New MSc thesis position available for IT students: “Usable IoT Security”

The importance of usable security for IoT

According to a recent Gartner report on “Securing the IoT”, by 2020 more than 25% of identified attacks in enterprises will involve IoT devices.  By 2018, the global market size for IoT security will exceed $500 million. Thus, it is important to develop appropriate security concepts for the Internet of Things (IoT).

Security concepts will be most effective when they are properly understood and effectively used by application developers and end-users. When security concepts are more understandable and usable, people are more likely to use them, which will increase the overall system security. In conclusion, to achieve secure internet of things applications, usable security mechanisms for securing the internet of things are required.

Within the scope of this masters thesis, … [read more here]

تحقیق اعتماد کاربران به خانه‌های هوشمند

در راستای مطالعه پیرامون اعتماد کاربران به خانه‌های هوشمند، آزمایشگاه هوشمندی محیطی (دکتر علی اصغر نظری شیره‌جینی) دانشکده کامپیوتر دانشگاه صنعتی شریف، تحقیقی را با استفاده از یک شبیه‌ساز سه‌بعدیِ خانه هوشمند طراحی کرده است. شرکت شما در این تحقیق، برای طراحی خانه‌های هوشمند بهتر، بسیار مفید و کمک کننده است. این تحقیق هیچ هزینه‌ای برای شما ندارد و تنها حدود 10 تا 15 دقیقه از شما زمان خواهد گرفت. برای شرکت در این تحقیق، روی لینک ارائه شده در ادامه این پیام کلیک کنید تا به وب سایت ما متصل شوید. در ضمن در صورت امکان، این پیام را برای دوستان و گروه‌های دیگر نیز فوروارد کنید.

اگر از کامپیوتر شخصی یا لپتاپ استفاده می‌کنید، در مرورگر به‌روز شده خود با شبیه‌ساز کار کرده و پس از نمایش پیام “این بخش به پایان رسید”، دگمه “رفتن به پرسشنامه” را فشرده و پرسشنامه آنلاین را تکمیل نمایید.
اگر از تلفن هوشمند استفاده می‌کنید، اپلیکشن شبیه‌ساز را به صورت مستقیم و یا از کافه بازار، دانلود کرده و پس از نصب، اجرا کنید. پس از کار با آن و مشاهده پیام اتمام کار، شما به صورت خودکار به صفحه پرسشنامه آنلاین در وب‌سایت ما متصل می‌شوید که در این مرحله بایستی پرسشنامه را پر کنید.

.داده‌های شما برای ما بسیار مهم و ارزشمند بوده و محرمانگی آن‌ها به صورت کامل حفظ می‌شود.

لینک ورود به وب‌سایت:

در صورت وجود هرگونه سوال یا مشکل، از طریق آدرس ایمیل “” یا آی‌دی تلگرام “@HadiHN” به بنده پیام بدهید.

پیشاپیش از شرکت شما در این تحقیق و انتشار این پیام تشکر می‌کنیم.

By 2020, 25% of attacks will involve IoT devices

According to Gartner, “more than 25 percent of identified attacks in enterprises will involve IoT, although IoT will account for less than 10 percent of IT security budgets. Security vendors will be challenged to provide usable IoT security features because of the limited assigned budgets for IoT and the decentralized approach to early IoT implementations in organizations. Vendors will focus too much on spotting vulnerabilities and exploits, rather than segmentation and other long-term means that better protect IoT.”


MSc thesis: “Smart Road – Vehicle tracking using passive RFID”

Are you interested in a MSc thesis with applications in Industrial IoT? We got an open thesis position. Your task will be to measure the performance of vehicle localisation using passive UHF RFID tags and Extended Kalman Filter.


  • Davide Dardari, Pau Closas, and Petar M. Djurić, “Indoor tracking: Theory, methods, and technologies,” IEEE Transactions on Vehicular Technology, vol. 64, pp. 1263-1278, 2015.
  • Po Yang, Wenyan Wu, Mansour Moniri, and Claude C. Chibelushi, “Efficient object localization using sparsely distributed passive RFID tags,” IEEE transactions on industrial electronics, vol. 60, pp. 5914-5924, 2013.
  • S. H. Jeong and H. W. Son, “UHF RFID Tag Antenna for Embedded Use in a Concrete Floor,” in IEEE Antennas and Wireless Propagation Letters, vol. 10, pp. 1158-1161, 2011.
    doi: 10.1109/LAWP.2011.2172179

MSc Thesis: “RFID-based Situation Recognition in Smart Classrooms”

Long range UHF RFID technology can be used to detect object presence, measure their location relative to antenna position, and read information such as object type, profile and preference that could be stored right on the tags. Today, novel RFID tags are also capable of sensing environmental information. These information can be used to understand an objects context, and the context information coming from multiple objects can be used to determine the  “situation” governing the environment (e.g. room) where objects are situated.This kind of situation awareness is a key attribute to Ambient Intelligence.

As an example scenario, consider a classroom where we want to detect situations such as “setup”, “delivering the lecture”, “coffee break”, “question and answer session”, “exam”, “close up” etc.

One key challenge to situation recognition is the computational complexity when dealing with multidimensional context data. In particular, because in Ambient Intelligence the recognition is supposed to get done by resource-limited computers that are arranged in a de-central architecture and co-operate with a partial topology knowledge.

The idea to overcome this problem is to use a uni-dimensional context information coming from a very large amount of objects. Imagine having the presence information from 100-1000 objects that are among the “frequently visiting objects” of a classroom: ranging from your pen, books, computers, jacket, “Tschador”, bags, shoos to those objects owned by the university such as tables, projectors, seats etc.

UHF RFID tags can be massively deployed to label all kind of everyday objects that could be detected using long-range RFID sensors. Such sensors can scan more than 500 tags per scan. One or two scans per second is a realistic operation scenario. A globally unique ID such as the EPC represents an object. Although RFID tags are capable of storing additional information such as, in this research we are interested to explore whether or not just the presence information can allow for a robust situation recognition. If the research successful, we can construct such environments using only one type of sensors: UHF RFID. In contrast to other kind of sensing technology, RFID is robust, widely accepted, and available. It is a off-the-shelf product. Worldwide, a large industry is working on improving it around the clock. Training and certification programs for system engineers to deploy and maintain RFID is widely available. Thus, using RFID technology to construct Ambient Intelligence environments will reduce acquisition, operation, and maintenance costs.

The research question is how robust one can recognize situations in an intelligent classroom using a single type of object presence sensor.

Note: both hardware and software with example source code are available in the lab.


Workshop on Ambient Multimedia and Sensory Environments (AMUSE)

We organize the “Second IEEE International Workshop on Ambient Multimedia and Sensory Environments (AMUSE)”, in Conjunction with the IEEE International Conference on Multimedia and Expo (ICME), on July 14 (or July 18), 2014, in Chengdu, China.

Submission deadline is the 23th March 2013.

Visit the workshops’ website at