Refine
Document Type
- Article (reviewed) (2)
- Bachelor Thesis (1)
- Conference Proceeding (1)
- Master's Thesis (1)
Conference Type
- Konferenzartikel (1)
Keywords
- Gebäudeleittechnik (5) (remove)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (2)
- Fakultät Medien (M) (ab 22.04.2021) (2)
- INES - Institut für nachhaltige Energiesysteme (2)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (1)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (1)
Open Access
- Closed Access (3)
- Closed (1)
- Diamond (1)
- Open Access (1)
Die Vielfalt der Protokolle, die praktisch auf allen Ebenen der Netzwerkkommunikation zu berücksichtigen ist, stellt eine der großen Herausforderungen bei der fortschreitenden Automatisierung des intelligenten Hauses dar. Unter dem Überbegriff Internet der Dinge (Internet of Things) entstehen gegenwärtig zahlreiche neue Entwicklungen, Standards, Allianzen und so genannte Ökosysteme. Diese haben die Absicht einer horizontalen Integration gewerkeübergreifender Anwendungen und verfolgen fast alle das Ziel, die Situation zu vereinfachen, die Entwicklungen zu beschleunigen und Markterfolge zu erreichen. Leider macht diese Vielfalt momentan die Welt aber eher noch komplexer und bringt damit das Risiko mit sich, genau das Gegenteil der ursprünglichen Absichten zu erreichen. Dieser Beitrag versucht, die Entwicklungen möglichst systematisch zu kategorisieren und mögliche Lösungsansätze zu beschreiben.
Private households constitute a considerable share of Europe's electricity consumption. The current electricity distribution system treats them as effectively passive individual units. In the future, however, users of the electricity grid will be involved more actively in the grid operation and can become part of intelligent networked collaborations. They can then contribute the demand and supply flexibility that they dispose of and, as a result, help to better integrate renewable energy in-feed into the distribution grids.
Konzeption und Erstellung einer Informationsplattform zur Darstellung von Smart Home Anwendungen
(2022)
Gegenstand dieser Bachelorarbeit ist die Konzeption und Erstellung einer digitalen Informati-onsplattform zur Darstellung von Smart Home Anwendungen und deren Funktionsweise.
Als Grundlage hierfür dient der von der Hahn-Schickard-Gesellschaft für angewandte For-schung errichtete und betriebene „Smarte Caravan (SmaC)“, in welchen zu Demonstrationszwecken einige Sensoren sowie Aktoren aus dem Smart Home Bereich eingebaut wurden.
Für die Erstellung der digitalen Informationsplattform wird daher zunächst eine Analyse sowie ein Vergleich der verschiedenen Möglichkeiten zur interaktiven Darstellung von Informationsinhalten durchgeführt.
Anschließend wird eine Aufstellung von Anwendungen und Szenarien gesammelt, welche in der interaktiven Darstellung integriert werden sollen.
Letztendlich liegt eine interaktive Smart Home Umgebung vor, mit der verschiedene Funktionalitäten des Smart Home erlebbar werden und Informationen darüber gewonnen werden können.
The current methods used to assess the energy performance of ventilation devices do not consider all the aspects necessary for a comprehensive evaluation of decentralised ventilation concepts and can only be partially adapted to their needs. In order to improve the energy evaluation and to ensure the comparability of different systems, a calorimetric method was developed and implemented in test facilities for the evaluation of two decentralised devices: one equipped with a recuperative counter flow heat exchanger and one with a regenerative heat exchanger. This method, based on direct measurements of the heating load in an insulated test room, includes the effect of the electrical consumption of the fans on the energy performance of the ventilation devices. The calorimetric evaluation method was extended to a seasonal evaluation on the basis of a heating-degree-day method implemented for a warm, a cool and a moderate location in Europe: Athens, Strasbourg and Copenhagen. All the results are above 50% efficiency for both devices, even in Athens where the use of heat recovery ventilation is not usual.
It is generally agreed that the development and deployment of an important amount of IoT devices throughout the world has revolutionized our lives in a way that we can rely on these devices to complete certain tasks that may have not been possible just years ago which also brought a new level of convenience and value to our lives.
This technology is allowing us in a smart home environment to remotely control doors, windows, and fridges, purchase online, stream music easily with the use of voice assistants such as Amazon Echo Alexa, also close a garage door from anywhere in the world to cite some examples as this technology has added value to several domains ranging from household environments, cites, industries by exchanging and transferring data between these devices and customers. Many of these devices’ sensors, collect and share information in real-time which enables us to make important business decisions.
However, these devices pose some risks and also some security and privacy challenges that need to be addressed to reach their full potential or be considered to be secure. That is why, comprehensive risk analysis techniques are essential to enhance the security posture of IoT devices as they can help evaluate the robustness and reliability towards potential susceptibility to risks, and vulnerabilities that IoT devices in a smart home setting might possess.
This approach relies on the basis of ISO/IEC 27005 methodology and risk matrix method to highlight the level of risks, impact, and likelihood that an IoT device in smart home settings can have, map the related vulnerability, threats and risks and propose the necessary mitigation strategies or countermeasures that can be taken to secure a device and therefore satisfying some security principles. Around 30 risks were identified on Amazon Echo and the related IoT system using the methodology. A detailed list of countermeasures is proposed as a result of the risk analysis. These results, in turn, can be used to elevate the security posture of the device.