miun.sePublikasjoner
Endre søk
Begrens søket
1234 1 - 50 of 187
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Afrim, Philip
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Kartläggning och identifiering av flaskhalsar inom arbetsprocesser för bagagehantering: Kartlägga och analysera förutsättningarna för en effektivare bagagehanteringsprocess för avgående bagage på Landvetter flygplats med hjälp av VSM, ABC-Analys och processkartläggningar.2019Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Flygplats logistik

    Fulltekst (pdf)
    fulltext
  • 2.
    Ahmad, Waqas
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Computationally Efficient Light Field Image Compression using a Multiview HEVC Framework2019Annet (Annet vitenskapelig)
    Download (zip)
    Computationally efficient light field image compression using a multiview HEVC framework
  • 3.
    Ahmad, Waqas
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Ghafoor, Mubeen
    COMSATS University Islamabad, Pakistan.
    Tariq, Syed Ali
    COMSATS University Islamabad, Pakistan.
    Hassan, Ali
    COMSATS University Islamabad, Pakistan.
    Sjöström, Mårten
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Olsson, Roger
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Computationally Efficient Light Field Image Compression Using a Multiview HEVC Framework2019Inngår i: IEEE Access, E-ISSN 2169-3536, Vol. 7, s. 143002-143014, artikkel-id 8853251Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The acquisition of the spatial and angular information of a scene using light eld (LF) technologies supplement a wide range of post-processing applications, such as scene reconstruction, refocusing, virtual view synthesis, and so forth. The additional angular information possessed by LF data increases the size of the overall data captured while offering the same spatial resolution. The main contributor to the size of captured data (i.e., angular information) contains a high correlation that is exploited by state-of-the-art video encoders by treating the LF as a pseudo video sequence (PVS). The interpretation of LF as a single PVS restricts the encoding scheme to only utilize a single-dimensional angular correlation present in the LF data. In this paper, we present an LF compression framework that efciently exploits the spatial and angular correlation using a multiview extension of high-efciency video coding (MV-HEVC). The input LF views are converted into multiple PVSs and are organized hierarchically. The rate-allocation scheme takes into account the assigned organization of frames and distributes quality/bits among them accordingly. Subsequently, the reference picture selection scheme prioritizes the reference frames based on the assigned quality. The proposed compression scheme is evaluated by following the common test conditions set by JPEG Pleno. The proposed scheme performs 0.75 dB better compared to state-of-the-art compression schemes and 2.5 dB better compared to the x265-based JPEG Pleno anchor scheme. Moreover, an optimized motionsearch scheme is proposed in the framework that reduces the computational complexity (in terms of the sum of absolute difference [SAD] computations) of motion estimation by up to 87% with a negligible loss in visual quality (approximately 0.05 dB).

    Fulltekst (pdf)
    fulltext
  • 4.
    Ahmad, Waqas
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Vagharshakyan, Suren
    Tampere University, Tampere, Finland.
    Sjöström, Mårten
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Gotchev, Atanas
    Tampere University, Tampere, Finland.
    Bregovic, Robert
    Tampere University, Tampere, Finland.
    Olsson, Roger
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Shearlet Transform-Based Light Field Compression under Low Bitrates2020Inngår i: IEEE Transactions on Image Processing, ISSN 1057-7149, E-ISSN 1941-0042, Vol. 29, s. 4269-4280, artikkel-id 8974608Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Light field (LF) acquisition devices capture spatial and angular information of a scene. In contrast with traditional cameras, the additional angular information enables novel post-processing applications, such as 3D scene reconstruction, the ability to refocus at different depth planes, and synthetic aperture. In this paper, we present a novel compression scheme for LF data captured using multiple traditional cameras. The input LF views were divided into two groups: key views and decimated views. The key views were compressed using the multi-view extension of high-efficiency video coding (MV-HEVC) scheme, and decimated views were predicted using the shearlet-transform-based prediction (STBP) scheme. Additionally, the residual information of predicted views was also encoded and sent along with the coded stream of key views. The proposed scheme was evaluated over a benchmark multi-camera based LF datasets, demonstrating that incorporating the residual information into the compression scheme increased the overall peak signal to noise ratio (PSNR) by 2 dB. The proposed compression scheme performed significantly better at low bit rates compared to anchor schemes, which have a better level of compression efficiency in high bit-rate scenarios. The sensitivity of the human vision system towards compression artifacts, specifically at low bit rates, favors the proposed compression scheme over anchor schemes. 

  • 5.
    Andersson, Åsa
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Implementering av nytt kvalitetssystem: och behovet av förändringsledning2019Independent thesis Advanced level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    In today’s market all companies want to find advantages against its competitors. A common way to do that is to change quality management system. One of those methods is Lean where focus is to create value to the customer and minimize waste. However common changing quality management system is, the success rate is low. This study is a case study on a department in a company where the implementation of Lean and 5S has stopped. To discover why interviews with the personnel in the department is done. The questions are based on an article written by Almeida Marodin and Saurin [1] where they categorized 14 barriers to Lean implementation. Out of the interviews emerged that they did not feel any responsibility for working with Lean and that they had problems with keeping the momentum. To remedy this recommendations where given how the department can create an higher commitment and understanding for working with Lean through change management and Kotters eight step model.

    Fulltekst (pdf)
    fulltext
  • 6.
    Anjum, Mahnoor
    et al.
    National University of Sciences and Technology (NUST), Pakistan.
    Khan, Muhammad Abdullah
    National University of Sciences and Technology (NUST), Pakistan.
    Hassan, Syed Ali
    National University of Sciences and Technology (NUST), Pakistan.
    Mahmood, Aamir
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Analysis of RSSI Fingerprinting in LoRa Networks2019Inngår i: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), IEEE, 2019, s. 1178-1183Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Localization has gained great attention in recent years, where different technologies have been utilized to achieve high positioning accuracy. Fingerprinting is a common technique for indoor positioning using short-range radio frequency (RF) technologies such as Bluetooth Low Energy (BLE). In this paper, we investigate the suitability of LoRa (Long Range) technology to implement a positioning system using received signal strength indicator (RSSI) fingerprinting. We test in real line-of-sight (LOS) and non-LOS (NLOS) environments to determine appropriate LoRa packet specifications for an accurate RSSI-to-distance mapping function. To further improve the positioning accuracy, we consider the environmental context. Extensive experiments are conducted to examine the performance of LoRa at different spreading factors. We analyze the path loss exponent and the standard deviation of shadowing in each environment

    Fulltekst (pdf)
    fulltext
  • 7.
    Ansari, Rafay Iqbal
    et al.
    Frederick University, Nicosia, Cyprus.
    Pervaiz, Haris
    Lancaster University, UK.
    Chrysostomou, Chrysostomos
    Frederick University, Nicosia, Cyprus.
    Hassan, Syed Ali
    National University of Sciences and Technology (NUST), Pakistan.
    Mahmood, Aamir
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Control-Data Separation Architecture for Dual-Band mmWave Networks: A New Dimension to Spectrum Management2019Inngår i: IEEE Access, E-ISSN 2169-3536, Vol. 7, s. 34925-34937, artikkel-id 8663278Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The exponential growth in global mobile data traffic, especially with regards to the massive deployment of devices envisioned for the fifth generation (5G) mobile networks, has given impetus to exploring new spectrum opportunities to support the new traffic demands. The millimeter wave (mmWave) frequency band is considered as a potential candidate for alleviating the spectrum scarcity. Moreover, the concept of multi-tier networks has gained popularity, especially for dense network environments. In this article, we deviate from the conventional multi-tier networks and employ the concept of control-data separation architecture (CDSA), which comprises of a control base station (CBS) overlaying the data base station (DBS). We assume that the CBS operates on the sub-6 GHz single band, while the DBS possesses a dual-band mmWave capability, i.e., 26 GHz unlicensed band and 60 GHz licensed band. We formulate a multi-objective optimization (MOO) problem, which jointly optimizes conflicting objectives: the spectral efficiency (SE) and the energy efficiency (EE). The unique aspect of this work includes the analysis of a joint radio resource allocation algorithm based on Lagrangian Dual Decomposition (LDD) and we compare the proposed algorithm with the maximal-rate (maxRx), dynamic sub-carrier allocation (DSA) and joint power and rate adaptation (JPRA) algorithms to show the performance gains achieved by the proposed algorithm.

    Fulltekst (pdf)
    fulltext
  • 8.
    Aroka, Annabel
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Hur använder man digitalisering för att uppnå hållbarhet?: En fallstudie om hur arbetet med digitalisering tillämpas på nationell och lokal nivå i ambition att uppnå hållbarhet2019Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Today, Sweden's ambition is to be the best in the world to use the possibilities of digitization, while at the same time aiming to be a leader in the work for sustainable development and Agenda 2030. The study aims to study whether there is a clear connection between how the theory of how one should work with digitization to achieve sustainability applies in the practical work at national and local level. Furthermore, one can use the result to identify how one should use digitization and plan for a more sustainable society.

    The aim of the study is to be able to see what differences and / or similarities there are at the different strategic levels, where the study is limited to comparing Sundsvall's municipality with the rest of Sweden.

    The parameters examined are supported by the theory that William Mitchell has written in his book "e-topia", which describes the connection between digitization and sustainability and answers the question of how to achieve sustainability with the help of digitization.

     

    The report is based on a qualitative method, in which the result is gathered from two interviews and two policy documents, respectively, in order to be compared and discussed in the report's concluding discussion and conclusion part. The result shows that it is the human transformation that is of significant importance both at national and local level, but that there is no clear link to the sustainability work in the national digitization strategy. Instead of focusing on what abilities that are required to be able to use digital techniques or technologies, one should instead focus on how digitalization contributes to the sustainability work in order to eliminate unnecessary processes or steps.

     

    Fulltekst (pdf)
    fulltext
  • 9.
    Aslam, Muhammad Shehryar
    et al.
    National University of Sciences and Technology (NUST), Pakistan.
    Khan, Alishba
    National University of Sciences and Technology (NUST), Pakistan.
    Atif, Abeera
    National University of Sciences and Technology (NUST), Pakistan.
    Hassan, Syed Ali
    National University of Sciences and Technology (NUST), Pakistan.
    Mahmood, Aamir
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Qureshi, Hassaan Khaliq
    National University of Sciences and Technology (NUST), Pakistan.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Exploring Multi-Hop LoRa for Green Smart Cities2020Inngår i: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 34, nr 2, s. 225-231Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    With the growing popularity of Internet-of-Things (IoT)-based smart city applications, various long-range and low-power wireless connectivity solutions are under rigorous research. LoRa is one such solution that works in the sub-GHz unlicensed spectrum and promises to provide long-range communication with minimal energy consumption. However, the conventional LoRa networks are single-hop, with the end devices connected to a central gateway through a direct link, which may be subject to large path loss and hence render low connectivity and coverage. This article motivates the use of multi-hop LoRa topologies to enable energy-efficient connectivity in smart city applications. We present a case study that experimentally evaluates and compares single-hop and multi-hop LoRa topologies in terms of range extension and energy efficiency by evaluating packet reception ratio (PRR) for various source to destination distances, spreading factors (SFs), and transmission powers. The results highlight that a multi-hop LoRa network configuration can save significant energy and enhance coverage. For instance, it is shown that to achieve a 90% PRR, a two-hop network provides 50% energy savings as compared to a single-hop network while increasing 35% coverage at a particular SF. In the end, we discuss open challenges in multi-hop LoRa deployment and optimization.

    Fulltekst (pdf)
    fulltext
  • 10.
    Aydogan, Emre
    et al.
    Hacettepe University, Ankara, Turkey.
    Yilmaz, Selim
    Hacettepe University, Ankara, Turkey.
    Sen, Sevil
    Hacettepe University, Ankara, Turkey.
    Butun, Ismail
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Forsström, Stefan
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    A Central Intrusion Detection System for RPL-Based Industrial Internet of Things2019Inngår i: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, 2019, artikkel-id 8758024Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Although Internet-of-Things (IoT) is revolutionizing the IT sector, it is not mature yet as several technologies are  still being offered to be candidates for supporting the backbone of this system. IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is one of those promising candidate technologies to be adopted by IoT and Industrial IoT (IIoT). Attacks against RPL have shown to be possible, as the attackers utilize the unauthorized parent selection system of the RLP protocol. In this work, we are proposing a methodology and architecture to detect intrusions against IIoT. Especially, we are targeting to detect attacks against RPL by using genetic programming. Our results indicate that the developed framework can successfully (with high accuracy, along with high true positive and low false positive rates) detect routing attacks in RPL-based Industrial IoT networks.

  • 11.
    Basir, Rabeea
    et al.
    School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad 44000, Pakistan.
    Qaisar, Saad
    School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad 44000, Pakistan.
    Ali, Mudassar
    School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad 44000, Pakistan.
    Aldwairi, Monther
    College of Technological Innovation, Zayed University, Abu Dhabi 144534, UAE.
    Ashraf, Muhammad Ikram
    Centre for Wireless Communication, University of Oulu, 90014 Oulu, Finland.
    Mahmood, Aamir
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Fog Computing Enabling Industrial Internet of Things: State-of-the-Art and Research Challenges2019Inngår i: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 19, nr 21, artikkel-id 4807Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Industry is going through a transformation phase, enabling automation and data exchange in manufacturing technologies and processes, and this transformation is called Industry 4.0. Industrial Internet-of-Things (IIoT) applications require real-time processing, near-by storage, ultra-low latency, reliability and high data rate, all of which can be satisfied by fog computing architecture. With smart devices expected to grow exponentially, the need for an optimized fog computing architecture and protocols is crucial. Therein, efficient, intelligent and decentralized solutions are required to ensure real-time connectivity, reliability and green communication. In this paper, we provide a comprehensive review of methods and techniques in fog computing. Our focus is on fog infrastructure and protocols in the context of IIoT applications. This article has two main research areas: In the first half, we discuss the history of industrial revolution, application areas of IIoT followed by key enabling technologies that act as building blocks for industrial transformation. In the second half, we focus on fog computing, providing solutions to critical challenges and as an enabler for IIoT application domains. Finally, open research challenges are discussed to enlighten fog computing aspects in different fields and technologies.

    Fulltekst (pdf)
    fulltext
  • 12.
    Beije, Gustav
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Pix2019Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This thesis is about the creation of a new game framework named Pix and a comparison between it and the game engine Godot. The purpose is to create a game framework that focuses on making the workflow streamlined for the pro- grammer and at the same time giving the programmer a lot of creative power. Pix uses C# as programming language which runs on the .NET Core platform. Pix is built with Entity Component System (ECS) design which means that the design is data-oriented and that it focuses on composition. Thus the ECS design brings with it a clear separation between logic and data. The ECS design also makes it easy to write multithreaded code and to serialize the game world state. The comparison against Godot shows clear differences between how you use them and the philosophy about how the users become familiar with them. The obvious difference between them is that the main time spent working with Godot will be in the graphical user interface. In Pix on the other hand you will only work in a text-editor or an IDE if you do not create your own editor. The coding in Godot is done primarily with the script language GDScript. It is made for creating common game functionality but can’t be used to extend the engine with new advanced functionality. Thus to integrate new more advanced features Godot will need to be recompiled. Being forced to recompile the engine to add new advanced features results in that extending the engine can both be time consuming and challenging. In Pix there is no difference between coding game functionality and extending the framework. This equality in Pix between coding game functionality and extending the framework brings with it that when you can make a game in Pix you can also extend the engine with more functionality. The differences results in that Godot is simpler to learn but also gives the regu- lar user less power. Pix is the opposite of that. I you look at the workflow of us- ing Pix and combine that with the technologies Pix is built upon you can see that Pix differentiates itself from the already existing alternatives. The work- flow Pix provides and the technologies it is built upon shows that Pix can be a good alternative for creating complex games that doesn't need the most ad- vanced graphical features.

    Fulltekst (pdf)
    fulltext
  • 13.
    Beltramelli, Luca
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Random and Hybrid Medium Access for M2M Communication: Scalability and Energy Analysis2020Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    The term machine-to-machine (M2M) communication identifies any fully automated communication between intelligent devices, autonomous from human intervention. M2M communication is a key enabling technology for the Internet of Things (IoT), where it is used to provide ubiquitous connectivity between a large number of intelligent devices. M2M technologies find applications in numerous emerging use cases, such as smart metering, smart cities, intelligent transportation systems, eHealth monitoring, and surveillance/security. The service requirements placed onM2M communication can vary greatly depending on the intended area of application. In general, M2M applications are characterized by the high number of devices communicating with one another through sporadic and short transmissions. The devices are generally distributed over wide areas without easy access to the power grid, relying for their energy supply on batteries and energy harvesting. Therefore, the design of M2M communication technologies should meet the goal of supporting a large number of connected devices while retaining low energy consumption. One of the obstacles to achieving this goal is the high level of interference that can be present on the channel if a large number of M2M devices decide to transmit within a short period of time. To understand how to overcome this obstacle, it is necessary to explore new and old design options available in the channel access of M2M communication. The aim of this work is to study the performance and propose improvements to the channel access mechanisms of M2M communication technologies operating in the unlicensed frequency spectrum. The two technologies discussed in this thesis are IEEE 802.11ah and LoRaWAN. The performance metrics that have been considered consistently throughout this work are the scalability and energy efficiency of the investigated channel access mechanisms, which are especially critical to massive M2M.The first part of the thesis focuses on the IEEE 802.11ah standard and its medium access mechanism with station grouping. An analytical model of the grouping mechanism of IEEE 802.11ah combined with enhanced distributed channel access (EDCA) is presented to assess the quality of service (QoS) differentiation available in IEEE 802.11ah. The throughput and delay of the access categories of EDCA are investigated for different group size and composition. The results reveal that grouping is effective at increasing the throughput of both high and low priority access categories up to 40% compared to the case without groups. A redesign of the access mechanism of IEEE 802.11ah is proposed to realize a hybrid channel access for energy efficient uplink data transmission.  The numerical results show that fora wide range of contending M2M devices and even for the relatively small frame size of 256 bytes, the use of an hybrid channel access can help reducing the average energy  consumption  of  the  devices  per  successful  uplink  frame  transmission.   In the  considered  scenarios,  the  proposed  MAC  mechanism  was  able  to  reduce  the average  energy  consumption  per  successful  transmission  up  to  55%  compared  to standard approach. The second part of the thesis focuses on LoRa, with an investigation on the performance of alternative random channel access mechanisms in LoRaWAN. The connection between the channel access mechanism and the intensity of interference in LoRa networks is characterized for pure Aloha, slotted Aloha, and CSMA channel access. The results reveal several assisting guidelines on the design and selection of a medium access solution within LoRa’s parameter space: device density, service area, and spreading factor allocation.  An out-of-band synchronization mechanism based on FM-Radio Data System (FM-RDS) is proposed to achieve synchronous channel access in LoRa.  The throughput and fairness results for the proposed communication show the clear advantages of synchronous communication in LoRa, meanwhile, the use of out-of-band synchronization reduces the usage of LoRa channels, improving the scalability.  The timing errors of FM-RDS are evaluated combining experimental approach and analytical methods. The observations reveal that despite the poor absolute synchronization, FM-RDS can effectively be used to realize time-slotted communication in LoRa, with performance similar to those obtained by more accurate but expensive time-dissemination technologies.  Finally, a comprehensive model of the interference in neighboring clusters of LoRa devices is proposed, highlights the disruptive effects of the inter-cluster interference on the transmissions success probability, particularly for the devices using the largest spreading factors.

    Fulltekst (pdf)
    fulltext
  • 14.
    Beltramelli, Luca
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Mahmood, Aamir
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Ferrari, Paolo
    Österberg, Patrik
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Sisinni, Emiliano
    Synchronous LoRa Communication by Exploiting Large-Area out-of-band SynchronizationManuskript (preprint) (Annet vitenskapelig)
  • 15.
    Beltramelli, Luca
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Mahmood, Aamir
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Österberg, Patrik
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    LoRa beyond ALOHA: An Investigation of Alternative Random Access Protocols2020Inngår i: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    We present a stochastic geometry-based model to investigate alternative medium access choices for LoRaWAN a widely adopted low-power wide-area networking (LPWAN) technology for the Internet-of-things (IoT). LoRaWAN adoption is driven by its simplified network architecture, air interface, and medium access. The physical layer, known as LoRa, provides quasi-orthogonal virtual channels through spreading factors (SFs) and time-power capture gains. However, the adopted pure ALOHA access mechanism suffers, in terms of scalability, under the same-channel same-SF transmissions from a large number of devices. In this paper, our objective is to explore access mechanisms beyond-ALOHA for LoRaWAN. Using recent results on time- and power-capture effects of LoRa, we develop a unified model for the comparative study of other choices, i.e., slotted ALOHA and carrier-sense multiple access (CSMA). The model includes the necessary design parameters of these access mechanisms, such as guard time and synchronization accuracy for slotted ALOHA, carrier sensing threshold for CSMA. It also accounts for the spatial interaction of devices in annular shaped regions, characteristic of LoRa, for CSMA. The performance derived from the model in terms of coverage probability, throughput, and energy efficiency are validated using Monte-Carlo simulations. Our analysis shows that slotted ALOHA indeed has higher reliability than pure ALOHA but at the cost of lower energy efficiency for low device densities. Whereas, CSMA outperforms slotted ALOHA at smaller SFs in terms of reliability and energy efficiency, with its performance degrading to pure ALOHA at higher SFs.

  • 16.
    Berggren, Peter
    et al.
    Institutionen för datavetenskap, Linköpings Universitet, Linköping, Sverige.
    Johansson, Björn J E
    Institutionen för datavetenskap, Linköpings Universitet, Linköping, Sverige.
    Larsson, Aron
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Olsson, Leif
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Ibrahim, Osama
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    van laere, Joeri
    Institutionen för informationsteknologi, Högskolan i Skövde, Skövde, Sverige.
    Coping with large disruptions in the payment system: stakeholder experience from stakeholder workshops and computer based simulation gaming exercises2020Inngår i: Proceedings of the 2020 the 3rd International Conference on Computers in Management and Business: Session - Computer and Mobile Technology, ACM Digital Library, 2020, s. 141-145Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper, we describe a work in progress where a mixed methods approach is used to increase insight into what kind of consequences a temporal disruption or total breakdown of the payment system creates for a large variety of societal actors and to increase insight in how their collaborative behaviour can be guided to be more resilient. This approach includes data from different types of data collections; workshop with high-level decisionmakers from involved sectors, interviews with citizens, representatives from the fuel, foods, and finance sectors, as well as experiences from 15 simulation game exercises with stakeholders. The triangulated and aggregated outcomes of the different data collections resulted in a set of recommendations on how to cope with disruptions in the card payment system.

  • 17.
    Bergsten, Linnea
    et al.
    Linköping University, Department of Computer and Information Science, Linköping.
    Johansson, Björn J E
    Linköping University, Department of Computer and Information Science, Linköping.
    Berggren, Peter
    Linköping University, Department of Computer and Information Science, Linköping.
    van Laere, Joeri
    Skövde University, School of Informatics, Skövde.
    Ibrahim, Osama
    Stockholm University, DSV, Kista.
    Larsson, Aron
    Stockholm University, DSV, Kista.
    Olsson, Leif
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Designing engaging computer based simulation games for increasing societal resilience to payment system2020Inngår i: ICCMB 2020: Proceedings of the 2020 the 3rd International Conference on Computers in Management and Business, ACM Digital Library, 2020, s. 166-172Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Large or lengthy disruptions to the card payment system are threats that can cause crisis in society, especially in countries where other payment options are scarce. This paper presents a study that provides suggestions on how to improve a simulation game used to increase societal resilience to payment system disruptions. Questionnaires and interviews have been used to investigate how 16 participant in crisis exercises experience realism, relevance and validity in such exercises. Suggestions on how to improve the simulation game are provided, such as improvements to the 1 https://ec.europa.eu/digital-single-market/en/desi accessed at 2019-09-20 2 Statistics from 2018, analysed by the Swedish Riksbank, see https://www.riksbank.se/globalassets/media/statistik/betalningsstatistik/2018/ payments-patterns-in-sweden-2018.pdf 3 There are several reports of such disruptions in the card payment system, although the duration of the disruptions were shorter than ten days. See for example (all accessed on 2019-10-17): https://www.bbc.co.uk/news/business-44335804 graphical interface and introducing supporting roles from the exercise management.

  • 18.
    Blank, Fredrik
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Handlingsplaner och diskussion: Samarbetsverktyg2019Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [en]

    This report discloses the implementation of a collaboration tool in the form of action plans and discussion functionality in behalf of the company ZonderaCom AB (Zondera). The current tool used for this purpose is inflexible, have a hard time meeting customer requirements and therefore needs to be replaced. The new application is part of a larger entity where user management and database schemas are already in place. The functionality of this application consists of issue management, chat/discussion, document management, notes, sharing and printing. For users with higher permissions a summary view will also be available. The application is implemented using ASP.NET Core MVC, Entity Framework (EF) and SQL Server as the database engine. A SPA-based approach is used where the UI (User Interface) is dynamically rendered and loaded via Ajax and partial views. The source code for the application is largely omitted from this report due to business reasons. Interface’s and database schemas are used to display code and database structure.

    Fulltekst (pdf)
    fulltext
  • 19.
    Bombino, Andrea
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Grimaldi, Simone
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Mahmood, Aamir
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Machine Learning-Aided Classification of LoS/NLoS Radio Links in Industrial IoT2020Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Wireless sensors and actuators networks are an essential element to realize industrial IoT (IIoT) systems, yet their diffusion is hampered by the complexity of ensuring reliable communication in industrial environments.A significant problem with that respect is the unpredictable fluctuation of a radio-link between the line-of-sight (LoS) and the non-line-of-sight (NLoS) state due to time-varying environments.The impact of link-state over reception performance, suggests that link-state variations should be monitored at run-time, enabling dynamic adaptation of the transmission scheme on a link-basis to safeguard QoS.Starting from the assumption that accurate channel-sounding is unsuitable for low-complexity IIoT devices, we investigate the feasibility of channel-state identification for platforms with limited sensing capabilities. In this context, we evaluate the performance of different supervised-learning algorithms with variable complexity for the inference of the radio-link state.Our approach provides fast link-diagnostics by performing online classification based on a single received packet. Furthermore, the method takes into account the effects of limited sampling frequency, bit-depth, and moving average filtering, which are typical to hardware-constrained platforms.The results of an experimental campaign in both industrial and office environments show promising classification accuracy of LoS/NLoS radio links. Additional tests indicate that the proposed method retains good performance even with low-resolution RSSI-samples available in low-cost WSN nodes, which facilitates its adoption in real IIoT networks.

  • 20.
    Bonafini, Federico
    et al.
    University of Brescia, Italy.
    Depari, Alessandro
    Univeristy of Brescia, Italy.
    Ferrari, Paolo
    University of Brescia, Italy.
    Flammini, Alessandra
    University of Brescia, Italy.
    Pasetti, Marco
    University of Brescia, Italy.
    Rinaldo, Stefano
    University of Brescia, Italy.
    Sisinni, Emiliano
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi. University of Brescia, Italy.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Exploiting localization systems for LoRaWAN transmission scheduling in industrial applications2019Inngår i: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, 2019, artikkel-id 8757999Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The Internet of Things (IoT) paradigm contaminated industrial world, allowing for innovative services. The wireless communications seem to be particularly attracting, especially when complement indoor and outdoor Real Time Location Systems (RTLS) for geo-referencing smart objects (e.g. for asset tracking). In this paper, the LoRaWAN solution is considered for transmitting RTLS data. LoRaWAN is an example of Low Power Wide Area Network: it tradeoffs throughput with coverage and power consumption. However, performance can be greatly improved with limited changes to the standard specifications. In this work, a scheduling layer is suggested above the regular stack for allocating communication resources in a time slot channel hopping medium access strategy. The main innovation is the time synchronization, which is obtained opportunistically from the ranging devices belonging to the RTLSs. The experimental testbed, based on commercially available solutions, demonstrates the affordability and feasibility of the proposed approach. When low-cost GPS (outdoor) and UWB (indoor) ranging devices are considered, synchronization error of few microseconds can be easily obtained. The experimental results show the that time reference pulses disciplined by GPS have a maximum jitter of 180 ns and a standard deviation of 40 ns whereas, if time reference pulses disciplined by UWB are considered, the maximum jitter is 3.3 μs and the standard deviation is 0.7 μs.

  • 21.
    Borg, Madelene
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Is It True2019Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Studien behandlar en mindre del utav ett större projekt där flera personer är delaktiga. Projektets syfte är att erbjuda en tjänst för att motverka spridningen av falsk information på internet. En del i detta är att skapa en prototyp för att testa hur en sådan tjänst kan se ut och fungera. Frågeställningen som besvaras av studien handlar om hur detta kan åstadkommas med hjälp av webbutveckling. Studiens mål har varit att utveckla och föreslå lösningar till delar av prototypen på klientsidan. Metoder och verktyg som använts är React, Git, Scrum, Visual Studio Code, Jira och Microsoft Teams. Prototypen kommer att bestå av ett plugin för webbläsare, en webbplats samt en databas. Studien kommer att resultera i och visuellt visa lösningsförslag på de delar som författaren utvecklat. Det kommer även att framgå hur prototypen är uppbyggd i sin helhet. Studien har visat hur en tjänst av denna typ kan se ut och fungera. Den har även visat  att det finns många aspekter att ta hänsyn till innan projektet skulle kunna realiseras.

  • 22.
    Borgerud, Charlotte
    et al.
    Swedish Association of Local Authorities and Regions, Stockholm.
    Borglund, Erik A. M.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Open research data, an archival challenge?2020Inngår i: Archives and Museum Informatics, ISSN 1389-0166, E-ISSN 1573-7500Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The Swedish government has decided that all research results in the form of research data and scientific publications financed with public funds should be openly accessible as far as possible. The question is whether the responsible actors and if the universities are ready to implement the change. The significance of open access has amplified in Sweden. Earlier research has brought to light that the collection and preservation of research data are often surrounded by ambiguous rules and lack a comprehensive structure. For example, archiving is not given enough consideration in connection to research projects and researchers often tend to save their material on platforms that are not persistent over time. This article is based upon a qualitative research approach where 15 semi-structured interviews have been used as primarily data sources to investigate the implementation of open access of research data and scientific publications. The article investigated how Swedish universities and public authorities were working with archiving and implementation of open research data and their opinions on open access. The results displayed a lack of coordination, resources and infrastructure but also that common agreed nomenclature were missing. The management of research data was not part of an overall recordkeeping strategy. One explanation could be differences in the information culture among researchers and archivists. Social sciences theory has been combined with archival theory in order to explain the reasons to this. These have been put in relation to the principles of the open data directive. 

    Fulltekst (pdf)
    fulltext
  • 23.
    Borglund, Erik
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Att lära av historien2019Inngår i: Festskrift till Björn Fjæstad: Utvecklingen av en forskningsmiljö: Ett verksamhetsnära engagemang på distans / [ed] Erna Danielsson, Roine Johansson, Anna Olofsson, Susanna Öhman, Sundsvall: Mid Sweden University , 2019, s. 83-95Kapittel i bok, del av antologi (Annet vitenskapelig)
  • 24.
    Borglund, Erik A. M.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Records-making during crisis management – rule based or discretion driven?2020Inngår i: Lecture Notes in Computer Science, 2020, s. 599-615Konferansepaper (Fagfellevurdert)
    Abstract [en]

    During large crises, e.g. forest fires, flooding, terrorist attacks, or aircraft crashes, temporal organizations are set up to manage the crisis and minimize negative impacts on society. These temporal organizations are often called situation rooms. The purpose of this paper is to study what regulates the record-making practice in a police situation room. Qualitative research methods were used. Data was sourced from five different case studies in the Swedish police service. The tension between discretion and rule-based regulation has been used as the theoretical lens in this paper. Through the application of this theoretical lens of regulation, whereby the two extremes found were discretionary creation on the one hand and rule-based creation on the other, one can identify a real challenge in record-making practice. Much of the record-making was regulated discretionary, i.e. each regulated and motivated by a police officer’s own judgment. This kind of record-making is difficult to predict and consequently the created records may also be difficult to capture, simply because no-one knows that they exist. In non-temporal organizations’ recordkeeping practice, entire work processes can be identified, the records created in the processes can be identified in advance and the process can be supported by various information systems. But in the temporal organization, proactivity is more difficult to achieve and thus records created based upon discretion will probably not be proactively identified as being part of an activity in a process. 

  • 25.
    Borglund, Erik A. M.
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Svärd, Proscovia
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    What is really regulating the work with open data?2019Konferansepaper (Fagfellevurdert)
  • 26.
    Bosse, Sebastian
    et al.
    Fraunhofer Institute for Telecommunications – Heinrich Hertz Institute, Berlin, Germany.
    Brunnström, Kjell
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi. Research Intstitutes of Sweden AB.
    Arndt, Sebastian
    Norwegian University of Science and Technology, Trondheim, Norway.
    Martini, Maria G.
    Kingston University, London, UK.
    Ramzan, Naeem
    University of the West of Scotland, Hamilton, UK.
    Engelke, Ulrich
    CSIRO Data61, Kensington, Australia.
    A common framework for the evaluation of psychophysiological visual quality assessment2019Inngår i: Quality and User Experience, ISSN 2366-0139, E-ISSN 2366-0147, Vol. 4, nr 3Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The assessment of perceived quality based on psychophysiological methods recently gained attraction as it potentially overcomes certain flaws of psychophysical approaches. Although studies report promising results, it is not possible to arrive at decisive and comparable conclusions that recommend the use of one or another method for a specific application or research question. The video quality expert group started a project on psychophysiological quality assessment to study these novel approaches and to develop a test plan that enables more systematic research. This test plan comprises of a specifically designed set of quality annotated video sequences, suggestions for psychophysiological methods to be studied in quality assessment, and recommendations for the documentation and publications of test results. The test plan is presented in this article.

    Fulltekst (pdf)
    fulltext
  • 27.
    Brunnström, Kjell
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi. RISE Research Institute of Sweden AB.
    Dima, Elijs
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Andersson, Mattias
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Sjöström, Mårten
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Qureshi, Tahir
    HIAB.
    Johanson, Mathias
    Alkit Communications AB.
    Quality of Experience of hand controller latency in a Virtual Reality simulator2019Inngår i: Human Vision and Electronic Imaging 2019 / [ed] Damon Chandler, Mark McCourt and Jeffrey Mulligan, 2019, Springfield, VA, United States, 2019, artikkel-id 3068450Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this study, we investigate a VR simulator of a forestry crane used for loading logs onto a truck, mainly looking at Quality of Experience (QoE) aspects that may be relevant for task completion, but also whether there are any discomfort related symptoms experienced during task execution. A QoE test has been designed to capture both the general subjective experience of using the simulator and to study task performance. Moreover, a specific focus has been to study the effects of latency on the subjective experience, with regards to delays in the crane control interface. A formal subjective study has been performed where we have added controlled delays to the hand controller (joystick) signals. The added delays ranged from 0 ms to 800 ms. We found no significant effects of delays on the task performance on any scales up to 200 ms. A significant negative effect was found for 800 ms added delay. The Symptoms reported in the Simulator Sickness Questionnaire (SSQ) was significantly higher for all the symptom groups, but a majority of the participants reported only slight symptoms. Two out of thirty test persons stopped the test before finishing due to their symptoms.

    Fulltekst (pdf)
    fulltext
  • 28.
    Butun, Ismail
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Location Privacy Assured Internet of Things2019Inngår i: Proceedings of the 5th International Conference on Information Systems Security and Privacy / [ed] Paolo Mori, Steven Furnell and Olivier Camp, Setúbal, Portugal: SciTePress, 2019, Vol. 1, s. 623-630Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Internet of Things (IoT) is in the booming age of its growth, therefore a vast amount of applications, projects, hardware/software solutions, and customized concepts are being developed. The proliferation of IoT will enable location-based services to be available everywhere for everyone, and this will raise a large number of privacy issues related to the collection, usage, retention, and disclosure of the user’s location information. In order to provide a solution to this unique problem of IoT, this paper proposes Location Privacy Assured Internet of Things (LPA-IoT) scheme, which uses the concepts of Mix-Zone, location-obfuscation along with context-awareness. To the authors’ best knowledge, the proposed LPA-IoT scheme is the first location-based privacy-preserving scheme for IoT that provides flexible privacy levels associated with the present context of the user.

  • 29.
    Butun, Ismail
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Pereira, Nuno
    School of Engineering (DEI/ISEP), Polytechnic of Porto (IPP), 4200-072 Porto, Portugal.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Security Risk Analysis of LoRaWAN and Future Directions2019Inngår i: Future Internet, ISSN 1999-5903, E-ISSN 1999-5903, Vol. 11, nr 1, artikkel-id 3Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    LoRa (along with its upper layers definition—LoRaWAN) is one of the most promising Low Power Wide Area Network (LPWAN) technologies for implementing Internet of Things (IoT)-based applications. Although being a popular technology, several works in the literature have revealed vulnerabilities and risks regarding the security of LoRaWAN v1.0 (the official 1st specification draft). The LoRa-Alliance has built upon these findings and introduced several improvements in the security and architecture of LoRa. The result of these efforts resulted in LoRaWAN v1.1, released on 11 October 2017. This work aims at reviewing and clarifying the security aspects of LoRaWAN v1.1. By following ETSI guidelines, we provide a comprehensive Security Risk Analysisof the protocol and discuss several remedies to the security risks described. A threat catalog is presented, along with discussions and analysis in view of the scale, impact, and likelihood of each threat. To the best of the authors’ knowledge, this work is one of the first of its kind, by providing a detailed security risk analysis related to the latest version of LoRaWAN. Our analysis highlights important practical threats, such as end-device physical capture, rogue gateway and self-replay, which require particular attention by developers and organizations implementing LoRa networks.

    Fulltekst (pdf)
    fulltext
  • 30.
    Butun, Ismail
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Sari, Alparslan
    Department of Computer Engineering, University of Delaware, Newark, Delaware, USA.
    Österberg, Patrik
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Security Implications of Fog Computing on the Internet of Things2019Inngår i: International Conference on Consumer Electronics (ICCE), IEEE, 2019, artikkel-id 8661909Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Recently, the use of IoT devices and sensors has been rapidly increased which also caused data generation (information and logs), bandwidth usage, and related phenomena to be increased. To our best knowledge, a standard definition for the integration of fog computing with IoT is emerging now. This integration will bring many opportunities for the researchers, especially while building cyber-security related solutions. In this study, we surveyed about the integration of fog computing with IoT and its implications. Our goal was to find out and emphasize problems, specifically security related problems that arise with the employment of fog computing by IoT. According to our findings, although this integration seems to be non-trivial and complicated, it has more benefits than the implications. Index Terms—IoT, IIoT, vulnerabilities, trust, end-device, confidentiality, integrity, availability.

    Fulltekst (pdf)
    fulltext
  • 31.
    Butun, Ismail
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Österberg, Patrik
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Detecting Intrusions in Cyber-Physical Systems of Smart Cities: Challenges and Directions2019Inngår i: Secure Cyber-Physical Systems for Smart Cities / [ed] Riaz Ahmed Shaikh, Hershey, USA: IGI Global, 2019, s. 74-102Kapittel i bok, del av antologi (Fagfellevurdert)
    Abstract [en]

    Interfacing the smart cities with cyber-physical systems (CPSs) improves cyber infrastructures while introducing security vulnerabilities that may lead to severe problems such as system failure, privacy violation, and/or issues related to data integrity if security and privacy are not addressed properly. In order for the CPSs of smart cities to be designed with proactive intelligence against such vulnerabilities, anomaly detection approaches need to be employed. This chapter will provide a brief overview of the security vulnerabilities in CPSs of smart cities. Following a thorough discussion on the applicability of conventional anomaly detection schemes in CPSs of smart cities, possible adoption of distributed anomaly detection systems by CPSs of smart cities will be discussed along with a comprehensive survey of the state of the art. The chapter will discuss challenges in tailoring appropriate anomaly detection schemes for CPSs of smart cities and provide insights into future directions for the researchers working in this field.

  • 32.
    Butun, Ismail
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Österberg, Patrik
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Preserving location privacy in cyber-physical systems2019Inngår i: 2019 IEEE Conference on Communications and Network Security (CNS), IEEE, 2019, s. 1-6Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The trending technological research platform is Internet of Things (IoT)and most probably it will stay that way for a while. One of the main application areas of IoT is Cyber-Physical Systems (CPSs), in which IoT devices can be leveraged as actuators and sensors in accordance with the system needs. The public acceptance and adoption of CPS services and applications will create a huge amount of privacy issues related to the processing, storage and disclosure of the user location information. As a remedy, our paper proposes a methodology to provide location privacy for the users of CPSs. Our proposal takes advantage of concepts such as mix-zone, context-awareness, and location-obfuscation. According to our best knowledge, the proposed methodology is the first privacy-preserving location service for CPSs that offers adaptable privacy levels related to the current context of the user.

  • 33.
    Butun, Ismail
    et al.
    Chalmers.
    Österberg, Patrik
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Song, Houbing
    Embry-Riddle Aeronautical University, Daytona Beach, FL, USA.
    Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures2020Inngår i: IEEE Communications Surveys and Tutorials, ISSN 1553-877X, E-ISSN 1553-877X, Vol. 22, nr 1, s. 616-644, artikkel-id 8897627Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, the security of IoT should start with foremost securing WSNs ahead of the other components. However, owing to the absence of a physical line-of-defense, i.e., there is no dedicated infrastructure such as gateways to watch and observe the flowing information in the network, security of WSNs along with IoT is of a big concern to the scientific community. More specifically, for the application areas in which CIA (confidentiality, integrity, availability) has prime importance, WSNs and emerging IoT technology might constitute an open avenue for the attackers. Besides, recent integration and collaboration of WSNs with IoT will open new challenges and problems in terms of security. Hence, this would be a nightmare for the individuals using these systems as well as the security administrators who are managing those networks. Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In this text, attacks are categorized and treated into mainly two parts, most or all types of attacks towards WSNs and IoT are investigated under that umbrella: 'Passive Attacks' and 'Active Attacks'. Understanding these attacks and their associated defense mechanisms will help paving a secure path towards the proliferation and public acceptance of IoT technology. 

  • 34.
    Bygdeson, Mattias
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Utvecklingen av Spotalike2019Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [en]

    The goal with this assignment has been to study the product Spotalike and develop a new version to make the product more attractive. The studying of the product was done with the help of user data, such as how Spotalike is being used, what target audience it has, why it's being used, etc. The new version of Spotalike was planned by making design sketches and prototypes which were created as a first step in order to get a better picture of what the result would be. The new version is not available to the public, but it is fully functional and works locally. The solution that was concluded was to develop a music player which is built on the founding principles of the old Spotalike. The music player is developed with React and is powered by Spotify. Besides the old functions there are also new functions that has been implemented, and the interface has been redesigned. There is currently no new user data available to determine the result of the development, since the new version of Spotalike hasn't been made public yet.

    Fulltekst (pdf)
    fulltext
  • 35.
    Bylin, Jenniefer
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Riskanalys av självkörande fordon i hamnområden: En kvalitativ studie för interna transporter av containrar2019Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Today, companies face constant challenges, as the business must constantly be developed in order to compete. As new ports are being built in already existing ones, other opportunities are often made available to develop further and reduce costs and risks. Replacing some labour against automation is one of them. The study aims to ensure the risks of using selfdriving vehicles for the movement of containers in port areas. The work has been carried out at SCA in Tunadal for their new coming terminal. The aim of the study was to examine the risk associated with manpower versus self-driving vehicles exist. If, based on a safety aspect, it is profitable to go towards a more automated business. To carry out the study, documents have been collected describing the accidents in the port, two persons who are extra responsible for the accidents in the port have been interviewed and observations have been made to also see how the self-driving vehicle is to be applied to reality. When processing the data, THERP - Technique for human error rate prediction has been used for mapping the current situation. FMEA - failure mode and effects analysis and FTA - Fault tree analysis has been used to map the future situation with automation. The result shows that from a safety perspective, it is safest to use self-driving vehicles, as it is the human slips that represent the greatest risks in port areas.

    Fulltekst (pdf)
    fulltext
  • 36.
    Carlsson, Anna
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    eDiscovery-samverkan för digitalt bevarande2019Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    För att lösa problemen med långsiktigt digitalt bevarande måste det finnas en samverkan mellan människan, processen och tekniken. Databearbetning är ett viktigt steg att säkra den digitala långtidslagringen av dokument, och att använda samarbetsytor med gemensamma plattformar, för utarbetning mellan arkivinstitutioner. I ett datornätverk som automatiskt ska kunna hitta och kommunicera med annan utrustning i samma nätverk så använder vi dagligen olika system för att öppna våra filer, som i det ursprungliga filformatet har ett "inbyggt" format, som på ett bestämt sätt ordnar data som ska läsas och bearbetas av ett datorprogram. Här krävs att insamlingen av materialet görs korrekt. Behovet av kontaktytor för samarbete är stor och en aktivitet efter lösningar som möjliggör bland annat att uppfylla lagstiftning om bevarande av information pågår. Myndigheter och många företag som ännu inte uppmärksammat problematiken har behovet av lösningar.

    Fulltekst (pdf)
    fulltext
  • 37.
    Carlsson, August
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Åqvist, Marcus
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Lean´s påverkan på arbetsmiljön: En kvalitativ studie över effekterna på arbetsmiljö och hälsa vid införande av Lean2019Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    There are many organizations that choose to introduce Lean production in their operations, as these are the concepts that have made the greatest progress in terms of efficiency programs. Since Lean focuses on maximizing customer benefit and minimizing waste of resources in an organisation's business processes, it is often forgotten that the introduction also affects the staff. The purpose of the study is to investigate what effects on the working environment and health that employees in the private sector experience after an introduction of Lean production as a strategy within their organization. The aim of the study has been to answer how a Lean introduction affects the working environment and health. The study is based on Almondy's latest improvement work on the shrinkage process. With the help of an interview study and a general literature study, we have examined what effects a Lean introduction has on the work environment and health. The interview study was conducted at Almondy AB, which is a food producer based in Gothenburg. Searching the literature is done in article databases with keywords linked to the area. By means of a comparative analysis method, the result has been analyzed. There are studies that show that the effects vary depending on the point of view they have had and in which industry the survey was conducted. This means that the effects get a large spread and therefore it is difficult to give a general picture of the effects. The results of the interview study show a positive effect on the work environment as they describe that the physical moments in the process have decreased. The results of the literature study show that more studies are needed to be able to demonstrate the general effects that Lean has on the working environment. But the literature study suggests that there are both negative and positive effects on the work environment and health when introducing Lean. The conclusion suggests that Almondy has had a positive impact on their physical work environment since there has been a decrease in deviation reports. If someone wants to study further in the field, Lean production should be investigated in several industries and examine all aspects of a Lean introduction linked work environment and health.

     

    Fulltekst (pdf)
    fulltext
  • 38.
    Carlsson, Olivia
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Auktorisering i system för digitalt bevarande2019Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    The purpose is to investigate, analyze and clarify the relationship between authorization and security policy for digital preservation system. Information security comes into focus when digital preservation systems are discussed. The handling of electronic documents in digital preservation systems is now widespread and a large part of many activities. This means that the business must ensure that it protects against the loss of information stored in the digital preservation system. Authorization and security policy are relevant to archive and information science because digital objects in digital preservation system are to be protected from unauthorized access. With a qualitative method the research will go through security policy, systems and models for access architecture. With open approach and open questions, the research will be summarized with a discussion on the most important conclusions for access management for digital preservation system, which are mainly built on roles. It is of great importance that the company uses roles and authorization levels to ensure that everyone knows with certainty what to do and what they cannot do.

    Fulltekst (pdf)
    fulltext
  • 39.
    Danielson, Mats
    et al.
    Stockholm University, Kista; International Institute for Applied Systems Analysis, Laxenburg, Austria.
    Ekenberg, Love
    International Institute for Applied Systems Analysis, Laxenburg, Austria; Stockholm University, Kista.
    Larsson, Aron
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi. Stockholm University, Kista.
    A second-order-based decision tool for evaluating decisions under conditions of severe uncertainty2020Inngår i: Knowledge-Based Systems, ISSN 0950-7051, E-ISSN 1872-7409, Vol. 191, artikkel-id 105219Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The requirement to assign precise numerical values to model entities such as criteria weights, probabilities, and utilities is too strong in most real-life decision situations, and hence alternative representations and evaluation mechanisms are important to consider. In this paper, we discuss the DecideIT 3.0 state-of-the-art software decision tool and demonstrate its functionality using a real-life case. The tool is based on a belief mass interpretation of the decision information, where the components are imprecise by means of intervals and qualitative estimates, and we discuss how multiplicative and additive aggregations influence the resulting distribution over the expected values. 

  • 40.
    Davidsson, Viola
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Att välja e-arkiv2019Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Digitaliseringen har exploderat de senaste 30 åren och tyvärr har inte arkiven hunnit med i denna utveckling. Många kommuner har ännu inte tagit steget ut och infört e-arkiv, från en enkätundersökning som Riksarkivet gjorde 2010 visade det sig att enbart en femtedel av Sveriges kommuner hade infört e-arkiv vilket är väldigt lite med tanke på hur mycket framsteg digitaliseringen har gjort. Det finns två syften med den här uppsatsen; det första är att göra en mindre undersökning för att fånga orsaker till varför vissa kommuner har infört e-arkiv och andra inte.  Den andra är att visa vilka krav det finns på e-arkiv gällande juridiska aspekter, säkerhet, användarvänlighet och vilken kostnad införandet av e-arkiv medför. Uppsatsen är riktad till kommuner med ca 10 000-30 000 invånare där det inte finns samma möjligheter gällande ekonomi och kompetens som en större kommun har. Frågeställningarna är: Vilka krav finns det på e-arkiv gällande juridiska aspekter, säkerhet, användarvänlighet och klarar kommunerna av att bära den kostnaden som e-arkiv medför? Varför har vissa kommuner kommit igång med e-arkiv och andra inte?

    Metod för detta är en kombination av litteraturstudie och intervjustudie. Intervju har gjort med två leverantörer av e-arkiv, som vill vara anonyma i denna uppsats och 4 stycken kommuner, varav två stycken har infört e-arkiv och två stycken inte har e-arkiv. Dessa kommuner har valt för att de är kommuner med ca 10 000-30 000 invånare (som rapporten är riktad till). De valdes också ut för att de ligger i närheten av varandra rent geografiskt och kan därmed ge en mer rättvis bild av resultatet.

    I resultatdelen besvarades samtliga frågor. Krav på juridiska aspekter är Tryckfrihetsförordningen kap. 2 som säger att alla svenska medborgare har rätt att få ta del av allmänna handlingar. Arkivlagen reglerar vad det finns för krav på arkiv, vad syftet är, vad det ska tillgodose och att myndigheterna ska vårda sina arkiv. Gällande kostad fanns det som ambition att få fram en ekonomisk bild vad e-arkiv kostar. En kommun lämnade ut prisuppgifter och den andra kommunen hänvisade till SKL kommentus som har sekretess på prisuppgifterna. Leverantörerna lämnade inte heller ut prisuppgifter och på grund av detta kunde inte en jämförelse göras, men det ges tips på hur upphandling skulle kunna göras. Gällande säkerhet ges det exempel på saker att tänka på som till exempel behörighetsstyrning i e-arkivet för att skydda arkivet från obehöriga. Gällande tillgänglighet har det i denna uppsats valts att betyda hur tillgänglig e-arkivet är för allmänheten och även funktionshindrade. Därför har Ales e-arkiv granskats och de enlig Post och telestyrelsens - Vägledning för webbutveckling har Ale kommun hamnat på 44 %, de har alltså en bit kvar. Som svar på den andra frågan framkom det efter intervjustudien att den största orsaken till att kommunerna inte kommit igång med e-arkiv är att de saknar kompetens och därmed en eldsjäl som driver i frågan samt resurser.

    Fulltekst (pdf)
    fulltext
  • 41.
    Dima, Elijs
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Brunnström, Kjell
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi. Division ICT-Acreo, RISE Research Institutes of Sweden.
    Sjöström, Mårten
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Andersson, Mattias
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi. Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för design.
    Edlund, Joakim
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Johanson, Mathias
    Alkit Communications AB, Mölndal.
    Qureshi, Tahir
    HIAB AB, Hudiksvall.
    Joint effects of depth-aiding augmentations and viewing positions on the quality of experience in augmented telepresence2020Inngår i: Quality and User Experience, ISSN 2366-0139, E-ISSN 2366-0147, Vol. 5, s. 1-17Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Virtual and augmented reality is increasingly prevalent in industrial applications, such as remote control of industrial machinery, due to recent advances in head-mounted display technologies and low-latency communications via 5G. However, the influence of augmentations and camera placement-based viewing positions on operator performance in telepresence systems remains unknown. In this paper, we investigate the joint effects of depth-aiding augmentations and viewing positions on the quality of experience for operators in augmented telepresence systems. A study was conducted with 27 non-expert participants using a real-time augmented telepresence system to perform a remote-controlled navigation and positioning task, with varied depth-aiding augmentations and viewing positions. The resulting quality of experience was analyzed via Likert opinion scales, task performance measurements, and simulator sickness evaluation. Results suggest that reducing the reliance on stereoscopic depth perception via camera placement has a significant benefit to operator performance and quality of experience. Conversely, the depth-aiding augmentations can partly mitigate the negative effects of inferior viewing positions. However the viewing-position based monoscopic and stereoscopic depth cues tend to dominate over cues based on augmentations. There is also a discrepancy between the participants’ subjective opinions on augmentation helpfulness, and its observed effects on positioning task performance.

    Fulltekst (pdf)
    fulltext
  • 42.
    Dima, Elijs
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Brunnström, Kjell
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi. RISE Research Institutes of Sweden, Division ICT - Acreo.
    Sjöström, Mårten
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Andersson, Mattias
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Edlund, Joakim
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Johanson, Mathias
    Alkit Communications AB.
    Qureshi, Tahir
    HIAB AB.
    View Position Impact on QoE in an Immersive Telepresence System for Remote Operation2019Inngår i: 2019 Eleventh International Conference on Quality of Multimedia Experience (QoMEX), IEEE, 2019, s. 1-3Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper, we investigate how different viewing positions affect a user's Quality of Experience (QoE) and performance in an immersive telepresence system. A QoE experiment has been conducted with 27 participants to assess the general subjective experience and the performance of remotely operating a toy excavator. Two view positions have been tested, an overhead and a ground-level view, respectively, which encourage reliance on stereoscopic depth cues to different extents for accurate operation. Results demonstrate a significant difference between ground and overhead views: the ground view increased the perceived difficulty of the task, whereas the overhead view increased the perceived accomplishment as well as the objective performance of the task. The perceived helpfulness of the overhead view was also significant according to the participants.

    Fulltekst (pdf)
    Dima2019ViewPositionImpact
  • 43.
    Ekman, Marcus
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Implementation av Lean i traditionell verkstadsmiljö: En fallstudie i ett kollektivtrafikbolag2019Independent thesis Advanced level (degree of Master (One Year)), 20 poäng / 30 hpOppgave
    Abstract [sv]

    Denna studie undersöker hur Lean kan implementeras i en traditionell verkstadsmiljö för ett kollektivföretag inom bussbranschen i Sverige. Kollektivtrafikföretagen i Sverige lider av samma problem och det är låga marginaler. Lean kan vara ett sätt att öka sina marginaler på och i denna studie så fokuseras det på en pågående Lean implementation och även tidigare implementationer inom fallföretaget. Studien är gjord som en fallstudie med mixad metod dvs att den innehåller både kvalitativa och kvantitativa delar samt att ansatsen är abduktiv.

    Informationen om den pågående Lean implementationen och tidigare satsningar har inhämtas från intervjuer samt observationer. Sedan så har informationen analyserats och diskuterats för att komma fram till en slutsats. Den är att Lean kan implementeras i en traditionell verkstadsmiljö, men med olika resultat. Det beror på hur man gör det och studien visar att om man väljer att inkludera ledningen från början och utbilda dem innan implementationen sätter i gång så ökar chanserna att det blir lyckat. Först då visar studien att det är ett vinnande koncept. Ett annat problem är även det ärvda arbetssättet som finns i denna miljö, den är mer eller mindre påverkad av en svunnen tid då verksamheten var kommunal och inte hade samma avkastningskrav som idag.

    Fallföretaget som studien är gjord på har tidigare implementerat Lean men utan framgång, mycket beroende på att ledningen inte varit inkluderade. Det var en externpart som var den som utförde implementationen, det gjorde att det var svårt för underhållsledningen att se syftet och målet med implementationen dem var således exkluderade. Däremot har den pågående implementationen fått ett helt annat fäste hos ledningen, mycket därför att implementationen går genom dem. Underhållsledningen har också utbildats i förväg innan implementationen började, vilket studien visar var en av framgångsfaktorerna.

  • 44.
    Ekström, Louise
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för data- och systemvetenskap.
    Große, Christine
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Choice of Airport in Extinguishing Wildfires: Model and Cases2020Inngår i: Proceedings of the 9th International Conference on Operations Research and Enterprise Systems (ICORES) / [ed] Greg H. Parlier, Federico Liberatore and Marc Demange, SciTePress, 2020, s. 364-371Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper develops a model to support the optimal choice of an airport as a base for the flying vehicles that are operated to extinguish wildfires and forest fires. Based on experiences from the two largest wildfires in Swedish history, this study models the optimisation as a balanced transportation problem. In both cases, the model selected the airport that is closest to the fire area. If the capacity of the chosen airport was insufficient to host all of the flying vehicles, then the model added a second airport which is also nearby the wildfire area. The cases demonstrate that the total cost of the operation is lower when the extinguishing work is concentrated in an area that has a short distance between the airport and the fire, the fuel depots and the pilots’ accommodation. Improved access to relevant data in the context of crisis management by air could allow for the inclusion of additional parameters and correct data in the optimisation model, which could in turn provide more comprehensive decision-making support.

  • 45.
    Eldefrawy, Mohamed
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Butun, Ismail
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Pereira, Nuno
    Polytechnic of Porto (IPP), Porto, Portugal.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Formal security analysis of LoRaWAN2019Inngår i: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 148, s. 328-339Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Recent Low Power Wide Area Networks (LPWAN) protocols are receiving increased attention from industry and academia to offer accessibility for Internet of Things (IoT) connected remote sensors and actuators. In this work, we present a formal study of LoRaWAN security, an increasingly popular technology, which defines the structure and operation of LPWAN networks based on the LoRa physical layer. There are previously known security vulnerabilities in LoRaWAN that lead to the proposal of several improvements, some already incorporated into the latest protocol specification. Our analysis of LoRaWAN security uses Scyther, a formal security analysis tool and focuses on the key exchange portion of versions 1.0 (released in 2015) and 1.1 (the latest, released in 2017). For version 1.0, which is still the most widely deployed version of LoRaWAN, we show that our formal model allowed to uncover weaknesses that can be related to previously reported vulnerabilities. Our model did not find weaknesses in the latest version of the protocol (v1.1), and we discuss what this means in practice for the security of LoRaWAN as well as important aspects of our model and tools employed that should be considered. The Scyther model developed provides realistic models for LoRaWAN v1.0 and v1.1 that can be used and extended to formally analyze, inspect, and explore the security features of the protocols. This, in turn, can clarify the methodology for achieving secrecy, integrity, and authentication for designers and developers interested in these LPWAN standards. We believe that our model and discussion of the protocols security properties are beneficial for both researchers and practitioners. To the best of our knowledge, this is the first work that presents a formal security analysis of LoRaWAN.

    Fulltekst (pdf)
    fulltext
  • 46.
    Eldefrawy, Mohamed
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi. Halmstad Högskola.
    Ferrari, Nico
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Dynamic User Authentication Protocol for Industrial IoT without Timestamping2019Inngår i: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), IEEE, 2019, artikkel-id 8757984Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Internet of Things (IoT) technology has succeed ingetting a great attention in the industry where it has been ableand still can solve many industrial intractable issues. The emergingtechnology is suffering from severe security shortcomings.Authentication is a cornerstone of IoT security as it presents the measures of checking the legitimacy of communication’s entities.The Industrial IoT (IIoT) technology has special conditions, resulting from a lack of resources and a shortage of security skills. As far as we can tell, from the literature, IIoT user authentication has not been studied extensively. In 2017 Tai et al. presented an authenticated key agreement for IoT networks. Here we prove that Tai et al. is susceptible to sever security weaknesses, such as;i. stolen smart card attack, ii. unknown key share attack, iii. node capturing attack. In this research article, we offer an innovative IIoT user authentication scheme that can achieve secure remote user authentication without timestamping that requires precise synchronization, it only needs Hashing and Xor-ing. We examine the efficiency of our presented scheme using Tmote Sky node over an MSP430 microcontroller using COOJA simulator as well aswe show its correctness using Scyther verification tool.

  • 47.
    Eldefrawy, Mohamed
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Pereira, Nuno
    The Polytechnic of Porto (IPP), Portugal.
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Key Distribution Protocol for Industrial Internet of Things without Implicit Certificates2019Inngår i: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 6, nr 1, s. 906-917Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The deployment of the Internet of Things (IoT) in industry, called the Industrial IoT (IIoT), is supporting the introduction of very desirable improvements such as increasing production flexibility, self-organization and real-time and quick response to events. However, security and privacy challenges are still to be well addressed. The IIoT requires different properties to achieve secure and reliable systems and these requirements create extra challenges considering the limited processing and communication power available to IIoT field devices. In this research article, we present a key distribution protocol for IIoT that is computationally and communicationally lightweight (requires a single message exchange) and handles node addition and revocation, as well as fast re-keying. The scheme can also resist the consequences of node capture attacks (we assume that captured nodes can be detected by the Gateway and previous works have shown this assumption to be acceptable in practice), server impersonation attacks and provides forward/backward secrecy. We show formally the correctness of our protocol and evaluate its energy consumption under realistic scenarios using a real embedded platform compared to previous state-of-the-art key-exchange protocols, to show our protocol reliability for IIoT.

  • 48.
    Eneman, Marie
    et al.
    University of Gothenburg.
    Stenmark, Dick
    University of Gothenburg.
    Ljungberg, Jan
    University of Gothenburg.
    Borglund, Erik A. M.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Regulating Police Body-Worn Camera Practice - A Four Modality Perspective2019Inngår i: 10th Scandinavian Conference on Information Systems, Association for Information Systems, 2019Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Police authorities in a number of countries have recently introduced body-worn cameras (BWC). With the use of body-worn cameras, the police have gained access to new forms of wearable and powerful law enforcing technologies. The cameras enable collection of large volume of personal information and in some cases even sensitive information that must be managed and stored within the organisationin line with rules of law. As is often the case when technology develops faster than societal norms and values, a range of questions concerning issues related to regulation of these practises are still uninvestigated. Therefore, this paper will analyse what actually regulates individual police officers’ body- worn camera practice. Empirically, we use the Swedish police as a case and our study is based on qualitative interviews. Theoretically we draw upon Lawrence Lessig’s four modality model - law, norms, market, and architecture - and we conclude that i) law is considered important although law regarding BWC is still in its infancy, ii) while law and official directives have a more macro applicability, norms are developed and maintained more locally, iii) market regulate indirectly via availability and cost, and iv) architecture is not necessarily as self-executed as often stated.

  • 49.
    Engvall, Tove
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Records roles in Corporate Sustainability Reporting: An explorative study of corporate sustainability reporting from an archives and information science perspective2019Independent thesis Advanced level (degree of Master (Two Years)), 10 poäng / 15 hpOppgave
    Abstract [en]

    Calls for more responsible companies, have led to initiatives and legislations of sustainability reporting, in order to improve corporate transparency and accountability regarding companies economic, environmental and social impact.

    The aim of the research was to explore records roles in corporate sustainability reporting, which is discussed from an archives and information science perspective. Records are regarded as evidence of business activities and therefore crucial to accountability and decision-making processes. A sustainability report is a record, and records are also used to create a sustainability report.

    The thesis is based on a qualitative explorative methodology with interviews as data gathering technique. Interviews were carried out with four employees at three different companies who work with sustainability reporting, a sustainability consultant who works with sustainability reporting, and an auditor who assesses the  companies´ annual and sustainability reports. The interviews have addressed records’ role in different aspects of sustainability reporting, exploring how sustainability reports are created, used and pluralized. As well as how the records, generated as an effect of the reporting process, are used, what impact they have on the business and efficiency of the process. The thesis also explore respondents´ perspectives on reliability and credibility of the reports in relation to records qualities. Results from the interviews have been analysed with the lens of Records Continuum Model and the ISO standard for records management, ISO 15489-1:2016.

    Results show that records are key assets that provide evidential information that enables different functions and benefits –both to companies that report and to stakeholders. Primary benefits of the reporting that have been emphasized are that it enables transparency and accountability, informed decision-making, management of risks, compliance with legislation, ability to demonstrate corporate responsibility and meeting sustainability goals, greater business efficiency, evidence-based analysis and development activities, formation of business culture and identity, and protection of corporate and collective memory about the corporates’ work regarding sustainability. Records are also valuable assets for governance and continuous improvements. It enables to monitor trends and assessment on how the company meets its targets.

    The thesis gives an increased understanding of records’ role in a socio-economic context. It also suggests some areas for further research and development in order for sustainability reporting to further support a sustainable development. One of the major tasks would be to make pluralization of sustainability-related records more efficient, in order to facilitate further utilization of the information. This may enhance corporate accountability and decision making based on sustainability criteria, and would make the work more efficient for companies. The global records governance environment can be improved further, in order to support  global sustainable development. Important is also to raise awareness about the role of trustworthy records.

    Fulltekst (pdf)
    fulltext
  • 50.
    Engvall, Tove
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Situating trust challenges of online trade2019Inngår i: Records Management Journal, ISSN 0956-5698, E-ISSN 1758-7689, Vol. 29, nr 1-2, s. 272-286Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Purpose: This paper aims to offer an improved understanding of trust challenges in online trade, providing examples of issues that should be addressed for a trustworthy online environment. It also aims to illustrate how records and recordkeeping can contribute in terms of enabling trust and accountability. Design/methodology/approach: The paper is based on results from a self-ethnographic study of online trade (Engvall, 2017); the results are analyzed further. Kelton, Fleischmann and Wallace’s (2008) model for trust is used to gain a better understanding of the characteristics of the challenges and where they should be addressed. Findings: This paper recognizes that there are different types of trust challenges at different levels – individual, between clients and businesses and at a societal level – that should be addressed at these levels in different ways. Originality/value: This paper provides an understanding of trust challenges in the online environment. 

1234 1 - 50 of 187
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf