To see the other types of publications on this topic, follow the link: Internet of Things technologies.

Dissertations / Theses on the topic 'Internet of Things technologies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Internet of Things technologies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Norburg, David, and David Persson. "Internet of Things - Ett användarperspektiv." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Thomas, Darshana. "Optimal wireless technologies for the Internet of Things (IoT)." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=28633.

Full text
Abstract:
The Internet of Things (IoT) - connection of small smart sensors, actuators and other devices to the Internet - is a key concept within the smart home. To ease deployment, such devices are often wireless and battery powered. An important question is the wireless interface used. As these small sensors are increasing in number, the need to implement these with much more capable and ubiquitous transmission technology is necessary. The ubiquity of Wi-Fi in homes today makes this an attractive option, but the relatively high power requirements of Wi-Fi conflict with the requirement for long battery life and low maintenance. Lower power alternatives, such as Bluetooth and Zigbee, have been proposed, but these have a much smaller installed base. In addition, many Smart Home products are currently available using 433MHz technology. This thesis considers whether it is possible to reduce Wi-Fi power usage to the point where cheap Wi-Fi based products can be used instead of other protocols. A low cost Wi-Fi inbuilt IoT prototype was developed and tested for the purpose of the experiment carried out for this thesis, part of Treegreen project. The work in this thesis undertakes power analysis of a wireless sensor with a System on Chip (SoC) Wi-Fi module, with and without a separate microcontroller, optimized for low power usage which can be used to control the Wi-Fi module. The Wi-Fi chip used within the prototype is the ESP8266- ESP03. Based on the results, in order to optimize the power consumption of the Wi-Fi chip, an MSP430 microcontroller was added onto the existing device. Finally, the IoT data in LTE network is investigated and compared with the real world IoT data.
APA, Harvard, Vancouver, ISO, and other styles
3

Pereira, Vasco da Costa. "Perspectives and approaches for the internet of things." Master's thesis, Faculdade de Ciências e Tecnologia, 2014. http://hdl.handle.net/10362/12187.

Full text
Abstract:
Dissertação para obtenção do Grau de Mestre em Engenharia Electrotécnica e de Computadores<br>This thesis was developed based on a scenario in which a CEO of a certain company asked the author to conduct an exploratory work evaluating the potential opportunities and limitations of this emerging area described as the future of the Internet, the Internet of Things (IoT). The objective is thus to provide the reader with a wide view of the vital points for the implementation and exploitation of the IoT, a technology that promises to deliver a new and wider range of applications to the society. In this subject there is a need to gather and organize information produced by several researchers and contributors. Due to the fact of being a new area and researchers work independently of each other, the work is scattered and inconsistencies can be found among different projects and publications. As such, in a first stage some definitions are provided and an attempt to clarify concepts is made. To support and emphasize the exponential growth of IoT, a brief historical overview is provided to the reader. This overview is based on the new trends and expectations that arise every day through news, potential businesses and also in important tools such as Google Trends. Several examples of applications in the context of the IoT, illustrate the benefits, not only in terms of society, but also for business opportunities, safety, and well-being. The main areas of interest to achieve the IoT such as: hardware, software, modeling, methods of connection, security and integration are studied in this work, in order to provide some insight into current strong and weak points. As the Internet of Things become a matter of large interest, various research groups are active in exploring and organizing projects in this area. Some of these projects, namely the ones considered the most important, are also presented in this thesis. Taking into account the facts surrounding this new technology, it becomes quite important to bring them together, clarifying them and trying to open new perspectives for further studies and improvements. Finally, in order to allow a practical evaluation of the technology, a prototype is developed around the connection of an intelligent object – a small mobile robot – to the Internet. A set of conclusions and future work directions are then presented which take into account the findings of the bibliographic analysis as well as the acquired experience with the implementation of the prototype.
APA, Harvard, Vancouver, ISO, and other styles
4

Contu, Michele. "An Evaluation of Distributed Ledger Technologies for the Internet of Things." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.

Find full text
Abstract:
The aim of this work will be the study of different distributed ledger technologies in IoT context. The main objective will be to identify the limits that intrinsically render unsuitable the distributed ledgers in real time scenarios, possible solutions or new technologies that enable this union. In order to succeed, technologies already known, such as Ethereum, or new technologies that are more suited to the IoT context, such as IOTA or Radix, will be analyzed. The behaviors of the just mentioned distributed ledgers will be analyzed in particular through tests that measure their degree of scalability, availability and in general their performance in real-time scenarios, specific of the IoT, where the transactions load they have to register is able to stress their architecture. Thanks to the tests it will be possible to notice not only the reactivity of mechanisms that govern these networks (transaction validation, consensus), but also the hardware limits of the nodes that constitute networks themselves. The test results will be analyzed to obtain certain answers, thanks to descriptive statistics, but above all to have a final comparison between the different technologies treated. It will possible to notice how some of the technologies discussed have different limits, while others succeed almost in the intent of a harmonious union. This is to say that we are still far from a perfect integration between distributed ledgers and IoT devices, but progress is rapid and new technologies are very promising. Thanks to the data collected and to what has been learned, it will also be possible to identify possible future scenarios, in which an integration of the technologies studied in this thesis will not be unusual
APA, Harvard, Vancouver, ISO, and other styles
5

Pochangou, Paule Myriame. "Internet of Things : technologies and applications in healthcare management and manufacturing." Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/40146.

Full text
Abstract:
L'Internet des Objets (ou IoT) s'appuie sur des objets connectés dotés de capteurs et technologies capables d'échanger des données entre eux de manière indépendante. Ces nouvelles technologies offrent aux entreprises et à toutes les organisations des moyens pour l’acquisition et le traitement intelligent de l’information (Industrie 4.0) pour demeurer compétitives. Ce mémoire vise à analyser la contribution de l'IoT dans les soins de santé et production, mettant l'accent sur l'Industrie 4.0 et la maintenance prédictive, particulièrement en maintenance, sur la base d’oeuvres littéraires récentes publiées au cours de la dernière décennie. L’objectif principal de ce mémoire est de comprendre l'IoT, d’exposer ses potentiels et sa stratégie de déploiement dans différents domaines d’applications. Même, le but est de comprendre que l'IoT ne se limite pas à l'application de la maintenance des systèmes de production mais aussi du bien-être des patients, c'est pourquoi j'ai choisi ces deux domaines importants où l'IoT peut être appliqué (santé et production) pour ce travail de recherche. Cette thèse aidera à explorer comment l'IoT transforme le système de santé. J'explique comment l'IoT offre de grandes avancées dans ce système. Je donne quelques exemples où ses concepts souhaiteraient être implémentés pour améliorer la qualité des soins des patients et quelques études récentes. Outre, je clarifie l'impact de l’Industrie 4.0 sur la production, notamment en maintenance, en lien avec la maintenance prédictive rendue possible par l’IoT. Je fournis une vue d'ensemble de l'Industrie 4.0 et de la maintenance prédictive. J’aborde les fonctionnalités de l'Industrie 4.0 et présente ses technologies de pilotage susceptibles d'améliorer les domaines de processus de production, tels que la réduction des temps d'immobilisation, les coûts de service, etc. J'attire l'attention sur les implications de la maintenance prédictive dans l’Industrie 4.0 en décrivant son fonctionnement et comment les fabricants peuvent l'exécuter efficacement, avec des exemples à l'appui.<br>The Internet of Things (or IoT) relies on connected objects embedded with sensors and other technologies capable of exchanging data with each other independently. These new technologies provide businesses and all organizations with the means to acquire and intelligently process information (Industry 4.0) to remain competitive. This thesis aims to analyze the contribution of IoT in healthcare and manufacturing, with a focus on Industry 4.0 and Predictive Maintenance, specifically in maintenance, based on recent literary works published over the last decade. The main purpose of this thesis is to understand what IoT is, to highlight its potentials and its deployment strategy in various areas of application. Similarly, the goal is to understand that IoT is not limited to the application of the maintenance of production systems but also of patients’ wellbeing which is the reason why I selected these two important areas where IoT can be applied (healthcare and manufacturing) for this research work. This thesis will help explore how IoT is transforming the healthcare system. I explain how IoT offers great advances in the healthcare system. I give some examples of where its concepts would like to be implemented to improve the quality of care of patients and some recent studies. In addition, I clarify the impact of Industry 4.0 in manufacturing especially in maintenance, in connection with predictive maintenance made possible by IoT. I provide an overview of Industry 4.0 and predictive maintenance. I discuss the capabilities of Industry 4.0 and present its driving technologies that can improve all areas of production processes such as reducing downtime, service costs , etc. Moreover, I draw attention to the implications of predictive maintenance in Industry 4.0 by describing how it works and how manufacturers can run it effectively, with supporting examples.
APA, Harvard, Vancouver, ISO, and other styles
6

Bieringer, Alexandra, and Linda Müller. "Integration of Internet of Things technologies in warehouses : A multiple case study on how the Internet of Things technologies can efficiently be used in the warehousing processes." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Centre of Logistics and Supply Chain Management (CeLS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hansson, Niclas, Alexander Lantz, and Ludvig Fischerström. "A Security Analysis of Wireless Smart Home Technologies." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-113256.

Full text
Abstract:
The use of electronics connected to local networks and the Internet is growingall the time. Nowadays you can control your electronics in your house even when away from home, which opens up for potential security threats. The purpose of this report is to point out the potential risks with connecting home electronics to the Internet and to shed light on what security mechanisms that are needed in these kinds of systems. This report contains a theoretical part in which relevant material has been summarized. This material includes the smart home solution Tellstick Net and the wireless technologies ZigBee and Z-Wave, which are commonly used in home automation. The Tellstick Net system was mapped out and a risk analysis with attack trees was performed. After the analysis of the system, the implementation of two potential security threats were attempted. The two attempted attacks were replay attack and cross-site request forgery. The replay attack was unsuccessful due to the way the system communicates and keeps connections alive. However, the cross-site request forgery was discovered to be successful in some cases. It depended on if the browser of the target supported cross-origin resource sharing, as that property protects against cross-site request forgery. Finally, the report discusses what impact the found security deficiencies have, what they entail and how they reflect on the need for security in smart technologies for the home.
APA, Harvard, Vancouver, ISO, and other styles
8

Anton, Andersson, and Johan Runbert. "Cross-platform Mobile Development and Internet of Things : Developing a cross-platform mobile application using web technologies to interact with smart things." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-48517.

Full text
Abstract:
Today more and more objects in our daily lives are getting connected to the Internet. This phenomenon is called the Internet of Things and is a way for physical things such as cars, buildings or even bus stations to get access and communicate with other objects using the Internet. The problem is that for every Internet of Things device, an application is often needed in order to communicate with these devices. Developing mobile applications in a separate programming language for each operating system can be an expensive and time consuming task. In this thesis, we implement and evaluate a cross-platform mobile solution for users to interact with smart things using the advantages of web technologies. To compare previous findings in this area, two literature reviews has been performed to find out which is the state of the art on cross-platform mobile development frameworks and smart-things technologies used for interacting with physical objects. The result is a mobile application developed using PhoneGap and jQuery Mobile that interacts with iBeacons, where students inside a university building can get directions and schedules for different rooms. The application received good results from a couple of usability studies, and performed well when measuring its performance. The outcome shows that web technologies that exist today are a viable solution to native mobile applications in terms of interacting with smart things such as tagging technologies.
APA, Harvard, Vancouver, ISO, and other styles
9

Ghiro, Lorenzo. "Centrality Routing and Blockchain Technologies in Distributed Networks." Doctoral thesis, Università degli studi di Trento, 2021. http://hdl.handle.net/11572/305233.

Full text
Abstract:
This thesis contributes to the development of distributed networks proposing: • a technique to enhance the reliability of DV routing protocols; • a critical analysis of the integration of blockchains in distributed networks. First, a novel algorithm for the distributed computation of the Load Centrality (LC), a graph centrality metric, is proposed and then applied for steering the optimization of the route recovery process of Distance-Vector (DV) routing protocols: this way the algorithm contributes to the enhancement of the network reliability. The algorithm convergence is proved also identifying time complexity bounds that are later confirmed by computer simulations. The proposed algorithm is designed as an extension to the Bellman-Ford one and can thus be integrated with any DV routing protocol. An implementation of the algorithm in Babel, a real world DV protocol, is provided in support of this claim. Then an application of the algorithm is presented: the LC is used to find an optimal tuning for the generation frequency of the Babel control messages. This tuning technique effectively reduces the impact of losses consequent to random node failures in the emulations of several real world wireless mesh networks, without increasing the control overhead. A second version of the algorithm is designed to be incrementally deployable. This version can be deployed gradually in production networks also by uncoordinated administrators. When only a fraction of nodes is upgraded so to participate in the protocol, these upgraded nodes estimate their LC indexes approximating the theoretical ones. The approximation error is studied analytically and it is also shown that, even for low penetration ratios of upgraded nodes in the network, the algorithm accurately ranks nodes according to their theoretical centrality. The second contribution of the thesis is the critical discussion of the integration of blockchain technologies in distributed networks. An initial analysis of the literature concerning blockchain based applications reveals an ambiguity around the term "blockchain" itself. The term is used, apparently, to identify a number of similar but different technologies proposed to empower a surprisingly broad range of applications. This thesis prompts therefore the need of formulating a restrictive definition for the term blockchain, necessary for clarifying the role of the same blockchain in distributed networks. The proposed definition is grounded in the critical analysis of the blockchain from a distributed systems perspective: Blockchains are only those platforms that implement an open, verifiable and immutable Shared Ledger, independent of any trusted authority. Observing that the blockchain security grows with the amount of resources consumed to generate blocks, this thesis concludes that a secure blockchain is necessarily resource hungry, therefore, its integration in the constrained domain of distributed networks is not advised. The thesis draws recommendations for a use of the blockchain not in contrast with the definition. For example, it warns about applications that require data to be kept confidential or users to be registered, because the blockchain naturally supports the openness and transparency of data together with the anonymity of users. Finally a feasible role for the blockchain in the Internet of Things (IoT) is outlined: while most of the IoT transactions will be local and Off-Chain, a blockchain can still act as an external and decentralized platform supporting global transactions, offering an alternative to traditional banking services. The enhanced reliability of DV routing protocols encourages a wider adoption of distributed networks, moreover, the distributed algorithm for the computation of centrality enables applications previously restricted to centralized networks also in distributed ones. The discussion about the blockchain increases instead the awareness about the limits and the scope of this technology, inspiring engineers and practitioners in the development of more secure applications for distributed networks. This discussion highlights, for instance, the important role of the networking protocols and communication infrastructure on the blockchain security, pointing out that large delays in the dissemination of blocks of transactions make the blockchain more vulnerable to attacks. Furthermore, it is observed that a high ability to take control over the communications in the network favors eclipse attacks and makes more profitable the so called selfish mining strategy, which is detrimental to the decentralization and the security of blockchains. The two main contributions of this thesis blended together inspire the exploitation of centrality to optimize gossip protocols, minimizing block propagation delays and thus the exposure of the blockchain to attacks. Furthermore, the notion of centrality may be used by the community of miners to measure the nodes influence over the communication of blocks, so it might be used as a security index to warn against selfish mining and eclipse attack.
APA, Harvard, Vancouver, ISO, and other styles
10

Tiruchirappalli, Narayana Kumar Venkataramani. "A Game Theoretical Approach to Green Communications in Seamless Internet of Things." University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1576032496171712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Brych, Patrik. "Analýza rizik technologií chytrých domácností v rámci konceptu Internet of Things." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2021. http://www.nusl.cz/ntk/nusl-446769.

Full text
Abstract:
This diploma thesis deals with modern technologies that are used as smart home equipment. The analysis of the current state is devoted to the concept of the Internet of Things, into which smart home technologies can be included. The research part is focused on the analysis of risks that are associated with the implementation and use of smart technologies. Financial, technical and security risks are analyzed using adequate research methods. Financial risks were analyzed using the financial plan of the model house. Technical, which also included process risks, and security risks were analyzed using network analysis methods and risk analysis methods. The network graph method and the project evaluation and control method (PERT) were used for the analysis of process risks. The analysis of technical and safety risks was performed using the Failure Mode and Effect Analysis (FMEA) and Fault Tree Analysis (FTA) methods.
APA, Harvard, Vancouver, ISO, and other styles
12

Schill, Philip. "Svensk Internet of Things-utveckling : En intervjustudie som undersöker det svenska IoT-klimatet." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210025.

Full text
Abstract:
Den här rapporten diskuterar svårigheter med "Internet of Things"-utveckling. Artiklar och rapporter inom området har sammanställts för att ta reda på hur IoT-utveckling skiljer sig från annan typ av utveckling. Dessutom utförs en intervjustudie där svenska IoT-utvecklare beskriver hur de löser de listade programmeringsutmaningarna. Enligt den här undersökningen har utvecklarna i olika företag ofta samma problematik och deras lösningar är snarlika.<br>This report discusses the difficulties with "Internet of Things"-development. Various articles and reports in the same area have been compiled in order to find out where IoT-development differs from other types of development. In addition, an interview study was conducted in which Swedish IoT developers answer how they solve the challenges listed from this report. According to this survey, developers in different companies often have the same problems and their solutions are often similar.
APA, Harvard, Vancouver, ISO, and other styles
13

Cobârzan, Cosmin. "Internet of highly mobile things." Thesis, Strasbourg, 2015. http://www.theses.fr/2015STRAD037/document.

Full text
Abstract:
La mobilité devienne un partie intégrante de l’Internet des Object d’aujourd’hui, comme beaucoup d’applications (monitorage des animaux sauvage, suivi des cible dans le champs de bataille) sont impossible de mettre en œuvre juste avec des nœuds statiques. L’objective de cette thèse est de définir une nouvelle architecture de communication articule autour de la mobilité dans les réseaux avec pertes et à bas puissance (Low Power and Lossy Networks - LLNs) (réseaux des capteurs sans fils). Tout d’abord, nous avons analysé théoriquement l’auto configuration des adresses IPv6, fait avec toutes les optimisations disponibles dans Neighbor Discovery Optimization for IPv6 over 6LoWPAN. Cette étape est cruciale pour des protocoles qui donnent de support pour la mobilité dans des réseaux IP, comme MIPv6. Les résultats obtenues – taille des paquets trop grande et consumations énergétique importante pour les routeurs qui tournent Neighbor Discovery – n’ont amener a utiliser le IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). RPL est développe d’el debout pour les LLN. Notre deuxième contribution sont améliorer les opérations du RPL pour mieux supporter les nœuds mobiles. Enfin, nous avons développe une mécanisme inter-couche – Mobility Triggered-RPL – qui profite des actions dans le protocole avec préambule X-Machiavel à la couche accès au medium dans le protocole RPL à la couche routage<br>Mobility is becoming an integrating part of todays Internet of Things, as many applications such as wildlife monitoring or target tracking in the battlefield cannot be done only with the help of static nodes. The goal of this thesis is to provide new communication architecture articulated around providing mobility support in Low Power and Lossy Networks (LLNs). First we analyzed from a theoretical point of view the IPv6 address auto-configuration with all optimizations made in Neighbor Discovery Optimization for IPv6 over 6LoWPAN. This step is of crucial importance for protocols that offer mobility support in IP networks, such as MIPv6. Our findings, increased message size that leads to fragmentation and high energy consumption for routers that are involved in Neighbor Discovery message exchange, have lead us to use the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) in order to provide mobility support. RPL is build from ground up with respect to LLN requirements. Our second contribution enhanced RPL operations to support mobility management. Finally, we proposed a cross-layer protocol – Mobility Triggered-RPL – that leverages actions from the X-Machiavel preamble sampling MAC protocol into RPL
APA, Harvard, Vancouver, ISO, and other styles
14

Älvebrink, Johan, and Maria Jansson. "Investigation of blockchain applicability to Internet of Things within supply chains." Thesis, Uppsala universitet, Industriell teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-357258.

Full text
Abstract:
Internet of Things (IoT) means that physical objects will be able to interact and communicate via embedded systems. This will lead to a distributed network of devices that can communicate with both humans and each other. One application area is in improving supply chain management. The goal in supply chains is to move a product or a service from the producer to the customer as efficient as possible. Implementation of IoT will have many benefits but it also raises security issues that can affect integrity, security and privacy for both individuals and companies. In 2009, Satoshi Nakamoto created bitcoin and more importantly, blockchain. Blockchain is a ledger of facts, data is not stored in only one network with a common processor, but it is distributed among all the clients on the network. This technology may be a solution to some problems that IoT are facing. This paper looks into up to date research of blockchain and IoT with the purpose to study blockchain as a potential solution to secure IoT data management within supply chains. Both blockchain and IoT are relatively new research areas with little existing research, which support our use of a qualitative inductive method. Semi-structured interviews, which will be further explained in the methodology section, have been conducted with people working within the fields of blockchain, IoT and supply chain. The result indicates that blockchain can be used to secure data management within any given supply chain that uses IoT technology, but blockchain should be seen as a tool, and not as a complete solution. Many of the security issues within IoT are related to the devices and blockchain will not be able to provide a solution to these problems. Blockchain can however be used for handling information, securing identities, traceability of goods, transactions being made without human interaction, automated storage management and time stamped actions to name some examples. There are still barriers to make these benefits work in reality but there is a lot of research currently on-going, trying to make it happen.
APA, Harvard, Vancouver, ISO, and other styles
15

Ghiro, Lorenzo. "Centrality Routing and Blockchain Technologies in Distributed Networks." Doctoral thesis, Università degli studi di Trento, 2021. http://hdl.handle.net/11572/305233.

Full text
Abstract:
This thesis contributes to the development of distributed networks proposing: • a technique to enhance the reliability of DV routing protocols; • a critical analysis of the integration of blockchains in distributed networks. First, a novel algorithm for the distributed computation of the Load Centrality (LC), a graph centrality metric, is proposed and then applied for steering the optimization of the route recovery process of Distance-Vector (DV) routing protocols: this way the algorithm contributes to the enhancement of the network reliability. The algorithm convergence is proved also identifying time complexity bounds that are later confirmed by computer simulations. The proposed algorithm is designed as an extension to the Bellman-Ford one and can thus be integrated with any DV routing protocol. An implementation of the algorithm in Babel, a real world DV protocol, is provided in support of this claim. Then an application of the algorithm is presented: the LC is used to find an optimal tuning for the generation frequency of the Babel control messages. This tuning technique effectively reduces the impact of losses consequent to random node failures in the emulations of several real world wireless mesh networks, without increasing the control overhead. A second version of the algorithm is designed to be incrementally deployable. This version can be deployed gradually in production networks also by uncoordinated administrators. When only a fraction of nodes is upgraded so to participate in the protocol, these upgraded nodes estimate their LC indexes approximating the theoretical ones. The approximation error is studied analytically and it is also shown that, even for low penetration ratios of upgraded nodes in the network, the algorithm accurately ranks nodes according to their theoretical centrality. The second contribution of the thesis is the critical discussion of the integration of blockchain technologies in distributed networks. An initial analysis of the literature concerning blockchain based applications reveals an ambiguity around the term "blockchain" itself. The term is used, apparently, to identify a number of similar but different technologies proposed to empower a surprisingly broad range of applications. This thesis prompts therefore the need of formulating a restrictive definition for the term blockchain, necessary for clarifying the role of the same blockchain in distributed networks. The proposed definition is grounded in the critical analysis of the blockchain from a distributed systems perspective: Blockchains are only those platforms that implement an open, verifiable and immutable Shared Ledger, independent of any trusted authority. Observing that the blockchain security grows with the amount of resources consumed to generate blocks, this thesis concludes that a secure blockchain is necessarily resource hungry, therefore, its integration in the constrained domain of distributed networks is not advised. The thesis draws recommendations for a use of the blockchain not in contrast with the definition. For example, it warns about applications that require data to be kept confidential or users to be registered, because the blockchain naturally supports the openness and transparency of data together with the anonymity of users. Finally a feasible role for the blockchain in the Internet of Things (IoT) is outlined: while most of the IoT transactions will be local and Off-Chain, a blockchain can still act as an external and decentralized platform supporting global transactions, offering an alternative to traditional banking services. The enhanced reliability of DV routing protocols encourages a wider adoption of distributed networks, moreover, the distributed algorithm for the computation of centrality enables applications previously restricted to centralized networks also in distributed ones. The discussion about the blockchain increases instead the awareness about the limits and the scope of this technology, inspiring engineers and practitioners in the development of more secure applications for distributed networks. This discussion highlights, for instance, the important role of the networking protocols and communication infrastructure on the blockchain security, pointing out that large delays in the dissemination of blocks of transactions make the blockchain more vulnerable to attacks. Furthermore, it is observed that a high ability to take control over the communications in the network favors eclipse attacks and makes more profitable the so called selfish mining strategy, which is detrimental to the decentralization and the security of blockchains. The two main contributions of this thesis blended together inspire the exploitation of centrality to optimize gossip protocols, minimizing block propagation delays and thus the exposure of the blockchain to attacks. Furthermore, the notion of centrality may be used by the community of miners to measure the nodes influence over the communication of blocks, so it might be used as a security index to warn against selfish mining and eclipse attack.
APA, Harvard, Vancouver, ISO, and other styles
16

Ospina, Eslava David Mauricio, and Avendaño Flores Santiago. "Virtual Commissioning of Robotic Cell Using Cloud-based Technologies and Advanced Visualization System." Thesis, Högskolan i Skövde, Institutionen för ingenjörsvetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19793.

Full text
Abstract:
The manufacturing industry is quickly adapting to new technologies. Some of these trending technologies are virtual commissioning, virtual reality, and cloud-based technologies. This project summarizes these three technologies and aims to create a commissioning tool adapted to the 4.0 Industry. The project’s methodology was to analyse a problem and consequently create a solution that solves it. The process of designing and developing was repeated iteratively, each time an evaluation was made. The final product developed has shown that it is worth spending time introducing the cloudbased technologies inside many applications since it saves time and allows to work remotely. Applying virtual reality to virtual commissioning has proven to add efficiency. At the same time, it gives an immersive experience with a real-time display of quantitative data and the process itself in a visual mode without interfering with the actual production. With these two technologies, virtual commissioning evolves and goes a step further. This project also proved that the user experience and interface in this type of immersive applications need much attention on creating a comfortableinterface that does not fatigue or cause rejection in the user.
APA, Harvard, Vancouver, ISO, and other styles
17

Ruiz, Gerard. "Distributed Data Management in Internet of Things Networking Environments : IOTA Tangle and Bitcoin Blockchain Distributed Ledger Technologies." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-77359.

Full text
Abstract:
Distributed ledger technology (DLT) is one of the latest in a long list of digital technologies, which appear to be heading towards a new industrial revolution. DLT has become very popular with the publication of the Bitcoin Blockchain in 2008. However, when we consider its suitability for dynamic networking environments, such as the Internet of Things, issues like transaction fees, scalability, and offline accessibility have not been resolved. The IOTA Foundation has designed the IOTA protocol, which is the data and value transfer layer for the Machine Economy. IOTA protocol uses an alternative blockless Blockchain which claims to solve the previous problems: the Tangle. This thesis first inquires into the theoretical concepts of both technologies Tangleand Blockchain, to understand them and identify the reasons to be compatible or not with the Internet of Things networking environments. After the analysis, the thesis focuses on the proposed implementation as a solution to address the connectivity issue suffered by the IOTA network. The answer to the problem is the development of a Neighbor Discovery algorithm, which has been designed to fulfill the requirements demanded by the IOTA application. Dealing with IOTA network setup can be very interesting for the community that is looking for new improvements at each release. Testing the solution in a peer-to-peer specific protocol (PeerSim), with different networking scenarios, allowed us to get valuable and more realistic information. Thus, after analyzing the results, we were able to determine the appropriate IOTA network configuration to build a more reliable and long-lasting network.
APA, Harvard, Vancouver, ISO, and other styles
18

Asadi, Yasamin. "Connections through internet of things: Rethinking slow technologies through older adult experiences of the COVID-19 pandemic." Thesis, Queensland University of Technology, 2022. https://eprints.qut.edu.au/232434/1/Yasamin_Asadi_Thesis.pdf.

Full text
Abstract:
This study aims to understand how older adults responded to the COVID-19 pandemic by adjusting their activities, use of technology and social relations. An open-ended interview study with Australian older adults with access to telecommunication technologies was undertaken. Findings indicate some participants missed social interaction but found ways to decelerate their life and have greater agency to curate their own activities. Based on these findings, we reconsidered the design space of temporal design and slow technology from the point of view of people seeking to adapt to an ongoing impact of slowness in their lives.
APA, Harvard, Vancouver, ISO, and other styles
19

Gu, Wei. "Robustness against interference in Internet of Things." Thesis, Lille 1, 2012. http://www.theses.fr/2012LIL10195/document.

Full text
Abstract:
L'Internet des objets, plus particulièrement les réseaux de capteurs, a attiré beaucoup d'attention ces dernières années. Sa mise en œuvre soulève de nombreuses difficultés, comme la génération d'interférences d'accès multiple (MAI) à caractère impulsif et la consommation d'énergie relativement forte. Les MAI et le bruit thermique doivent être considérés simultanément car ils perturbent fortement les communications. Nous modélisons les MAI et le bruit thermique respectivement par la distribution stable et gaussienne. Nous étudions tout d’abord l’effet des turbo-codes sur le lien direct en utilisant la norme-p comme métrique de décodage. Cette métrique permet une performance de correction d’erreur proche du décodeur optimal. Ensuite nous nous penchons sur les communications coopératives. A l’aide de l’échantillonnage préférentiel, nous estimons les densités de probabilité de la décision statistique du récepteur optimal en présence des bruits stable et gaussien. Cette approche est coûteuse en calcul. Nous proposons donc d’approximer ces densités de probabilité par la distribution gaussienne inverse normale (NIG). Cette solution de calcul est efficace pour approcher le récepteur optimal. Nous montrons également que le récepteur utilisant la norme-p a des performances robustes, quel que soit le type de bruit dominant. A la fin nous combinons les travaux du codage canal et des communications coopératives pour établir une stratégie de codage canal distribué. Basé sur la qualité du lien direct et le niveau de taux d’erreur binaire envisagé, la stratégie d’économie d’énergie peut être mise en place via le choix d’un schéma de codage canal distribué<br>Internet of Things brought great interests in recent years for its attractive applications and intelligent structure. However, the implementation of sensor networks still presents important challenges such as the generation of Multiple-Access-Interference (MAI) with impulsive nature and the relatively high energy consumption. Both the MAI and the thermal noise should be considered due to their strong impairments each may cause on the communication quality. We employ the stable and Gaussian distributions to model the MAI and the thermal noise respectively. Firstly we study the performance of turbo codes in the direct link and we propose the p-norm as a decoding metric. This metric allows a considerable error correction performance improvement which is close to the optimal decoder. Then we investigate cooperative communications. The probability densities in the decision statistic of the optimal receiver are estimated using importance sampling approach when both the stable and Gaussian noises are present. Such a method is computationally expensive. Hence we develop an approximation approach based on the Normal Inverse Gaussian (NIG) distribution. This solution is efficient for calculation and is proximate to the optimal receiver. In addition we show that the p-norm receiver has robust performance no matter what kind of noise is dominant. At last we combine the channel coding and cooperative communication works to establish a distributed channel coding strategy. Through some simulation assessments, the energy saving strategy can be realized by choosing an appropriate distributed channel coding scheme based on the direct link quality and target bit error rate
APA, Harvard, Vancouver, ISO, and other styles
20

Мельник, Леонід Григорович, Леонид Григорьевич Мельник, Leonid Hryhorovych Melnyk, et al. "The Internet of things as the basic disruptive technology in Industry 4.0: the EU experience." Thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/87602.

Full text
Abstract:
Основними критеріями підривних технологій є висока потенційна потреба людства або багатьох користувачів, підвищена доступність для кожного та відносно низька вартість. ЄС запускає суперкомп’ютерну мережу для підтримки європейських програм досліджень і розробок, а також розробки та впровадження інноваційних технологій у критичних промислових областях. Європейські компанії досліджують взаємодію блокчейну з Інтернетом речей, а потім обговорюють, як технологія блокчейн може сприяти концепції IoT, надаючи децентралізовану платформу для централізованого підходу до Інтернету речей.<br>The main criteria of disruptive technologies are high potential need of humanity or many users, increased accessibility to everyone, and relatively low cost. The EU launches a supercomputer network to support European R&D programs and develop and implement innovative technologies in critical industrial areas. European companies investigate the interaction of the blockchain with the IoT and then discuss how blockchain technology can contribute to the IoT concept by providing a decentralized platform for a centralized IoT approach.
APA, Harvard, Vancouver, ISO, and other styles
21

Ben, Saied Yosra. "Collaborative security for the internet of things." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0013.

Full text
Abstract:
Cette thèse aborde des nouveaux défis de sécurité dans l'Internet des Objets (IdO). La transition actuelle de l'Internet classique vers l'Internet des Objets conduit à de nombreux changements dans les modèles de communications sous-jacents. La nature hétérogène des communications de l’IdO et le déséquilibre entre les capacités des entités communicantes qui le constituent rendent difficile l'établissement de connexions sécurisées de bout en bout. Contrairement aux nœuds de l’Internet traditionnel, la plupart des composants de l'Internet des Objets sont en effet caractérisés par de faibles capacités en termes d'énergie et de puissance calcul. Par conséquent, ils ne sont pas en mesure de supporter des systèmes de sécurité complexes. En particulier, la mise en place d'un canal de communication sécurisé de bout en bout nécessite l’établissement d'une clé secrète commune entre les deux nœuds souhaitant communiquer, qui sera négociée en s'appuyant sur un protocole d'échange de clés tels que le Transport Layer Security (TLS) Handshake ou l’Internet Key Exchange (IKE). Or, une utilisation directe de ces protocoles pour établir des connexions sécurisées entre deux entités de l’IdO peut être difficile en raison de l'écart technologique entre celles-ci et des incohérences qui en résultent sur le plan des primitives cryptographiques supportées. Le sujet de l'adaptation des protocoles de sécurité existants pour répondre à ces nouveaux défis a récemment été soulevé dans la communauté scientifique. Cependant, les premières solutions proposées n'ont pas réussi à répondre aux besoins des nœuds à ressources limitées. Dans cette thèse, nous proposons de nouvelles approches collaboratives pour l'établissement de clés, dans le but de réduire les exigences des protocoles de sécurité existants, afin que ceux-ci puissent être mis en œuvre par des nœuds à ressources limitées. Nous avons particulièrement retenu les protocoles TLS Handshake, IKE et HIP BEX comme les meilleurs candidats correspondant aux exigences de sécurité de bout en bout pour l'IdO. Puis nous les avons modifiés de sorte que le nœud contraint en énergie puisse déléguer les opérations cryptographiques couteuses à un ensemble de nœuds au voisinage, tirant ainsi avantage de l'hétérogénéité spatiale qui caractérise l’IdO. Nous avons entrepris des vérifications formelles de sécurité et des analyses de performance qui prouvent la sureté et l'efficacité énergétique des protocoles collaboratifs proposés. Dans une deuxième partie, nous avons porté notre attention sur une classe d’attaques internes que la collaboration entre les nœuds peut induire et que les mécanismes cryptographiques classiques, tels que la signature et le chiffrement, s'avèrent impuissants à contrer. Cela nous a amené à introduire la notion de confiance au sein d'un groupe collaboratif. Le niveau de fiabilité d'un nœud est évalué par un mécanisme de sécurité dédié, connu sous le nom de système de gestion de confiance. Ce système est lui aussi instancié sur une base collaborative, dans laquelle plusieurs nœuds partagent leurs témoignages respectifs au sujet de la fiabilité des autres nœuds. En nous appuyant sur une analyse approfondie des systèmes de gestion de confiance existants et des contraintes de l’IoD, nous avons conçu un système de gestion de confiance efficace pour nos protocoles collaboratifs. Cette efficacité a été évaluée en tenant compte de la façon dont le système de gestion de la confiance répond aux exigences spécifiques à nos approches proposées pour l'établissement de clés dans le contexte de l'IdO. Les résultats des analyses de performance que nous avons menées démontrent le bon fonctionnement du système proposé et une efficacité accrue par rapport à la littérature<br>This thesis addresses new security challenges in the Internet of Things (IoT). The current transition from legacy Internet to Internet of Things leads to multiple changes in its communication paradigms. Wireless sensor networks (WSNs) initiated this transition by introducing unattended wireless topologies, mostly made of resource constrained nodes, in which radio spectrum therefore ceased to be the only resource worthy of optimization. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy and autonomy to once uniform and deterministic systems. The heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT entities make it challenging to provide the required end-to-end secured connections. Unlike Internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources, and thus, are unable to support complex security schemes. The setup of a secure end-to-end communication channel requires the establishment of a common secret key between both peers, which would be negotiated relying on standard security key exchange protocols such as Transport Layer Security (TLS) Handshake or Internet Key Exchange (IKE). Nevertheless, a direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. The issue of adapting existing security protocols to fulfil these new challenges has recently been raised in the international research community but the first proposed solutions failed to satisfy the needs of resource-constrained nodes. In this thesis, we propose novel collaborative approaches for key establishment designed to reduce the requirements of existing security protocols, in order to be supported by resource-constrained devices. We particularly retained TLS handshake, Internet key Exchange and HIP BEX protocols as the best keying candidates fitting the end-to-end security requirements of the IoT. Then we redesigned them so that the constrained peer may delegate its heavy cryptographic load to less constrained nodes in neighbourhood exploiting the spatial heterogeneity of IoT nodes. Formal security verifications and performance analyses were also conducted to ensure the security effectiveness and energy efficiency of our collaborative protocols. However, allowing collaboration between nodes may open the way to a new class of threats, known as internal attacks that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a collaborative group. The trustworthiness level of a node has to be assessed by a dedicated security mechanism known as a trust management system. This system aims to track nodes behaviours to detect untrustworthy elements and select reliable ones for collaborative services assistance. In turn, a trust management system is instantiated on a collaborative basis, wherein multiple nodes share their evidences about one another's trustworthiness. Based on an extensive analysis of prior trust management systems, we have identified a set of best practices that provided us guidance to design an effective trust management system for our collaborative keying protocols. This effectiveness was assessed by considering how the trust management system could fulfil specific requirements of our proposed approaches for key establishment in the context of the IoT. Performance analysis results show the proper functioning and effectiveness of the proposed system as compared with its counterparts that exist in the literature
APA, Harvard, Vancouver, ISO, and other styles
22

Daniels, Anton. "Information Security in an Internet of Things Network Based on Blockchains and User Participation." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74757.

Full text
Abstract:
The amount of connected Internet of Things devices has seen a large growth during the last couple of years and shows no signs of slowing down. Considering the momentum of the technological advancement in our society with new technologies such as blockchains, AI and machine learning, a large amount of issues could occur if not prevented beforehand, especially within security. Therefore this thesis will examine how to maintain the information security in an Internet of Things network based on blockchains and user participation, by taking an exploratory approach to create an understanding of the issues and possible solutions when implementing a network of this type. By using a case developed together with Luleå Kommun this thesis takes a qualitative approach to the research. This is done by using solutions to issues which appeared during the development of this implementation to draw a conclusion on how to maintain the information security in an Internet of Things network based on blockchains and user participation.
APA, Harvard, Vancouver, ISO, and other styles
23

Johnsson, Daniel, and Lina Krohn. "Industrial Internet of Things : En analys av hot och sårbarheter i industriella verksamheter." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40263.

Full text
Abstract:
Today the digital evolution is progressing rapidly. This entails both pros and cons concerning the security of devices. Despite the evolution, security has been left in the dark. This results in threats and vulnerabilities in devices, which could potentially be used by a hacker with the purpose of exploiting information. Security has not been a priority in industrial enterprises, even though industrial devices and other networked devices reside on the same network. The evolution of the infrastructure of the Internet has resulted in an increase of cyberattacks. These attacks used to target random individuals. The attacks of today are more intelligent, and hackers have changed their targets to specific enterprises to further exploit sensitive information, damage devices or for financial benefits. Safety in today’s industrial workplaces, such as firewalls, encryption and intrusion detection systems are not specifically designed to work in this type of environment. This leads to new threats and vulnerabilities which further leads to more exploited vulnerabilities. This formulate the following questions: Which are the most occurring threats and vulnerabilities today? What current methods and tools are suited for controlling security in IIoT-networks and its internal industrial devices? The purpose of this thesis was to examine the most occurring threats and vulnerabilities in IIoT-networks and its internal devices and reason among the methods to evaluate security in industrial enterprises. Lastly, an experiment in a real industrial workplace was conducted to attain a nuanced picture of the implementation of finding threats and vulnerabilities in industrial systems. In summary, there are a lot of different threats and vulnerabilities divided into categories and many tools are available to ensure the vulnerability. To conduct a test to find threats and vulnerabilities in an industrial enterprise, it needs to be ethically correct and the consequences carefully considered. The result of this thesis is a mapping and a demonstration of how threats and vulnerabilities are detected in an industrial workplace.
APA, Harvard, Vancouver, ISO, and other styles
24

NILSEN, SAMUEL, and ERIC NYBERG. "The adoption of Industry 4.0- technologies in manufacturing : a multiple case study." Thesis, KTH, Industriell Management, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190630.

Full text
Abstract:
Innovations such as combustion engines, electricity and assembly lines have all had a significant role in manufacturing, where the past three industrial revolutions have changed the way manufacturing is performed. The technical progress within the manufacturing industry continues at a high rate and today's progress can be seen as a part of the fourth industrial revolution. The progress can be exemplified by ”Industrie 4.0”; the German government's vision of future manufacturing. Previous studies have been conducted with the aim of investigating the benefits, progress and relevance of Industry 4.0-technologies. Little emphasis in these studies has been put on differences in implementation and relevance of Industry 4.0-technologies across and within industries. This thesis aims to investigate the adoption of Industry 4.0-technologies among and within selected industries and what types of patterns that exists among them. Using a qualitative multiple case study consisting of firms from Aerospace, Heavy equipment, Automation, Electronics and Motor Vehicle Industry, we gain insight into how leading firms are implementing the technologies. In order to identify the factors determining how Industry 4.0-technologies are implemented and what common themes can be found, we introduce the concept production logic, which is built upon the connection between competitive priorities; quality, flexibility, delivery time, cost efficiency and ergonomics. This thesis has two contributions. In our first contribution, we have categorized technologies within Industry 4.0 into two bundles; the Human-Machine-Interface (HMI) and the connectivity bundle. The HMI bundle includes devices for assisting operators in manufacturing activities, such as touchscreens, augmented reality and collaborative robots. The connectivity-bundle includes systems for connecting devices, collecting and analyzing data from the digitalized factory. The result of this master thesis indicates that depending on a firm’s or industry’s logic of production, the adoption of elements from the technology bundles differ. Firms where flexibility is dominant tend to implement elements from the HMI-bundle to a larger degree. In the other end, firms with few product variations where quality and efficiency dominates the production logic tends to implement elements from the connectivity bundle in order to tightly monitor and improve quality in their assembly. Regardless of production logic, firms are implementing elements from both bundles, but with different composition and applications. The second contribution is within the literature of technological transitions. In this contribution, we have studied the rise and development of the HMI-bundle in the light of Geels (2002) Multi-Level Perspective (MLP). It can be concluded that an increased pressure on the landscape-level in the form of changes in the consumer-market and the attitudes within the labor force has created a gradual spread of the HMI-bundle within industries. The bundles have also been studied through Rogers (1995) five attributes of innovation, where the lack of testability and observability prevents increased application of M2M-interfaces. Concerning Big Data and analytics, the high complexity prevents the technology from being further applied. As the HMI-bundle involves a number of technologies with large differences in properties, it is hard draw any conclusion using the attributes of innovation about what limits their application.
APA, Harvard, Vancouver, ISO, and other styles
25

Ben, Saied Yosra. "Collaborative security for the internet of things." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00879790.

Full text
Abstract:
This thesis addresses new security challenges in the Internet of Things (IoT). The current transition from legacy Internet to Internet of Things leads to multiple changes in its communication paradigms. Wireless sensor networks (WSNs) initiated this transition by introducing unattended wireless topologies, mostly made of resource constrained nodes, in which radio spectrum therefore ceased to be the only resource worthy of optimization. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy and autonomy to once uniform and deterministic systems. The heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT entities make it challenging to provide the required end-to-end secured connections. Unlike Internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources, and thus, are unable to support complex security schemes. The setup of a secure end-to-end communication channel requires the establishment of a common secret key between both peers, which would be negotiated relying on standard security key exchange protocols such as Transport Layer Security (TLS) Handshake or Internet Key Exchange (IKE). Nevertheless, a direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. The issue of adapting existing security protocols to fulfil these new challenges has recently been raised in the international research community but the first proposed solutions failed to satisfy the needs of resource-constrained nodes. In this thesis, we propose novel collaborative approaches for key establishment designed to reduce the requirements of existing security protocols, in order to be supported by resource-constrained devices. We particularly retained TLS handshake, Internet key Exchange and HIP BEX protocols as the best keying candidates fitting the end-to-end security requirements of the IoT. Then we redesigned them so that the constrained peer may delegate its heavy cryptographic load to less constrained nodes in neighbourhood exploiting the spatial heterogeneity of IoT nodes. Formal security verifications and performance analyses were also conducted to ensure the security effectiveness and energy efficiency of our collaborative protocols. However, allowing collaboration between nodes may open the way to a new class of threats, known as internal attacks that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a collaborative group. The trustworthiness level of a node has to be assessed by a dedicated security mechanism known as a trust management system. This system aims to track nodes behaviours to detect untrustworthy elements and select reliable ones for collaborative services assistance. In turn, a trust management system is instantiated on a collaborative basis, wherein multiple nodes share their evidences about one another's trustworthiness. Based on an extensive analysis of prior trust management systems, we have identified a set of best practices that provided us guidance to design an effective trust management system for our collaborative keying protocols. This effectiveness was assessed by considering how the trust management system could fulfil specific requirements of our proposed approaches for key establishment in the context of the IoT. Performance analysis results show the proper functioning and effectiveness of the proposed system as compared with its counterparts that exist in the literature
APA, Harvard, Vancouver, ISO, and other styles
26

De, Vries Sander, and Christoffer Thörnvall. "Technologies Enhancing the Customer Experience in Apparel Retail – A Future Study." Thesis, KTH, Produktinnovationsteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-245200.

Full text
Abstract:
I en värld driven av kontinuerliga framsteg inom teknologisektorn, i samband med ökad konkurrens, har detaljhandelslandskapet genomgått en förändring där kundernas förväntningar har förändrats drastiskt. Introduktionen av internet, ”smartphones” och sociala plattformar har resulterat till oöverträffade nivåer av tillgång till enkel kommunikation mellan individer, samt till geografiskt avlägsna klädbutiker som inte tidigare var möjliga att shoppa ifrån. Den här utvecklingen har lett till att kunderna förväntar sig mer från företag och nöjer sig därför inte längre med ”one-size-fits-all” upplevelse, utan förväntar sig istället en upplevelse som är präglad av individuell anpassning. Då kunder idag har tillgång till många olika alternativ att köpa kläder ifrån så behöver dagens klädbutiker förändra sitt värdeerbjudande. Teknik och personifiering av shoppingupplevelsen är därför två viktiga komponenter som klädbutiker behöver investera i för att kunna leva upp till de krav som framtidens kund kommer att ställa. Med detta i åtanke har följande syfte formulerats: "Syftet med uppsatsen är att undersöka vilka nya tekniker som kan implementeras i framtida klädbutiker för att förbättra kundupplevelsen och därmed möta de framtida kundernas behov." Baserat på de resultat och analyser som genomfördes under studiens gång, så bör dagens klädbutiker fokusera på följande tekniker för att kunna tillgodose de krav som framtidens kund kommer att ställa: RFID-taggar, digitala speglar, online avatarer, artificiell intelligens, biometritekniker, förstärkt verklighet och maskininlärning.<br>In a volatile business world, continuous advancements within the technology sector along with increased competition has led the retailing landscape to go through a transformation of late and have subsequently led customers to view retail stores in a different light. The rise of internet, smartphones, and social networking platforms has led to unprecedented levels of customer connection and empowerment. This development has led the customers to expect more from companies and no longer settle for a “one-size-fits-all” service experience, but instead expects individualized customization. As customers are undoubtedly in power and desires a personalized experience, technology and personalization are therefore two key components that retailers need to invest in to solidify a competitive edge in the imminent future.  “The purpose of the thesis is to investigate what emerging technologies could be implemented in future apparel retail stores to enhance the customer experience and address the needs of the future customer.” Based on the results and analysis derived from the study, findings suggest that companies should focus on the following technologies to have the means to meet the needs of the future customer, with the intention to enhance the overall customer experience: RFID tags, digital mirrors, online avatars, artificial intelligence, biometrics, augmented reality, and machine learning.
APA, Harvard, Vancouver, ISO, and other styles
27

Stussi, Fredrik. "Business models for Internet of Things : A literature review on similarities and key areas." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34053.

Full text
Abstract:
The area of business models for the Internet of Things and how to approach modelling them is relatively unexplored. Therefore this study researches how others have previously approached the area through a literature analysis. The articles showed several different ways of describing business models for IoT, some of these where based around old and well known tools such as Business model canvas. While other approaches where based on creating entirely new models based on modern technology. One of these models is based around blockchain technology, the last main approach is to innovate the tool used to describe business models in order to be able to manage the change in actors. After analysing the different approaches by comparing them to either their standard model or seeing what the key part of the model was, it became obvious that business models for IoT have certain areas that need to be taken into account. These areas are not commonly seen in previous tools used to describe business models. One of these areas is increased collaboration as a consequence of increased number of participants in the creation of an IoT service or product. The other area is increased focus on IT knowledge, partners and therefore also increased cost. This is a consequence of the increased amount of technology needed. These areas in particular the increased collaboration strongly affects the business model and therefore is one of the main reasons for the business model innovation in the IoT market.
APA, Harvard, Vancouver, ISO, and other styles
28

Manocha, Jitendra. "Using innovation from block chain technology to address privacy and security problems of Internet of Things." Thesis, KTH, Industriell Marknadsföring och Entreprenörskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209682.

Full text
Abstract:
Internet of things (IoT) is growing at a phenomenal speed and outpacing all the technological revolutions that occurred in the past. Together with window of opportunity it also poses quite a few challenges. One of the most important and unresolved challenge is vulnerability in security and privacy in IoT. This is mainly due to lack of a global decentralized standard even though characteristically IoT is based on distributed systems. Due to lack of standard IoT has interoperability issue between different devices and platform suppliers which implicitly creates need of reliance on the suppliers as they store and control user data. There is no decentralized industry wide solution which can offer the control of user data and security back to the user. While experts in IoT are still wondering on solving the challenge, a new Block chain technology has surfaced in past few years and showed signs of disruptive innovation in financial industry. This technology is decentralized, secure and private. Let alone information, block chain innovation has proven to keep assets secure. Recently few forms of block chains have emerged. This research will focus on analyzing the innovative block chain technology, their characteristics specifically the types of block chain to address the privacy and security challenges of IoT. Research proposes a new concept of hybrid block chain as a solution to IoT security and privacy problem.
APA, Harvard, Vancouver, ISO, and other styles
29

Hussein, Ali Dina. "A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024/document.

Full text
Abstract:
Récemment, l'intégration entre les environnements informatiques et de réseautage a été largement promu pour fournir des services intelligents à des utilisateurs finaux ainsi que l'utilisation efficace des ressources. Cette convergence a ouvert la voie à l'émergence de l'internet des objets (IdO). Le paradigme de l'IdO repose principalement sur la fabrication d'objets, appelés les choses, disparaître et se tissent dans le tissu de notre vie de tous les jours pour nous soutenir dans l'accomplissement des activités quotidiennes. L'évolutivité et l'hétérogénéité sont parmi les principaux défis qui entravent la réalisation à grande échelle de services de l'IdO dans la vie quotidienne des utilisateurs. Afin de relever les défis de l'IdO, un nouveau volet de recherche est venu en avant dans la littérature comme une classe paradigmatique des Cyber-physiques systèmes sociaux (CSPR), qui est connu comme l'Internet social des choses (Siot). Le SIOT se fonde sur la notion soulignée par phénomène petite-monde où la structure sociale permettant relation sociale fondée sur la confiance entre les personnes et les objets, d'une manière qui ressemble à des services de réseaux sociaux traditionnels (SNS) est suggérée de relever les défis de l'IdO. Cependant, depuis SIOT hérite des caractéristiques de différents informatiques et de réseautage environnements (par exemple, l'IdO et SNS) cela, en fait, augmente la quantité et la variété des données contextuelles qui doit être manipulé pour Adaptive fourniture de services dans Siot, qui agit comme le principal défi adressé dans cette thèse. Autrement dit, dans cette thèse, nous proposons la notion de contexte cognitif lorsque, dans certaine situation spatio-temporelle, le raisonnement sur les aspects objectifs du cadre, ce qui représente l'environnement physique, avec le contexte subjective, qui représente les aspects comportementaux et sociaux, est considéré comme l'amélioration des services SIOT intelligence et la capacité d'adaptation aux besoins conjoncturels des utilisateurs. Nous envisageons technologies du Web sémantique pour déployer notre contexte cognitif proposé dans deux domaines d'application; sensible au contexte recommandation des tâches quotidiennes dans les maisons intelligentes et structure sociale dépendant de la situation des choses. Un prototype de preuve de concept a été développé pour chaque domaine d'application, dans le but de démontrer l'intégration harmonieuse des objets sur le Web pour la réalisation de certaines applications. Nos résultats empiriques montrent un niveau de service amélioré l'adaptabilité et la complexité en temps de fonctionner lors de l'application de notre contexte cognitif suggéré<br>The paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
APA, Harvard, Vancouver, ISO, and other styles
30

Kponhinto, Gérard. "Data Collection and Transmission in the Internet of Things." Electronic Thesis or Diss., université Paris-Saclay, 2024. http://www.theses.fr/2024UPASG124.

Full text
Abstract:
Cette thèse a pour objectif de proposer une solution optimale pour la collecte et la transmission des données dans un réseau IoT dédié à la surveillance de la santé du bétail. L'objectif est d'aider les éleveurs à détecter rapidement les bovins malades afin de les isoler, limitant ainsi les risques de contamination massive et de décès.Les capteurs IoT utilisés pour la collecte des données sont soumis à des contraintes de ressources telles que la capacité de la batterie, la mémoire et la puissance de traitement. Ces limitations influencent considérablement l'efficacité de la collecte des données, nécessitant le développement de protocoles intelligents et innovants. Les approches métaheuristiques, associées aux techniques de clustering, se révèlent être des solutions prometteuses.Nous avons abordé le problème de la collecte de données dans les réseaux IoT appliqués à l'élevage en combinant des techniques de clustering et des métaheuristiques bio-inspirées. Dans un premier temps, nous avons développé un algorithme hybride appelé Hybrid Bio-Inspired Protocol (HBIP), s'inspirant de l'optimisation par recherche de nourriture bactérienne - Bacterial Foraging Optimization (BFO). L'algorithme intègre la phase d'essaimage du BFO dans la phase d'exploitation de l'algorithme de la colonie d'abeilles artificielles - Artificial Bee Colony (ABC). Ce protocole a ensuite été appliqué pour créer un mécanisme de collecte de données par arbres à grappes, optimisé pour économiser l'énergie dans un environnement statique.Cependant, la mobilité du bétail implique que nous devons traiter un réseau d'IoT mobile. Notre deuxième contribution s'est donc concentrée sur la gestion de la mobilité dans ces réseaux. Nous avons développé un protocole de collecte de données basé sur l'optimisation multi-objectifs, tenant compte des défis spécifiques aux réseaux de capteurs d'IoT mobiles, tels que la perte importante de paquets de données due à la mobilité et la consommation énergétique élevée. Nous avons formulé ce problème comme un problème d'optimisation, et l'avons résolu en utilisant l'algorithme (HBIP) développé dans notre première contribution.Enfin, notre troisième contribution propose une solution de sécurité pour protéger les réseaux d'IoT mobiles appliqués à l'élevage contre les attaques visant à modifier l'architecture du protocole de routage, compromettant ainsi la collecte de données. L'objectif est de concevoir des stratégies efficaces pour contrer ces attaques et garantir la fiabilité des systèmes de collecte de données dans les environnements IoT mobiles<br>This thesis aims to propose an optimal solution for data collection and transmission in an IoT network dedicated to monitoring livestock health. The goal is to help farmers quickly detect sick cattle so they can isolate them, thereby limiting the risks of mass contamination and deaths.The IoT sensors used for data collection face resource constraints such as battery life, memory, and processing power. These limitations significantly affect the efficiency of data collection, making it necessary to develop intelligent and innovative protocols. Metaheuristic approaches, combined with clustering techniques, have emerged as promising solutions.We addressed the data collection issue in IoT livestock networks by combining clustering techniques with bio-inspired metaheuristics. First, we developed a hybrid algorithm called the Hybrid Bio-Inspired Protocol (HBIP), inspired by Bacterial Foraging Optimization (BFO). The algorithm integrates the swarming phase of BFO into the exploitation phase of the ABC algorithm. This protocol was then applied to create an energy-efficient cluster-based data collection mechanism in a static environment.However, due to the mobility of livestock, the network becomes a mobile IoT network. Our second contribution focused on managing mobility in these networks. We developed a data collection protocol based on multi-objective optimization, addressing specific challenges in mobile IoT sensor networks, such as high packet loss due to mobility and increased energy consumption. We formulated this problem as an optimization problem and solved it using the HBIP hybrid algorithm developed in our first contribution.Lastly, our third contribution proposes a security solution to prevent protocol attacks in mobile IoT livestock networks. The aim of this contribution is to devise strategies to combat attacks that modify the network architecture of the routing protocol, thereby compromising data collection. The objective is to design effective strategies to counter these attacks and ensure the reliability of data collection systems in mobile IoT environments
APA, Harvard, Vancouver, ISO, and other styles
31

Hussein, Ali Dina. "A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024.

Full text
Abstract:
Récemment, l'intégration entre les environnements informatiques et de réseautage a été largement promu pour fournir des services intelligents à des utilisateurs finaux ainsi que l'utilisation efficace des ressources. Cette convergence a ouvert la voie à l'émergence de l'internet des objets (IdO). Le paradigme de l'IdO repose principalement sur la fabrication d'objets, appelés les choses, disparaître et se tissent dans le tissu de notre vie de tous les jours pour nous soutenir dans l'accomplissement des activités quotidiennes. L'évolutivité et l'hétérogénéité sont parmi les principaux défis qui entravent la réalisation à grande échelle de services de l'IdO dans la vie quotidienne des utilisateurs. Afin de relever les défis de l'IdO, un nouveau volet de recherche est venu en avant dans la littérature comme une classe paradigmatique des Cyber-physiques systèmes sociaux (CSPR), qui est connu comme l'Internet social des choses (Siot). Le SIOT se fonde sur la notion soulignée par phénomène petite-monde où la structure sociale permettant relation sociale fondée sur la confiance entre les personnes et les objets, d'une manière qui ressemble à des services de réseaux sociaux traditionnels (SNS) est suggérée de relever les défis de l'IdO. Cependant, depuis SIOT hérite des caractéristiques de différents informatiques et de réseautage environnements (par exemple, l'IdO et SNS) cela, en fait, augmente la quantité et la variété des données contextuelles qui doit être manipulé pour Adaptive fourniture de services dans Siot, qui agit comme le principal défi adressé dans cette thèse. Autrement dit, dans cette thèse, nous proposons la notion de contexte cognitif lorsque, dans certaine situation spatio-temporelle, le raisonnement sur les aspects objectifs du cadre, ce qui représente l'environnement physique, avec le contexte subjective, qui représente les aspects comportementaux et sociaux, est considéré comme l'amélioration des services SIOT intelligence et la capacité d'adaptation aux besoins conjoncturels des utilisateurs. Nous envisageons technologies du Web sémantique pour déployer notre contexte cognitif proposé dans deux domaines d'application; sensible au contexte recommandation des tâches quotidiennes dans les maisons intelligentes et structure sociale dépendant de la situation des choses. Un prototype de preuve de concept a été développé pour chaque domaine d'application, dans le but de démontrer l'intégration harmonieuse des objets sur le Web pour la réalisation de certaines applications. Nos résultats empiriques montrent un niveau de service amélioré l'adaptabilité et la complexité en temps de fonctionner lors de l'application de notre contexte cognitif suggéré<br>The paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
APA, Harvard, Vancouver, ISO, and other styles
32

Ambe, Aloha May Hufana. "From monitoring to engagement: Co-designing future technologies with older adults." Thesis, Queensland University of Technology, 2020. https://eprints.qut.edu.au/204265/1/Aloha%20May_Ambe_Thesis.pdf.

Full text
Abstract:
Monitoring technology solutions for older people's independent living tends to treat them as passive recipients of technology to be observed by others. This thesis investigated older people's perspectives, exploring how they might reimagine these technologies in their life and future, by involving them in co-design and qualitative research. Studies included older adults inventing their own Internet of Things with kits, writing fictional works about life with future technology, and trialling a collaborative "messaging kettle". This thesis proposes a design approach that shifts the emphasis from perceived needs to bring to light the lived values, agency and aspirations of older people.
APA, Harvard, Vancouver, ISO, and other styles
33

Käll, Nathalie, and Rebecca Fransson. "Internet of Things påverkan på informationsflödet : En fallstudie på Saab Training & Simulation." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Industriell organisation och produktion, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-41485.

Full text
Abstract:
Syfte: Studien ämnar att studera hur Internet of Things skulle kunna integreras för att minska potentiella brister i informationsflödet hos tillverkande företag. För att möjliggöra detta formulerades två forskningsfrågor:  <li data-aria-level="1" data-aria-posinset="1" data-listid="12" data-font="Georgia,Serif" data-leveltext="%1.">Hur är informationsflödet utformat hos ett tillverkande företag med högt anpassade kundprocesser?  <li data-aria-level="1" data-aria-posinset="1" data-listid="12" data-font="Georgia,Serif" data-leveltext="%1.">Vilka möjligheter ger Internet of Things för att minska potentiella brister i informationsflödet?  Metod: En förundersökning gjordes för att ge författarna en bild av studiens problemområde. Vidare genomfördes en litteraturstudie och en fallstudie. Litteraturstudien skapade studiens teoretiska ramverk och innehåller områden som Internet of Things, information, kommunikation, informationsflöde och informationssystem. Fallstudien genomfördes på ett stort tillverkande företag och bestod av dokumentstudier, observationer och en fokusgrupp. En sammankoppling av studiens teoretiska ramverk och empiri genererade studiens resultat.  Resultat: Företagets informationsflöde visade sig vara komplext och innehålla mycket manuell hantering av information. Något som visade sig ge konsekvenser för informationens pålitlighet, relevans och tidsperspektiv. Det finns därför förbättringsmöjligheter genom att integrera Internet of Things, då en digitalisering av informationsflödet skulle kunna leda till standardiserade processer samt en större och säkrare mängd delad information.  Implikationer: Teoretiskt bidrar studien genom att utvärdera hur Internet of Things kan bidra till nya sätt att arbeta med informationsflöden hos tillverkande företag. Studien visar detta genom att analysera viktiga aspekter inom ett nuvarande informationsflöde och Internet of things. Praktiskt bidrar studien med att identifiera potentiella förbättringsmöjligheter i ett företags informationsflöde genom en integration av Internet of Things.  Begränsningar: Studien är designad som en enfallsstudie vilket begränsar generaliserbarheten. Andra företag kan komma att behöva undersöka sina specifika förutsättningar för att dra nytta av studien. Generaliserbarheten ökar till viss del då Internet of Things är ett brett ämne och kan appliceras på ett stort antal områden. För att öka studiens tillförlitlighet har metodkapitlet noggrant utformats och beskrivits.<br>Purpose: This study aims to explore how Internet of Things could be integrated in manufacturing companies to reduce the potential inadequacy in an information flow. To achieve this, two research questions were formed:  <li data-aria-level="1" data-aria-posinset="1" data-listid="13" data-font="Georgia,Serif" data-leveltext="%1.">How is the information flow designed in a manufacturing company that produces customer-specific products?  <li data-aria-level="1" data-aria-posinset="1" data-listid="13" data-font="Georgia,Serif" data-leveltext="%1.">What possibilities does Internet of Things give information flow to reduce potential inadequac <p data-aria-level="1" data-aria-posinset="2" data-listid="13" data-font="Times New Roman" data-leveltext="%1.">Method: A pilot study was conducted to help the authors create a picture of the study's problem area. Later a literature study and a case study were conducted. The literature study was conducted to create the theoretical framework and included areas such as Internet of Things, information, communication, information flow and information systems. The case study conducted at a large manufacturing company and was consisted document studies, observations and a focus group. The results of the study are generated through a pairing of the theoretical framework and empirical study.  <p data-aria-level="1" data-aria-posinset="2" data-listid="13" data-font="Times New Roman" data-leveltext="%1.">Findings: The company's information flow was complex and contained a lot of manual management of information and communication. This turned out to create consequences for the information’s reliability, relevance, and timing. It has therefore been found that there are improvement opportunities through an integration of IOT in the information flow. A digitalization of an information flow can lead to creation of standard process and a larger and safer amount of shared information.  <p data-aria-level="1" data-aria-posinset="2" data-listid="13" data-font="Times New Roman" data-leveltext="%1.">Implications: The study contributes theoretically by evaluating how IOT can contribute to innovative ways of working with information flows at manufacturing companies; this by analysing key aspects of a current information flow and IOT. Practically, the study contributes to identifying potential improvements by integrate IOT in a corporate information flow.  Limitations: The study is of a one-case-design which limits generalisability. Therefore, other companies may need to examine their specific requirements before taking advantage of the study. The generalization increases slightly due to the broadness of the term IOT and that it can be applied in a wide range of areas. The method chapter has been carefully designed and described to increase the study's reliability.
APA, Harvard, Vancouver, ISO, and other styles
34

Horyachyy, Oleh. "Comparison of Wireless Communication Technologies used in a Smart Home : Analysis of wireless sensor node based on Arduino in home automation scenario." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14845.

Full text
Abstract:
Context. Internet of Things (IoT) is an extension of the Internet, which now includes physical objects of the real world. The main purpose of Internet of Things is to increase a quality of people’s daily life. A smart home is one of the promising areas in the Internet of Things which increases rapidly. It allows users to control their home devices anytime from any location in the world using Internet connectivity and automate their work based on the physical environment conditions and user preferences. The main issues in deploying the architecture of IoT are the security of the communication between constrained low-power devices in the home network and device performance. Battery lifetime is a key QoS parameter of a battery-powered IoT device which limits the level of security and affects the performance of the communication. These issues have been deepened with the spread of cheap and easy to use microcontrollers which are used by electronic enthusiasts to build their own home automation projects. Objectives. In this study, we investigated wireless communication technologies used in low-power and low-bandwidth home area networks to determine which of them are most suitable for smart home applications. We also investigated the correlation between security, power consumption of constrained IoT device, and performance of wireless communication based on a model of a home automation system with a sensor node. Sensor node was implemented using Arduino Nano microcontroller and RF 433 MHz wireless communication module. Methods. To achieve the stated objectives of this research following methods were chosen: literature review to define common applications and communication technologies used in a smart home scenario and their requirements, comparison of wireless communication technologies in smart home, study of Arduino microcontroller technology, design and simulation of a part of  home automation project based on Arduino, experimental measurements  of execution time and power consumption of Arduino microcontroller with RF 433 MHz wireless module when transmitting data with different levels of security, and analysis of experimental results. Results. In this research, we presented a detailed comparison of ZigBee, WiFi, Bluetooth, Z-Wave, and ANT communication technologies used in a smart home in terms of the main characteristics. Furthermore, we considered performance, power consumption, and security. A model of a home automation system with a sensor node based on Arduino Nano was described with sleep management and performance evaluation. The results show that the battery lifetime of Arduino in a battery-powered sensor node scenario is determined by the communication speed, sleep management, and affected by encryption. Conclusions. The advanced communication strategy can be used to minimize the power consumption of the device and increase the efficiency of the communication. In that case, our security measures will reduce the productivity and lifetime of the sensor node not significantly. It’s also possible to use symmetric encryption with smaller block size.
APA, Harvard, Vancouver, ISO, and other styles
35

Bhatti, Areeb. "Internet of Equipment : Enhancing customer value and experience." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-43933.

Full text
Abstract:
Background: Organizations are continuously challenged to create differentiated customer value and experience to increase profitability and gain competitive advantage. At the same time, the fast-paced advancement of technologies provides the opportunity to the organizations to create a differentiated customer value by offering innovative products and services. Internet of things (IoTs) is one such emerging technology that brings within itself opportunities and challenges to be addressed. However, so far research has not sufficiently followed how the utilization of IoTs can enhance customer value and experience. Purpose: The purpose of conducting this study is to explore how the utilization of IoTs enhance customer value and experience in an equipment manufacturers context and what are the associated opportunities and challenges. The study also aims to contribute to gap identified in the literature about how organizations can utilize IoTs to enhance customer value and experience. Method: The qualitative study utilized a single instrumental case study to explore the research questions. The data is collected by conducting semi-structured in-depth interviews. Conclusion: The study reveals that the utilization of IoTs can significantly improve customer value and experience in many ways. This may involve enabling user to monitor, control and optimally use the equipment, sharing useful information, allowing value co-creation and synergistic values and finally by providing autonomous equipment’s or solutions. However, the study also reveals that the utilization of IoTs also pose certain challenges along with the opportunities which must be carefully evaluated.
APA, Harvard, Vancouver, ISO, and other styles
36

Lockl, Jannik [Verfasser], and Maximilian [Akademischer Betreuer] Röglinger. "The Convergence of Emerging Digital Technologies : Examining the Interplay of the Internet of Things and Distributed Ledger Technology / Jannik Lockl ; Betreuer: Maximilian Röglinger." Bayreuth : Universität Bayreuth, 2021. http://d-nb.info/1241183759/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Diratie, Eyassu Dilla. "Hybrid internet of things network for energy-efficient video surveillance system." Electronic Thesis or Diss., université Paris-Saclay, 2022. http://www.theses.fr/2022UPASG066.

Full text
Abstract:
Les réseaux de capteurs visuels sans fil basés sur les réseaux maillés IEEE 802.11 sont des solutions efficaces et adaptées aux systèmes de vidéosurveillance pour surveiller les intrusions dans des zones sélectionnées. Les réseaux de capteurs visuels basés sur IEEE 802.11 offrent des transmissions vidéo à haut débit mais souffrent de problèmes d'inefficacité énergétique. De plus, la transmission vidéo dans les réseaux de capteurs visuels nécessite une qualité de service (QoS) stricte en termes de bande passante et de délai. En outre, il est difficile de réduire la consommation énergétique globale du réseau tout en garantissant une qualité de service garantie en termes de bande passante et de délai dans les réseaux de capteurs visuels sans fil à énergie limitée. La principale contribution de cette thèse est de fournir un réseau de vidéosurveillance économe en énergie sans compromettre l'exigence de qualité de service de la transmission vidéo. Premièrement, nous proposons une nouvelle architecture de réseau hybride IoT pour un système de vidéosurveillance qui détecte et suit un intrus dans la zone de surveillance. Le réseau IoT hybride intègre les réseaux de capteurs visuels multi-sauts basés sur IEEE 802.11 et le réseau LoRa pour fournir un système de vidéosurveillance autonome, économe en énergie et à haut débit. Tirant parti des caractéristiques du réseau LoRa, le réseau LoRa est utilisé comme un réseau toujours actif pour la détection et le suivi préliminaires des mouvements. De plus, le réseau LoRa décide également quels nœuds de capteurs visuels réveiller en fonction des informations de suivi. Le filtre de Kalman est étudié pour suivre la trajectoire de l'intrus à partir des mesures de bruit des capteurs de mouvement à faible puissance afin d'activer uniquement les nœuds de capteurs visuels le long de la trajectoire de l'intrus pour fournir une surveillance vidéo efficace. Nous avons montré par simulation que le filtre de Kalman estime et prédit la trajectoire de l'intrus avec une précision raisonnable. De plus, l'approche de réseau hybride IoT proposée réduit considérablement la consommation d'énergie par rapport à un réseau de capteurs visuels à un seul niveau de surveillance continue traditionnelle et toujours active. Ensuite, la contribution de cette thèse se concentre sur un mécanisme de routage sensible à l'énergie et QoS pour le réseau de capteurs visuels multi-sauts basé sur IEEE 802.11 du réseau hybride IoT. Nous proposons un algorithme de routage qui route un ensemble de flux vidéo vers la passerelle avec une QoS garantie en termes de bande passante et de délai tout en minimisant le nombre de nœuds capteurs visuels impliqués dans le routage. Cela maximise le nombre de nœuds pouvant être complètement désactivés pour optimiser la consommation énergétique globale du réseau sans compromettre les performances QoS. Le problème de routage proposé est formulé comme un programme linéaire entier (ILP) et résolu à l'aide d'un algorithme branch-and-bound. Grâce à la simulation informatique, les performances de l'approche proposée sont comparées aux algorithmes de routage de pointe existants dans la littérature. Les résultats montrent clairement que le mécanisme proposé permet d'économiser une quantité significative de la consommation d'énergie globale tout en garantissant la QoS en termes de bande passante et de délai<br>Wireless visual sensor networks based on IEEE 802.11 mesh networks are effective and suitable solutions for video surveillance systems in monitoring intrusions in selected areas. The IEEE 802.11-based visual sensor networks offer high bit rate video transmissions but suffer from energy inefficiency issues. Moreover, the video transmission in the visual sensor networks requires strict quality of service (QoS) in terms of bandwidth and delay. Also, it is challenging to decrease the overall energy consumption of the network while assuring guaranteed QoS in terms of bandwidth and delay in energy-constrained wireless visual sensor networks. The main contribution of this dissertation is to provide an energy-efficient video surveillance network without compromising the QoS requirement of video transmission. First, we propose a new hybrid IoT network architecture for a video surveillance system that detects and tracks an intruder in the monitoring area. The hybrid IoT network integrates the IEEE 802.11-based multi-hop visual Sensor Networks and LoRa network to provide an autonomous, energy-efficient, high-bitrate video surveillance system. Leveraging the LoRa network characteristics, the LoRa network is utilized as an always-active network for preliminary motion detection and tracking. Moreover, the LoRa network also decides which visual sensor nodes to wake up depending on the tracking information. The Kalman filter is investigated to track the intruder's trajectory from noise measurements of low-power motion sensors to activate only the visual sensor nodes along the intruder's trajectory to provide effective video vigilance. We showed through simulation that Kalman filter estimates and predicts intruder trajectory with reasonable accuracy. Moreover, the proposed hybrid IoT network approach reduces energy consumption significantly compared with a traditional, always active continuous monitoring single-tier visual sensor network. Next, the contribution of this dissertation focuses on an energy-aware and QoS routing mechanism for the IEEE 802.11-based multi-hop visual sensor network of the hybrid IoT network. We propose a routing algorithm that routes a set of video streams to the gateway with guaranteed QoS in terms of bandwidth and delay while minimizing the number of visual sensor nodes that are involved in routing. This maximizes the number of nodes that can be turned off completely to optimize the overall energy consumption of the network without compromising QoS performance. The proposed routing problem is formulated as an Integer Linear Program (ILP) and solved using the branch-and-bound algorithm. Through computer simulation, the performance of the proposed approach is compared with the existing state-of-the-art routing algorithms from the literature. The results clearly show that the proposed mechanism saves a significant amount of the overall energy consumption while guaranteeing QoS in terms of bandwidth and delay
APA, Harvard, Vancouver, ISO, and other styles
38

Shakoori, Moghadam Monfared Shaghayegh. "Design and prototyping of indoor positioning systems for Internet-of-Things sensor networks." Doctoral thesis, Universite Libre de Bruxelles, 2021. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/316363.

Full text
Abstract:
Accurate indoor positioning of narrowband Internet-of-Things (IoT) sensors has drawn more attention in recent years. The introduction of Bluetooth Low Energy (BLE) technology is one of the latest developments of IoT and especially applicable for Ultra-Low Power (ULP) applications. BLE is an attractive technology for indoor positioning systems because of its low-cost deployment and reasonable accuracy. Efficient indoor positioning can be achieved by deducing the sensor position from the estimated signal Angle-of-Arrival (AoA) at multiple anchors. An anchor is a base station of known position and equipped with a narrowband multi-antenna array. However, the design and implementation of indoor positioning systems based on AoA measurements involve multiple challenges. The first part of this thesis mainly addresses the impact of hardware impairments on the accuracy of AoA measurements. In practice, the subspace-based algorithms such as Multiple Signal Classification (MUSIC) suffer from sensitivity to array calibration errors coming from hardware imperfections. A detailed experimental implementation is performed using a Software Defined Radio (SDR) platform to precisely evaluate the accuracy of AoA measurements. For this purpose, a new Over-the-Air (OTA) calibration method is proposed and the array calibration error is investigated. The experimental results are compared with the theoretical analysis. These results show that array calibration errors can cause some degrees of uncertainty in AoA estimation. Moreover, we propose iterative positioning algorithms based on AoA measurements for low capacity IoT sensors with high accuracy and fair computational complexity. Efficient positioning accuracy is obtained by iterating between the angle and position estimation steps. We first develop a Data-Aided Maximum a Posteriori (DA- MAP) estimator based on the preamble of the transmitted signal. DA-MAP estimator relies on the knowledge of the transmitted signal which makes it impractical for narrowband communications where the preamble is short. For this reason, a Non-Data- Aided Maximum a Posteriori (NDA-MAP) estimator is developed to improve the AoA accuracy. The iterative positioning algorithms are therefore classified as Data-Aided Iterative (DA-It) and Non-Data-Aided Iterative (NDA-It) depending on the knowledge of the transmitted signal that is used for estimation. Both numerical and experimental analyses are carried out to evaluate the performance of the proposed algorithms. The results show that DA-MAP and NDA-MAP estimators are more accurate than MUSIC. The results also show that DA-It comes very close to the performance of the optimal approach that directly estimates the position based on the observation of the received signal, known as Direct Position Estimation (DPE). Furthermore, the NDA-It algorithm significantly outperforms the DA-It because it can use a much higher number of samples; however, it needs more iterations to converge. In addition, we evaluate the computational savings achieved by the iterative schemes compared to DPE through a detailed complexity analysis. Finally, we investigate the performance degradation of the proposed iterative algorithms due to the impact of multipath and NLOS propagation in indoor environments. Therefore, we develop an enhanced iterative positioning algorithm with an anchor selection method in order to identify and exclude NLOS anchors. The numerical results show that applying the anchor selection strategy significantly improves the positioning accuracy in indoor environments.<br>Doctorat en Sciences de l'ingénieur et technologie<br>info:eu-repo/semantics/nonPublished
APA, Harvard, Vancouver, ISO, and other styles
39

Ekman, Björn. "Bilindustrins förmåga att hantera förändringar i affärsmodellerna : Hur den uppkopplade bilen påverkar bilindustrins affärsmodeller." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-30908.

Full text
Abstract:
The development of IT has enabled the Internet of Things. Internet of Things is connected devices that communicate with each other and generate data that can then be used for different purposes. The number of connected devices is estimated to 20.4 billion by year 2020. The technology allows the automotive industry to connect its vehicles, which is called Internet of Vehicles, an application of the Internet of Things and intelligent cars. The amount of scientific literature that addresses the economic aspects related to the Internet of Things is scarce and need to be investigated further. The connected car is a disruptive technology that is expected to affect the automotive industry and their business models radically in the next few years and nobody really knows how the industry may look like the next 10-15 years. This type of disruptive technology requires companies to have the competence to implement innovative business models. The study focuses on the connected car from a business perspective and makes no insight into technical aspects or security challenges. The purpose of the study is to create an under-standing of the challenges facing the automotive business models with the introduction of the Internet of Things, which gives the automotive industry the opportunity to connect their cars to a greater extent than before. The study's results show that the value proposition and the channels are the most important parts to focus on in the business model. In order for companies to capitalize on the connection, it is extremely important that the customers understand the value of the connection and that the companies properly manage the information derived from the connected cars. Today, companies offer services or increased value in existing business models to strengthen their brand. The respondents share the opinion that the traditional business models will not change radically as long as the ownership of the car stay the same. Ownership and autonomous cars are the factors that are expected to affect the automotive industry the most. According to the respondents in the study, in order to deal with disruptive innovations in the industry, courage, adaptability, prospects and innovative thinking are required.<br>IT-utvecklingen har möjliggjort sakernas internet, Internet of Things. Internet of Things är uppkopplade enheter som kommunicerar med varandra och genererar data som sedan kan användas i olika syften. Antalet anslutna enheter beräknas att uppgå till 20,4 miljarder år 2020. Tekniken ger bilindustrin möjligheten att koppla upp sina fordon vilket benämns som Internet of Vehicles, en applikation av Internet of Things och intelligenta bilar. Vetenskaplig litteratur som tar upp de ekonomiska aspekterna i relation till Internet of Things är begränsad och behöver undersökas i större utsträckning. Den uppkopplade bilen är en disruptiv teknologi som förväntas påverka bilindustrin och deras affärsmodeller radikalt inom de närmaste åren och det är ingen som riktigt vet hur industrin kan komma att se ut de närmsta 10-15 åren. Denna typ av disruptiv teknologi kräver att företagen har kompetensen att implementera innovativa affärsmodeller. Studien fokuserar på den uppkopplade bilen ur ett affärsperspektiv och gör ingen fördjupning i tekniska aspekter eller säkerhetsutmaningar. Syftet med studien är att skapa förståelse för vilka utmaningar bilindustrins affärsmodeller står inför med introduktionen av Internet of Things som ger industrin möjligheten att koppla upp sina bilar i en större omfattning än tidigare. Studiens resultat visar att värdeerbjudandet och kanalerna är de viktigaste delarna att fokusera på i affärsmodellen. För att företagen ska kunna kapitalisera på uppkopplingen är det viktigt att kunderna förstår värdet av uppkoppling och att företagen förvaltar informationen från de uppkopplade bilarna på rätt sätt. Idag erbjuder företagen tjänster eller utökat värde i befintlig affärsmodell för att stärka sitt varumärke. Respondenterna delar uppfattningen om att de traditionella affärsmodellerna inte kommer förändras radikalt så länge ägandet av bilen inte gör en helomvändning. Ägandeskapet och autonoma bilar är de faktorer som förväntas påverka industrin störst. Respondenterna i studien nämner fyra viktiga egenskaper för att kunna hantera disruptiva innovationer i branschen, mod, anpassningsbarhet, framtidsutsikt och nytänkande.
APA, Harvard, Vancouver, ISO, and other styles
40

Oliveira, Rúben Pedrosa. "Sensor networks with multiple technologies: short and long range." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/22735.

Full text
Abstract:
Mestrado em Engenharia Eletrónica e Telecomunicações<br>Low-Power Wide Area Networks (LPWANs) are one set of technologies that are growing in the eld of the Internet of Things (IoT). Due to the long range capabilities and low energy consumption, Low-Power Wide Area Networks (LPWANs) are the ideal technologies to send small data occasionally. With their unique characteristics, LPWANs can be used in many applications and in di erent environments such as urban, rural and even indoor. The work developed in this dissertation presents a study on the LPWAN LoRa technology, by testing and evaluate its range, signal quality properties and its performance in delivering data. For this, three distinct scenarios are proposed and tested. The inclusion of LoRa in a multi-technology data gathering platform is the key objective of this dissertation. For this it is proposed: (1) an organization based in clusters of sensor nodes; (2) a Media Access Control (MAC) protocol to provide e cient communications through the LoRa technology; and nally, (3) a Connection Manager that is capable of managing the di erent available technologies in the sensor nodes and that is able to adapt its actions according to the acquired data type is proposed. The performed tests aim to perceive which type of parameters can in uence the performance of the overall proposed solution, as well as the advantages of a multi-technology approach in a data gathering platform.<br>Low-Power Wide Area Networks (LPWANs) são um conjunto de tecnologias em crescimento na área da Internet of Things (IoT). Devido ás suas capacidades de comunicar a longo alcance e de baixo consumo energético, as LPWANs apresentam-se como a tecnologia ideal para o envio ocasional de pequenas porções de dados. Ao possuírem características únicas, as LPWANs podem ser usadas em diversas aplicações e em diferentes ambientes, sejam eles urbanos, rurais ou interiores. O trabalho desenvolvido nesta dissertação apresenta um estudo acerca da tecnologia Long Range (LoRa), uma LPWAN, testando e avaliando o seu alcance, a qualidade do sinal e o desempenho na entrega de dados. Para isso, três cenários distintos são propostos e testados. A inclusão de LoRa numa plataforma de aquisição de dados com múltiplas tecnologias e um dos objectivos chave desta dissertação. Para isso, são propostas: (1) uma organização baseada em clusters de sensores; (2) um protocolo de controlo de acesso ao meio (MAC) para permitir que as comunicações através de LoRa sejam eficientes; e finalmente, (3) um gestor de conectividade com capacidade de gerir as diferentes tecnologias disponíveis nos sensores e que seja capaz de agir consoante o tipo de dados adquiridos. Os testes efectuados tem como objectivo perceber que tipo de parâmetros podem influenciar o desempenho global da soluçao proposta, bem como as vantagens de usar uma abordagem baseada em múltiplas tecnologias numa plataforma de aquisição de dados.
APA, Harvard, Vancouver, ISO, and other styles
41

Azmat, Muhammad, Sebastian Kummer, Moura Lara T, Gennaro Federico Di, and Rene Moser. "Future Outlook of Highway Operations with Implementation of Innovative Technologies Like AV, CV, IoT and Big Data." MDPI, 2019. http://dx.doi.org/10.3390/logistics3020015.

Full text
Abstract:
In the last couple of decades, there has been an unparalleled growth in number of people who can afford motorized vehicles. This is increasing the number of vehicles on roads at an alarming rate and existing infrastructure and conventional methods of traffic management are becoming inefficient both on highways and in urban areas. It is very important that our highways are up and running 24/7 as they not only provide a passage for human beings to move from one place to another, but also are the most important mode for intercity or international transfer of goods. There is an utter need of adapting the new world order, where daily processes are driven with the help of innovative technologies. It is highly likely that technological advancements like autonomous or connected vehicles, big data and the Internet of things can provide highway operators with a solution that might resolve unforeseeable challenges. This investigative exploratory research identifies and highlights the impact of new technological advancements in the automotive industry on highways and highway operators. The data for this research was collected on a Likert scale type online survey, from different organizations around the world (actively or passively involved in highway operations). The data was further tested for its empirical significance with non-parametric binomial and Wilcoxon signed rank tests, supported by a descriptive analysis. The results of this study are in line with theoretical and conceptual work done by several independent corporations and academic researchers. It is evident form the opinions of seasoned professionals that these technological advancements withhold the potential to resolve all potential challenges and revolutionize highway operations.
APA, Harvard, Vancouver, ISO, and other styles
42

Teles, Hermeto Rodrigo. "Standard improvements and predictable performance for industrial Internet of things in indoor deployments." Thesis, Strasbourg, 2019. https://publication-theses.unistra.fr/public/theses_doctorat/2019/Teles-Hermeto_Rodrigo_2019_ED269.pdf.

Full text
Abstract:
Les réseaux industriels sont utilisés pour surveiller les processus liés à la sécurité, où une fiabilité élevée et des délais prévisibles doivent être assurés. Pour cette raison, la norme IEEE 802.15.4-2015 a été publiée en 2016, en définissant le mode TSCH (Time-Slotted Channel Hopping). TSCH permet l’ordonnancement des transmissions où chaque noeud dispose de ressources dédiées pour communiquer en évitant les collisions. De plus, le mécanisme de saut de canal permet aux noeuds d’atténuer les effets des interférences externes. Toutefois, les pertes de paquets continuent à se produire en raison de variations de radio. L’objectif de ce travail est d’améliorer la fiabilité des réseaux sans fil dans les environnements intérieurs, où les obstacles et les interférences externes sont la règle. Nous nous concentrons principalement sur la recherche expérimentale pour identifier les limites et dans quelles circonstances ces réseaux ne parviennent pas à fournir une performance prévisible<br>Industrial networks are typically used to monitor safety-related processes, where high reliability and an upper-bounded delay must be ensured. To attend these requirements, IEEE 802.15.4-2015 standard was published in 2016, defining the Time-Slotted Channel Hopping (TSCH) mode. TSCH allows the scheduling of transmissions, such that each device has enough opportunities for communicating while avoiding collisions. In addition, slow-channel hopping mechanism allows the nodes to combat the effect of external interference. Although TSCH increases the reliability, packet losses keep on occurring due to variations on the radioconditions, very common in indoor environments. The goal of this work is to improve the reliability of low-power wireless networks in indoor scenarios, where obstacles and external interference are the rule. We focus mostly on experimental research to identify the limits and in which circumstances these networks fail at providing a predictable performance
APA, Harvard, Vancouver, ISO, and other styles
43

Ferrasi, Faberson Augusto [UNESP]. "O uso de mídias locativas no universo da internet das coisas: construindo uma prova de conceito." Universidade Estadual Paulista (UNESP), 2017. http://hdl.handle.net/11449/150785.

Full text
Abstract:
Submitted by FABERSON AUGUSTO FERRASI null (faberson.ferrasi@gmail.com) on 2017-05-28T17:26:24Z No. of bitstreams: 1 dissertassão_mestrado_Faberson Ferrasi_PPGMiT_2017.pdf: 1812047 bytes, checksum: 79b5df7e4bd32070c135e865cd18834d (MD5)<br>Rejected by Luiz Galeffi (luizgaleffi@gmail.com), reason: Solicitamos que realize uma nova submissão seguindo a orientação abaixo: O arquivo submetido não contém o certificado de aprovação com as assinaturas dos membros da banca (de acordo com as normas de sua unidade). Corrija esta informação e realize uma nova submissão com o arquivo correto. Agradecemos a compreensão. on 2017-05-31T16:24:51Z (GMT)<br>Submitted by FABERSON AUGUSTO FERRASI null (faberson.ferrasi@gmail.com) on 2017-05-31T17:36:12Z No. of bitstreams: 1 ferrasi_fa_me_bauru.pdf: 1814213 bytes, checksum: 548e7d51b663c5c3ae30e2fa3eafec17 (MD5)<br>Approved for entry into archive by Luiz Galeffi (luizgaleffi@gmail.com) on 2017-05-31T17:43:58Z (GMT) No. of bitstreams: 1 ferrasi_fa_me_bauru.pdf: 1814213 bytes, checksum: 548e7d51b663c5c3ae30e2fa3eafec17 (MD5)<br>Made available in DSpace on 2017-05-31T17:43:58Z (GMT). No. of bitstreams: 1 ferrasi_fa_me_bauru.pdf: 1814213 bytes, checksum: 548e7d51b663c5c3ae30e2fa3eafec17 (MD5) Previous issue date: 2017-04-17<br>Este trabalho tem por objetivo mostrar os resultados de um estudo exploratório sobre a evolução da Internet e conceituar sua fase atual denomina-se Internet das Coisas (Internet of Things - IoT). Tal conceito se apresenta como uma revolução tecnológica e oferece um grande potencial de inovação para diversas áreas. Nesta ocasião, são abordadas as possíveis inovações no uso dos dispositivos móveis alinhados ao seu potencial de comunicação com a Internet. Para isto, foi desenvolvido um experimento apoiado nas tecnologias, com o uso de dispositivos móveis, como smartphones e sensores de proximidade (beacons). Por meio do desenvolvimento de uma aplicação, são oferecidos recursos para captação autônoma de dados sobre a detecção da presença de pessoas em ambientes físicos. Através disso, oferecer um melhor gerenciamento dos dados obtidos e a possibilidade de outras formas de compartilhamento das informações geradas através da Internet, evidenciando, assim, o potencial de aplicação dos conceitos propostos na Internet das Coisas, foco central do projeto.<br>This work aims to show the results of an exploratory study on the evolution of the Internet and conceptualize its current phase is called Internet of Things (IoT). This concept presents itself as a technological revolution and offers great potential for innovation in several areas. This occasion, the possible innovations in the use of the mobile devices in line with their potential of communication with the Internet are approached. For this, an experiment was developed based on the technologies, with the use of mobile devices, such as smartphones and proximity sensors (beacons). Through the development of an application, resources are provided for autonomous capture of data on the detection of the presence of people in physical environments. Through this, offer a better management of the data obtained and the possibility of other forms of sharing of the information generated through the Internet, thus evidencing the potential of applying the concepts proposed in the Internet of Things, central focus of the project.
APA, Harvard, Vancouver, ISO, and other styles
44

Дегтярьова, Ірина Борисівна, Ирина Борисовна Дегтярева, Iryna Borysivna Dehtyarova, et al. "Socio-Economic Effects of Disruptive Technologies." Thesis, Sumy State University, 2020. https://essuir.sumdu.edu.ua/handle/123456789/80921.

Full text
Abstract:
В статті характеризуються позитивні та негативні ефекти проривних технологій. Як сучасні проривні технології виступають: адитивні методи, альтернативна енергетика, нанотехнології, електрифікація транспорту, мережевізація економіки, Інтернет речей, штучний інтелект, хмарні технології, віртуальна та доповнена реальності. Позитивні ефекти включають: зменшення екологічного впливу, дематеріалізація, формування циркулярної економіки, соціологізація розвитку та ін. Негативні ефекти включають: збільшення інформаційної залежності, інформаційна вразливість, втрата робочих місць, ризик втрати людиною контроля за кіберсистемами, ризик хакерських порушень, ін.<br>The paper demonstrated the positive and negative effects of current disruptive technologies. As the current disruptive technologies can be called: additive methods, alternative energy, nanotechnologies, electrification of transport, network development, Internet of Things, artificial intelligence, cloud computing, virtual and augmented reality and other. Positive effects include: decrease of environmental impact, dematerialization, formation of circular economy, sociologization of development and other. Negative effects include: increasing information dependence, information vulnerability, loss of jobs, hacking risks, the risk of loss of human control over cybersystems.
APA, Harvard, Vancouver, ISO, and other styles
45

Mašek, Petr. "Implementace a vyhodnocení komunikační technologie LoRaWAN v simulačním prostředí NS-3." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442353.

Full text
Abstract:
The diploma thesis focuses on the description of LPWAN (Low Power Wide Area Network) technologies for use in IoT (Internet of Things) communication scenarios. The theoretical part compares communication technologies operating in the license-exempt frequency band, i.e. Sigfox and LoRaWAN (Long Range Wide Area Network). Furthermore, technologies using the licensed frequency spectrum are discussed, specifically, attention is focused on NB-IoT (Narrow Band IoT). Emphasis is placed on LoRaWAN technology and the properties of the unlicensed frequency band below the 1 GHz, which is utilized by this technology. The practical part of the thesis consists of the evaluation of simulation scenarios using an integrated module in the simulation environment NS-3 (Network Simulator 3). Attention is focused mainly on the analysis of data transmission success using selected communication parameters of LoRaWAN technology. The obtained simulation outputs with a focus on mMTC (massive Machine-Type Communication) communication scenarios confirm the relationship between the number of end devices and gateways, communication distance and transmission reliability, or the limit value for the duty cycle.
APA, Harvard, Vancouver, ISO, and other styles
46

Razafimandimby, Anjalalaina Jean Cristanel. "Toward internet of heterogeneous things : wireless communication maintenance and efficient data sharing among devices." Thesis, Lille 1, 2017. http://www.theses.fr/2017LIL10074/document.

Full text
Abstract:
Malgré le grand succès de l'Internet des Objets, la plupart de ses applications sont basées uniquement sur l'actionnement statique. Cependant, l'ajout d'un rôle actif pour les actionneurs sera nécessaire afin d'optimiser les systèmes où ils sont présents. Pour ce faire, dans cette thèse, nous introduisons un nouveau concept appelé Internet des Objets Hétérogènes qui prend en compte les actionnements statique et dynamique. L'actionnement dynamique est fourni par un robot mobile ou un capteur mobile. Dans ce cas, nous exploitons le potentiel de la mobilité contrôlée en proposant des algorithmes efficaces pour maintenir la connectivité entre les dispositifs. Nous montrons par simulation l'efficacité des algorithmes proposés et leur performance en termes de temps de convergence, de connectivité et de distance parcourue. Une fois que la connectivité entre les dispositifs est garantie, un autre défi majeur qui devrait être résolu est l'énorme quantité de données qu'ils génèrent. Pour faire face à ce problème, nous proposons une approche d'inférence bayésienne qui permet d'éviter la transmission des données fortement corrélées. L'algorithme de propagation de croyance, couplé au modèle de champ aléatoire de Markov, est utilisé dans ce cas pour inférer les données manquantes. Selon différents scénarios, notre approche est évaluée sur la base des données réelles recueillies à partir des capteurs déployés sur des environnements intérieurs et extérieurs. Les résultats montrent que notre approche réduit considérablement la quantité de données transmises et la consommation d'énergie, tout en maintenant un niveau acceptable d'erreur d'inférence et de qualité de l'information<br>Despite of the large success of IOT, most of its applications are based only on static actuation. However, adding an active role for actuators will be needed, in order to optimize the systems where they are present. To achieve this goal, in this thesis, we introduce a new concept called Internet of Heterogeneous Things which takes into account both static and dynamic actuation. The dynamic actuation is provided by a mobile robot or a mobile sensor. In this case, we exploit the potential of controlled mobility by proposing efficient algorithms to maintain the global connectivity among devices. We show by simulation the efficiency of the proposed algorithms and their performance in terms of convergence time, connectivity, and traveled distance. Once the connectivity among devices is guaranteed, another major challenge that should be solved is the huge amount of data they generate and transmit. To tackle this problem, we propose a Bayesian Inference Approach which allows avoiding the transmission of high correlated data. Belief Propagation algorithm, coupled with the Markov Random Field model, is used in this case to reconstruct the missing sensing data. According to different scenarios, our approach is evaluated based on the real data collected from sensors deployed on indoor and outdoor environments. The results show that our proposed approach reduces drastically the number of transmitted data and the energy consumption, while maintaining an acceptable level of inference error and information quality
APA, Harvard, Vancouver, ISO, and other styles
47

Vaisutis, Kathleen Learmonth. "Understanding the roles of social and tangible technologies in maintaining social interaction, habits and independence into old age." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/91542/1/Kathleen_Vaisutis_Thesis.pdf.

Full text
Abstract:
The research offers a deeper understanding of how objects currently facilitate social interaction and physical activity for older adults living independently. It uses this awareness to develop, from a human perspective, considerations for the design of internet connected objects that provide novel ways of maintaining contact with loved ones. The research found that people invest emotional attachment to objects and objects foster emotional responses in people. Objects can facilitate feeling connected to another however the relationship is a result of time and repeated interaction. Recreating this connection/relationship digitally is not as simple as attaching a hyperlink.
APA, Harvard, Vancouver, ISO, and other styles
48

Klučka, Tomáš. "Implementace technologie smart meteringu do provozu malého obecního vodovodu." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2019. http://www.nusl.cz/ntk/nusl-391949.

Full text
Abstract:
The diploma thesis describes the actual situation of smart water metering, an overview of water meters suitable for remote data reading and individual components for application of remote data transmission including transmission itself. The thesis also contains the characteristics of available wireless data communication technologies and detailed solutions according to two companies specializing in remote transmission of water meter data. Subsequently, the pilot projects of large water company are presented, including practical findings. The practical part deals with the implementation of smart water metering in three specific municipalities, including a description of the area of interest, water supply system specification and possible limitations, the recommended technology, the requirements for putting in into operation and the pricing of technology and services according to two specialized companies. Finally, the possibilities of other using of smart water meter technology are discussed.
APA, Harvard, Vancouver, ISO, and other styles
49

Milota, Martin. "Systém zabezpečení včelích úlů před nepovolenou manipulací." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442373.

Full text
Abstract:
This master thesis deals with the design of beehive security system against unauthorized manipulation. The system uses LoRaWAN wireless communication technology for data transmission. The device records the movement of the beehive using an accelerometer and then locates the beehive using a GPS module. The low-energy system works via a battery-powered ESP32 microcontroller and is located on a beehive. The battery is charged using a solar panel. The system can be modularly expanded with additional sensors to monitor the condition of the bees. The device has been tested in practice, where it has been confirmed that it meets the required properties for securing beehives.
APA, Harvard, Vancouver, ISO, and other styles
50

van, Leeuwen Daniel, and Leonel Taku Ayuk. "Security testing of the Zigbee communication protocol in consumer grade IoT devices." Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.

Full text
Abstract:
With the ever increasing number of Internet of Things devices going out on the market for consumers that are Zigbee certified there is a need for security testing. This is to make sure that security standards are upheld and improved upon in order to make sure networks are protected from unauthorized users. Even though a lot of research and testing has been done on the Zigbee key exchange mechanism, called Zigbee commissioning, improvements have still not been enough with severe vulnerabilities in consumer grade devices still existing today. The devices tested in this study use EZ-mode commissioning in order to exchange the network key between a Zigbee coordinator and a Zigbee end device in order to encrypt later communication after being paired.  By using a simple radio receiver and a packet capturing program such as Wireshark an eavesdropping attack was conducted in order to capture the network key. The experiment demonstrates that this is still a weak point as the network key was successfully captured using eavesdropping. The analysis of the results show that previous criticisms of Zigbee commissioning have still not fully been addressed and can be a potential weak point in networks that use Zigbee certified IoT products.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography