted to become a part of everyday life. This can be used to create products which will make everyday life easier. Automated object detection combined with an automated inventory check can make it easier to manage what is in stock, this is something that can be used in smart refrigerators as an example, to make life more convenient through Internet of Things. This Bachelor thesis studies methods regarding object detection with the purpose to build a system which automatically identifies objects and manages the inventory status. A prototype was built and tested to see what the possibilities there is with such a system. The Prototype uses a Raspberry Pi as core unit, which uses Dlib libraries to identify predefined objects. The user will identify unknown objects via the mobile phone application, which makes it possible for the system to learn how to identify new objects. The same application is used to check the inventory status for the different objects that has been identified by the system. The prototype can identify objects and learn to identify new ones, according to the goals of the project.
APA, Harvard, Vancouver, ISO, and other styles
18

gupta, Devansh. "Smart-Scooter Rider Assistance System using Internet of Wearable Things and Computer Vision." Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1619611136736967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Guo, Jia. "Trust-based Service Management of Internet of Things Systems and Its Applications." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/82854.

Full text
Abstract:
A future Internet of Things (IoT) system will consist of a huge quantity of heterogeneous IoT devices, each capable of providing services upon request. It is of utmost importance for an IoT device to know if another IoT service is trustworthy when requesting it to provide a service. In this dissertation research, we develop trust-based service management techniques applicable to distributed, centralized, and hybrid IoT environments. For distributed IoT systems, we develop a trust protocol called Adaptive IoT Trust. The novelty lies in the use of distributed collaborating filtering to select trust feedback from owners of IoT nodes sharing similar social interests. We develop a novel adaptive filtering technique to adjust trust protocol parameters dynamically to minimize trust estimation bias and maximize application performance. Our adaptive IoT trust protocol is scalable to large IoT systems in terms of storage and computational costs. We perform a comparative analysis of our adaptive IoT trust protocol against contemporary IoT trust protocols to demonstrate the effectiveness of our adaptive IoT trust protocol. For centralized or hybrid cloud-based IoT systems, we propose the notion of Trust as a Service (TaaS), allowing an IoT device to query the service trustworthiness of another IoT device and also report its service experiences to the cloud. TaaS preserves the notion that trust is subjective despite the fact that trust computation is performed by the cloud. We use social similarity for filtering recommendations and dynamic weighted sum to combine self-observations and recommendations to minimize trust bias and convergence time against opportunistic service and false recommendation attacks. For large-scale IoT cloud systems, we develop a scalable trust management protocol called IoT-TaaS to realize TaaS. For hybrid IoT systems, we develop a new 3-layer hierarchical cloud structure for integrated mobility, service, and trust management. This architecture supports scalability, reconfigurability, fault tolerance, and resiliency against cloud node failure and network disconnection. We develop a trust protocol called IoT-HiTrust leveraging this 3-layer hierarchical structure to realize TaaS. We validate our trust-based IoT service management techniques developed with real-world IoT applications, including smart city air pollution detection, augmented map travel assistance, and travel planning, and demonstrate that our trust-based IoT service management techniques outperform contemporary non-trusted and trust-based IoT service management solutions.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Chen. "Location based services and location based behavior in a smart city." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSEC017/document.

Full text
Abstract:
Le concept de ”Smart Cities” a émergé au cours des dernières années pour décrire comment les investissements dans le capital humain et social, et dans les technologies de la communication (TIC) infrastructures et services électroniques peuvent maintenir la croissance durable et la qualité de vie, par une gestion judicieuse des ressources naturelles et par un gouvernement participatif. Pour nous, Smart City est un environnement réel augmenté permettant l’informatique ubiquitaire, avec web 2.0, qui est collaborative, mobile et contextuelle, les acteurs humains, ainsi que des objets connectés faisant désormais partie intégrante de l’Internet. Dans le contexte de notre projet international France-Chine sur Smart City, nous avons utilisé une approche MOCOCO (Mobilité, Contextualisation, Collaboration) à mener des travaux de recherche avec de multiples applications dans des situations de travail professionnels et à domicile, des situations d’apprentissage mobile contextuelles, ainsi que des applications de Smart City sont prises en compte - le transport, la distribution des marchandises, et des activités sportives et culturelles. Cette thèse se concentre sur les services basés sur la localisation (LBS), et Internet des Objets (IdO), qui sont deux aspects importants de Smart City. Le choix de la Gestion Dynamique des Voies de Circulation comme une étude de cas dans cette thèse est également une bonne pratique d’intégration de nouvelles technologies pour rendre la ville plus intelligente et pour rendre notre vie plus confortable. Selon Schiller et Voisard (2004), les services basés sur la localisation peuvent ˆêtre définis comme des services qui intègrent l’emplacement ou la position d’un dispositif mobile avec d’autres informations afin de fournir une valeur ajoutée à un utilisateur. L’objectif est d’utiliser la mise en œuvre IdO pour améliorer LBS, fournissant l’intelligence ambiante et d’assurer la facilité d’utilisation pour usagers dans des situations dynamiques. L’aspect théorique de nos contributions est que nous examinons la possibilité et la faisabilité de l’utilisation de l’IdO pour augmenter LBS. L’architecture de l’IdO a une capacité d’intégrer divers objets, ce qui fournit à LBS une meilleure gestion des dispositifs de géolocalisation; l’intergiciel de l’IdO, capable de faire l’abstraction des objets et la composition de services, donne la possibilité de déployer des composants de service plus intelligents et personnalisés, ainsi peut améliorer l’intergiciel de LBS. L’aspect pratique de nos contributions est que nous avons choisi une problématique de gestion dynamique des voies comme une étude de cas, validant notre approche d’utiliser l’IdO pour augmenter LBS dans une application de Smart City. L’objectif du système de gestion dynamique des voies est d’assurer une meilleure utilisation de voie de circulation par l’allocation dynamique de voies à différents types de transport. Nous avons fourni l’architecture du système du point de vue de TIC, et un environnement de simulation pour valider la conception de la solution. Nous avons également développé une preuve de concept pour valider les aspects technologiques du système. L’environnement de simulation comprend un simulateur pour simuler la fonction du système et les comportements des véhicules, un éditeur de scénario, et un générateur de trafic en tant qu’outils d’initialisation. Différentes formes de visualisation de résultats de simulation sont également prises en compte. En outre, nous avons développé un outil d’évaluation basé sur la visualisation en 3D, qui permet l’interaction entre l’utilisateur et l’outil en temps réel, pour effectuer des tests d’utilisation comme l’étude des aspects IHM, puisque les facteurs humains devraient toujours être mis en premiers dans le contexte de Smart City. [...]<br>The concept of “Smart Cities” has emerged during the last few years to describe how investments in human and social capital and modern Information and Communication Technologies (ICT) infrastructure and e-services fuel sustainable growth and quality of life, enabled by a wise management of natural resources and through participative government. To us, Smart City is a real augmented environment allowing ubiquitous computing, with up-to-date web 2.0, which is collaborative, mobile and contextual, human actors as well as different things (connected objects) are now an integral part of internet. In the international France-China project on Smart City we used the MOCOCO approach (Mobility, Contextualization, Collaboration) to conduct research work with multiple applications in working, learning and social situations; professional and home working situations, professional and teenager contextual mobile learning situations as well as Smart City applications are taken into account – transportation, goods distribution and local sport and cultural activities. This dissertation focuses on Location Based Services, and Internet of Things, which are both important aspects of Smart City. The choice of dynamic management of road lanes as a case study in this thesis, is also a good practice of integrating new technologies to make the city smarter and to make our life more comfortable. According to Schiller and Voisard (2004), Location Based Services (LBS) can be defined as services that integrate a mobile device’s location or position with other information so as to provide added value to a user. During recent years, LBS has evolved from simple GIS applications and positioning of emergent phone callers to more complicated, proactive, application-oriented services adapted to different users. However, heterogeneity of devices, data management and analysis, and HCI aspects are always main challenges for LBS. Our goal is to make the LBS meet the requirements of Smart City, with use of Internet of Things (IoT), integrating a certain degree of ambient intelligence. The theoretical aspect of our contributions is that we examine at component level the possibility and feasibility of using IoT to better support LBS. The ability of IoT architecture of integrating various objects gives LBS a better management of location-aware devices; the sensors can also enrich the data source of LBS. The middleware of IoT, good at objects abstraction and service composition, provides possibilities to deploy more intelligent and customized service components, thus can enhance the middleware of LBS. The practical aspect of our contributions is that we choose a dynamic lane management problem as a use case study demonstrating our approach in regard to combining LBS with IoT for a Smart City application. The goal of the dynamic lane management system is to make a better use of road lanes by dynamic allocation of lanes to different types of transportation. We provide the system architecture, user interfaces and a simulation environment to validate the solution design. We also develop a proof of concept to validate the technological aspects of the lane management system. The simulation environment of the lane management system is another important part of our contributions, it includes a core simulator to simulate the function of the system and the behaviors of the vehicles, and an editor of scenario and a generator of traffic as initialization tools. Different visualization methods of simulation results are also taken into consideration. In addition, we develop an evaluation tool which allows for real time user interaction, based on the visualization of the results of the simulator to conduct user tests for HCI aspects, as human factors should always be considered in the context of Smart City. [...]
APA, Harvard, Vancouver, ISO, and other styles
21

Alam, Kazi Masudul. "Towards Cloud-based Vehicular Cyber-physical Systems." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36227.

Full text
Abstract:
We are living in the age of information technology, where we are fully occupied with the revolutionary innovations of the last few decades such as the Internet, mobile devices, wireless communications, social networks, wearables, cloud computing, etc. While these technologies have become integral part of our daily life, we are now anxiously waiting to embrace Internet-of-Things (IoT), intelligent digital assistants, driver-less cars, drone deliveries, virtual reality, and smart city applications. Recently, research community is demonstrating increasing interests about Cyber-Physical Systems (CPS) that resides in the cross-section of embedded systems, network communications, and scalable distributed infrastructures. The main responsibility of a CPS is to collect sensory data about the physical world and to inform the computation module using communication technologies that processes the data, identifies important insights and notifies back using a feedback loop. These notifications can however be control commands to reconfigure the physical world. Such a setup is a useful method to deploy smart city applications. In this dissertation, we keep our focus onto the smart transport objective using vehicular CPS (VCPS) based systems organization. We have compiled this dissertation with our research contributions in this growing field of VCPS. One of our key contributions in this field is an architecture reference model for the cloud-based CPS, C2PS, where we analytically describe the key properties of a CPS: computation, communication and control, while integrating cloud features to it. We have identified various types of computation and interaction modes of this paradigm as well as describe Bayesian network and fuzzy logic based smart connection to select a mode at any time. It is considered that the true adoption of CPS is only possible through the deployment of the IoT systems. Thus, it is important to have IoT as a foundation in the CPS architectures. Our next contribution is to leverage existing Vehicular Adhoc Network (VANET) technologies and map them with the standard IoT-Architecture reference model to design the VCPS, Social Internet-of-Vehicles (SIoV). In this process, we have identified the social structures and system interactions among the subsystems involved in the SIoV. We also present a message structure to facilitate different types of SIoV interactions. The ability of dynamic reconfiguration in a C2PS is very appealing. We capture this feature in the VCPS by designing a model-based reconfiguration scheme for the SIoV, where we measure the data workloads of distinct subsystems involved in various types of SIoV interactions. We further use these models to design dynamic adaptation schemes for the subsystems involved in VCPS interactions. Our final contribution is an application development platform based on C2PS design technique that uses server-client based system communications. In this platform, server side is built using JAVA, client side uses Android, message communication uses JSON and every component has its own MySQL database to store the interactions. We use this platform to emulate and deploy SIoV related applications and scenarios. Such a platform is necessary to continue C2PS related research and developments in the laboratory environment.
APA, Harvard, Vancouver, ISO, and other styles
22

Gullstrand, Simon, and Jonas Wahlfrid. "Forming Emergent Configurations in Smart Office IoT Systems." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20170.

Full text
Abstract:
In this thesis, we examine how Emergent Configurations are formed to manageThings and People for the purpose of achieving the user’s goal of repairing a coffeemachine in the dynamic environment of a smart office. We develop an architecturein the form of requirement and design artifacts as well as a realization of the GoalManager component in the Emergent Configuration Manager which is responsiblefor the forming of Emergent Configurations, using the novel Emergent ConfigurationIoT system engineering approach. To demonstrate the capability of the realizationwe developed multiple case scenarios which correspond to the context dynamicity ofa smart office environment. The results of this study introduce an architecture forthe Goal Manager component and demonstrate that the novel engineering approach,Emergent Configuration, is a feasible way of managing IoT systems in the smart officecategory.
APA, Harvard, Vancouver, ISO, and other styles
23

Wahlfrid, Jonas, and Gullstrand Simon Irengård. "Forming Emergent Configurations in Smart Office IoT Systems." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20553.

Full text
Abstract:
In this thesis, we examine how Emergent Configurations are formed to manageThings and People for the purpose of achieving the user’s goal of repairing a coffeemachine in the dynamic environment of a smart office. We develop an architecturein the form of requirement and design artifacts as well as a realization of the GoalManager component in the Emergent Configuration Manager which is responsiblefor the forming of Emergent Configurations, using the novel Emergent ConfigurationIoT system engineering approach. To demonstrate the capability of the realizationwe developed multiple case scenarios which correspond to the context dynamicity ofa smart office environment. The results of this study introduce an architecture forthe Goal Manager component and demonstrate that the novel engineering approach,Emergent Configuration, is a feasible way of managing IoT systems in the smart officecategory.
APA, Harvard, Vancouver, ISO, and other styles
24

Petrolo, Riccardo. "Semantic-based discovery and integration of heterogeneous things in a Smart City environment." Thesis, Lille 1, 2016. http://www.theses.fr/2016LIL10093/document.

Full text
Abstract:
Une ville intelligente peut être considérée comme un système complexe dans lequel les différents acteurs coopèrent afin d’améliorer la zone urbaine, la rendant plus efficace et plus durable. Pour atteindre cet objectif, les technologies de l’information et de la communication et, en particulier l’Internet des Objets, sont appelées à jouer un rôle clé pour la mise en œuvre des solutions innovantes, des services et des applications. Cependant, en regardant l’état actuel de la ville intelligente, la réalisation d’un tel concept est encore loin d’être atteinte; le scénario réel est en effet caractérisé par un niveau élevé de fragmentation en raison de la pléthore de technologies et de dispositifs présents dans une ville. Afin de combler cette lacune, dans cette thèse, l’évolution de l’Internet des objets vers le Cloud of Things (CoT) est démontrée. Pour démontrer ce concept, le système d’exploitation VITAL est introduit. Dans le CoT, et en général dans le contexte Smart City, l’un des défis les plus importants est la découverte de données-sources appropriées aux besoins des utilisateurs. Cette découverte est une opération qui peut être exécutée directement in-network et / ou out-network. Dans cette thèse, les deux processus sont discutés en introduisant deux solutions différentes. En ce qui concerne la découverte in-network, la conception d’une passerelle pour le Cloud of Things est introduite. Cette passerelle est capable de découvrir et de gérer différents objets sur une base sémantique et, d’autre part, d’agir comme point final pour la présentation des données aux utilisateurs, combinant ainsi tous les aspects de cette thèse<br>A Smart City can be seen as a complex system in which different actors cooperate in order to improve, the urban area, making it efficient and sustainable. To achieve this goal, the Information and Communication Technologies, and especially the prominent Internet of Things, are called to play a key role for implementing innovative solutions, services, and applications. However, looking at the current status, the realization of the Smart City is still far from being realized; the real scenario is indeed characterized with a high level of fragmentation due to the plethora of technologies and devices present in a city. In order to bridge this gap, in this thesis, the evolution of the Internet of Things towards the Cloud of Things (CoT) is demonstrated. To demonstrate this concept, the VITAL operating system is introduced. Within the CoT, and in general in the Smart City context, one of the most important challenges is the discovery of appropriate data-sources that satisfy user requirements. The discovery is an operation that can be performed directly in-network and/or out-network. In this thesis, both processes are discussed by introducing two different solutions. Going deeply towards an horizontal unification of different data-sources and the need to have processing capabilities closer to the network, in the last part of the dissertation, the design of a gateway for the Cloud of Things is introduced. This gateway is capable to discover and manage different semantic-like things and, on the other hand, to act as end-point for the presentation of data to users, bridging the contributions of this thesis
APA, Harvard, Vancouver, ISO, and other styles
25

Araujo, Soto Víctor Estuardo. "Performance evaluation of scalable and distributed iot platforms for smart regions." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-65343.

Full text
Abstract:
As the vision of the Internet of Things (IoT) becomes a reality, thousands of devices will beconnected to IoT platforms in smart cities and regions. These devices will actively send dataupdates to cloud-based platforms, as part of smart applications in domains like healthcare, trafficand pollution monitoring. Therefore, it is important to study the ability of modern IoT systemsto handle high rates of data updates coming from devices. In this work we evaluated the per-formance of components of the Internet of Things Services Enablement Architecture of theEuropean initiative FIWARE. We developed a testbed that is able to inject data updates usingMQTT and the CoAP-based Lightweight M2M protocols, simulating large scale IoT deploy-ments. Our extensive tests considered the vertical and horizontal scalability of the componentsof the platform. Our results found the limits of the components when handling the load, and thescaling strategies that should be targeted by implementers. We found that vertical scaling is notan effective strategy in comparison to the gains achieved by horizontally scaling the databaselayer. We reflect about the load testing methodology for IoT systems, the scalability needs ofdifferent layers and conclude with future challenges in this topic.
APA, Harvard, Vancouver, ISO, and other styles
26

Christophe, Benoit. "Semantic based middleware to support nomadic users in IoT-enabled smart environments." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066669/document.

Full text
Abstract:
Avec le développement de l’Internet des Objets, la réalisation d’environnements composés de diverses ressources connectées (objets, capteurs, services, données, etc.) devient une réalite tangible. De plus, la place prépondérante que les smartphones prennent dans notre vie (l’utilisateur étant toujours connecté) font que ces espaces dits ‘intelligents’ ouvrent la voie au développement de nouveaux types d’applications; embarquées dans les téléphones d’utilisateurs nomades – passant d’un environnement connecté (la maison) à un autre (la salle de réunion) – et se reconfigurant dynamiquement pour utiliser les ressources de l’environnement connecté dans lequel celles-ci se trouvent. La création de telles applications va cependant de pair avec le design d’outils supportant les utilisateurs en mobilité, en particulier afin de réaliser la sélection la plus efficace possible des ressources de l’environnement dans lequel l’utilisateur se trouve. Tandis qu’une telle sélection requiert la définition de modèles permettant de décrire de façon précise les caractéristiques de ces ressources, elle doit également prendre en compte les profils et préférences utilisateurs.Enfin, l’augmentation du nombre de ressources connectées, potentiellement mobiles, requiert également le développement de processus de sélection qui “passent à l’échelle”. Des avancées dans ce champ de recherche restent encore à faire, notamment à cause d’une connaissance assez floue concernant les acteurs (ainsi que leurs interactions) définissant (i.e., prenant part à) l’éco-système qu’est un “espace intelligent”. En outre, la multiplicité de diverses ressources connectées implique des problèmes d’interopérabilité et de scalabilité qu’il est nécessaire d’adresser. Si le Web Sémantique apporte une réponse à des problèmes d’interopérabilité, il en soulève d’autres liés au passage à l’échelle. Enfin, si des modèles représentant des “espaces intelligents” ont été développé, leur formalisme ne couvre que partiellement toutes les caractéristiques des ressoures connectées. En particulier, ces modèles tendent à omettre les caractéristiques temporelles, spatiales où encore d’appartenance liées à l’éco-système dans lequel se trouvent ces ressources. S’appuyant sur mes recherches conduites au sein des Bell Labs, cette dissertation identifie les interactions entre les différents acteurs de cet éco-système et propose des représentations formelles, basées sur une sémantique, permettant de décrire ces acteurs. Cette dissertation propose également des procédures de recherche, permettant à l’utilisateur (ou ses applications) de trouver des ressources connectées en se basant sur l’analyse de leur description sémantique. En particulier, ces procédures s’appuient sur une architecture distribuée, également décrite dans cette dissertation, afin de permettre un passage à l’échelle. Ces aides à l’utilisateur sont implémentées au travers de briques intergicielles déployées dans différentes pièces d’un bâtiment, permettant de conduire des expérimentations afin de s’assurer de la validité de l’approche employée<br>With the growth in Internet of Things, the realization of environments composed of diverse connected resources (devices, sensors, services, data, etc.) becomes a tangible reality. Together with the preponderant place that smartphones take in the daily life of users, these nascent smart spaces pave the way to the development of novel types of applications; carried by the phones of nomadic users and dynamically reconfiguring themselves to make use of such appropriate connected resources. Creating these applications however goes hand-in-hand with the design of tools supporting the nomadic users roaming in these spaces, in particular by enabling the efficient selection of resources. While such a selection calls for the design of theoretically grounded descriptions, it should also consider the profile and preferences of the users. Finally, the rise of (possibly mobile) connected resources calls for designing a scalable process underlying this selection. Progress in the field is however sluggish especially because of the ignorance of the stakeholders (and the interactions between them) composing this eco-system of “IoT-enabled smart environments”. Thus, the multiplicity of diverse connected resources entails interoperability and scalability problems. While the Semantic Web helped in solving the interoperability issue, it however emphasizes the scalability one. Thus, misreading of the ecosystem led to producing models partially covering connected resource characteristics.Revolving from our research works performed over the last 6 years, this dissertation identifies the interactions between the stakeholders of the nascent ecosystem to further propose formal representations. The dissertation further designs a framework providing search capabilities to support the selection of connected resources through a semantic analysis. In particular, the framework relies on a distributed architecture that we design in order to manage scalability issues. The framework is embodied in a VR Gateway further deployed in a set of interconnected smart places and that has been assessed by several experimentations
APA, Harvard, Vancouver, ISO, and other styles
27

Nobile, Marco. "Piattaforme per Internet of Things: Windows IoT Core come caso di studio." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/9216/.

Full text
Abstract:
Questa tesi si pone l'obiettivo di esplorare alcuni aspetti di uno dei settori più in crescita in questi anni (e nei prossimi) in ambito informatico: \textbf{Internet of Things}, con un occhio rivolto in particolar modo a quelle che sono le piattaforme di sviluppo disponibili in questo ambito. Con queste premesse, si coglie l'occasione per addentrarsi nella scoperta della piattaforma realizzata e rilasciata da pochi mesi da uno dei colossi del mercato IT: Microsoft. Nel primo capitolo verrà trattato Internet of Things in ambito generale, attraverso una panoramica iniziale seguita da un'analisi approfondita dei principali protocolli sviluppati per questa tecnologia. Nel secondo capitolo verranno elencate una serie di piattaforme open source disponibili ad oggi per lo sviluppo di sistemi IoT. Dal terzo capitolo verrà incentrata l'attenzione sulle tecnologie Microsoft, in particolare prima si tratterà Windows 10 in generale, comprendendo \emph{UWP Applications}. Di seguito, nel medesimo capitolo, sarà focalizzata l'attenzione su Windows IoT Core, esplorandolo dettagliatamente (Windows Remote Arduino, Modalità Headed/Headless, etc.). Il capitolo a seguire concernerà la parte progettuale della tesi, comprendendo lo sviluppo del progetto \textbf{Smart Parking} in tutte le sue fasi (dei Requisiti fino ad Implementazione e Testing). Nel quinto (ed ultimo) capitolo, saranno esposte le conclusioni relative a Windows IoT Core e i suoi vantaggi/svantaggi.
APA, Harvard, Vancouver, ISO, and other styles
28

Nguyen, Huu Ha. "Context-Based Multi-Tenancy Policy Enforcement For Data Sharing In IoT Systems." University of Dayton / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1628158560712128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kamatsos, Paraskevas. "Smart Homes : Human interactions and IoT." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-53427.

Full text
Abstract:
This thesis studies the phenomenon of human-system interaction in smart homes as a practice of Internet of Things. The research was conducted through interviews, workshops and observations and followed an interpretive research paradigm of phenomenologically-situated paradigm of HCI and a qualitative research approach. The theories of Phenomenology and Postphenomenology were used to interpret the experiences, beliefs and views of the participants. The empirical findings were processed and a thematic analysis was followed in order to identify the main themes that emerged out of the interviews, workshops and observations. The discussion of the findings showed that the research questions were answered to the grade that the participants of the research design, use and interact with smart homes in a multiple and complex way.
APA, Harvard, Vancouver, ISO, and other styles
30

Abed, Javad. "A NOVEL FRAMEWORK FOR SOCIAL INTERNET OF THINGS: LEVERAGING THE FRIENDSHIPS AND THE SERVICES EXCHANGED BETWEEN SMART DEVICES." VCU Scholars Compass, 2019. https://scholarscompass.vcu.edu/etd/5980.

Full text
Abstract:
As humans, we tackle many problems in complex societies and manage the complexities of networked social systems. Cognition and sociability are two vital human capabilities that improve social life and complex social interactions. Adding these features to smart devices makes them capable of managing complex and networked Internet of Things (IoT) settings. Cognitive and social devices can improve their relationships and connections with other devices and people to better serve human needs. Nowadays, researchers are investigating two future generations of IoT: social IoT (SIoT) and cognitive IoT (CIoT). This study develops a new framework for IoT, called CSIoT, by using complexity science concepts and by integrating social and cognitive IoT concepts. This framework uses a new mechanism to leverage the friendships between devices to address service management, privacy, and security. The framework addresses network navigability, resilience, and heterogeneity between devices in IoT settings. This study uses a new simulation tool for evaluating the new CSIoT framework and evaluates the privacy-preserving ability of CSIoT using the new simulation tool. To address different CSIoT security and privacy issues, this study also proposes a blockchain-based CSIoT. The evaluation results show that CSIoT can effectively preserve the privacy and the blockchain-based CSIoT performs effectively in addressing different privacy and security issues.
APA, Harvard, Vancouver, ISO, and other styles
31

Christophe, Benoit. "Semantic based middleware to support nomadic users in IoT-enabled smart environments." Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066669.

Full text
Abstract:
Avec le développement de l’Internet des Objets, la réalisation d’environnements composés de diverses ressources connectées (objets, capteurs, services, données, etc.) devient une réalite tangible. De plus, la place prépondérante que les smartphones prennent dans notre vie (l’utilisateur étant toujours connecté) font que ces espaces dits ‘intelligents’ ouvrent la voie au développement de nouveaux types d’applications; embarquées dans les téléphones d’utilisateurs nomades – passant d’un environnement connecté (la maison) à un autre (la salle de réunion) – et se reconfigurant dynamiquement pour utiliser les ressources de l’environnement connecté dans lequel celles-ci se trouvent. La création de telles applications va cependant de pair avec le design d’outils supportant les utilisateurs en mobilité, en particulier afin de réaliser la sélection la plus efficace possible des ressources de l’environnement dans lequel l’utilisateur se trouve. Tandis qu’une telle sélection requiert la définition de modèles permettant de décrire de façon précise les caractéristiques de ces ressources, elle doit également prendre en compte les profils et préférences utilisateurs.Enfin, l’augmentation du nombre de ressources connectées, potentiellement mobiles, requiert également le développement de processus de sélection qui “passent à l’échelle”. Des avancées dans ce champ de recherche restent encore à faire, notamment à cause d’une connaissance assez floue concernant les acteurs (ainsi que leurs interactions) définissant (i.e., prenant part à) l’éco-système qu’est un “espace intelligent”. En outre, la multiplicité de diverses ressources connectées implique des problèmes d’interopérabilité et de scalabilité qu’il est nécessaire d’adresser. Si le Web Sémantique apporte une réponse à des problèmes d’interopérabilité, il en soulève d’autres liés au passage à l’échelle. Enfin, si des modèles représentant des “espaces intelligents” ont été développé, leur formalisme ne couvre que partiellement toutes les caractéristiques des ressoures connectées. En particulier, ces modèles tendent à omettre les caractéristiques temporelles, spatiales où encore d’appartenance liées à l’éco-système dans lequel se trouvent ces ressources. S’appuyant sur mes recherches conduites au sein des Bell Labs, cette dissertation identifie les interactions entre les différents acteurs de cet éco-système et propose des représentations formelles, basées sur une sémantique, permettant de décrire ces acteurs. Cette dissertation propose également des procédures de recherche, permettant à l’utilisateur (ou ses applications) de trouver des ressources connectées en se basant sur l’analyse de leur description sémantique. En particulier, ces procédures s’appuient sur une architecture distribuée, également décrite dans cette dissertation, afin de permettre un passage à l’échelle. Ces aides à l’utilisateur sont implémentées au travers de briques intergicielles déployées dans différentes pièces d’un bâtiment, permettant de conduire des expérimentations afin de s’assurer de la validité de l’approche employée<br>With the growth in Internet of Things, the realization of environments composed of diverse connected resources (devices, sensors, services, data, etc.) becomes a tangible reality. Together with the preponderant place that smartphones take in the daily life of users, these nascent smart spaces pave the way to the development of novel types of applications; carried by the phones of nomadic users and dynamically reconfiguring themselves to make use of such appropriate connected resources. Creating these applications however goes hand-in-hand with the design of tools supporting the nomadic users roaming in these spaces, in particular by enabling the efficient selection of resources. While such a selection calls for the design of theoretically grounded descriptions, it should also consider the profile and preferences of the users. Finally, the rise of (possibly mobile) connected resources calls for designing a scalable process underlying this selection. Progress in the field is however sluggish especially because of the ignorance of the stakeholders (and the interactions between them) composing this eco-system of “IoT-enabled smart environments”. Thus, the multiplicity of diverse connected resources entails interoperability and scalability problems. While the Semantic Web helped in solving the interoperability issue, it however emphasizes the scalability one. Thus, misreading of the ecosystem led to producing models partially covering connected resource characteristics.Revolving from our research works performed over the last 6 years, this dissertation identifies the interactions between the stakeholders of the nascent ecosystem to further propose formal representations. The dissertation further designs a framework providing search capabilities to support the selection of connected resources through a semantic analysis. In particular, the framework relies on a distributed architecture that we design in order to manage scalability issues. The framework is embodied in a VR Gateway further deployed in a set of interconnected smart places and that has been assessed by several experimentations
APA, Harvard, Vancouver, ISO, and other styles
32

Taboada, Orozco Adrian. "Distributed Knowledge in the Building Management Systems Architecture for Smart Buildings." Electronic Thesis or Diss., Bourgogne Franche-Comté, 2022. http://www.theses.fr/2022UBFCK114.

Full text
Abstract:
L'avenir des villes est en jeu. Au cours des dernières décennies, la répartition de la population s'est considérablement modifiée. Depuis 1980, les modes de cohabitation sont remis en cause par le passage de l'exode rural à l'exode urbain. Les villes abritent désormais 60 % de la population mondiale. Cette concentration massive de personnes, sans anticipation, a entraîné une mauvaise connectivité, des transports inadaptés, une concentration de la pollution, une sécurité inadéquate et un gaspillage énergétique. Par conséquent, assurer la croissance durable des villes nécessite des ruptures technologiques évolutives qui doivent apporter une meilleure qualité de vie sans appauvrir les ressources. La principale préoccupation des villes est la gestion de la question énergétique, notamment dans les bâtiments, qui représentent 40 % d'énergie dans la consommation totale des villes. Cette thèse aborde le domaine émergent du Smart Building. L'objectif principal est de travailler vers le concept de Building Operating Systems (BOS). BOS est un système piloté par les données qui facilite et permet le développement d'applications orientées Bâtiment. Nos études ont identifié que le principal obstacle au développement du BOS est l'intégration des données et le manque de contexte dans un système de gestion du bâtiment (BMS) naturellement et physiquement dispersé. Le BMS est le système sous-jacent qui prend en charge les services dans le bâtiment, et sa compréhension de ses caractéristiques est fondamentale pour atteindre l'objectif principal de cette thèse. Les résultats de cette recherche servent de base pour concevoir l'approche principale appelée WITTYM. Elle vise à créer et diffuser des connaissances sur les bâtiments en tirant parti du Building Information Modeling (BIM) et d'autres sources de données hétérogènes (IoT). L'approche WITTYM est une conjonction d'ontologies, de connaissances et de méthodes de distribution. L'approche WITTYM est évaluée à travers des hypothèses de recherche sur des cas d'utilisation métiers. Les résultats ont montré une optimisation du BMS pour l'intégration des données, les applications, la sécurité et la réponse décisionnelle. Notre travail pose les bases de recherches futures et d'applications de systèmes à plusieurs niveaux dans les bâtiments intelligents<br>The future of cities is at stake. Over the previous few decades, the population distribution has shifted substantially. Since 1980, people's ways of cohabiting have been challenged by the change from rural to urban migration. Cities now hold 60 % of the world's population. This massive concentration of people has resulted in poor connectivity, ineffective transportation, pollution, inadequate security, and energy waste. As a result, ensuring the sustainable growth of cities necessitates scalable technological breakthroughs that must give quality of life while maximizing resources. The main concern in cities is dealing with energy waste, especially in buildings, which represent 40 % of energy in the total consumption of cities.Therefore, this thesis addresses the emergent Smart Building field. The main goal is to work toward the concept of Building Operating Systems (BOS). BOS is a data-driven system that facilitates and enables the development of applications. Our studies have identified that the main barrier to BOS development is the integration of data and lack of context in a naturally and physically dispersed Building Management System (BMS). BMS is the underlying system that supports services in Building, and its understanding of its features is fundamental to achieving the main goal of this thesis. Therefore, this thesis first reviews the Smart Building field and then focuses on the BMS architecture. The results of the review serve as the basis for conceiving the main approach of this thesis, which is the WITTYM Approach. It aims to create and distribute buildings' knowledge by leveraging Building Information Modeling (BIM) and other heterogeneous data sources. WITTYM Approach is a conjunction of Ontologies, Knowledge, and Distribution Methods. The WITTYM Approach is evaluated through research hypotheses over use cases. Results have shown an optimization of BMS for data integration, applications, security, and decision-making response. Our work sets the basis for further research and applications on BMS
APA, Harvard, Vancouver, ISO, and other styles
33

Dhang, Prakriti, and Manaswini Kolluru. "Interaction with Smart Assistant." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20337.

Full text
Abstract:
Newer technologies are being developed all the time in order to help us in our daily tasks. Smart Assistant (SA) is one such broad category of devices which, when instructed through speech or command, perform certain tasks. Most SAs have two primary tasks: identify the user, and perform the taskcommunicated by the user. The task of identification can be achieved in severalways and one such method involves face recognition interface integrated within SA. Further interaction with the user is achieved via either a touch screen or a speech-based interface integrated within SA. Since the primary objective of a SA involves interaction with an individual user, it is necessary to identify users' concerns related to the usability of SA.In this thesis, the goal is to perform a usability study of Smart Assistant(SA) in the context of providing assistance in scheduling meetings at the workplace. Adopting a qualitative approach and we performed the usability study by designing a questionnaire to document public perception of new technologies like a smart assistant. We performed an online survey and collected responses from a section of the population. We also performed a similar survey with employees at Cybercom who have experience in interacting with the SAbeing developed in their company, and which is meant for providing assistance in scheduling meetings.In the process, we also provide relevant background literatureon human-computer interaction to contextualize the results of our survey. Themain outcome of this work is a list of guidelines to be followed for developing asocially interactive speech-based SA.The results of our survey indicate that there are several privacy and security related concerns that users have when using a face recognition interface and speech-based interaction. Although some of the concerns require technological advancements, a few of the concerns can be addressed by adopting certain suggested strategies.
APA, Harvard, Vancouver, ISO, and other styles
34

Mirza, Helen, and Rade Nikolic. "Hur förändrar smart teknik resurseffektiviteten i fordonsbranschen? : En studie av hur Cyber-Physical Systems och Internet of Things påverkar resurseffektiviteten i personbilsbranschen." Thesis, KTH, Industriell produktion, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-255153.

Full text
Abstract:
Idag pratas det mycket om smart teknik och man säger att den fjärde industriella revolutionen är på väg. Revolutionen kallas för Industri 4.0 och innebär två tekniska förbättringar, Internet of Things (IoT) och Cyber-Physical Systems (CPS). IoT låter fysiska enheter sammankopplas i ett system med andra enheter med hjälp av elektromagnetiska vågor och CPS ger möjligheten till att få in information från omvärlden och implementera informationen i digital form. När det kommer till implementering i tillverkningsindustrin används begreppen Industrial Internet of Things och Cyber-Physical Production Systems. Arbetet består av en djupgående litteraturstudie och undersöker vad implementering av IoT och CPS i personbilsbranschens tillverkningssystem kan leda till och hur de fungerar i praktiken. Teorin utgår från vetenskapliga artiklar, tidskrifter och journaler samt en studie från Atlas Copco. Eftersom att smart teknik är ett brett ämne och vi behövde förhålla oss till en tidsgräns på 18 veckor avgränsades arbetet till endast IoT och CPS i tillverkande personbilsföretag. Branschen för personbilar valdes för att i jämförelse med andra branscher är både kvaliteten och kvantiteten avgörande. Samtidigt som det produceras många personbilar måste varje personbil uppfylla en rad olika krav och varje enhet utgör en betydande del av kapitalet i företaget.Resultatet visar hur IoT och CPS fungerar som helhet och vad för positiva och negativa konsekvenser implementering av begreppen ger. Av resultatet framgår också att faktorerna produktion, ekonomi och människa ska analyseras som en helhet och inte enskilt för att implementeringen ska vara framgångsrik i tillverkande personbilsföretag.Möjligheterna som IoT och CPS medför är snabbare och exaktare beslut, systemövervakning och insamling, utbyte och analysering av data för personbilsbranschens företag. Den största utmaningen som implementeringen av begreppen medför är datahantering. Det finns en risk att oönskade mottagare får tillgång till konfidentiell information genom bland annat dataläckage och dataintrång. Således bör fokus ligga på att förebygga detta för att få ut fördelarna och samtidigt reducera nackdelarna. Slutsatsen som kan dras av resultatet är att en kombination av IoT och CPS i personbils-branschens tillverkningssystem skapar ett kommunikationsnätverk bland heterogena enheter som gör att system kan kommunicera och utbyta data med varandra på ett effektivt sätt.Implementering av begreppen leder till minskning av defekter, introduktionskostnader, energianvändning och upplärning för arbetare samt ökad verktygsdrift och produktivitet.<br>Today, there is much talk about smart technology and it is said that the fourth industrial revolution is on its way. The revolution is called Industry 4.0 and involves two technical improvements, the Internet of Things (IoT) and Cyber-Physical Systems (CPS). IoT allows physical devices to be interconnected in a system with other devices using electromagnetic waves and CPS provides the opportunity to get information from the outside world and implement the information in digital form. When it comes to implementation in the manufacturing industry, the concepts Industrial Internet of Things and Cyber-Physical Production Systems are used.The thesis consists of an in-depth literature study and investigates what implementation of IoT and CPS in the automotive industry's manufacturing system can lead to and how they work in practice. The theory is based on scientific articles, paper and journals, and a study by Atlas Copco. Because smart technology is a broad topic and we needed to relate to a time limit of 18 weeks, the work was limited to IoT and CPS only in manufacturing passenger car companies. The industry for passenger cars was chosen so that, in comparison with other industries, both the quality and the quantity are decisive. While many passenger cars are being produced, each passenger car must meet a variety of requirements and each unit constitutes a significant part of the capital of the company.The result shows how IoT and CPS work as a whole and what positive and negative consequences the implementation of the concepts gives. The result also shows that the factors of production, economy and humanity should be analysed as a whole and not individually in order for the implementation to be successful in manufacturing passenger car companies.The opportunities that IoT and CPS entail are faster and more precise decisions, system monitoring and collection, exchange and analysis of data for the automotive industry's companies. The biggest challenge that the implementation of the concepts entails is data management. There is a risk that unwanted recipients will have access to confidential information through, among other things, data leakage and hacking. Thus, the focus should be on preventing this in order to get the benefits and at the same time reduce the disadvantages.The conclusion that can be drawn from the result is that IoT and CPS in the automotive industry's manufacturing system create a communication network among heterogeneous units that enable systems to communicate and exchange data with each other in an efficient manner. Implementation of the concepts leads to a reduction of defects, introduction costs, energy use and training for workers, as well as increased tool operation and productivity.
APA, Harvard, Vancouver, ISO, and other styles
35

Andersson, Sebastian, and Oliver Josefsson. "On the assessment of Denial of Service vulnerabilities affecting smart home systems." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20717.

Full text
Abstract:
IoT is an abbreviation of the term Internet of Things. The term describes everydayitems such as light bulbs that are connected to the Internet. IoT is a field that isgrowing very quickly with some researchers and industry leaders predicting thatthere will be up to 200 billion connected IoT devices in the world by 2020. Many IoTdevices are developed by smaller companies looking to capitalize on a specific needin the market. Because of this, the companies may favor launching a product as fastas possible which could mean that the devices may have not been adequately testedfor different vulnerabilities.The IoT and Smart Home market is currently experiencing rapid growth and all signspoint towards that continuing in the future. This thesis focuses on testing forvulnerabilities to Denial of Service attacks in common-off-the-shelf IoT devices thatcan be found in a smart home environment. The purpose of this thesis is to createmore knowledge about the vulnerabilities that can be found in Internet connecteddevices that are used daily.This thesis includes experiments using OpenVAS, which is a vulnerability scannerdeveloped by Greenbone Security used to test for vulnerabilities to Denial of Serviceattacks in IoT devices. The devices that are tested are Sony PlayStation 4, IKEATrådfri Smart Lighting, Google Chromecast (First Generation), Apple TV (ThirdGeneration) and D-Link DCS-930LB Wi-Fi IP-Camera. The firmware/software of allthe devices are updated as of April of 2019.The results of the conducted experiments show that all the tested devices besidesChromecast and IKEA Trådfri had vulnerabilities to Denial of Service attacks.PlayStation 4 was the device with the highest amount of vulnerabilities (9) and thevulnerability with highest possible severity (10.0). The effects of a Denial of Serviceattack range from an annoyance, when a gaming console is unavailable, to a securityrisk when an IP camera can be temporarily disabled.
APA, Harvard, Vancouver, ISO, and other styles
36

Persson, Mathias. "Simultaneous Data Management in Sensor-Based Systems using Disaggregation and Processing." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188856.

Full text
Abstract:
To enable high performance data management for sensor-based systems the system components in an architecture has to be tailored to the situation at hand. Therefore, each component has to handle a massive amount of data independently, and at the same time cooperate with other components within a system. To facilitate rapid data processing between components, a model detailing the flow of information and specifying internal component structures will assist in faster and more reliable system designs. This thesis presents a model for a scalable, safe, reliable and high performing system for managing sensor-based data. Based on the model a prototype is developed that can be used to handle a large amount of messages from various distributed sensors. The different components within the prototype are evaluated and their advantages and disadvantages are presented. The result merits the architecture of the prototype and validates the initial requirements of how it should operate to achieve high performance. By combining components with individual advantages, a system can be designed that allows a high amount of simultaneous data to be disaggregated into its respective category, processed to make the information usable and stored in a database for easy access to interested parties.<br>Om ett system som hanterar sensorbaserad data ska kunna prestera bra måste komponenterna som ingår i systemet vara skräddarsydda för att hantera olika situationer. Detta betyder att varje enskild komponent måste individuellt kunna hantera stora simultana datamängder, samtidigt som de måste samarbeta med de andra komponenterna i systemet. För att underlätta snabb bearbetning av data mellan komponenter kan en modell, som specificerar informationsflödet och interna strukturer hos komponenterna, assistera i skapande av snabbare och mer tillförlitliga systemarkitekturer. I denna uppsats presenteras en modell för skapande av skalbara, säkra, tillförlitliga och bra presterande system som hanterar sensor-baserad data. En prototyp utvecklas, baserad på modellen, som kan hantera en stor mängd meddelanden från distribuerade sensorer. De olika komponenterna som används i prototypen utvärderas och deras för- och nackdelar presenteras. Resultatet visar att arkitekturen hos prototypen fungerar enligt de initiala kraven om hur bra systemet ska prestera. Genom att kombinera individuella styrkor hos komponenterna kan ett system skapas som tillåter stora mängder data att bli fördelat enligt deras typ, behandlat för att få fram relevant information och lagrat i en databas för enkel tillgång.
APA, Harvard, Vancouver, ISO, and other styles
37

Cao, Huu Quyet. "Policy-based usage control for trustworthy data sharing in smart cities." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0010/document.

Full text
Abstract:
Dans le domaine de “smart cities” ou “villes connectées”, les technologies de l’information et de la communication sont intégrées aux services traditionnels de la ville (eau, électricité, gaz, transports collectifs, équipements publics, bâtiments, etc.) pour améliorer la qualité des services urbains ou encore pour réduire les coûts. Les données dans la ville connectée sont généralement produites par une grande variété d’acteurs. Ces données devraient être partagées entre diverses applications ou services. Or, il y a un problème, comment les acteurs peuvent-ils exercer un contrôle sur la façon dont leurs données vont être utilisées? C’est important car pour encourager le partage des données, nous devons établir des relations de confiance entre acteurs. Les acteurs ont confiance s’ils ont la capacité à contrôler l’utilisation de leurs données. Nous prendrons en compte les obligations définies par les acteurs pour leurs données : (i) Abstraction de certaines informations, (ii) Granularité spatio-temporelle, (iii) Classification des acteurs et des objectifs, et (iv) Monétisation des données. Mes contributions sont: (i) Un modèle de contrôle d’utilisation des données. Ce modèle répond aux obligations définies par les acteurs pour leur données. (ii) Une plateforme en tant que service. La plateforme a rajouté des composants nécessaire pour permettre la transparence et la traçabilité d’utilisation des données basée sur le modèle. (iii) Un outil de visualisation. C’est l’implémentation d’un prototype pour que les acteurs puissent exercer un contrôle sur la façon dont leurs données vont être utilisées. (iv) Une évaluation de la performance et l’impact de notre solution. Ces solutions permettent l’établissement des relations de confiance pour le partage des données de Smart Cities basées sur le modèle de contrôle d’utilisation des données. Les résultats de ma thèse peuvent être appliqués à la plateforme IoT Datavenue d’Orange<br>In smart cities, Information and Communication Technologies, in particular Internet of Things (IoT) Technologies, are integrated into traditional services of our city, for example waste management, air pollution monitoring, and parking to improve quality while reducing costs of these services. IoT data in this context are generated by different actors, such as service providers, developers, and municipal authorities. These data should be shared among applications or services. However, in traditional scenario, there is no sharing of IoT data between them. Each actor consumes data from sensors deployed on behalf of that actor, and network infrastructure maybe shared. In order to encourage IoT data sharing, we need to establish the confidence between the actors. Exercising control over the usage of data by other actors is critical in building trust. Thus, the actors should have an ability to exercise control on how their data are going to be used. This major issue have not been treated in IoT namely Usage Control. In this thesis, we take into account obligations defined by the actors for their data (i) Abstraction of certain information, (ii) Spatial and temporal granularity, (iii) Classification of actors and purposes, and (iv) Monetization of data. For example, requirements of data usage in Intelligent parking applications are (i) Data owners have full access to all the details, (ii) Municipal authorities can access the average occupancy of parking place per street on an hourly basis, (iii) Commercial service providers can access only statistical data over a zone and a weekly basis, and (iv) Monetization of data can be based on subscription types or users roles. Thesis contributions include: (i) Policy-based Data Usage Control Model (DUPO) responds to the obligations defined by actors to their data. (ii) Trustworthy Data Sharing Platform as a Service allows transparency and traceability of data usage with open APIs based on the DUPO and Semantic technologies. (iii) Visualization Tool Prototype enables actors to exercise control on how their data will be used. (iv) Evaluation of the performance and the impact of our solution. The results show that the performance of the added trust is not affecting of the system. Mistrust might hamper public acceptance of IoT data sharing in smart cities. Our solution is key which will establish the trust between data owners and consumers by taking into account the obligations of the data owners. It is useful for data operators who would like to provide an open data platform with efficient enablers to partners, data-based services to clients, and ability to attract partners to share data on their platforms
APA, Harvard, Vancouver, ISO, and other styles
38

Pan, Zhiwen, and Zhiwen Pan. "A Context Aware Anomaly Behavior Analysis Methodology for Building Automation Systems." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625624.

Full text
Abstract:
Advances in mobile and pervasive computing, electronics technology, and the exponential growth in Internet of Things (IoT) applications and services has led to Building Automation System (BAS) that enhanced the buildings we live by delivering more energy-saving, intelligent, comfortable, and better utilization. Through the use of integrated protocols, a BAS can interconnects a wide range of building assets so that the control and management of asset operations and their services can be performed in one protocol. Moreover, through the use of distributed computing and IP based communication, a BAS can implement remote monitor and control in adaptive and real-time manner. However, the use of IoT and distributed computing techniques in BAS are leading to challenges to secure and protect information and services due to the significant increase in the attack surface and the inherent vulnerabilities of BAS integrated protocols. Since there is no intrusion detection and prevention available for BAS network, proposing a reliable security mechanism which can monitor the behavior of BAS assets becomes a major design issue. Anomaly Based Intrusion Detection is a security mechanism that uses baseline model to describe the normal behaviors of a system, so that malicious behaviors occurred in a system can be detected by comparing the observed behavior to the baseline model. With its ability of detecting novel and new attacks, Anomaly based Behavior Analysis (ABA) has been actively pursued by researchers for designing Intrusion Detection Systems. Since the information acquired from a BAS system can be from a variety of sources (e.g. sensors, network protocols, temporal and spatial information), the traditional ABA methodology which merely focuses on analyzing the behavior of communication protocols will not be effective in protecting BAS networks. In this dissertation we aim at developing a general methodology named Context Aware Anomaly based Behavior Analysis (CAABA) which combines Context Awareness technique with Anomaly based Behavior Analysis in order to detect any type of anomaly behaviors occurred in Building Automation Systems. Context Awareness is a technique which is widely used in pervasive computing and it aims at gathering information about a system's environment so it can accurately characterize the current operational context of the BAS network and its services. The CAABA methodology can be used to protect a variety of BAS networks in a sustainable and reliable way. To handle the heterogeneous BAS information, we developed a novel Context Aware Data Structure to represent the information acquired from the sensors and resources during execution of the BAS system which can explicitly describe the system's behavior. By performing Anomaly based Behavior Analysis over the set of context arrays using either data mining algorithm or statistical functions, the BAS baseline models are generated. To validate our methodology, we have applied it to two different building application scenarios: a smart building system which is usually implemented in industrial and commercial office buildings and a smart home system which is implemented in residential buildings, where we have achieved good detection results with low detection errors.
APA, Harvard, Vancouver, ISO, and other styles
39

Ahmad, Abbas. "Model-Based Testing for IoT Systems : Methods and tools." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD008/document.

Full text
Abstract:
L'internet des objets (IoT) est aujourd'hui un moyen d'innovation et de transformation pour de nombreuses entreprises. Les applications s'étendent à un grand nombre de domaines, tels que les villes intelligentes, les maisons intelligentes, la santé, etc. Le Groupe Gartner estime à 21 milliards le nombre d'objets connectés d'ici 2020. Le grand nombre d'objets connectés introduit des problèmes, tels que la conformité et l'interopérabilité en raison de l'hétérogénéité des protocoles de communication et de l'absence d'une norme mondialement acceptée. Le grand nombre d'utilisations introduit des problèmes de déploiement sécurisé et d'évolution du réseau des IoT pour former des infrastructures de grande taille. Cette thèse aborde la problématique de la validation de l'internet des objets pour répondre aux défis des systèmes IoT. Pour cela, nous proposons une approche utilisant la génération de tests à partir de modèles (MBT). Nous avons confronté cette approche à travers de multiples expérimentations utilisant des systèmes réels grâce à notre participation à des projets internationaux. L'effort important qui doit être fait sur les aspects du test rappelle à tout développeur de système IoT que: ne rien faire est plus cher que de faire au fur et à mesure<br>The Internet of Things (IoT) is nowadays globally a mean of innovation and transformation for many companies. Applications extend to a large number of domains, such as smart cities, smart homes, healthcare, etc. The Gartner Group estimates an increase up to 21 billion connected things by 2020. The large span of "things" introduces problematic aspects, such as conformance and interoperability due to the heterogeneity of communication protocols and the lack of a globally-accepted standard. The large span of usages introduces problems regarding secure deployments and scalability of the network over large-scale infrastructures. This thesis deals with the problem of the validation of the Internet of Things to meet the challenges of IoT systems. For that, we propose an approach using the generation of tests from models (MBT). We have confronted this approach through multiple experiments using real systems thanks to our participation in international projects. The important effort which is needed to be placed on the testing aspects reminds every IoT system developer that doing nothing is more expensive later on than doing it on the go
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Xiaolong. "A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7589.

Full text
Abstract:
Building Automation System (BAS) is a complex distributed control system that is widely deployed in commercial, residential, industrial buildings for monitoring and controlling mechanical/electrical equipment. Through increasing industrial and technological advances, the control components of BAS are becoming increasingly interconnected. Along with potential benefits, integration also introduces new attack vectors, which tremendous increases safety and security risks in the control system. Historically, BAS lacks security design and relies on physical isolation and "security through obscurity". These methods are unacceptable with the "smart building" technologies. The industry needs to reevaluate the safety and security of the current building automation system, and design a comprehensive solution to provide integrity, reliability, and confidentiality on both system and network levels. This dissertation focuses on the system level in the effort to provide a reliable computing foundation for the devices and controllers. Leveraged on the preferred security features such as, robust modular design, small privilege code, and formal verifiability of microkernel architecture, this work describes a security enhanced operating system with built-in mandatory access control and a proxy-based communication framework for building automation controllers. This solution ensures policy-enforced communication and isolation between critical applications and non-critical applications in a potentially hostile cyber environment.
APA, Harvard, Vancouver, ISO, and other styles
41

Cao, Huu Quyet. "Policy-based usage control for trustworthy data sharing in smart cities." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0010.

Full text
Abstract:
Dans le domaine de “smart cities” ou “villes connectées”, les technologies de l’information et de la communication sont intégrées aux services traditionnels de la ville (eau, électricité, gaz, transports collectifs, équipements publics, bâtiments, etc.) pour améliorer la qualité des services urbains ou encore pour réduire les coûts. Les données dans la ville connectée sont généralement produites par une grande variété d’acteurs. Ces données devraient être partagées entre diverses applications ou services. Or, il y a un problème, comment les acteurs peuvent-ils exercer un contrôle sur la façon dont leurs données vont être utilisées? C’est important car pour encourager le partage des données, nous devons établir des relations de confiance entre acteurs. Les acteurs ont confiance s’ils ont la capacité à contrôler l’utilisation de leurs données. Nous prendrons en compte les obligations définies par les acteurs pour leurs données : (i) Abstraction de certaines informations, (ii) Granularité spatio-temporelle, (iii) Classification des acteurs et des objectifs, et (iv) Monétisation des données. Mes contributions sont: (i) Un modèle de contrôle d’utilisation des données. Ce modèle répond aux obligations définies par les acteurs pour leur données. (ii) Une plateforme en tant que service. La plateforme a rajouté des composants nécessaire pour permettre la transparence et la traçabilité d’utilisation des données basée sur le modèle. (iii) Un outil de visualisation. C’est l’implémentation d’un prototype pour que les acteurs puissent exercer un contrôle sur la façon dont leurs données vont être utilisées. (iv) Une évaluation de la performance et l’impact de notre solution. Ces solutions permettent l’établissement des relations de confiance pour le partage des données de Smart Cities basées sur le modèle de contrôle d’utilisation des données. Les résultats de ma thèse peuvent être appliqués à la plateforme IoT Datavenue d’Orange<br>In smart cities, Information and Communication Technologies, in particular Internet of Things (IoT) Technologies, are integrated into traditional services of our city, for example waste management, air pollution monitoring, and parking to improve quality while reducing costs of these services. IoT data in this context are generated by different actors, such as service providers, developers, and municipal authorities. These data should be shared among applications or services. However, in traditional scenario, there is no sharing of IoT data between them. Each actor consumes data from sensors deployed on behalf of that actor, and network infrastructure maybe shared. In order to encourage IoT data sharing, we need to establish the confidence between the actors. Exercising control over the usage of data by other actors is critical in building trust. Thus, the actors should have an ability to exercise control on how their data are going to be used. This major issue have not been treated in IoT namely Usage Control. In this thesis, we take into account obligations defined by the actors for their data (i) Abstraction of certain information, (ii) Spatial and temporal granularity, (iii) Classification of actors and purposes, and (iv) Monetization of data. For example, requirements of data usage in Intelligent parking applications are (i) Data owners have full access to all the details, (ii) Municipal authorities can access the average occupancy of parking place per street on an hourly basis, (iii) Commercial service providers can access only statistical data over a zone and a weekly basis, and (iv) Monetization of data can be based on subscription types or users roles. Thesis contributions include: (i) Policy-based Data Usage Control Model (DUPO) responds to the obligations defined by actors to their data. (ii) Trustworthy Data Sharing Platform as a Service allows transparency and traceability of data usage with open APIs based on the DUPO and Semantic technologies. (iii) Visualization Tool Prototype enables actors to exercise control on how their data will be used. (iv) Evaluation of the performance and the impact of our solution. The results show that the performance of the added trust is not affecting of the system. Mistrust might hamper public acceptance of IoT data sharing in smart cities. Our solution is key which will establish the trust between data owners and consumers by taking into account the obligations of the data owners. It is useful for data operators who would like to provide an open data platform with efficient enablers to partners, data-based services to clients, and ability to attract partners to share data on their platforms
APA, Harvard, Vancouver, ISO, and other styles
42

Lindorin, Axel. "Säkerhet i smarta hem : En litteraturanalys på protokollsäkerhet för det smarta hemmet." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18940.

Full text
Abstract:
Denna undersökning har granskat det problem som uppstår i samband med den snabba utvecklingen utav Internet of Things där de lågenergienheter saknar kraft för att utföra avancerade säkerhetslösningar. På grund av den låga säkerheten och växande användningsområdet så har Internet of Things enheterna blivit ett lockande mål för eventuella attacker. Den systematiska litteraturanalysen har genomförts genom att granska tidigare mer detaljerade analyser av protokollen och dess säkerhet samt utvecklarnas specifikationer. Detta för att bland annat skapa en sammanfattning utav protokollens säkerhet men också för att sedan jämföra protokollen för att kunna ta fram det säkrare protokollet för hemanvändning. Alla protokoll som tas upp har någon form av säkerhet implementerad för att förse med autentisering i form av MAC (i vissa fall HMAC), nyckelhantering, integritet i form av MIC och kommunikationssäkerhet med kryptering. Alla protokoll har stöd för AES-128 kryptering samt användning av IEEE 802.15.4 säkerhetsserie som ytterligare skydd utöver protokollens egna lösningar. Flertalen av protokollen använder sig också av Elleptic Curve för att säkert transportera nycklar. Analysens slutsats visar att Thread och Z-Wave anses som de två säkraste protokollen för hemmaanvändning. Det baserat på hur protokollen hanterar de olika aspekterna med sin märkbara prioritering av säkerhet tillsammans med det få antalet brister som kan skada det smarta hemmet. Bluetooth Low Energy och EnOcean är de två mindre säkra gällande en IoT miljö. Undersökningen tar också med en diskussion kring olika områden som dykt upp under undersökningens gång. Slutligen tas några punkter som dök upp under granskningen som kan vara bra att tänka på vid utveckling av dessa protokoll men säkerhet i tanken.<br>This study has examined the problems that arise in connection with the rapid development of the Internet of Things, where the low-energy units lack the power to implement advanced security solutions. Due to the low security and growing area of use, the Internet of Things units have become an attractive target for any attacks. The systematic literature analysis has been carried out by reviewing previously more detailed analyzes of the protocols and their security as well as the developers' specifications. This is to create a wide summary of the security of the protocols and then to compare the protocols to select one or more as the safer protocol for home use. All protocols that are included have some form of security implemented to provide authentication in the form of MAC, key management, integrity in the form of MIC and communication security with encryption. All protocols support AES-128 encryption and the use of IEEE 802.15.4 security suit as additional protection in addition to the protocol's own solutions. The majority of protocols also use Elleptic Curve to safely transport keys. The analysis concludes that Thread and Z-Wave are considered the two most secure home use protocols. It is based on how the protocols handle the various aspects with their noticeable prioritization of security along with the few deficiencies that can damage the smart home. Bluetooth Low Energy and EnOcean are thetwo less secure regarding an IoT environment. The survey also includes a discussion of various areas that emerged during the course of the investigation. Finally, some points that emerged during the review that may be good to consider when developing these protocols with security as focus.
APA, Harvard, Vancouver, ISO, and other styles
43

Sanjab, Anibal Jean. "Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/86204.

Full text
Abstract:
Cyber-physical systems (CPSs) are large-scale systems that seamlessly integrate physical and human elements via a cyber layer that enables connectivity, sensing, and data processing. Key examples of CPSs include smart power systems, smart transportation systems, and the Internet of Things (IoT). This wide-scale cyber-physical interconnection introduces various operational benefits and promises to transform cities, infrastructure, and networked systems into more efficient, interactive, and interconnected smart systems. However, this ubiquitous connectivity leaves CPSs vulnerable to menacing security threats as evidenced by the recent discovery of the Stuxnet worm and the Mirai malware, as well as the latest reported security breaches in a number of CPS application domains such as the power grid and the IoT. Addressing these culminating security challenges requires a holistic analysis of CPS security which necessitates: 1) Determining the effects of possible attacks on a CPS and the effectiveness of any implemented defense mechanism, 2) Analyzing the multi-agent interactions -- among humans and automated systems -- that occur within CPSs and which have direct effects on the security state of the system, and 3) Recognizing the role that humans and their decision making processes play in the security of CPSs. Based on these three tenets, the central goal of this dissertation is to enhance the security of CPSs with human actors by developing fool-proof defense strategies founded on novel theoretical frameworks which integrate the engineering principles of CPSs with the mathematical concepts of game theory and human behavioral models. Towards realizing this overarching goal, this dissertation presents a number of key contributions targeting two prominent CPS application domains: the smart electric grid and drone systems. In smart grids, first, a novel analytical framework is developed which generalizes the analysis of a wide set of security attacks targeting the state estimator of the power grid, including observability and data injection attacks. This framework provides a unified basis for solving a broad set of known smart grid security problems. Indeed, the developed tools allow a precise characterization of optimal observability and data injection attack strategies which can target the grid as well as the derivation of optimal defense strategies to thwart these attacks. For instance, the results show that the proposed framework provides an effective and tractable approach for the identification of the sparsest stealthy attacks as well as the minimum sets of measurements to defend for protecting the system. Second, a novel game-theoretic framework is developed to derive optimal defense strategies to thwart stealthy data injection attacks on the smart grid, launched by multiple adversaries, while accounting for the limited resources of the adversaries and the system operator. The analytical results show the existence of a diminishing effect of aggregated multiple attacks which can be leveraged to successfully secure the system; a novel result which leads to more efficiently and effectively protecting the system. Third, a novel analytical framework is developed to enhance the resilience of the smart grid against blackout-inducing cyber attacks by leveraging distributed storage capacity to meet the grid's critical load during emergency events. In this respect, the results demonstrate that the potential subjectivity of storage units' owners plays a key role in shaping their energy storage and trading strategies. As such, financial incentives must be carefully designed, while accounting for this subjectivity, in order to provide effective incentives for storage owners to commit the needed portions of their storage capacity for possible emergency events. Next, the security of time-critical drone-based CPSs is studied. In this regard, a stochastic network interdiction game is developed which addresses pertinent security problems in two prominent time-critical drone systems: drone delivery and anti-drone systems. Using the developed network interdiction framework, the optimal path selection policies for evading attacks and minimizing mission completion times, as well as the optimal interdiction strategies for effectively intercepting the paths of the drones, are analytically characterized. Using advanced notions from Nobel-prize winning prospect theory, the developed framework characterizes the direct impacts of humans' bounded rationality on their chosen strategies and the achieved mission completion times. For instance, the results show that this bounded rationality can lead to mission completion times that significantly surpass the desired target times. Such deviations from the desired target times can lead to detrimental consequences primarily in drone delivery systems used for the carriage of emergency medical products. Finally, a generic security model for CPSs with human actors is proposed to study the diffusion of threats across the cyber and physical realms. This proposed framework can capture several application domains and allows a precise characterization of optimal defense strategies to protect the critical physical components of the system from threats emanating from the cyber layer. The developed framework accounts for the presence of attackers that can have varying skill levels. The results show that considering such differing skills leads to defense strategies which can better protect the system. In a nutshell, this dissertation presents new theoretical foundations for the security of large-scale CPSs, that tightly integrate cyber, physical, and human elements, thus paving the way towards the wide-scale adoption of CPSs in tomorrow's smart cities and critical infrastructure.<br>Ph. D.<br>Enhancing the efficiency, sustainability, and resilience of cities, infrastructure, and industrial systems is contingent on their transformation into more interactive and interconnected smart systems. This has led to the emergence of what is known as cyber-physical systems (CPSs). CPSs are widescale distributed and interconnected systems integrating physical components and humans via a cyber layer that enables sensing, connectivity, and data processing. Some of the most prominent examples of CPSs include the smart electric grid, smart cities, intelligent transportation systems, and the Internet of Things. The seamless interconnectivity between the various elements of a CPS introduces a wealth of operational benefits. However, this wide-scale interconnectivity and ubiquitous integration of cyber technologies render CPSs vulnerable to a range of security threats as manifested by recently reported security breaches in a number of CPS application domains. Addressing these culminating security challenges requires the development and implementation of fool-proof defense strategies grounded in solid theoretical foundations. To this end, the central goal of this dissertation is to enhance the security of CPSs by advancing novel analytical frameworks which tightly integrate the cyber, physical, and human elements of a CPS. The developed frameworks and tools enable the derivation of holistic defense strategies by: a) Characterizing the security interdependence between the various elements of a CPS, b) Quantifying the consequences of possible attacks on a CPS and the effectiveness of any implemented defense mechanism, c) Modeling the multi-agent interactions in CPSs, involving humans and automated systems, which have a direct effect on the security state of the system, and d) Capturing the role that human perceptions and decision making processes play in the security of CPSs. The developed tools and performed analyses integrate the engineering principles of CPSs with the mathematical concepts of game theory and human behavioral models and introduce key contributions to a number of CPS application domains such as the smart electric grid and drone systems. The introduced results enable strengthening the security of CPSs, thereby paving the way for their wide-scale adoption in smart cities and critical infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
44

Berlini, Filippo. "Tecniche e algoritmi di aggregate computing a supporto di contesti di smart mobility." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14292/.

Full text
Abstract:
Il terzo millennio ha portato con sé importanti innovazioni tecnologiche nell'ambito dell'informatica che hanno causato modifiche sostanziali nel modo di vivere e di pensare delle persone. Al giorno d'oggi non vi è soggetto che esca di casa senza il proprio smartphone, questo ci porta ad essere sempre muniti di un dispositivo computazionale con un'elevata capacità di calcolo. La diffusione di questi device, in aggiunta alla crescita di dispositivi in rete, ha portato allo studio e lo sviluppo di sistemi basati sull'Internet of Things (IoT). Lo studio e lo sviluppo di tali sistemi offrono grandi potenzialità che non riescono però ad essere pienamente sfruttate a causa di un supporto tecnico non adeguato. Un'altra conseguenza dello sviluppo e della diffusione dei device computazionali sono i sistemi di Smart City e gli studi ad essi associati. La Smart City, in tutti i suoi ambiti, è in fervente crescita e lo sviluppo e il progresso tecnologico le offrono sempre nuove potenzialità. Grazie ai finanziamenti delle istituzioni internazionali che supportano questo tipo di ricerca, il processo di evoluzione è continuo. La progettazione di un sistema distribuito, come è di fatto l'IoT, è per sua natura complessa. Gli approcci utilizzati finora per lo sviluppo di questi sistemi si sono mostrati frequentemente inadeguati o poco efficaci. È proprio in questo ambito che si inserisce l'Aggregate Programming. Lo studio di questa tesi vuole mostrare infatti come l'Aggregate Programming offra un modo di interpretare e pensare in termini di sistemi distribuiti capace di sfruttare le potenzialità che questi sistemi offrono. Nella presente tesi si pone in particolare attenzione alla Smart Mobility con lo scopo di mostrare possibili soluzioni algoritmiche nell'ambito della gestione del traffico e della viabilità utilizzando l'Aggregate Programming.
APA, Harvard, Vancouver, ISO, and other styles
45

Eriksson, Anton, and Joel Tjernström. "Säkerhet i smarta hem: användares agerande : En fallstudie i användares möjligheter att agera och deras agerande för att hålla smarta hemprodukter säkra." Thesis, Tekniska Högskolan, Jönköping University, JTH, Datateknik och informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50830.

Full text
Abstract:
This study explores how smart home users act to keep their smart products safe. The sample was identified in the literature as early adopters. These were studied through a qualitative case study with semi-structured interviews. Data were then analysed with a thematic analysis, which resulted in four themes: Lack of concern, In the hands of the manufacturer, Safety outside the product and Safety measures. The informants had different reasons and motivations for their common lack of concern, their experience of being able to influence product security the measures they could evoke and the measures they actually took. The informants' lack of concern is linked to the theory of the impact of worryon actionand risk perception. The informants' problems in influencing security are supported by other literature. Their hypothetical measures are mainly outside the product. The actions they actually perform on the product are limited to basic security measures such as passwords, etc. Users find it difficult to influence the security of their products, unsafe products can easily fall victim to malicious individuals and influence others in their environment.<br>Denna studie undersöker hur användare av smarta hem kan agera för att hålla sina smarta produkter säkra.Urvalet identifierades i litteratur som early adopters. Dessa studerades genom en kvalitativ fallstudie med semistrukturerade intervjuer. Data analyserades sedan med en tematisk analys, vilket resulterade i fyra teman: Avsaknad av oro, I händerna på tillverkaren, Säkerhet utanför produkten och Säkerhetsåtgärder. Informanterna hade olika anledningar och motivationer till sin gemensamma avsaknad av oro, deras upplevelse av att kunna påverka produkters säkerhet, de åtgärder som de kunde frammana och de åtgärder som de faktiskt gjorde. Informanternas avsaknad av oro länkas till teori om oros påverkan på agerande och upplevd risk. Informanternas problematik att påverka säkerheten stöds av annan litteratur. Deras hypotetiska åtgärder ligger i huvudsak utanför produkten. Det agerande de faktiskt utför på sina produkter är begränsat till grundläggande säkerhetsåtgärder som lösenord etc. Användarna har svårt att påverka säkerheten hos sina produkter, osäkra produkter kan enkelt falla offer för illvilliga individer och påverka andra i sin omgivning.
APA, Harvard, Vancouver, ISO, and other styles
46

Weston, Leigh, and Reyes Javier Marrero. "Driver Safety Alert System - An Alternative to Vehicle-to-Vehicle Communication-based Systems." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20172.

Full text
Abstract:
Automotive transport unavoidably raises safety concerns for drivers, passengers, and indeed, all road users alike. Advancements in vehicle safety technologies have come a long way, and have had a major impact on the reduction of road-related accidents and fatalities. However, as the push towards autonomous vehicle systems gains momentum, assumptions must be avoided about the global application of such technologies.This paper proposes an idea for a road safety alert system, which is realized in the form of small-scale prototype, subsequently tested and evaluated to study its theoretical application to real world scenarios. The system is geared towards developing regions of the world where a reduction in road-related accidents and death is needed most. Reviews of various existing and proposed safety systems within the realm of Intelligent Transportation Systems (ITS) are conducted, with a focus on Vehicle-to-Vehicle (V2V) and non-V2V applications, which are compared to and contrasted with our proposal.We hope to foster further discussion and research into suitable technologies and their application, in regions of the world that require a different approach when trying to realistically reduce the consistent destructive trend of accidents and fatalities when humans are still behind the wheel.
APA, Harvard, Vancouver, ISO, and other styles
47

Vergara, Rammsy Andrea, Karolina Ekbäck, and Marcus Viksten. "Smart Omedelbart? : En kvalitativ studie om IoT och dess bidrag till smarthet inom offentlig verksamhet." Thesis, Umeå universitet, Institutionen för informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-183641.

Full text
Abstract:
The use of the Internet of Things is increasing in our society and it brings value to the public sector, companies and individuals' personal lives. There is however a strong indication that many Swedish municipalities do not use IoT. The use of IoT can contribute to smartness, efficiency and effectiveness, decreased costs and increased public value. Therefore it is problematic that it is not used to a greater extent. In this study we conduct interviews with IT-staff involved in IoT initiatives within Swedish municipalities to find out how they are working with IoT. Using related research and a theoretical framework called Dimensions of smartness in government we analyze how the municipalities are working with IoT and how it contributes to smartness. The results of the study suggest that working with IoT within the municipalities does contribute to smartness even though a majority of the municipalities state that they are in an early stage. We also conclude that the municipalities work on an operative level rather than a strategic level in implementing IoT-solutions. Organisational integration was identified as a vital part for successful IoT usage. This study will help municipalities with their journey on using IoT and making their municipality smarter by highlighting the important measures to take while working with the Internet of Things.
APA, Harvard, Vancouver, ISO, and other styles
48

Kemas, Muslim Lhaksmana. "Multiagent Systems for Robust IoT Services." 京都大学 (Kyoto University), 2016. http://hdl.handle.net/2433/217203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Igelmo, Victor. "Context-aware augmented reality experiences using cloud-based systems." Thesis, Högskolan i Skövde, Institutionen för ingenjörsvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19172.

Full text
Abstract:
The new reality is about connectivity. From social media to collaborative tools in work environments, people and their devices are highly intercommunicated. This reality also affects the manufacturing industry, which has been developing standards to keep up with technology and take advantage of it. These technologies are encompassed in what has been called Industry 4.0. Out of all the technologies, apart from artificial intelligence, the main drives of Industry 4.0 are considered by many studies augmented reality (AR) and industrial internet of things (IIoT). This thesis suggests that these drivers have been mostly tested either in an isolated fashion or with limited connectivity. The main objective is to explore the advantages of connecting AR, IIoT, and the main source of information in the manufacturing process: product lifecycle management (PLM) systems. Two sub-objectives are extracted from the main one: to study of value created from real-time role-dependent AR information displaying, and to study how the connection AR-IIoT-PLM can affect developing and deploying times of AR experiences. To achieve the mentioned objectives, a case of study is built, and the combined system implemented on it. Following design and creation methodology, an artefact is created, and conclusions are extracted from the design, implementation, and usage stages. Main results are an improvement in developing and deploying time of AR experiences, along with guidelines to extract as much value as possible from the implementation of a combined system of this sort. This thesis includes a discussion section, where the potential of the system is explained and framed within the near future of manufacturing companies.
APA, Harvard, Vancouver, ISO, and other styles
50

Eliasson, Frida, Gabriella Karlsson, and Agnes Svanling. "Smarta enheter i hemmet : nytta eller risk för individen?" Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-12608.

Full text
Abstract:
Teknikutvecklingen och digitaliseringen går fort framåt och har idag sträckt sig till det privatahemmet. Det smarta hemmet är en del av ett större fenomen som kallas Internet of Things(IoT). Enheterna inom IoT består av sensorer och datorer som kan kommunicera medvarandra och skapa ett situationsanpassat beteende. Idén med smarta hem handlar om attanvända sig av olika smarta enheter inom hemmet, som är uppkopplade till ett gemensamtnätverk. Smarta hem bidrar med många bra funktioner där individen kan skapa en bekväm,säker och hållbar vardag. Förutom att underlätta i vardagen för individer kommer dessasmarta enheter med ett antal risker. Ju fler enheter som kopplas upp på ett nätverk destoenklare är det för en obehörig person att komma åt en annan individs privata information. Det samlas in mycket data från de smarta enheterna vilket kan möjliggöra detaljeradkartläggning av användaren. Det är svårt att veta vem som får tillgång till den privatainformationen om användaren vilket bidrar till att det blir svårt för individen att vara anonymoch skydda sig. Syftet med studien är att utveckla kunskap om vilken medvetenhet som finnshos individen kring riskerna vid användning av smarta enheter i hemmet, då det finnsförhållandevis lite forskning inom ämnet. En effekt av att individen blir mer medveten kanleda till att hen tar mer ansvar och därmed skyddar sig mer mot eventuella IT-brott. Utgångspunkten för studien har varit att samla in tidigare forskning och litteratur samt attutföra en kvantitativ enkätundersökning. Litteraturstudien ligger till grund till både tidigareforskning och det teoretiska ramverket. Med hjälp av litteraturstudien har enkätfrågorutformats för att kunna besvara studiens frågeställning. Enkätundersökningen gjordes via eninternetenkät som riktades till användarna av smarta enheter i hemmet. Utifrån insamlatmaterial och empiri kunde ett resultat presenteras och en analys utföras. Med hjälp av fyraolika teman har en slutsats dragits om vilken medvetenhet som finns hos individen kringriskerna vid användningen av smarta enheter i hemmet.<br>The development of technology and digitization are moving fast forward and have nowextended to the private homes. The smart home is part of a larger phenomenon called Internetof Things (IoT). The IoT devices consist of sensors and computers that can communicate witheach other and create a situational behavior. The idea of smart homes is about using differentsmart devices within the home, which are connected to a shared network. Smart homesprovides with many great functions where the individuals can create a comfortable, safe andsustainable everyday life. In addition to facilitating everyday life for individuals, these smartdevices come with a number of risks. The more devices connected to the Internet, the easier itgets for an unauthorized person to access another person's private information. The smartdevices collect a lot of data, which enables for detailed mapping of the user. It's hard to knowwho gets access to the private data about the user, which makes it difficult for the individualto be anonymous and protect himself. The purpose of the study is to develop knowledge aboutthe awareness of the individual about the risks associated with the use of smart devices athome, as there is relatively little research on the subject. An effect of becoming more aware ofthe risks, can lead to more responsibility taken by the individual to protect itself againstpossible IT crimes. The starting point of the study has been to collect prior research and literature and to conducta quantitative survey. The literature study forms the basis for the previous research and thetheoretical framework. With help from the literature, survey questions have been formulatedto answer the research question. The survey was conducted through an internet survey aimedto users of smart devices at home. Based on collected material and empirical data, a resultcould be presented and an analysis performed. With the help of four different themes, aconclusion has been drawn about the awareness of the individual about the risks associatedwith the use of smart devices in the home.Keywords:
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography