5,057 research outputs found

    Raamistik mobiilsete asjade veebile

    Get PDF
    Internet on oma arengus lĂ€bi aastate jĂ”udnud jĂ€rgmisse evolutsioonietappi - asjade internetti (ingl Internet of Things, lĂŒh IoT). IoT ei tĂ€hista ĂŒhtainsat tehnoloogiat, see vĂ”imaldab eri seadmeil - arvutid, mobiiltelefonid, autod, kodumasinad, loomad, virtuaalsensorid, jne - omavahel ĂŒle Interneti suhelda, vajamata seejuures pidevat inimesepoolset seadistamist ja juhtimist. Mobiilseadmetest nagu nĂ€iteks nutitelefon ja tahvelarvuti on saanud meie igapĂ€evased kaaslased ning oma mitmekĂŒlgse vĂ”imekusega on nad motiveerinud teadustegevust mobiilse IoT vallas. Nutitelefonid kĂ€tkevad endas vĂ”imekaid protsessoreid ja 3G/4G tehnoloogiatel pĂ”hinevaid internetiĂŒhendusi. Kuid kui kasutada seadmeid jĂ€rjepanu tĂ€isvĂ”imekusel, tĂŒhjeneb mobiili aku kiirelt. Doktoritöö esitleb energiasÀÀstlikku, kergekaalulist mobiilsete veebiteenuste raamistikku anduriandmete kogumiseks, kasutades kergemaid, energiasÀÀstlikumaid suhtlustprotokolle, mis on IoT keskkonnale sobilikumad. Doktoritöö kĂ€sitleb pĂ”hjalikult energia kokkuhoidu mobiilteenuste majutamisel. Töö kĂ€igus loodud raamistikud on kontseptsiooni tĂ”estamiseks katsetatud mitmetes juhtumiuuringutes pĂ€ris seadmetega.The Internet has evolved, over the years, from just being the Internet to become the Internet of Things (IoT), the next step in its evolution. IoT is not a single technology and it enables about everything from computers, mobile phones, cars, appliances, animals, virtual sensors, etc. that connect and interact with each other over the Internet to function free from human interaction. Mobile devices like the Smartphone and tablet PC have now become essential to everyday life and with extended capabilities have motivated research related to the mobile Internet of Things. Although, the recently developed Smartphones enjoy the high performance and high speed 3G/4G mobile Internet data transmission services, such high speed performances quickly drain the battery power of the mobile device. This thesis presents an energy efficient lightweight mobile Web service provisioning framework for mobile sensing utilizing the protocols that were designed for the constrained IoT environment. Lightweight protocols provide an energy efficient way of communication. Finally, this thesis highlights the energy conservation of the mobile Web service provisioning, the developed framework, extensively. Several case studies with the use of the proposed framework were implemented on real devices and has been thoroughly tested as a proof-of-concept.https://www.ester.ee/record=b522498

    Survey of energy efficient tracking and localization techniques in buildings using optical and wireless communication media

    Get PDF
    This paper presents a survey of beamforming, beamsteering and mobile tracking techniques. The survey was made in the context of the SOWICI project. The aim of this project is to reduce power consumption of data exchanging devices within houses. An optical fiber network is used for data transport to and from rooms whereas wireless transceivers communicate with appliances within the rooms. Using this approach, the aim is to reduce power consumption and exposure to electromagnetic radiation. To realize this, beamforming will be used to only radiate energy in, and receive signals from, the direction of interest. Because appliances within households can move, some of them even relatively fast, the pointing direction of the beam should be steerable. The pointing direction can be deduced from the communication link (beamsteering) or via separate mobile tracking techniques

    Applications of Context-Aware Systems in Enterprise Environments

    Get PDF
    In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees’ devices store both enterprise and personal data, and have the ability to remotely access a secure enterprise network. While mobile devices enable users to access such resources in a pervasive manner, it also increases the risk of breaches for sensitive enterprise data as users may access the resources under insecure circumstances. That is, access authorizations may depend on the context in which the resources are accessed. In both scenarios, it is vital that the security of accessible enterprise content is preserved. In this work, we explore the use of contextual information to influence access control decisions within context-aware systems to ensure the security of sensitive enterprise data. We propose several context-aware systems that rely on a system of sensors in order to automatically adapt access to resources based on the security of users’ contexts. We investigate various types of mobile devices with varying embedded sensors, and leverage these technologies to extract contextual information from the environment. As a direct consequence, the technologies utilized determine the types of contextual access control policies that the context-aware systems are able to support and enforce. Specifically, the work proposes the use of devices pervaded in enterprise environments such as smartphones or WiFi access points to authenticate user positional information within indoor environments as well as user identities

    A Context-Aware System to Secure Enterprise Content: Incorporating Reliability Specifiers

    Get PDF
    The sensors of a context-aware system extract contextual information from the environment and relay that information to higher-level processes of the system so to influence the system\u2019s control decisions. However, an adversary can maliciously influence such controls indirectly by manipulating the environment in which the sensors are monitoring, thereby granting privileges the adversary would otherwise not normally have. To address such context monitoring issues, we extend CASSEC by incorporating sentience-like constructs, which enable the emulation of \u201dconfidence\u201d, into our proximity-based access control model to grant the system the ability to make more inferable decisions based on the degree of reliability of extracted contextual information. In CASSEC 2.0, we evaluate our confidence constructs by implementing two new authentication mechanisms. Co-proximity authentication employs our time-based challenge-response protocol, which leverages Bluetooth Low Energy beacons as its underlying occupancy detection technology. Biometric authentication relies on the accelerometer and fingerprint sensors to measure behavioral and physiological user features to prevent unauthorized users from using an authorized user\u2019s device. We provide a feasibility study demonstrating how confidence constructs can improve the decision engine of context-aware access control systems

    Semantic-based policy engineering for autonomic systems

    No full text
    This paper presents some important directions in the use of ontology-based semantics in achieving the vision of Autonomic Communications. We examine the requirements of Autonomic Communication with a focus on the demanding needs of ubiquitous computing environments, with an emphasis on the requirements shared with Autonomic Computing. We observe that ontologies provide a strong mechanism for addressing the heterogeneity in user task requirements, managed resources, services and context. We then present two complimentary approaches that exploit ontology-based knowledge in support of autonomic communications: service-oriented models for policy engineering and dynamic semantic queries using content-based networks. The paper concludes with a discussion of the major research challenges such approaches raise

    Assisted GPS solution in cellular networks

    Get PDF
    The ‘Wireless Enhanced 911’ rules, which were issued in 1996, state that the position of a mobile device should be sent to Public Safety Answering Point (‘PSAP’) once a 9-1-1 call takes place from it. The rules imposed the cellular carriers to integrate a technology into their networks so that the mobile device location can be transferred once a 9-1-1 call is made. One of the chosen technologies was the Global Positioning System (GPS). The solution suggests integrating a GPS receiver into every cellular device. But the GPS receiver, as a stand alone solution, has some major performance limitations in regards to the Wireless Enhanced 911 requirements. The Assisted GPS (A-GPS) technology improves the GPS receiver performances. It reduces the time it takes the receiver to calculate its location. It also enhances the receiver’s reception sensitivity and improves the calculated position accuracy. With the A-GPS technology, the GPS receiver solution becomes compatible with the rules requirements. Two of the four large wireless carriers in the U.S. had chosen the A-GPS as their location solution in their networks. The A-GPS technology became an important part of the cellular industry. The intention of the thesis is to explore the A-GPS solution and to show its necessity in today’s GPS-based solutions. The following aspects are reviewed in the thesis – how the A-GPS solution works, how it improves the GPS receiver performances, the technology that is being used to implement it, and how it integrates to the cellular network. Another A-GPS related aspect that is reviewed in the thesis is the integration of location-based applications in cellular networks. The location-based applications service is a new and growing market in the cellular industry as a result of the deployed location solutions

    Context Aware Computing for The Internet of Things: A Survey

    Get PDF
    As we are moving towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future. These sensors continuously generate enormous amounts of data. However, in order to add value to raw sensor data we need to understand it. Collection, modelling, reasoning, and distribution of context in relation to sensor data plays critical role in this challenge. Context-aware computing has proven to be successful in understanding sensor data. In this paper, we survey context awareness from an IoT perspective. We present the necessary background by introducing the IoT paradigm and context-aware fundamentals at the beginning. Then we provide an in-depth analysis of context life cycle. We evaluate a subset of projects (50) which represent the majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade (2001-2011) based on our own taxonomy. Finally, based on our evaluation, we highlight the lessons to be learnt from the past and some possible directions for future research. The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. Our goal is not only to analyse, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards the IoT.Comment: IEEE Communications Surveys & Tutorials Journal, 201
    • 

    corecore