Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Smart Energy Harvesting For Internet Of Things Networks, Fisayo Sangoleye Oct 2021

Smart Energy Harvesting For Internet Of Things Networks, Fisayo Sangoleye

Electrical and Computer Engineering ETDs

In this thesis, we address the problem of prolonging the battery life of Internet of Things (IoT) nodes by introducing a smart energy harvesting framework for IoT networks supported by femtocell access points (FAPs) based on the principles of Contract Theory and Reinforcement Learning. Initially, the IoT nodes’ social and physical characteristics are identified and captured through the concept of IoT node types. Then, Contract Theory is adopted to capture the interactions among the FAPs, who provide personalized rewards, i.e., charging power, to the IoT nodes to incentivize them to invest their effort, i.e., transmission power, to report their data …


Iot Garden Frost Alarm, Andrew James Jun 2021

Iot Garden Frost Alarm, Andrew James

Honors Theses

Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.

The system as designed …


Pilltank, Lucas Chang, Hayden Tam, Aaron Teh, Krista Round Jun 2021

Pilltank, Lucas Chang, Hayden Tam, Aaron Teh, Krista Round

Electrical Engineering

Imagine an elderly family member, going through their daily routine of taking their pills. They find their pill box; however, they are having trouble identifying all the pills in there. Is there a name on the tablet? Can they read what it says? Do they just trust that the medication in their box is correct? How can they properly take care of themselves if they can not even confirm that what they are taking is the right medication? To combat this issue that many face, we present PillTank.

To decrease the risk of consuming the wrong medication, PillTank identifies the …


Smartmesh Ip Network And Iot System, Marc Aurel Kamsu Tennou May 2021

Smartmesh Ip Network And Iot System, Marc Aurel Kamsu Tennou

Culminating Projects in Electrical Engineering

In recent years, a great deal of research conducted in a variety of scientific areas, including physics, microelectronics, and material science, by scientific experts from different domains of expertise has resulted in the invention of Micro-Electro-Mechanical Systems (MEMS). As MEMS became very popular and widely used, the need for combining the capabilities of sensing, actuation, processing, and communication also grew, and led to further research which would result in the design and implementation of devices which could reflect all those four capabilities. These devices became knowns as Wireless Sensor Networks (WSNs) and they have been the focus of considerable research …


A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner May 2021

A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner

Masters Theses

The advent of the Internet of Things has brought about a staggering level of inter-connectivity between common devices used every day. Unfortunately, security is not a high priority for developers designing these IoT devices. Often times the trade-off of security comes at too high of a cost in other areas, such as performance or power consumption. This is especially prevalent in resource-constrained devices, which make up a large number of IoT devices. However, a lack of security could lead to a cascade of security breaches rippling through connected devices. One of the most common attacks used by hackers is return …


Enabling Iot Authentication, Privacy And Security Via Blockchain, Md Nazmul Islam Apr 2021

Enabling Iot Authentication, Privacy And Security Via Blockchain, Md Nazmul Islam

Doctoral Dissertations

Although low-power and Internet-connected gadgets and sensors are increasingly integrated into our lives, the optimal design of these systems remains an issue. In particular, authentication, privacy, security, and performance are critical success factors. Furthermore, with emerging research areas such as autonomous cars, advanced manufacturing, smart cities, and building, usage of the Internet of Things (IoT) devices is expected to skyrocket. A single compromised node can be turned into a malicious one that brings down whole systems or causes disasters in safety-critical applications. This dissertation addresses the critical problems of (i) device management, (ii) data management, and (iii) service management in …