SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
-
Master Thesis @ UNIK
Areas for Master Thesis work in
Wireless Networks and Information Security
Josef Noll, Audun Jøsang, Øivind Kure, Leif Nilsen, Pål
Orten, Abul Kaosher, Torleiv Maseng, Paal Engelstad, Terje
Tjelta, Lars Bråten.....
University Graduate Center, Kjeller
josef@unik.no
http://cwi.unik.no/wiki/Thesis
WNIS
Josef NollMaster Thesis @ UNIK
WNIS
Security
Our areas
2
TagCloud for Thesis
Remote Sensing/
Methods
Radio
technology
Network
technology
4G Access Network Ad-hoc Adaptive systems Ambient environment ANT+ Beyond 4G Bluetooth Cognitive radio Communications Congestion control Category:Context
Continous Phase Modulation Cyber Security Decision making DVB-RCS EHealth Embedded systems Emerging Economies Encryption Energy consumption Ethernet ETSI
TS102.690 Femto Cells Frequency GPS Gray space GSM-R Home applications Identity management IMT-A Indoor Indoor Positioning Information Security Interface
Internet of Things IoT IPS Liberty Alliance Light-weight semantics Link layer protocol Login LTE M2M platform Matlab Microsoft Card Space MMRP protocol Mobile Mobile
applications Mobile Infrastructure Mobile integration Mobil Networks Mobile networks Modellering MSTP Multicast Network Networked
embedded systems NFC OMNET OpenFlow Pervasive computing Propagation QoS Radio Reasoning Reuse RFID Routing Satellite Security
Category:Semantic Technologies SensorSensornett Sensor Networks Service platform Shepherd SIM Simulation Simulering Smart home Smart house Smart metering
Social networks Software defined network Spanning Tree Prototocl SSO Subsea Sun SPOT Telenor Objects Thin pipes TLS Traffic engineering Traffic management Trust Trust-based
security TV Ultrasound UWB Video Virtualization Web-services Web integration White space Wifi WiMAX Wireless HART Wireless networks Wireless
Sensor Networks WSNZigBee
Josef NollMaster Thesis @ UNIK
WNIS
3
Examples of Master Theses (completed)
SIM with
NFC & PKI
Nettbank access
through phone
authentication
Mobile key (mkey)
distributed by the
mobile
Interworking Mobile,
Devices, Sensors
Seamless access to
home content
Roles
Virtual.
Josef NollMaster Thesis @ UNIK
WNISCommunication in the North
4
Operasjonsområdet
• xxx
Course: UNIK4100: Satellite Communication
– The challenges to cover the high North
Course: UNIK4700: Radio and Mobility
– The basics in radio communication and mobile services
and many other courses related to Radio and Propagation
ESA project on
Measuring and Modelling
Propagation in the High
North FFI
Josef NollMaster Thesis @ UNIK
WNISInternet for Emerging Economies
l “Internet is a social right”
l “The user owns the network”
l Network planning under new
considerations:
– WiMAX, LTE
– Wifi
– AdHoc
l Challenges
– coverage
– education
5
Josef NollMaster Thesis @ UNIK
WNIS
User-centric
service provision
Preferences
Context
Roles
Identities
Sensors
Services
Devices
Data
3rd wave of Internet
The Internet of People, Things and Services
l An ever increasing complexity in the digital
environment
-> Hiding the complexity from the user
l User-centric service provisioning
-> Representing the user adequately
l Connecting to sensors, devices and
services
-> Provide privacy and ensure trust
relations
Course: UNIK4710: Mobile Semantic Service Delivery
– how to provide personalised and context aware services
Josef NollMaster Thesis @ UNIK
WNISMeasurable Security
l How secure is a system?
l And a system of systems?
l With data from sensors?
7
Security
attributes
availability
confidentiality
integrity
safety
reliability
maintaina
Josef NollMaster Thesis @ UNIK
WNISeHealth and fun :-)
l eHealth
l phone based health
monitoring
l monitor and positive
control
8
and some fun:
l Drive, the car, download the
app
l Search for Silverlit Ferrari
Enzo
Bluetooth
low energy
ANT+
HTC Rhyme
Endomondo
Xperia
Josef NollMaster Thesis @ UNIK
WNISSocialtainment
l Entertainment
l Infotainment
l Socialtainment
9
people
traffic
Social
Mobility
vehicles
Pool
charging
warning
parking
micro-
coordination
social
IoT
tour
smart grid
www
info
music
maps
energy
control
Josef NollMaster Thesis @ UNIK
WNIS
Local Presence
context-aware information
l Information, Advertisement and Entertainment
l Context-aware and personalised
10
free Wifi
preferences
1
2
personalised info
Oslo: gate 51 (on time), boarding in 30
min, 5 min walk
Zürich: gate 89 (on time), boarding in 2
hours, 10 min walk
Transfer Information
3
Josef NollMaster Thesis @ UNIK
WNISMonitoring Air Quality
l Measuring particles/molecules
l Model for air pollution
l phone based health information
11
App on
mobile
phone
EU project on Mobile
Monitoring of Air Quality
(tbc) NILU
Josef NollMaster Thesis @ UNIK
WNIS
Light-weight software for
autonomous operations
l The challenge of UAV reconfigurability: certifying
software
l Software certification: 50 US$/line
l The novel concept: from algorithms to search
12
Josef NollMaster Thesis @ UNIK
WNIS
13
My phone is my digital identifier
SIM with
NFC & PKI
Check http://cwi.unik.no

Weitere ähnliche Inhalte

Was ist angesagt?

Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile Computing
David Livingston J
 
5 g tech
5 g tech5 g tech
5 g tech
manas87
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
prjpublications
 
08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
IAESIJEECS
 

Was ist angesagt? (20)

Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challenges
 
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
 
Making Sense of M2M and IoT
Making Sense of M2M and IoTMaking Sense of M2M and IoT
Making Sense of M2M and IoT
 
Past, Present and Future of Mobile Computing
Past, Present and Future of Mobile ComputingPast, Present and Future of Mobile Computing
Past, Present and Future of Mobile Computing
 
Zigbee based proposal
Zigbee based proposalZigbee based proposal
Zigbee based proposal
 
Fog Networking
Fog NetworkingFog Networking
Fog Networking
 
5 g tech
5 g tech5 g tech
5 g tech
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
seminar report on ambient intelligent
seminar report on ambient intelligentseminar report on ambient intelligent
seminar report on ambient intelligent
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
 
IEEE NS2 Projects 2012
IEEE NS2 Projects 2012IEEE NS2 Projects 2012
IEEE NS2 Projects 2012
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012
 
Wireless vs mobile computing
Wireless vs mobile computingWireless vs mobile computing
Wireless vs mobile computing
 
Internet of Things (Indoor Localization and iBeacons)
Internet of Things (Indoor Localization and iBeacons)Internet of Things (Indoor Localization and iBeacons)
Internet of Things (Indoor Localization and iBeacons)
 
08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
 

Ähnlich wie Masterthesis/Masteroppgaver at UNIK

Advantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving applicationAdvantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving application
bachhavsmita
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
PayamBarnaghi
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
CityPulse Project
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
Clayton Hatathlie
 
Lawful interception monitoring using distributed architecture for ngn 2
Lawful interception monitoring using distributed architecture for ngn 2Lawful interception monitoring using distributed architecture for ngn 2
Lawful interception monitoring using distributed architecture for ngn 2
IAEME Publication
 

Ähnlich wie Masterthesis/Masteroppgaver at UNIK (20)

FIRE and Linked Data: Dennis Pfisterer (University of Luebeck, Germany)
FIRE and Linked Data: Dennis Pfisterer (University of Luebeck, Germany)FIRE and Linked Data: Dennis Pfisterer (University of Luebeck, Germany)
FIRE and Linked Data: Dennis Pfisterer (University of Luebeck, Germany)
 
Advantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving applicationAdvantages of ad hoc sensor network, driving application
Advantages of ad hoc sensor network, driving application
 
Smart health
Smart healthSmart health
Smart health
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Thesis on Wireless Networks
Thesis on Wireless NetworksThesis on Wireless Networks
Thesis on Wireless Networks
 
5G NR radio protocols to support URLLC
5G NR radio protocols to support URLLC5G NR radio protocols to support URLLC
5G NR radio protocols to support URLLC
 
Role of communication in it
Role of communication in itRole of communication in it
Role of communication in it
 
wireless sensor networks & application :forest fire detection
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detection
 
Iot Report
Iot ReportIot Report
Iot Report
 
CV_Ilias_Moutzouris
CV_Ilias_MoutzourisCV_Ilias_Moutzouris
CV_Ilias_Moutzouris
 
Fiber Optics
Fiber OpticsFiber Optics
Fiber Optics
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 
Lawful interception monitoring using distributed architecture for ngn 2
Lawful interception monitoring using distributed architecture for ngn 2Lawful interception monitoring using distributed architecture for ngn 2
Lawful interception monitoring using distributed architecture for ngn 2
 
Ericsson Technology Review: Key technology choices for optimal massive IoT de...
Ericsson Technology Review: Key technology choices for optimal massive IoT de...Ericsson Technology Review: Key technology choices for optimal massive IoT de...
Ericsson Technology Review: Key technology choices for optimal massive IoT de...
 
Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensor
 
Research Challenges in Networked Systems, Torsten Braun, Universität Bern
Research Challenges in Networked Systems, Torsten Braun, Universität BernResearch Challenges in Networked Systems, Torsten Braun, Universität Bern
Research Challenges in Networked Systems, Torsten Braun, Universität Bern
 

Mehr von Josef Noll

Mehr von Josef Noll (14)

Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...Free Internet Information Access - Activities and Pilots for the Human Right ...
Free Internet Information Access - Activities and Pilots for the Human Right ...
 
Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...
 
Security, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile NetworksSecurity, Privacy and Dependability in Mobile Networks
Security, Privacy and Dependability in Mobile Networks
 
Internet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptationInternet of Things in Scandinavia - society and ecosystem for early adaptation
Internet of Things in Scandinavia - society and ecosystem for early adaptation
 
The Future Network: Users will own the access in a collaborative radio enviro...
The Future Network: Users will own the access in a collaborative radio enviro...The Future Network: Users will own the access in a collaborative radio enviro...
The Future Network: Users will own the access in a collaborative radio enviro...
 
"Potentials and Challenges for Mobile Commerce - a Nordic Perspective
"Potentials and Challenges for Mobile Commerce - a Nordic Perspective"Potentials and Challenges for Mobile Commerce - a Nordic Perspective
"Potentials and Challenges for Mobile Commerce - a Nordic Perspective
 
Near field communication and RFID - opening for new business
Near field communication and RFID - opening for new businessNear field communication and RFID - opening for new business
Near field communication and RFID - opening for new business
 
Towards Global Mobility
Towards Global MobilityTowards Global Mobility
Towards Global Mobility
 
What is Semantic Service provisioning
What is Semantic Service provisioningWhat is Semantic Service provisioning
What is Semantic Service provisioning
 
Semantic Service Creation for Mobile Users
Semantic Service Creation for Mobile UsersSemantic Service Creation for Mobile Users
Semantic Service Creation for Mobile Users
 
Mobile based authentication and payment
Mobile based authentication and paymentMobile based authentication and payment
Mobile based authentication and payment
 
Privacy issues in network environments
Privacy issues in network environmentsPrivacy issues in network environments
Privacy issues in network environments
 
Introduction to Personalisation
Introduction to PersonalisationIntroduction to Personalisation
Introduction to Personalisation
 
Who ownes the SIM? a user-centric view on future networks
Who ownes the SIM? a user-centric view on future networksWho ownes the SIM? a user-centric view on future networks
Who ownes the SIM? a user-centric view on future networks
 

Kürzlich hochgeladen

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Masterthesis/Masteroppgaver at UNIK

  • 1. - Master Thesis @ UNIK Areas for Master Thesis work in Wireless Networks and Information Security Josef Noll, Audun Jøsang, Øivind Kure, Leif Nilsen, Pål Orten, Abul Kaosher, Torleiv Maseng, Paal Engelstad, Terje Tjelta, Lars Bråten..... University Graduate Center, Kjeller josef@unik.no http://cwi.unik.no/wiki/Thesis WNIS
  • 2. Josef NollMaster Thesis @ UNIK WNIS Security Our areas 2 TagCloud for Thesis Remote Sensing/ Methods Radio technology Network technology 4G Access Network Ad-hoc Adaptive systems Ambient environment ANT+ Beyond 4G Bluetooth Cognitive radio Communications Congestion control Category:Context Continous Phase Modulation Cyber Security Decision making DVB-RCS EHealth Embedded systems Emerging Economies Encryption Energy consumption Ethernet ETSI TS102.690 Femto Cells Frequency GPS Gray space GSM-R Home applications Identity management IMT-A Indoor Indoor Positioning Information Security Interface Internet of Things IoT IPS Liberty Alliance Light-weight semantics Link layer protocol Login LTE M2M platform Matlab Microsoft Card Space MMRP protocol Mobile Mobile applications Mobile Infrastructure Mobile integration Mobil Networks Mobile networks Modellering MSTP Multicast Network Networked embedded systems NFC OMNET OpenFlow Pervasive computing Propagation QoS Radio Reasoning Reuse RFID Routing Satellite Security Category:Semantic Technologies SensorSensornett Sensor Networks Service platform Shepherd SIM Simulation Simulering Smart home Smart house Smart metering Social networks Software defined network Spanning Tree Prototocl SSO Subsea Sun SPOT Telenor Objects Thin pipes TLS Traffic engineering Traffic management Trust Trust-based security TV Ultrasound UWB Video Virtualization Web-services Web integration White space Wifi WiMAX Wireless HART Wireless networks Wireless Sensor Networks WSNZigBee
  • 3. Josef NollMaster Thesis @ UNIK WNIS 3 Examples of Master Theses (completed) SIM with NFC & PKI Nettbank access through phone authentication Mobile key (mkey) distributed by the mobile Interworking Mobile, Devices, Sensors Seamless access to home content Roles Virtual.
  • 4. Josef NollMaster Thesis @ UNIK WNISCommunication in the North 4 Operasjonsområdet • xxx Course: UNIK4100: Satellite Communication – The challenges to cover the high North Course: UNIK4700: Radio and Mobility – The basics in radio communication and mobile services and many other courses related to Radio and Propagation ESA project on Measuring and Modelling Propagation in the High North FFI
  • 5. Josef NollMaster Thesis @ UNIK WNISInternet for Emerging Economies l “Internet is a social right” l “The user owns the network” l Network planning under new considerations: – WiMAX, LTE – Wifi – AdHoc l Challenges – coverage – education 5
  • 6. Josef NollMaster Thesis @ UNIK WNIS User-centric service provision Preferences Context Roles Identities Sensors Services Devices Data 3rd wave of Internet The Internet of People, Things and Services l An ever increasing complexity in the digital environment -> Hiding the complexity from the user l User-centric service provisioning -> Representing the user adequately l Connecting to sensors, devices and services -> Provide privacy and ensure trust relations Course: UNIK4710: Mobile Semantic Service Delivery – how to provide personalised and context aware services
  • 7. Josef NollMaster Thesis @ UNIK WNISMeasurable Security l How secure is a system? l And a system of systems? l With data from sensors? 7 Security attributes availability confidentiality integrity safety reliability maintaina
  • 8. Josef NollMaster Thesis @ UNIK WNISeHealth and fun :-) l eHealth l phone based health monitoring l monitor and positive control 8 and some fun: l Drive, the car, download the app l Search for Silverlit Ferrari Enzo Bluetooth low energy ANT+ HTC Rhyme Endomondo Xperia
  • 9. Josef NollMaster Thesis @ UNIK WNISSocialtainment l Entertainment l Infotainment l Socialtainment 9 people traffic Social Mobility vehicles Pool charging warning parking micro- coordination social IoT tour smart grid www info music maps energy control
  • 10. Josef NollMaster Thesis @ UNIK WNIS Local Presence context-aware information l Information, Advertisement and Entertainment l Context-aware and personalised 10 free Wifi preferences 1 2 personalised info Oslo: gate 51 (on time), boarding in 30 min, 5 min walk Zürich: gate 89 (on time), boarding in 2 hours, 10 min walk Transfer Information 3
  • 11. Josef NollMaster Thesis @ UNIK WNISMonitoring Air Quality l Measuring particles/molecules l Model for air pollution l phone based health information 11 App on mobile phone EU project on Mobile Monitoring of Air Quality (tbc) NILU
  • 12. Josef NollMaster Thesis @ UNIK WNIS Light-weight software for autonomous operations l The challenge of UAV reconfigurability: certifying software l Software certification: 50 US$/line l The novel concept: from algorithms to search 12
  • 13. Josef NollMaster Thesis @ UNIK WNIS 13 My phone is my digital identifier SIM with NFC & PKI Check http://cwi.unik.no