Dissertationen zum Thema „Réseau Internet des objets“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Réseau Internet des objets" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Hammi, Mohamed Tahar. „Sécurisation de l'Internet des objets“. Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006/document.
Der volle Inhalt der QuelleInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Bonnefoi, Rémi. „Utilisation de la radio intelligente pour un réseau mobile à faible consommation d’énergie“. Thesis, CentraleSupélec, 2018. http://www.theses.fr/2018CSUP0001.
Der volle Inhalt der QuelleThe reduction of the carbon footprint of human activities is one of the current major economic and ecological challenges. Communication networks have a dual role in this reduction. On one hand, mobile networks, and in particular the base stations, are nowadays an important energy consumer. It is, thus, necessary to optimize their behavior in order to reduce their carbon footprint. On the other hand, some communication networks are necessary to better manage the electrical grid. Thanks to this better management, it is possible to improve the proportion of electricity produced by renewable energy sources.In this thesis, we look at both aspects. In a first step, we propose a solution to reduce the energy consumption of wireless mobile networks. For that purpose, we propose algorithms that optimize the power allocation when Cell Discontinuous Transmission is used by the base stations.In a second step, we propose a solution in order to improve the performance of Internet of Things networks used for the electrical grid. More precisely, we use multi-armed bandit algorithm for channel selection in IoT networks as a means of increasing the reliability of communications
Bamdé, Aurélien. „Essai d'une théorie sur l'architecture normative du réseau Internet“. Thesis, Paris 2, 2013. http://www.theses.fr/2013PA020036.
Der volle Inhalt der QuelleComplex is undoubtedly the adjective that best summarises the issue of the normative architecture of the Internet network. This issue is complex for two reasons. The first one results from the identification of the rules that make up this architecture and the second one from their purpose. First of all, the identification of the rules proves to be an extremely complex matter, since this concept of the rule is not so easy to define, as it refers to such a wide range of realities. After establishing the existence of the rules which set the behaviour of network builders, it is necessary to raise the question of the the nature of the rules. Here again, solving this issue is not as easy as it seems. In fact, in literature there is no universal way to distinguish the various types of rules. Secondly, the rules that compose the normative architecture of the internet aim at organising the digital society. Yet, this is a complex system. If one accepts the idea, one has to correlatively claim that the rule-complying scheme that enables such a system to be controlled is very different from that which rules more common rules for us, such as the rules of law. While the former is underpinned by a self organising mechanism, the creation of the latter stems from an act of willing. The difference between both schemes is significant: in the first case spontaneity controls the setting up of rules of conduct, while in the second case reason does. The opposition between these two normative schemes can be found in the digital universe too. It is conveyed by the existing competition between the digital and the legal orders. That is why the normative architecture of the Internet network will be described through the competition between these two normative systems
Pittoli, Philippe. „Influence d'une architecture de type maître-esclave dans les problématiques de sécurité de l'Internet des objets“. Thesis, Strasbourg, 2019. http://www.theses.fr/2019STRAD006/document.
Der volle Inhalt der QuelleThe Internet of things is a network design where "things" are connected to the Internet, such as thermometers or lights. These objects are constrained in memory, computational capacity and communication (packet size, shared medium). The thesis is focused on issues around those constraints. A client willing to send a request to an object may either establish a direct connection to the object (end-to-end architecture) or establish a connection to the network gateway, which is not constrained in memory or computation capabilities, and will be used as a broker between clients and objects (master-slave architecture). This purpose of the thesis is to understand and to spotlight the differences between those two kinds of architectures and to determine their viability in an IoT context
Marcastel, Alexandre. „Allocation de puissance en ligne dans un réseau IoT dynamique et non-prédictible“. Thesis, Cergy-Pontoise, 2019. http://www.theses.fr/2019CERG0995/document.
Der volle Inhalt der QuelleOne of the key challenges in Internet of Things (IoT) networks is to connect numerous, heterogeneous andautonomous devices. These devices have different types of characteristics in terms of: application, computational power, connectivity, mobility or power consumption. These characteristics give rise to challenges concerning resource allocation such as: a) these devices operate in a highly dynamic and unpredictable environments; b) the lack of sufficient information at the device end; c) the interference control due to the large number of devices in the network. The fact that the network is highly dynamic and unpredictable implies that existing solutions for resource allocation are no longer relevant because classical solutions require a perfect or statistical knowledge of the network. To address these issues, we use tools from online optimization and machine learning. In the online optimization framework, the device only needs to have strictly causal information to define its online policy. In order to evaluate the performance of a given online policy, the most commonly used notion is that of the regret, which compares its performance in terms of loss with a benchmark policy, i.e., the best fixed strategy computed in hindsight. Otherwise stated, the regret measures the performance gap between an online policy and the best mean optimal solution over a fixed horizon. In this thesis, we focus on an online power minimization problem under rate constraints in a dynamic IoT network. To address this issue, we propose a regret-based formulation that accounts for arbitrary network dynamics, using techniques used to solve the multi-armed bandit problem. This allows us to derive an online power allocation policy which is provably capable of adapting to such changes, while relying solely on strictly causal feedback. In so doing, we identify an important tradeoff between the amount of feedback available at the transmitter side and the resulting system performance. We first study the case in which the device has access to a vector, either the gradient or an unbiased estimated of the gradient, as information feedback. To limit the feedback exchange in the network our goal is to reduce it as mush as possible. Therefore, we study the case in which the device has access to only a loss-based information (scalar feedback). In this case, we propose a second online algorithm to determine an efficient and adaptative power allocation policy
Hahm, Oliver. „Enabling Energy Efficient Smart Object Networking at Internet-Scale : Experimental Tools, Software Platform, and Information-Centric Networking Protocols“. Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLX090/document.
Der volle Inhalt der QuelleThe Internet of Things aims to seamlessly integrate billions of so-called Smart Objects into traditional Internet infrastructures.From the hardware perspective, Smart Objects emerged when tiny, cheap computers became available, combining energy efficient micro-controllers, low-power radio transceivers, and sensors as well as actuators interacting with the physical world, often powered by batteries.Typically, Smart Objects are thus heavily constrained in terms of CPU, memory and energy resources.Furthermore, wireless links used for communication among Smart Objects or towards the Internet are often slow, subject to high packet loss, and may require spontaneous store-and-forward among peer Smart Objects to ensure connectivity.Such characteristics pose challenges, on one hand in terms of software running on Smart Objects, and on the other hand in terms of network protocols Smart Objects use to communicate.In consequence, novel evaluation methods and experimental tools are needed to study Smart Object networks in vivo, new software platforms are needed to efficiently operate Smart Objects, and innovative networking paradigms and protocols are required to interconnect Smart Objects.This thesis addresses these challenges by introducing new tools for large scale testbed-driven experimental research, a novel operating system (RIOT) applicable to a wide variety of connected Smart Objects, and several new mechanisms leveraging information-centric networking which significantly improve energy-efficiency compared to state-of-the-art network protocols in the Internet of Things
Dalmasso, Loïc. „De la vulnérabilité des nœuds capteurs à la certification des transactions sur le réseau, une approche de la sécurisation de l’Internet des Objets“. Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS069.
Der volle Inhalt der QuelleThe Internet of Things (IoT) is a global infrastructure, aiming to connect any systems of various kinds, to generate new services. While this hyperconnectivity offers many opportunities in many areas (e.g. health, industry, energy, etc.), its deployment represents a major challenge in terms of security and privacy. The use of cryptography becomes essential, particularly to ensure the confidentiality of data. Nevertheless, classical algorithms such as AES are not designed to be embedded in systems with limited resources, such as connected devices. To address this issue, the scientific community is moving towards so-called "lightweight" cryptography. Despite this term, to what extent is it relevant and in line with the resources of the connected objects ? What level of security can it achieve ?Through common metrics, the objective of the first axis of this thesis is to determine the gains of lightweight cryptography compared to the classical one, in terms of size, performance and robustness against side channel analysis, recognized as a major attack vector. This evaluation focuses on the AES- 128 standard and its close lightweight derivatives PRESENT-80/128 and more recent GIFT-64- 128/GIFT-128-128, whose bit-level oriented structure favours hardware implementation. In terms of performances, GIFT-64-128 is positioned as the best alternative, with a reduction in size by almost a factor of 10, for a 58% gain in efficiency over AES-128. In terms of resistance against side channel analysis, CPA in this thesis, lightweight cryptography is once again proving its worth, with PRESENT-128 achieving an increased robustness by a factor of 3 compared to AES-128.Although indispensable, confidentiality alone is not enough to create a secure environment. Facing the emergence of cyber attacks, an IoT ecosystem has to integrate security mechanisms to deal with various threats. In addition, its network topology is becoming conducive to decentralization for efficiency reasons. Without central organization, how can the reliability and security of a highly heterogeneous environment be ensured ?The second part of this thesis proposes a trust protocol, specifically designed for IoT. Inspired by the blockchain concept, several optimizations have been implemented, allowing to reduce the use of resources to a minimum. In an approach centered on network gateways, the results show a reduction in storage space by a factor of 3 000 compared to Bitcoin, as well as a latency divided by 18, for a consumption lower than that of a smartphone charger. Finally, an extension of the protocol is proposed to be embedded in objects. The model focuses on the trust assessment in a close environment, that means on entities where direct communication is possible. With less than 400 bytes, the protocol is capable of evaluating the trust of about ten objects, and up to thirty with only 1 KB
Naas, Mohammed Islam. „Placement des données de l'internet des objets dans une infrastructure de fog“. Thesis, Brest, 2019. http://www.theses.fr/2019BRES0014/document.
Der volle Inhalt der QuelleIn the coming years, Internet of Things (IoT) will be one of the applications generating the most data. Nowadays, IoT data is stored in the Cloud. As the number of connected objects increases, transmitting the large amount of produced data to the Cloud will create bottlenecks. As a result, latencies will be high and unpredictable. In order to reduce these latencies, Fog computing has been proposed as a paradigm extending Cloud services to the edge of the network. It consists of using any equipment located in the network (e.g. router) to store and process data. Therefore, the Fog presents a heterogeneous infrastructure. Indeed, its components have differences in computing performance, storage capacity and network interconnections. This heterogeneity can further increase the latency of the service. This raises a problem: the wrong choice of data storage locations can increase the latency of the service. In this thesis, we propose a solution to this problem in the form of four contributions: 1. A formulation of the IoT data placement problem in the Fog as a linear program. 2. An exact solution to solve the data placement problem using the CPLEX, a mixed linear problem solver. 3. Two heuristics based on the principle of “divide and conquer” to reduce the time of placement computation. 4. An experimental platform for testing and evaluating solutions for IoT data placement in the Fog, integrating data placement management with iFogSim, a Fog and IoT environment simulator
Vucinic, Malisa. „Architectures and Protocols for Secure and Energy-Efficient Integration of Wireless Sensor Networks with the Internet of Things“. Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM084/document.
Der volle Inhalt der QuelleOur research explores the intersection of academic, industrial and standardization spheres to enable secure and energy-efficient Internet of Things. We study standards-based security solutions bottom-up and first observe that hardware accelerated cryptography is a necessity for Internet of Things devices, as it leads to reductions in computational time, as much as two orders of magnitude. Overhead of the cryptographic primitives is, however, only one of the factors that influences the overall performance in the networking context. To understand the energy - security tradeoffs, we evaluate the effect of link-layer security features on the performance of Wireless Sensors Networks. We show that for practical applications and implementations, link-layer security features introduce a negligible degradation on the order of a couple of percent, that is often acceptable even for the most energy-constrained systems, such as those based on harvesting.Because link-layer security puts trust on each node on the communication path consisted of multiple, potentially compromised devices, we protect the information flows by end-to-end security mechanisms. We therefore consider Datagram Transport Layer Security (DTLS) protocol, the IETF standard for end-to-end security in the Internet of Things and contribute to the debate in both the standardization and research communities on the applicability of DTLS to constrained environments. We provide a thorough performance evaluation of DTLS in different duty-cycled networks through real-world experimentation, emulation and analysis. Our results demonstrate surprisingly poor performance of DTLS in networks where energy efficiency is paramount. Because a DTLS client and a server exchange many signaling packets, the DTLS handshake takes between a handful of seconds and several tens of seconds, with similar results for different duty cycling protocols.But apart from its performance issues, DTLS was designed for point-to-point communication dominant in the traditional Internet. The novel Constrained Ap- plication Protocol (CoAP) was tailored for constrained devices by facilitating asynchronous application traffic, group communication and absolute need for caching. The security architecture based on DTLS is, however, not able to keep up and advanced features of CoAP simply become futile when used in conjunction with DTLS. We propose an architecture that leverages the security concepts both from content-centric and traditional connection-oriented approaches. We rely on secure channels established by means of DTLS for key exchange, but we get rid of the notion of “state” among communicating entities by leveraging the concept of object security. We provide a mechanism to protect from replay attacks by coupling the capability-based access control with network communication and CoAP header. OSCAR, our object-based security architecture, intrinsically supports caching and multicast, and does not affect the radio duty-cycling operation of constrained devices. Ideas from OSCAR have already found their way towards the Internet standards and are heavily discussed as potential solutions for standardization
Sagar, Samya. „Gestion intelligente de réseaux de capteurs, intégrés à des vêtements sportifs instrumentés“. Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0129/document.
Der volle Inhalt der QuelleThe Internet of Things (IoT) integrates sensor networks with the Internet, and paves the way for systems or ecosystems to help people live in both physical and cyber worlds. IoT offers the ubiquity of objects that are able to interact with each other and cooperate with their neighbors to achieve common goals. These objects, called "Smart" (SO), can detect the environment and communicate with other objects. The creation of SO and IoT system involves actors of very diverse expertise. Hence, it becomes essential to have standardized and semantic descriptions to solve the problems related to the interoperability and the semantic heterogeneity between the different available resources on the one hand, and between the different stakeholders designing/manufacturing the SO, on the other hand. Therefore, we have proposed the FSMS semantic and generic framework, which is structured into a set of ontological modules to design/manufacture a given SO. A support methodology for this framework has been equally proposed. It is based on the same ontological modules identified in the semantic component of the FSMS. These ontological modules form the SMS ontology that is proposed and constitutes the corner stone of this thesis. In order to intelligently manage an SO design, we proposed a generic process based on a semantic description of the structural and behavioral components of an SO. This process was thereafeter implemented for Smart Clothing of sports. This Sportswear is intended to be used in different contexts of use, an approach to reconfiguration/adaptation of the operation of the Smart Clothing has been proposed. This one is also based on the modular ontology SMS
Billet, Benjamin. „Système de gestion de flux pour l'Internet des objets intelligents“. Thesis, Versailles-St Quentin en Yvelines, 2015. http://www.theses.fr/2015VERS012V/document.
Der volle Inhalt der QuelleThe Internet of Things (IoT) is currently characterized by an ever-growing number of networked Things, i.e., devices which have their own identity together with advanced computation and networking capabilities: smartphones, smart watches, smart home appliances, etc. In addition, these Things are being equipped with more and more sensors and actuators that enable them to sense and act on their environment, enabling the physical world to be linked with the virtual world. Specifically, the IoT raises many challenges related to its very large scale and high dynamicity, as well as the great heterogeneity of the data and systems involved (e.g., powerful versus resource-constrained devices, mobile versus fixed devices, continuously-powered versus battery-powered devices, etc.). These challenges require new systems and techniques for developing applications that are able to (i) collect data from the numerous data sources of the IoT and (ii) interact both with the environment using the actuators, and with the users using dedicated GUIs. To this end, we defend the following thesis: given the huge volume of data continuously being produced by sensors (measurements and events), we must consider (i) data streams as the reference data model for the IoT and (ii) continuous processing as the reference computation model for processing these data streams. Moreover, knowing that privacy preservation and energy consumption are increasingly critical concerns, we claim that all the Things should be autonomous and work together in restricted areas as close as possible to the users rather than systematically shifting the computation logic into powerful servers or into the cloud. For this purpose, our main contribution can be summarized as designing and developing a distributed data stream management system for the IoT. In this context, we revisit two fundamental aspects of software engineering and distributed systems: service-oriented architecture and task deployment. We address the problems of (i) accessing data streams through services and (ii) deploying continuous processing tasks automatically, according to the characteristics of both tasks and devices. This research work lead to the development of a middleware layer called Dioptase, designed to run on the Things and abstract them as generic devices that can be dynamically assigned communication, storage and computation tasks according to their available resources. In order to validate the feasability and the relevance of our work, we implemented a prototype of Dioptase and evaluated its performance. In addition, we show that Dioptase is a realistic solution which can work in cooperation with legacy sensor and actuator networks currently deployed in the environment
Claeys, Timothy. „Sécurité pour l'internet des objets : une approche des bas en haut pour un internet des objets sécurisé et normalisé“. Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM062.
Der volle Inhalt der QuelleThe rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Formany of these products, security was merely an afterthought. Due to their advanced sensing and actuatingfunctionalities, poorly-secured IoT devices endanger the privacy and safety of their users.While the IoT contains hardware with varying capabilities, in this work, we primarily focus on the constrainedIoT. The restrictions on energy, computational power, and memory limit not only the processingcapabilities of the devices but also their capacity to protect their data and users from attacks. To secure theIoT, we need several building blocks. We structure them in a bottom-up fashion where each block providessecurity services to the next one.The first cornerstone of the secure IoT relies on hardware-enforced mechanisms. Various security features,such as secure boot, remote attestation, and over-the-air updates, rely heavily on its support. Sincehardware security is often expensive and cannot be applied to legacy systems, we alternatively discusssoftware-only attestation. It provides a trust anchor to remote systems that lack hardware support. In thesetting of remote attestation, device identification is paramount. Hence, we dedicated a part of this work tothe study of physical device identifiers and their reliability.The IoT hardware also frequently provides support for the second building block: cryptography. Itis used abundantly by all the other security mechanisms, and recently much research has focussed onlightweight cryptographic algorithms. We studied the performance of the recent lightweight cryptographicalgorithms on constrained hardware.A third core element for the security of the IoT is the capacity of its networking stack to protect the communications.We demonstrate that several optimization techniques expose vulnerabilities. For example,we show how to set up a covert channel by exploiting the tolerance of the Bluetooth LE protocol towardsthe naturally occurring clock drift. It is also possible to mount a denial-of-service attack that leverages theexpensive network join phase. As a defense, we designed an algorithm that almost completely alleviates theoverhead of network joining.The last building block we consider is security architectures for the IoT. They guide the secure integrationof the IoT with the traditional Internet. We studied the IETF proposal concerning the constrainedauthentication and authorization framework, and we propose two adaptations that aim to improve its security.Finally, the deployment of the IETF architecture heavily depends on the security of the underlying communicationprotocols. In the future, the IoT will mainly use the object security paradigm to secure datain flight. However, until these protocols are widely supported, many IoT products will rely on traditionalsecurity protocols, i.e., TLS and DTLS. For this reason, we conducted a performance study of the most criticalpart of the protocols: the handshake phase. We conclude that while the DTLS handshake uses fewerpackets to establish the shared secret, TLS outperforms DTLS in lossy networks
Lemercier, François. „Multiple interface management in smart grid networks“. Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0100/document.
Der volle Inhalt der QuelleSince decades, the power grid is Under going a tremendous evolution, toward what is called the Smart Grid. The grid is actually evolving from a centralized architecture to a decentralized one, taking into account all the unpredictable sources and consumption. The Advanced Metering Infrastructure is the network dedicated to the Smart Grid that allows two-ways communications between the consumers and the energy providers. Smart Meters networks, that are part of this architecture, rely on powerline communications, a technology that is highly sensitive to interference. Despite dedicated layer 2 protocols, the employed technologies cannot fulfill most of smart grid applications requirements. The majority of smart meter network technology candidates are short range, each meter cannot reach the concentrator in one hop. Nodes need to collaborate, using a routing protocol like RPL to reach the destination. The goal of this thesis is to modify RPL to a multi interfaces environment, and study how interface heterogeneity could increase the reliability and the performance of a smart meter network
Patel, Pankesh. „Environnement de développement d'applications pour l'Internet des objets“. Phd thesis, Université Pierre et Marie Curie - Paris VI, 2013. http://tel.archives-ouvertes.fr/tel-00927150.
Der volle Inhalt der QuelleShahid, Mustafizur Rahman. „Deep learning for Internet of Things (IoT) network security“. Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS003.
Der volle Inhalt der QuelleThe growing Internet of Things (IoT) introduces new security challenges for network activity monitoring. Most IoT devices are vulnerable because of a lack of security awareness from device manufacturers and end users. As a consequence, they have become prime targets for malware developers who want to turn them into bots. Contrary to general-purpose devices, an IoT device is designed to perform very specific tasks. Hence, its networking behavior is very stable and predictable making it well suited for data analysis techniques. Therefore, the first part of this thesis focuses on leveraging recent advances in the field of deep learning to develop network monitoring tools for the IoT. Two types of network monitoring tools are explored: IoT device type recognition systems and IoT network Intrusion Detection Systems (NIDS). For IoT device type recognition, supervised machine learning algorithms are trained to perform network traffic classification and determine what IoT device the traffic belongs to. The IoT NIDS consists of a set of autoencoders, each trained for a different IoT device type. The autoencoders learn the legitimate networking behavior profile and detect any deviation from it. Experiments using network traffic data produced by a smart home show that the proposed models achieve high performance.Despite yielding promising results, training and testing machine learning based network monitoring systems requires tremendous amount of IoT network traffic data. But, very few IoT network traffic datasets are publicly available. Physically operating thousands of real IoT devices can be very costly and can rise privacy concerns. In the second part of this thesis, we propose to leverage Generative Adversarial Networks (GAN) to generate bidirectional flows that look like they were produced by a real IoT device. A bidirectional flow consists of the sequence of the sizes of individual packets along with a duration. Hence, in addition to generating packet-level features which are the sizes of individual packets, our developed generator implicitly learns to comply with flow-level characteristics, such as the total number of packets and bytes in a bidirectional flow or the total duration of the flow. Experimental results using data produced by a smart speaker show that our method allows us to generate high quality and realistic looking synthetic bidirectional flows
Brun-Laguna, Keoma. „Deterministic Networking for the Industrial IoT“. Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS157.
Der volle Inhalt der QuelleThe Internet of Things (IoT) evolved from a connected toaster in 1990 to networks of hundreds of tiny devices used in industrial applications. Those “Things” usually are tiny electronic devices able to measure a physical value (temperature, humidity, etc.) and/or to actuate on the physical world (pump, valve, etc). Due to their cost and ease of deployment, battery-powered wireless IoT networks are rapidly being adopted. The promise of wireless communication is to offer wire-like connectivity. Major improvements have been made in that sense, but many challenges remain as industrial application have strong operational requirements. This section of the IoT application is called Industrial IoT (IIoT). The main IIoT requirement is reliability. Every bit of information that is transmitted in the network must not be lost. Current off-the-shelf solutions offer over 99.999% reliability. That is, for every 100k packets of information generated, less than one is lost. Then come latency and energy-efficiency requirements. As devices are battery-powered, they need to consume as little as possible to be able to operate during years. The next step for the IoT is to target time-critical applications. Industrial IoT technologies are now adopted by companies over the world, and are now a proven solution. Yet, challenges remain and some of the limits of the technologies are still not fully understood. In this work we address TSCH-based Wireless Sensor Networks and study their latency and lifetime limits under real-world conditions. We gathered 3M network statistics 32M sensor measurements on 11 datasets with a total of 170,037 mote hours in real-world and testbeds deployments. We assembled what we believed to be the largest dataset available to the networking community. Based on those datasets and on insights we learned from deploying networks in real-world conditions, we study the limits and trade-offs of TSCH-based Wireless Sensor Networks. We provide methods and tools to estimate the network performances of such networks in various scenarios. We believe we assembled the right tools for protocol designer to built deterministic networking to the Industrial IoT
Le, Xuan Sang. „Co-conception Logiciel/FPGA pour Edge-computing : promotion de la conception orientée objet“. Thesis, Brest, 2017. http://www.theses.fr/2017BRES0041/document.
Der volle Inhalt der QuelleCloud computing is often the most referenced computational model for Internet of Things. This model adopts a centralized architecture where all sensor data is stored and processed in a sole location. Despite of many advantages, this architecture suffers from a low scalability while the available data on the network is continuously increasing. It is worth noting that, currently, more than 50% internet connections are between things. This can lead to the reliability problem in realtime and latency-sensitive applications. Edge-computing which is based on a decentralized architecture, is known as a solution for this emerging problem by: (1) reinforcing the equipment at the edge (things) of the network and (2) pushing the data processing to the edge.Edge-centric computing requires sensors nodes with more software capability and processing power while, like any embedded systems, being constrained by energy consumption. Hybrid hardware systems consisting of FPGA and processor offer a good trade-off for this requirement. FPGAs are known to enable parallel and fast computation within a low energy budget. The coupled processor provides a flexible software environment for edge-centric nodes.Applications design for such hybrid network/software/hardware (SW/HW) system always remains a challenged task. It covers a large domain of system level design from high level software to low-level hardware (FPGA). This result in a complex system design flow and involves the use of tools from different engineering domains. A common solution is to propose a heterogeneous design environment which combining/integrating these tools together. However the heterogeneous nature of this approach can pose the reliability problem when it comes to data exchanges between tools.Our motivation is to propose a homogeneous design methodology and environment for such system. We study the application of a modern design methodology, in particular object-oriented design (OOD), to the field of embedded systems. Our choice of OOD is motivated by the proven productivity of this methodology for the development of software systems. In the context of this thesis, we aim at using OOD to develop a homogeneous design environment for edge-centric systems. Our approach addresses three design concerns: (1) hardware design where object-oriented principles and design patterns are used to improve the reusability, adaptability, and extensibility of the hardware system. (2) hardware / software co-design, for which we propose to use OOD to abstract the SW/HW integration and the communication that encourages the system modularity and flexibility. (3) middleware design for Edge Computing. We rely on a centralized development environment for distributed applications, while the middleware facilitates the integration of the peripheral nodes in the network, and allows automatic remote reconfiguration. Ultimately, our solution offers software flexibility for the implementation of complex distributed algorithms, complemented by the full exploitation of FPGAs performance. These are placed in the nodes, as close as possible to the acquisition of the data by the sensors† in order to deploy a first effective intensive treatment
Mekbungwan, Preechai. „In-network Computation for IoT in Named Data Networking“. Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS151.
Der volle Inhalt der QuelleActiveNDN is proposed to extend Named Data Networking (NDN) with in-network computation by embedding functions in an additional entity called Function Library, which is connected to the NDN forwarder in each NDN router. Function calls can be expressed as part of the Interest names with proper name prefixes for routing, with the results of the computation returned as NDN Data packets, creating an ActiveNDN network. Our main focus is on performing robust distributed computation, such as analysing and filtering raw data in real-time, as close as possible to sensors in an environment with intermittent Internet connectivity and resource-constrained computable IoT nodes. In this thesis, the design of ActiveNDN is illustrated with a small prototype network as a proof of concept. Extensive simulation experiments were conducted to investigate the performance and effectiveness of ActiveNDN in large-scale wireless IoT networks. The real-time processing capability of ActiveNDN is also compared with centralized edge computing approaches. Finally, the ActiveNDN is demonstrated over the wireless sensor network testbed with real-world applications that provide sufficiently accurate hourly PM2.5 predictions using linear regression model. It shows the ability to distribute the computational load across many nodes, which makes ActiveNDN suitable for large-scale IoT deployments
Iova, Oana-Teodora. „Standards optimization and network lifetime maximization for wireless sensor networks in the Internet of things“. Thesis, Strasbourg, 2014. http://www.theses.fr/2014STRAD022/document.
Der volle Inhalt der QuelleNew protocols have been standardized in order to integrate Wireless Sensor Networks (WSN) in the Internet. Among them, the IEEE 802.15.4 MAC layer protocol, and RPL, the IPv6 Routing Protocol for Low-power and Lossy Networks. The goal of this thesis is to improve these protocols, considering the energy constraints of the devices that compose the WSN. First, we proposed a new MAC layer broadcast mechanism in IEEE 802.15.4, to ensure a reliable delivery of the control packets from the upper layers (especially from RPL). Then, we provided an exhaustive evaluation of RPL and highlighted an instability problem. This instability generates a large overhead, consuming a lot of energy. Since the lifetime of WSN is very limited, we proposed a new routing metric that identifies the energy bottlenecks and maximizes the lifetime of the network. Finally, by coupling this metric with a multipath version of RPL, we are able to solve the instability problem previously highlighted
Hamidouche, Ranida. „Paradigme bio-inspiré dans les réseaux intelligents dynamiques au service de l’internet des objets“. Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG066.
Der volle Inhalt der QuelleToday the Internet makes it possible to connect billions of heterogeneous electronic devices and ensures communication between them. These devices have sensors designed with resource constraints that significantly affect data collection, especially memory and battery size limitations. The divergences in the characteristics of these objects require new intelligent methods to ensure communication between them. Heuristic solutions become obsolete or powerless to satisfy the user's requirement, hence a search for new methods becomes necessarily necessary to satisfy users. Among these solutions, we have those based on bio-inspired models. In this context, intending to minimize data loss, we propose different bio-inspired approaches for the mobility of the data collector and the choice of meeting points for data collection.First of all, we propose mobility inspired by the movement of Escherichia Coli bacteria. Then, we propose a technique inspired by the grouping of grey wolves and whales for the choice of meeting points. Afterward, we improve the mobility of the collector by mobility inspired by salps.Finally, we combine these approaches by taking into account the urgency of the data. The different contributions were evaluated using simulations and then were compared with similar existing work.The results obtained are very promising in terms of energy consumption and the amount of data collected
Gilbert, Johann. „Étude et développement d'un réseau de capteurs synchronisés à l'aide d'un protocole de communication sans fil dédié à l'Internet des objets“. Electronic Thesis or Diss., Toulon, 2018. http://www.theses.fr/2018TOUL0012.
Der volle Inhalt der QuelleIn the last 20 years, the coming up of Internet of Things and Cloud Computing has conditionedthe need to deploy sensors everywhere to feed databases and analytics. To meet this requirements,new kind of networks have been massively deployed based on the sub-gigahertz frequency which haveunknown effect on human health.Couple the non-invasive aspect of the Visible Light Communication (VLC) with IoT could notonly reduce potential risks for human health but also avoid radio band saturation. However, today'stechniques consist mainly in broadcast data from light sources to receivers which is the opposite of theIoT paradigm. In this study, we will present a new design where the gateway is not a classic photodiodebut a camera.With this camera based method, we are able to design a star network using VLC. Even if the datarate is not the same as standard method, we are now able to collect data emanating from many sensorsat once with only one photoreceptor. This system also includes the ability of discriminate LED matrix,which transfer the same data faster, and single LED. Finally, data rate can be handle autonomouslyby the system to provide an optimal data transfer
Chelle, Hugo. „Contrôle de charge des réseaux IoT : D'une étude théorique à une implantation réelle“. Thesis, Toulouse, INPT, 2018. http://oatao.univ-toulouse.fr/24349/1/Chelle_hugo.pdf.
Der volle Inhalt der QuelleFuentes, Samaniego Raul Armando. „Monitorage des réseaux des capteurs sans fils (WSN) : application à l'interopérabilité sécurisée“. Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLL005/document.
Der volle Inhalt der QuelleThe denominated "Internet of Things'' (IoT) has been getting relevance in both the public and research communities. The main reason is that on 2011, the number of “objects” connected to the Internet surpassed the number of humans online, and is expected that for 2020, the number of objects exceeds the amount of 20 billion. Because of the high number of heterogeneous platforms that composed the IoT, our interest is centered around the Wireless Sensors Networks (WSN), which are composed by small devices with constrained resources (small amount of memory, small power processor, and small power supply) that collect one or more type of data. Almost all the research conducted to date relies on standardizing the communication protocols, ameliorating the performance, optimizing the resource consumption, etc. Security has been relegated to a second plane, due mainly to the low resources available on the sensors. However, the data collected in many scenarios can be highly sensitive. The data must be stored in a safe way and must be transmitted in a safe approach from the origin to the destiny. The work developed in this dissertation defines mechanisms to guarantee the safety of the communication between sensors. And, providing native tools for the monitoring of the communication, to validate these mechanisms directly on the network
Tarek, mohamed ibrahim hafez Dina. „Development of Spectrum Sharing Protocol for Cognitive Radio Internet of Things“. Thesis, Avignon, 2020. http://www.theses.fr/2020AVIG0280.
Der volle Inhalt der QuelleInternet of Things (IoT) presents a new life style by developing smart homes, smart grids, smart city, smart transportation, etc., so IoT is developing rapidly. However recent researches focus on developing the IoT applications disregarding the IoT spectrum scarcity problem facing it. Integrating Internet of Things (IoT) technology and Cognitive Radio Networks (CRNs), forming Cognitive Radio Internet of Things (CRIoTs), is an economical solution for overcoming the IoT spectrum scarcity. The aim of this thesis is to solve the problem of spectrum sharing for CRIoT; the work in thesis is presented in three parts, each represents a contribution. Our first contribution is to propose two new protocols to solve the problem of channel status prediction for interweave CRNs. Both protocols use Hidden Markov Model (HMM). In the training stage of both protocols, the available data are trained to produce two HMM models, an idle HMM model and a busy one. Both models are used together to produce the 2-model HMM. In the prediction stage the first protocol uses Bayes theorem and the 2-model HMM, while the second protocol uses Support Vector Machine (SVM) employing the parameters produced from applying the 2-model HMM, named 2-model HMM-SVM. The 2-model HMM-SVM outperforms the classical HMM and 2-model HMM in terms of the true percentage, the inaccuracy and the probability of primary users’ collision (false negative prediction). In our second contribution, we proposed a centralized time slotted packet scheduling protocol for CRIoTs. It uses Discrete Permutation Particle Swarm Optimization (DP-PSO) for scheduling the IoT device packets among the free slots obtained from applying cognitive radio networks' channel estimation technique proposed in the first part. Our proposed protocol is applied to smart healthcare facility. Configuring three main building blocks for the used application architecture; the IoT devices block, the first layer fog nodes block and the central fog server. Each group of IoT devices is connected to a fog node, the entire fog nodes in the system are connected to the central fog node. The proposed protocol is named Scheduling based-on Discrete Permutation Particle Swarm Optimization (SDP-PSO). An objective fitness function is formulated with three parameters; maximizing the fairness index among fog nodes, minimizing the packets' queuing delay and minimizing the number of dropped packets that exceeded their allowed time in the network without being sent. The performance of the proposed SDP-PSO protocol overcomes an old protocol named spectrum auction in terms of the fairness between fog nodes, the average queuing delay, the number of dropped packets and the time and the space complexity. Finally, in the third contribution, we proposed a distributed packets' scheduling protocol for CRIoTs. Our proposed protocol can be applied to an urban traffic control. The configured system in this part consists of three main building blocks; the IoT devices block, the first fog layer block (Road Side Units (RSUs)) and the second fog layer block. Each group of IoT devices is connected to a RSU, each group of RSU are connected to a fog node which acts as their cluster head. The fog nodes are connected together forming a partial mesh network. The proposed distributed packets' scheduling protocol for CRIoTs is applying three distributed access strategies together with the SDP-PSO proposed in the second part to schedule the packets on the estimated free slots resulted from applying the protocol proposed in the first part. The used access strategies are the classical round robin, in addition to two proposed ones named; the vertex cover and the enhanced round robin. An objective fitness function near similar to that used in the centralized protocol, was applied but with some differences to make it suitable for distributed scheduling
Enguehard, Marcel. „On information-centric routing and forwarding in the internet of things“. Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLT013/document.
Der volle Inhalt der QuelleAs the Internet of Things (IoT) has brought upon new communication patterns and challenges, Information-Centric Networking (ICN) has been touted as a potential solution. To confirm that hypothesis, the fundamental issue of routing and forwarding in the ICN-IoT must be addressed. This thesis investigates this topic across the IoT architecture.First, a scheme to securely forward ICN interests packets based on geographic coordinates is proposed for low-power wireless sensor networks (WSN). Its efficiency is compared to an optimized flooding-based scheme similar to current ICN-WSN approaches in terms of deployability and scalability using an analytical model. Realistic data for the model is derived from a mixture of simulation, literature study, and experiments on state-of-the-art sensor boards. Geographic forwarding is shown to halve the memory footprint of the ICN stack on reference deployments and to yield significant energy savings, especially for dynamic topologies. Second, ICN is used to enhance admission control (AC) to fixed-capacity Edge-computing platforms to guarantee request-completion time for latency-constrained applications. The LRU-AC, a request-aware AC strategy based on online learning of the request popularity distribution through a Least-Recently-Used (LRU) filter, is proposed. Using a queueing model, the LRU-AC is shown to decrease the number of requests that must be offloaded to the Cloud. An implementation of the LRU-AC on FPGA hardware is then proposed, using Ageing Bloom Filters (ABF) to provide a compact memory representation. The validity of using ABFs for the LRU-AC is proven through analytical modelling. The implementation provides high throughput and low latency.Finally, the management and virtualization of ICN-IoT networks are considered.vICN (virtualized ICN), a unified intent-based framework for network configuration and management that uses recent progress in resource isolation and virtualization techniques is introduced. It offers a single, flexible and scalable platform to serve different purposes, ranging from reproducible large-scale research experimentation to demonstrations with emulated and/or physical devices and network resources and to real deployments of ICN in existing IP networks
Diratie, Eyassu Dilla. „Hybrid internet of things network for energy-efficient video surveillance system“. Electronic Thesis or Diss., université Paris-Saclay, 2022. http://www.theses.fr/2022UPASG066.
Der volle Inhalt der QuelleWireless visual sensor networks based on IEEE 802.11 mesh networks are effective and suitable solutions for video surveillance systems in monitoring intrusions in selected areas. The IEEE 802.11-based visual sensor networks offer high bit rate video transmissions but suffer from energy inefficiency issues. Moreover, the video transmission in the visual sensor networks requires strict quality of service (QoS) in terms of bandwidth and delay. Also, it is challenging to decrease the overall energy consumption of the network while assuring guaranteed QoS in terms of bandwidth and delay in energy-constrained wireless visual sensor networks. The main contribution of this dissertation is to provide an energy-efficient video surveillance network without compromising the QoS requirement of video transmission. First, we propose a new hybrid IoT network architecture for a video surveillance system that detects and tracks an intruder in the monitoring area. The hybrid IoT network integrates the IEEE 802.11-based multi-hop visual Sensor Networks and LoRa network to provide an autonomous, energy-efficient, high-bitrate video surveillance system. Leveraging the LoRa network characteristics, the LoRa network is utilized as an always-active network for preliminary motion detection and tracking. Moreover, the LoRa network also decides which visual sensor nodes to wake up depending on the tracking information. The Kalman filter is investigated to track the intruder's trajectory from noise measurements of low-power motion sensors to activate only the visual sensor nodes along the intruder's trajectory to provide effective video vigilance. We showed through simulation that Kalman filter estimates and predicts intruder trajectory with reasonable accuracy. Moreover, the proposed hybrid IoT network approach reduces energy consumption significantly compared with a traditional, always active continuous monitoring single-tier visual sensor network. Next, the contribution of this dissertation focuses on an energy-aware and QoS routing mechanism for the IEEE 802.11-based multi-hop visual sensor network of the hybrid IoT network. We propose a routing algorithm that routes a set of video streams to the gateway with guaranteed QoS in terms of bandwidth and delay while minimizing the number of visual sensor nodes that are involved in routing. This maximizes the number of nodes that can be turned off completely to optimize the overall energy consumption of the network without compromising QoS performance. The proposed routing problem is formulated as an Integer Linear Program (ILP) and solved using the branch-and-bound algorithm. Through computer simulation, the performance of the proposed approach is compared with the existing state-of-the-art routing algorithms from the literature. The results clearly show that the proposed mechanism saves a significant amount of the overall energy consumption while guaranteeing QoS in terms of bandwidth and delay
Chen, Yibo. „Routing algorithm dedicated to environmental data collection : precision agriculture“. Thesis, Clermont-Ferrand 2, 2015. http://www.theses.fr/2015CLF22572/document.
Der volle Inhalt der QuelleThe wireless sensor network (WSN) is one of the most important technologies of the 21st century. Most researchers and technical analysts believe that in the near future, these micro-sensors will be integrated into the environment of our daily lives. In recent years, the IoT (Internet of Things) and WoT (Web of Things) technologies also have great forwarding. Especially, the IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) protocol has allowed the use of IPv6 protocol stack in the field of WSN, thanks to its encapsulation and compression mechanisms in IPv6 packet header. Moreover, the RPL (IPv6 Routing Protocol for Low-power and Lossy Network) provides such a powerful routing function that can be applied for a variety of application scenarios. These two key standards of IoT and WoT technologies for WSN can be used in an IPv6 stack, and they will successfully achieve the connection between Internet and micro-sensors. Thus, due to the availability of IPv6 address (128-bit), all the communicating objects, such as smart device, sensor, and actuator, can be connected to the Internet. That is the greatest advantage brought by the IoT. Although the progress of these techniques is extremely fast, several issues caused by resource constraints of micro-sensor (limited processing power, bandwidth and lossy connection link, and energy), such as QoS, energy efficient, robustness and lifetime of WSN, and the most important, the special requirement of agricultural applications. Notice that Precision Agriculture is are still very challenging and waiting to be solved. Essentially, these open questions would dabble in the aspects like telemedicine, remote home automation, industrial control etc. Thus, the results obtained in this work will have a significant impact on both economic and scientific. Economically, it can offer a solution for WSN to support sustainable development in the field of agriculture automation. While scientifically, we will contribute to the routing protocol standardization of wireless micro-sensors in the domain of environmental monitoring
Challal, Yacine. „Sécurité de l'Internet des Objets : vers une approche cognitive et systémique“. Habilitation à diriger des recherches, Université de Technologie de Compiègne, 2012. http://tel.archives-ouvertes.fr/tel-00866052.
Der volle Inhalt der QuelleHachem, Sara. „Service oriented Middleware for the large scale Internet of things“. Versailles-St Quentin en Yvelines, 2014. http://www.theses.fr/2014VERS0003.
Der volle Inhalt der QuelleThe Internet of Things (IoT) is characterized by a wide penetration in the regular user’s life through an increasing number of Things embedding sensing, actuating, processing, and communication capacities. A considerable portion of those Things will be mobile Things, which come with several advantages yet lead to unprecedented challenges. The most critical challenges, that are directly inherited from, yet amplify, today’s Internet issues, lie in handling the large scale of users and mobile Things, providing interoperability across the heterogeneous Things, and overcoming the unknown dynamic nature of the environment, due to the mobility of an ultra-large number of Things. This thesis addresses the aforementioned challenges by revisiting the commonly employed Service-Oriented Architecture (SOA) which allows the functionalities of sensors/actuators embedded in Things to be provided as services, while ensuring loose-coupling between those services and their hosts, thus abstracting their heterogeneous nature. In spite of its benefits, SOA has not been designed to address the ultra-large scale of the mobile IoT. Consequently, our main contribution lies in conceiving a Thing-based Service-Oriented Architecture, that revisits SOA interactions and functionalities, service discovery and composition in particular. We concretize the novel architecture within MobIoT, a middleware solution that is specifically designed to manage and control the ultra-large number of mobile Things in partaking in IoT-related tasks. To assess the validity of our proposed architecture, we provide a prototype implementation of MobIoT and evaluate its performance through extensive experiments that demonstrate the correctness, viability, and scalability of our solution
Amroun, Hamdi. „Modèles statistiques avancés pour la reconnaissance de l’activité physique dans un environnement non contrôlé en utilisant un réseau d’objets connectés“. Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS406/document.
Der volle Inhalt der QuelleWith the arrival of connected objects, the recognition of physical activity is experiencing a new era. New considerations need to be taken into account in order to achieve a better treatment process. In this thesis, we explored the treatment process for recognizing physical activity in an uncontrolled environment. The recognized physical activities, with only one inertial unit (accelerometer, gyroscope and magnetometer), are called elementary. Other types of context-dependent activities are called "context-based". We extracted the DCT as the main descriptor for the recognition of elementary activities. In order to recognize the physical activities based on the context, we defined three levels of granularity: a first level depending on embedded connected objects (smartphone, smartwatch and samrt TV . A second level concerns the study of participants' behaviors interacting with the smart TV screen. The third level concerns the study of participants' attention to TV. We took into consideration the imperfection aspect of the data by merging the multi sensor data with the Dempster-Shafer model. As such, we have proposed different approaches for calculating and approximating mass functions. In order to avoid calculating and selecting the different descriptors, we proposed an approach based on the use of deep learning algorithms (DNN). We proposed two models: a first model consisting of recognizing the elementary activities by selecting the DCT as the main descriptor (DNN-DCT). The second model is to learn raw data from context-based activities (CNN-raw). The disadvantage of the DNN-DCT model is that it is fast but less accurate, while the CNN-raw model is more accurate but very slow. We have proposed an empirical study to compare different methods that can accelerate learning while maintaining a high level of accuracy. We thus explored the method of optimization by particle swarm (PSO). The results are very satisfactory (97%) compared to deep neural network with stochastic gradients descent and Nesterov accelerated Gradient optimization. The results of our work suggest the use of good descriptors in the case where the context matters little, the taking into account of the imperfection of the sensor data requires that it be used and faster models
Cluzel, Sylvain. „Système M2M/IoT par satellite pour l'hybridation d'un réseau NB-IoT via une constellation LEO“. Thesis, Toulouse, ISAE, 2019. http://www.theses.fr/2019ESAE0007/document.
Der volle Inhalt der QuelleThe aim of this thesis is to study the implementation of Internet-based services of Thing (IoT) and Machine to Machine (M2M) through a satellite link. This type of system have to deal with two issues: first the physical layer level: terminal related constraints (limited in power, energy, and antenna size), channel (potentially with masking and multipath) and the space segment involve the implementation of different techniques (interleaving, interference cancellation,) to ensure proper link budget allowing the communication. On the other hand , the need to provide access to the resource to a large number of terminals requiring low throughput involves the use of optimized contention access techniques , as well as taking into account the level of access issues energy saving. The access layer should also be able to interface with larger networks architectures. Internet architectures for example include supporting IP services for Iota, with sporadic services, such as the ones found in the DTN networks, or 4G architectures / 5G for the implementation of mobile services. This thesis will investigate two innovative approaches and different techniques as well as physical layer access layer (potentially coupled) to their implementation. The first scenario involves the use of a very low throughput satellite relay terminal (unlike in the conventional case found in the literature based on broadband terminals), interfacing with terrestrial access technology sensors. Innovative resource management and energy saving techniques through a dedicated access layer (not DVB) could absorb the large number of terminals in this type of architecture. The second scenario is based on direct communication with sensors / objects via satellite constellation. This approach raises the question of the efficiency of the waveform for extremely sporadic services and the reliability of communication. DLR works on this type of waveform including the definition of S -MIM. However, this solution seems to be complex and many optimizations can be made. From the access layer point of view, E -SSA (asynchronous spread spectrum communication with SIC) defined by the ESA is also interesting even if its implementation to the system and its complexity level should be consolidated
Abdelghani, Wafa. „A multi-dimensional trust-model for dynamic, scalable and resources-efficient trust-management in social internet of things“. Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30231.
Der volle Inhalt der QuelleThe Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by giving them the ability to connect to the Internet, communicate and interact. The integration of the social component in the IoT has given rise to the Social Internet of Things (SIoT), which has overcome various issues such as interoperability, navigability and resource/service discovery. In this type of environment, participants compete to offer a variety of attractive services. Some of them resort to malicious behavior to propagate poor quality services. They launch so-called Trust-Attacks (TA) and break the basic functionality of the system. Several works in the literature have addressed this problem and have proposed different trust-models. Most of them have attempted to adapt and reapply trust models designed for traditional social networks or peer-to-peer networks. Despite the similarities between these types of networks, SIoT ones have specific particularities. In SIoT, there are different types of entities that collaborate: humans, devices, and services. Devices can have very limited computing and storage capacities, and their number can be as high as a few million. The resulting network is complex and highly dynamic, and the impact of Trust-Attacks can be more compromising. In this work, we propose a Multidimensional, Dynamic, Resources-efficient and Scalable trust-model that is specifically designed for SIoT environments. We, first, propose features to describe the behavior of the three types of nodes involved in SIoT networks and to quantify the degree of trust according to the three resulting Trust-Dimensions. We propose, secondly, an aggregation method based on Supervised Machine-Learning and Deep Learning that allows, on the one hand, to aggregate the proposed features to obtain a trust score allowing to rank the nodes, but also to detect the different types of Trust-Attacks and to counter them. We then propose a hybrid propagation method that allows spreading trust values in the network, while overcoming the drawbacks of centralized and distributed methods. The proposed method ensures scalability and dynamism on the one hand, and minimizes resource consumption (computing and storage), on the other. Experiments applied to synthetic data have enabled us to validate the resilience and performance of the proposed model
Alleg, Abdelhamid. „Service Function Placement and Chaining in Network Function Virtualization Environments“. Thesis, Bordeaux, 2019. http://www.theses.fr/2019BORD0117.
Der volle Inhalt der QuelleThe emergence of Network Function Virtualization (NFV) technology has aroused keen interest to design, manage and deploy network services in a flexible, automated and vendor-agnostic manner. Implementing NFV technology is expected to be a win-win solution for both service providers and costumers. However, this paradigm shift, sparked by NFV, calls for a progressive abandon of network services that are provided as hardware appliance and rather it proposes a fully or partially virtualized environment that offers software modules called Virtual Network Functions (VNFs). This shift rises a set of challenges related to service deployment and operation such as orchestration and management, service resiliency, Quality of Service (QoS) and resource provisioning among others. Furthermore, the core question that needs to be solved within NFV context is “What is the best way to place and chain VNFs that form a service in order to meet Service Level Agreement requirements (costumer side) while optimizing resource usage (service provider side)?”.This thesis investigates the problem of VNF Placement and Chaining considering service requirements such as end-to-end delay, service availability and energy consumption and proposes a set of algorithms and mechanisms that aim to achieve an optimized deployment of the requested/provided services. Our contributions in this thesis are threefold. First, we propose a delay-aware Placement and Chaining algorithms for delay-sensitive applications over NFV networks. The proposed algorithms aim to meet the appropriate end-to-end delay defined according to the deployed service (VoIP, Streaming, etc.). Second, we provide a comprehensive service availability benchmarking and we propose two availability-aware mechanisms for VNFs chain. The aim is to provide resilient service provisioning by fine-tuning the parameters of the protection scheme (the number, the type, the placement and the size of the spare instances) needed to reach a predefined availability level, despite network failures. Finally, we propose a framework architecture that explores the possibility to extend the virtualization paradigm to Internet of Things (IoT). Toward this end, we define an energy-aware Placement and Chaining for IoT services where inherent IoT functionalities are decoupled from specific dedicated IoT devices and instantiated on-demand. By bringing together NFV and IoT paradigms, this extension opens new perspectives and push toward designing new use cases
Gilbert, Johann. „Étude et développement d'un réseau de capteurs synchronisés à l'aide d'un protocole de communication sans fil dédié à l'Internet des objets“. Thesis, Toulon, 2018. http://www.theses.fr/2018TOUL0012/document.
Der volle Inhalt der QuelleIn the last 20 years, the coming up of Internet of Things and Cloud Computing has conditionedthe need to deploy sensors everywhere to feed databases and analytics. To meet this requirements,new kind of networks have been massively deployed based on the sub-gigahertz frequency which haveunknown effect on human health.Couple the non-invasive aspect of the Visible Light Communication (VLC) with IoT could notonly reduce potential risks for human health but also avoid radio band saturation. However, today'stechniques consist mainly in broadcast data from light sources to receivers which is the opposite of theIoT paradigm. In this study, we will present a new design where the gateway is not a classic photodiodebut a camera.With this camera based method, we are able to design a star network using VLC. Even if the datarate is not the same as standard method, we are now able to collect data emanating from many sensorsat once with only one photoreceptor. This system also includes the ability of discriminate LED matrix,which transfer the same data faster, and single LED. Finally, data rate can be handle autonomouslyby the system to provide an optimal data transfer
Mayzaud, Anthéa. „Monitoring and Security for the RPL-based Internet of Things“. Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0207/document.
Der volle Inhalt der QuelleThe growing interest for the Internet of Things (IoT) has resulted in the large scale deployment of Low power and Lossy Networks (LLN). These networks are strongly constrained in terms of resources and communicate using unstable links. In this context, existing routing protocols for traditional networks do not cope with all these constraints. The IETF has proposed a new routing protocol called RPL based on IPv6 and specifically designed for these environments. The RPL protocol is however exposed to a large variety of attacks. The deployment of security mechanisms may also be quite expensive for the nodes. Therefore, LLN networks present new challenges in terms of monitoring and security. In this thesis we propose to investigate a security-oriented monitoring approach for addressing the trade-off between security and cost in the IoT. In a first stage, we assess security threats faced by these networks by identifying and classifying attacks through a dedicated taxonomy. We also quantify the consequences of two major attacks called DAG inconsistency attacks and version number attacks causing over-consumption of node resources. We then focus our work on security solutions for RPL-based IoT. We propose a local strategy for addressing DAG inconsistency attacks. In order to detect complex attacks such as version number attacks and to complement our node-level approach, we design a security-oriented distributed monitoring architecture for RPL networks. This solution allows us to preserve constrained nodes energy by performing monitoring and detection activities on dedicated nodes. We quantify the performance and the cost of this architecture and the deployed detection modules
Picard, Alexis. „I²PHEN : une nouvelle plateforme de télésurveillance médicale basée sur l'Internet des Objets“. Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD056.
Der volle Inhalt der QuelleMedical telemonitoring is an area still in full development in France. It is a branch of telemedicine which aims at enabling a doctor in collecting and interpreting remotely the data necessary for the medical follow-up of a patient. It enables, among others, in improving remote medical monitoring of seniors with loss of autonomy or suffering from chronic diseases (heart diseases, diabetes and high blood pressure for example). Hence it encourages their stay at home and to warn as soon as possible of any hospitalizations.This CIFRE Thesis within Maincare company (major publisher of digital solutions for the world of health) allowed us to propose our novel platform I²PHEN (IoT Interoperable Platform for Health moNitoring low power) in which the monitoring of a patient's health parameters is done using connected objects (sphygmomanometer, thermometer, glucometer, ...) which communicates with the remote platform (distributed data monitoring). The central server can then trigger alerts which are defined beforehand with the medical teams. The technological choice of the networks used is a major concern. LPWAN networks (Low-Power Wide Area Network) offer a cost-effective alternative and are less expensive in terms of energy than cellular networks to transmit small amounts of data from sensors and energy efficient objects powered on batteries over important distances. This field being new, and still little dedicated to the medical field, it is necessary to develop new focus of research such as COMMA, a new adaptive algorithm to reduce energy consumption and interference in daily mobility. Hence, the first lock is the energy consumption, in relation to the quality of service (QoS), of these new networks in the critical area of telemedecine. The second lock, and probably the most difficult, is to propose interoperable solutions in which connected objects can interact, through these new networks, with the remote platform through a local gateway (based on Arduino). In the end, the platform that we propose in this PHD allows the telemonitoring of patients from end to end, is interoperable and energy efficient
Le, Kim-Hung. „Mécanismes d’interopérabilité pour les applications industrielles de l’Internet des Objets et la Ville Intelligente“. Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS225.
Der volle Inhalt der QuelleWith the rapid growth of Internet technologies as well as the explosion of connected objects, Internet of Things (IoT) is considered an Internet revolution that positively affects several life aspects. The integration of IoT solutions and cloud computing, namely cloud-based IoT, is a crucial concept to meet these demands. However, two major challenges of the cloud-based IoT are interoperability and reliability. In this thesis, our main objective is to deal with the interoperability and reliability issues that arise from large-scale deployment. The proposed solutions spread over architectures, models, and algorithms, ultimately covering most of the layers of the IoT architecture. At the communication layer, we introduce a method to interoperate heterogeneous IoT connections by using a connector concept. We then propose an error and change point detection algorithm powered by active learning to enhance IoT data reliability. To maximize usable knowledge and business value from this cleaned data and make it more interoperable, we introduce a virtual sensor framework that simplifies creating and configuring virtual sensors with programmable operators. Furthermore, we provide a novel descriptive language, which semantically describes groups of Things. To ensure the device reliability, we propose an algorithm that minimizes energy consumption by real-time estimating the optimal data collection frequency. The efficiency of our proposals has been practically demonstrated in a cloud-based IoT platform of a start-up company
Razafimandimby, Anjalalaina Jean Cristanel. „Toward internet of heterogeneous things : wireless communication maintenance and efficient data sharing among devices“. Thesis, Lille 1, 2017. http://www.theses.fr/2017LIL10074/document.
Der volle Inhalt der QuelleDespite of the large success of IOT, most of its applications are based only on static actuation. However, adding an active role for actuators will be needed, in order to optimize the systems where they are present. To achieve this goal, in this thesis, we introduce a new concept called Internet of Heterogeneous Things which takes into account both static and dynamic actuation. The dynamic actuation is provided by a mobile robot or a mobile sensor. In this case, we exploit the potential of controlled mobility by proposing efficient algorithms to maintain the global connectivity among devices. We show by simulation the efficiency of the proposed algorithms and their performance in terms of convergence time, connectivity, and traveled distance. Once the connectivity among devices is guaranteed, another major challenge that should be solved is the huge amount of data they generate and transmit. To tackle this problem, we propose a Bayesian Inference Approach which allows avoiding the transmission of high correlated data. Belief Propagation algorithm, coupled with the Markov Random Field model, is used in this case to reconstruct the missing sensing data. According to different scenarios, our approach is evaluated based on the real data collected from sensors deployed on indoor and outdoor environments. The results show that our proposed approach reduces drastically the number of transmitted data and the energy consumption, while maintaining an acceptable level of inference error and information quality
Abane, Amar. „A realistic named data networking architecture for the Internet of things“. Electronic Thesis or Diss., Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1255.
Der volle Inhalt der QuelleThe Internet of Things (IoT) uses the interconnection of billions of small computing devices, called “Things”, to provide access to services and information all over the world. However, the IP protocol suite has been designed decades ago for a completely different purpose, and IoT features now highlight the limitations of IP. While adapting IP for the IoT might be seen as cutting corners, alternative architectures based on the Information Centric Networking (ICN) paradigm promise to natively satisfy emerging Internet applications. One of these architectures is Named Data Networking (NDN). Our objectives through the work reported in this manuscript can be summarized in two aspects. The first objective is to show that NDN is suitable to support IoT networking. The second objective is the design of two solutions for lightweight forwarding in constrained wireless networks
Roth, Yoann. „Étude de modulation et codage conjoint avec récepteur itératif pour la couche physique des réseaux longue portée bas débit“. Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT036/document.
Der volle Inhalt der QuelleMore than 10% of the Internet-of-Things (IoT) connections are expected to be realized through Low Power Wide Area (LPWA) networks, representing several billions of connected devices. Several industrial solutions have been developed and a standardization process is ongoing. The low levels of sensitivity and low data rate required for the long range communication are achieved by the means of two strategies: a narrow-band strategy and a low spectral efficiency strategy. Considering the limits of the information theory, additional gains in the communication's energy efficiency can be achieved. Nonetheless, a trade-off between spectral efficiency and energy efficiency should always be made. Reliable transmission with high energy efficiency will necessarily result in poor spectral efficiency, and in comparison, a system with a higher spectral efficiency has to consume more energy to transmit the same amount of bits with the same arbitrary level of error.This work considers the low spectral efficiency strategy. The combination of orthogonal modulations and a powerful channel code is studied. The scheme, so-called Turbo-FSK, associates the low spectral efficiency of Frequency Shift Keying (FSK) with the energy efficiency gain of a turbo receiver. Low levels of spectral efficiency can be achieved while optimizing the use of the available resource. The parameters of the scheme are optimized using a classic tool for iterative receivers, the Extrinsic Information Transfer (EXIT) chart. Performance of Turbo-FSK compared to existing LPWA solutions demonstrates the potential of the proposed solution to achieve low levels of sensitivity and to outperform existing schemes. However, the restrictions on low levels of spectral efficiency reduces the number of possible applications for the scheme. By introducing a linear component in the alphabet and a puncturing procedure, flexibility in spectral efficiency is achieved. A large range of spectral efficiencies can be obtained while maintaining performance close to the channel capacity theoretical limit. Eventually, more practical scenarios are considered for evaluating the performance of the scheme. Frequency selective channels are considered and an encapsulation in a Fast Fourier Transform (FFT) based system is implemented. Various indicators are studied and the Turbo-FSK scheme is compared to well-known technologies, such as schemes using Orthogonal Frequency Division Multiplexing (OFDM) associated with a powerful Forward Error Correction (FEC) scheme, namely Turbo Code (TC)
Smache, Meriem. „La sécurité des réseaux déterministes de l’Internet des objets industriels (IIoT)“. Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEM033.
Der volle Inhalt der QuelleTime synchronization is a crucial requirement for the IEEE802.15.4e based Industrial Internet of Things (IIoT). It is provided by the application of the Time-Slotted Channel-Hopping (TSCH) mode of the IEEE802.15.4e. TSCH synchronization allows reaching low-power and high-reliability wireless networking. However, TSCH synchronization resources are an evident target for cyber-attacks. They can be manipulated by attackers to paralyze the whole network communications. In this thesis, we aim to provide a vulnerability analysis of the TSCH asset synchronization. We propose novel detection metrics based on the internal process of the TSCH state machine of every node without requiring any additional communications or capture or analysis of the packet traces. Then, we design and implement novel self-detection and self-defence techniques embedded in every node to take into account the intelligence and learning ability of the attacker, the legitimate node and the real-time industrial network interactions. The experiment results show that the proposed mechanisms can protect against synchronization attacks
Jaber, Ghada. „A content-centric approach for wireless sensor networks“. Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30196.
Der volle Inhalt der QuelleWireless sensor networks are an essential part of the Internet of Things (IoT) "perception" layer. IoT connects the digital world created by conventional computer networks to the physical world. They continually bring new applications to life through a large number of elements that collect, process and disseminate environmental data. Today, moves accross the IoT a large and varied volume of data. Data is generated in a continuous way with a greater emphasis on information and not on its source. This indifference to the source is reinforced by the interchangeable and redundant deployments of the sensor networks. In this thesis, we focus on integrating the principles and mechanisms of content-oriented networks in wireless sensor networks to improve the operation and performance of these networks. Hence, we first focused on the temporal relevance of data in content-centric sensor networks. Indeed, we considered the content lifetime (or freshness) and we proposed two approaches (one reactive and the other proactive) for their update. In the second part of the thesis, we proposed a mechanism based on the control of the duty-cycle to overcome the impact of the flooding mainly used to disseminate the interests sent by the users and the corresponding contents. For this purpose, we tried to maintain a sufficient subset of nodes necessary to satisfy the interests received by the network. The main challenge was to reduce energy consumption thanks to a mechanism controlling the node activity while keeping a good interest satisfaction rate. Finally, to improve the content caching in a sensor network, we have studied the existing strategies and identified the parameters impacting their performance. We then proposed a strategy placing the contents according to the degree of the nodes and their distance from the source. An exhaustive comparative study with other solutions show that the proposed mechanisms guarantee good performance in terms of latency, energy consumption and interest satisfaction rate
Abane, Amar. „A realistic named data networking architecture for the Internet of things“. Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1255/document.
Der volle Inhalt der QuelleThe Internet of Things (IoT) uses the interconnection of billions of small computing devices, called “Things”, to provide access to services and information all over the world. However, the IP protocol suite has been designed decades ago for a completely different purpose, and IoT features now highlight the limitations of IP. While adapting IP for the IoT might be seen as cutting corners, alternative architectures based on the Information Centric Networking (ICN) paradigm promise to natively satisfy emerging Internet applications. One of these architectures is Named Data Networking (NDN). Our objectives through the work reported in this manuscript can be summarized in two aspects. The first objective is to show that NDN is suitable to support IoT networking. The second objective is the design of two solutions for lightweight forwarding in constrained wireless networks
Bouloukakis, Georgios. „Systèmes mobiles émergents dans l’IoT : de l’interopérabilité au niveau middleware de communication à l’analyse de la qualité de service associée“. Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066234/document.
Der volle Inhalt der QuelleInternet of Things (IoT) applications consist of diverse Things including both resource-constrained/rich devices with a considerable portion being mobile. Such devices demand lightweight, loosely coupled interactions in terms of time, space, and synchronization. IoT middleware protocols support one or more interaction types (e.g., asynchronous messaging, streaming) ensuring Thing communication. Additionally, they introduce different Quality of Service (QoS) features for this communication with respect to available device and network resources. Things employing the same middleware protocol interact homogeneously, since they exploit the same functional and QoS features. However, the profusion of developed IoT middleware protocols introduces technology diversity which results in highly heterogeneous Things. Interconnecting heterogeneous Things requires mapping both their functional and QoS features. This calls for advanced interoperability solutions integrated with QoS modeling and evaluation techniques. The main contribution of this thesis is to introduce an approach and provide a supporting platform for the automated synthesis of interoperability software artifacts. Such artifacts enable the interconnection between mobile Things that employ heterogeneous middleware protocols. Our platform further supports evaluating the effectiveness of the interconnection in terms of end-to-end QoS. More specifically, we derive formal conditions for successful interactions, and we enable performance modeling and analysis as well as end-to-end system tuning, while considering several system parameters related to the mobile IoT
Sabine, Anastasia. „Production et circulation d’informations médicales personnelles sur le web et les objets connectés“. Thesis, Paris 13, 2019. http://www.theses.fr/2019PA131044.
Der volle Inhalt der QuelleNon communiqué
Gaillard, Guillaume. „Opérer les réseaux de l'Internet des Objets à l'aide de contrats de qualité de service (Service Level Agreements)“. Thesis, Lyon, 2016. http://www.theses.fr/2016LYSEI152/document.
Der volle Inhalt der QuelleWith the growing use of distributed wireless technologies for modern services, the deployments of dedicated radio infrastructures do not enable to ensure large-scale, low-cost and reliable communications. This PhD research work aims at enabling an operator to deploy a radio network infrastructure for several client applications, hence forming the Internet of Things (IoT). We evaluate the benefits earned by sharing an architecture among different traffic flows, in order to reduce the costs of deployment, obtaining a wide coverage through efficient use of the capacity on the network nodes. We thus need to ensure a differentiated Quality of Service (QoS) for the flows of each application. We propose to specify QoS contracts, namely Service Level Agreements (SLAs), in the context of the IoT. SLAs include specific Key Performance Indicators (KPIs), such as the transit time and the delivery ratio, concerning connected devices that are geographically distributed in the environment. The operator agrees with each client on the sources and amount of traffic for which the performance is guaranteed. Secondly, we describe the features needed to implement SLAs on the operated network, and we organize them into an SLA management architecture. We consider the admission of new flows, the analysis of current performance and the configuration of the operator's relays. Based on a robust, multi-hop technology, IEEE Std 802.15.4-2015 on TSCH mode, we provide two essential elements to implement the SLAs: a mechanism for the monitoring of the KPIs, and KAUSA, a resource allocation algorithm with multi-flow QoS constraints. The former uses existing data frames as a transport medium to reduce the overhead in terms of communication resources. We compare different piggybacking strategies to find a tradeoff between the performance and the efficiency of the monitoring. With the latter, KAUSA, we dedicate adjusted time-frequency resources for each message, hop by hop. KAUSA takes into account the interference, the reliability of radio links and the expected load to improve the distribution of allocated resources and prolong the network lifetime. We show the gains and the validity of our contributions with a simulation based on realistic traffic scenarios and requirements
Kaddah, Rim. „Gestion active de la demande basée sur l'habitat connecté“. Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0025/document.
Der volle Inhalt der QuelleThe Internet of Things (IoT) paradigm brings an opportunity for advanced Demand Response (DR) solutions. Indeed, it enables visibility and control on the various appliances that may consume, store or generate energy within a home. In this thesis, we consider solutions having the capability to produce direct control decisions at different granularities based on variables measured at homes. Control schemes are driven by an optimization based on utility functions. These functions are defined based on a generic approach that considers load’s flexibility and the impact of control decisions on users. The proposed approach does not impose any restrictions on the type of controlled appliances nor on the granularity of control decisions. This enables joint control of heterogeneous loads. We consider three types of control architectures, namely centralized, partially distributed and fully distributed solutions. Schemes based on these architectures differ in the distribution of decision making among entities involved in the control and data that is made available to these entities. Numerical analysis shows the trade-offs of proposed solutions from a performance, scalability and complexity perspectives
Vargas, Anamuro Cesar Augusto. „Etude du relayage entre terminaux pour la connectivité des objets dans les réseaux 5G“. Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0196.
Der volle Inhalt der QuelleMassive machine-type communication (mMTC) is one of the main services delivered by the 5G mobile network. mMTC represents a major challenge for 5G network since it is characterized by a large number of low complexity devices thats end small data packets. Moreover, mMTC devices are often battery-powered, and the battery is expected to operate for long periods without being recharged or replaced. Traditional cellular networks, which are designed for human communications, are not energy efficient for this type of service. To address this problem, in this thesis, we study the use of Device-to-Device(D2D) relaying as a complementary transmission. In this approach, the mMTC device can transmit its data using a nearby UE as a relay. First, we calculate the energy consumed in each phase of the communication process for a device located at the cell border that uses LTE-Mtechnology. Then, using a simple model, we compare the energy consumption of cellular and D2D transmission modes, and we determine the optimal relay location. Through the use of stochastic geometry, we analyze the performance of D2D communication with ARQ and CC-HARQ with regard to the transmission success probability, the average number of transmissions, and MTD energy consumption. Finally, we propose an energy-efficient D2D relaying mechanism suitable for mMTC applications thanks to its easy implementation. This mechanism uses a distributed relay selection approach, which prioritizes the selection of the user equipments (UEs) with the best channel qualities. Moreover, we present a tractable model to evaluate the performance of our mechanism
Blaise, Jean-Yves. „Le formalisme objet appliqué à l'étude de l'édifice patrimonial : Problèmes de modélisation et d'échanges de données sur le réseau Internet“. Phd thesis, Aix-Marseille 3, 2003. http://tel.archives-ouvertes.fr/tel-00268228.
Der volle Inhalt der QuelleNous montrons qu'une analyse a priori du corpus d'éléments physiques formant l'édifice peut grandement en faciliter l'étude. Mesure, représentations et documentation, trois exemples d'applications abordés, deviennent dans ce cadre des processus visant à renseigner le modèle et ses instances. Nous montrons que la compréhension globale de l'édifice bâti et de son évolution est mieux assurée.
Dufrene, Louis-Adrien. „Etude et optimisation de solutions reposant sur les réseaux cellulaires existants pour l'internet des objets“. Thesis, Rennes, INSA, 2017. http://www.theses.fr/2017ISAR0022/document.
Der volle Inhalt der QuelleThe Internet of Things (loT) is a concept, where a large number of connected devices are communicating together through the same network, constituting an autonomous and intelligent entity. The increasing number of connected devices and IoT services confirms the growing interest for the loT and its applications. To provide connectivity to the devices, several dedicated wireless low power and wide area networks have been created. Recently, with the Release 13, the 3GPP decided to modify the 2G and 4G technologies, to be able to also provide such connectivity for the loT devices, creating the field of Cellular-loT. These evolutions imply a coverage extension compared to the legacy technologies. To obtain this extension, these new standards especially use a blind repetition mechanism. In this context, this thesis studies the performance of several diversity combiners at the receiver, and observes the impact of the temporal evolution of the propagation channel and of imperfections in the receiver. The 2G GSM system is chosen as the application case. Firstly, we consider a receiver without imperfection. Secondly, we consider imperfect frequency synchronization in the receiver. Then, we consider imperfect channel estimation and propose a hybrid combining scheme, obtained by mixing two different combining mechanisms. Finally, in the last part of our study, we carry out a hardware implementation of the system into a software-radio platform. With the theoretical and simulation results provided in this thesis, one can better evaluate the potential of each combining scheme proposed in the framework of loT communications to efficiently benefit from blind repetition mechanisms