14,696 research outputs found

    IoT-laitteiden datayhteyden automaattinen määrittely matkapuhelinverkoissa

    Get PDF
    Cellular networks have existed for almost forty years. During the course of their history, they have transformed from wireless voice communication providers to wireless network providers. Nowadays mobile broadband data forms the bulk of the cellular data transfer which was a staggering 14 exabytes per month in year 2017, or 2.9 gigabytes per smartphone per month. The Internet of Things is changing this connectivity landscape by introducing devices in the millions but with scarce individual resources and data usage. However, there are some challenges related to cellular data connections in constrained IoT devices. This thesis identifies those challenges and proposes solutions to overcome them for enabling simpler cellular data connectivity. We first present the technical challenges and solutions found in today’s cellular IoT devices. We then present a proof of concept prototype that realizes automatic cellular connectivity in a very constrained IoT device. The prototype is capable of connecting to a management system and reporting sensor readings without requiring any user interaction. Besides recognizing important improvements in the next generation of cellular IoT technology, the thesis concludes with suggestions on how to improve the usability of programming interfaces for cellular connectivity.Lähes neljäkymmenvuotisen historiansa aikana atkapuhelinverkot ovat muuttuneet puheen välittäjistä langattomaksi dataverkoksi. Nykyään langaton laajakaista muodostaa suuren osan matkapuhelinverkoissa siirretystä datasta, jota oli 14 exatavua kuukaudessa vuonna 2017. Esineiden Internet tuo verkkoon miljoonia laitteita joiden yksittäinen datansiirron tarve on vähäinen. Matkapuhelinverkon datayhteyden käyttö ei kuitenkaan ole ongelmatonta rajoittuneissa Esineiden Internetin laitteissa. Tämä diplomityö tunnistaa ja luokittelee näitä teknisiä haasteita ja ehdottaa ratkaisuja niihin. Esittelemme prototyypin joka toteuttaa automaatisen matkapuhelinverkon datayhteyden luonnin rajoittuneessa laitteessa. Prototyyppi ottaa yhteyden hallintajärjestelmään ja raportoi mittausdataa ilman käyttäjältä vaadittavia toimia. Johtopäätöksenä tämä diplomityö esittää parannuksia tehtäväksi matkapuhelinverkkojen datayhteyksien ohjelmointirajapintoihin niitä käyttävissä laitteissa. Löysimme myös tärkeitä parannuksia joita on jo tehty tulevan sukupolven matkapuhelinverkon määrittelyssä

    Evaluation of the Ability to Transform SIM Applications into Hostile Applications

    Get PDF
    Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand attacks is based on software and hardware countermeasures, and on the ability of the Java platform to check the correct behavior of Java code (by using byte code verification). Recently, the idea of combining logical attacks with a physical attack in order to bypass byte code verification has emerged. For instance, correct and legitimate Java Card applications can be dynamically modified on-card using a laser beam. Such applications become mutant applications, with a different control flow from the original expected behaviour. This internal change could lead to bypass controls and protections and thus offer illegal access to secret data and operations inside the chip. This paper presents an evaluation of the application ability to become mutant and a new countermeasure based on the runtime checks of the application control flow to detect the deviant mutations

    RTLabOS Dissemination Activities:RTLabOS D4.2

    Get PDF

    Radio frequency optimization of a Global System for Mobile (GSM) network

    Get PDF
    Includes bibliographical references

    CHORUS Deliverable 4.5: Report of the 3rd CHORUS Conference

    Get PDF
    The third and last CHORUS conference on Multimedia Search Engines took place from the 26th to the 27th of May 2009 in Brussels, Belgium. About 100 participants from 15 European countries, the US, Japan and Australia learned about the latest developments in the domain. An exhibition of 13 stands presented 16 research projects currently ongoing around the world

    Wireless Intelligent Electricity Metering and Billing System (WIMBIS)

    Get PDF
    This paper presents a novel smart meter design with a focus on the peculiarities of energy metering and billing challenges in Nigeria. The smart meter can be remotely configured at the control centre to work in either pre-paid or post-paid mode which allows for flexibility for various types of customers. The microcontroller based meter communicates with the energy company control centre via SMS using the embedded GSM Module. Using an LCD display or the globally accessible web based portal, the customer can track and manage their energy usage according to their financial means
    corecore