Letteratura scientifica selezionata sul tema "Internet des objets – Dispositifs de sécurité"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Internet des objets – Dispositifs de sécurité".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Internet des objets – Dispositifs de sécurité"
Meiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management". Sécurité et stratégie 32, n. 4 (19 marzo 2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Testo completoMarrast, Philippe, Marie Bénéjean, Florian Hémont, Marcela Patrascu, Antoine Février e Isabelle Bazet. "Matérialisation d’un dispositif de suppléance communicationnelle". Approches Théoriques en Information-Communication (ATIC) N° 8, n. 1 (4 ottobre 2024): 107–44. http://dx.doi.org/10.3917/atic.008.0107.
Testo completoBoukala, Mouloud, e Joseph Josy Lévy. "La mémorialisation numérique et tangible de la pandémie de la COVID-19". Frontières 35, n. 1 (2024). http://dx.doi.org/10.7202/1113465ar.
Testo completoTesi sul tema "Internet des objets – Dispositifs de sécurité"
Laamech, Nouha. "Towards a secure data sharing management approach for IoT environments". Electronic Thesis or Diss., Pau, 2024. http://www.theses.fr/2024PAUU3031.
Testo completoInternet of Things (IoT) generates, connects and shares collected data from smart devices with various independent parties. With the increasing number of connected devices, its wide deployment is revolutionizing the modern world by covering almost every aspect of an individual's life. In this context, it is in the best interest of the community to successfully motivate users to share their IoT data with the rest of the environment, to allow the emergence of new services in different fields such as healthcare, education, or industrial manufacturing. However, requesting data to be able to extract valuable information from it can be a sensitive matter to approach. Therefore, framing requests and providing clarity on how this information will be used is necessary for building trust and credibility in connected environments. More precisely, when data providers decide to share their data with the community, they have little control over how their information are being used and in which context. In parallel, data consumers don't have the ability to trace back the different nodes by which the available data went through and its processing history to determine, for example, if it meets the technical and legal requirements of a given activity.Our research focus on three main challenges: (i) the definition of a semantic layer that handles the security requirements in the context of IoT data sharing, (ii) the enforcement of a context-aware security policy that matches both the data provider's preferences and the data consumer's usage, and (iii) the establishment of an end-to-end security solution that manage the sharing of IoT data in a decentralized architecture while eliminating the need to trust any involved IoT parties.To address these issues, we first present a context-aware IoT data Sharing Management ontology called IdSM-O, to establish a shared security vocabulary and handle the interoperability of IoT environments. Following that, we introduce a three-layer automatic semantic rule manager, that collects data provider's security policies requirements and automatically translate them to semantic rules ready for reasoning. Those contributions are the basement of IdSM, an end-to-end security framework for data sharing management during the phases of collection, transmission, and processing. Using this framework, we aim at addressing user's control enforcement over the owned smart devices, information security requirements, and obligation compliance between various parties in the IoT environment. Finally, we design, implement, and develop a prototype of the the proposal in order to prove its feasibility and analyze its performances
Claeys, Timothy. "Sécurité pour l'internet des objets : une approche des bas en haut pour un internet des objets sécurisé et normalisé". Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM062.
Testo completoThe rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Formany of these products, security was merely an afterthought. Due to their advanced sensing and actuatingfunctionalities, poorly-secured IoT devices endanger the privacy and safety of their users.While the IoT contains hardware with varying capabilities, in this work, we primarily focus on the constrainedIoT. The restrictions on energy, computational power, and memory limit not only the processingcapabilities of the devices but also their capacity to protect their data and users from attacks. To secure theIoT, we need several building blocks. We structure them in a bottom-up fashion where each block providessecurity services to the next one.The first cornerstone of the secure IoT relies on hardware-enforced mechanisms. Various security features,such as secure boot, remote attestation, and over-the-air updates, rely heavily on its support. Sincehardware security is often expensive and cannot be applied to legacy systems, we alternatively discusssoftware-only attestation. It provides a trust anchor to remote systems that lack hardware support. In thesetting of remote attestation, device identification is paramount. Hence, we dedicated a part of this work tothe study of physical device identifiers and their reliability.The IoT hardware also frequently provides support for the second building block: cryptography. Itis used abundantly by all the other security mechanisms, and recently much research has focussed onlightweight cryptographic algorithms. We studied the performance of the recent lightweight cryptographicalgorithms on constrained hardware.A third core element for the security of the IoT is the capacity of its networking stack to protect the communications.We demonstrate that several optimization techniques expose vulnerabilities. For example,we show how to set up a covert channel by exploiting the tolerance of the Bluetooth LE protocol towardsthe naturally occurring clock drift. It is also possible to mount a denial-of-service attack that leverages theexpensive network join phase. As a defense, we designed an algorithm that almost completely alleviates theoverhead of network joining.The last building block we consider is security architectures for the IoT. They guide the secure integrationof the IoT with the traditional Internet. We studied the IETF proposal concerning the constrainedauthentication and authorization framework, and we propose two adaptations that aim to improve its security.Finally, the deployment of the IETF architecture heavily depends on the security of the underlying communicationprotocols. In the future, the IoT will mainly use the object security paradigm to secure datain flight. However, until these protocols are widely supported, many IoT products will rely on traditionalsecurity protocols, i.e., TLS and DTLS. For this reason, we conducted a performance study of the most criticalpart of the protocols: the handshake phase. We conclude that while the DTLS handshake uses fewerpackets to establish the shared secret, TLS outperforms DTLS in lossy networks
Challal, Yacine. "Sécurité de l'Internet des Objets : vers une approche cognitive et systémique". Habilitation à diriger des recherches, Université de Technologie de Compiègne, 2012. http://tel.archives-ouvertes.fr/tel-00866052.
Testo completoKouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes". Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.
Testo completoThe Internet of things (IoT) is a new technology that aims to connect billions of physical devices to the Internet. The components of IoT communicate and collaborate between each other in distributed and dynamic environments, which are facing several security challenges. In addition, the huge number of connected objects and the limitation of their resources make the security in IoT very difficult to achieve. In this thesis, we focus on the application of lightweight cryptographic approaches and blockchain technology to address security problems in IoT, namely : authentication and trust management. First, we were interested on some kind of IoT applications where we need to control remotely the execution of smart actuators using IoT devices. To solve this problem, we proposed an efficient and fine-grained access controlsolution, based on the Attribute Based Encryption (ABE) mechanism and oneway hash chains. Using formal security tools, we demonstrated the security of our scheme against malicious attacks. Second, we tackled the problem of authentication in IoT based fog computing environments. Existing authentication techniques do not consider latency constraints introduced in the context of fog computing architecture. In addition, some of them do not provide mutual authentication between devices and fog servers. To overcome these challenges, we proposed a novel, efficient and lightweight mutual authentication scheme based on blockchain technologyand secret sharing technique. We demonstrated the efficiency of our authentication scheme through extensive simulations. The third problem treated in this work is the trust management in IoT. Existing trust management protocols do not meet the new requirements introduced in IoT such as heterogeneity, mobility and scalability. To address these challenges, we proposed a new scalable trust management protocol based on consortium blockchain technology and fog computing paradigm, with mobility support. Our solution allows IoT devices to accurately assess and share trust recommendations about other devices in a scalable way without referring to any pre-trusted entity. We confirmed the efficiency of our proposal through theoretical analysis and extensive simulations. Finally, we showed that our protocol outperforms existing solutions especially in terms of scalability, mobility support, communication and computation
Pittoli, Philippe. "Influence d'une architecture de type maître-esclave dans les problématiques de sécurité de l'Internet des objets". Thesis, Strasbourg, 2019. http://www.theses.fr/2019STRAD006/document.
Testo completoThe Internet of things is a network design where "things" are connected to the Internet, such as thermometers or lights. These objects are constrained in memory, computational capacity and communication (packet size, shared medium). The thesis is focused on issues around those constraints. A client willing to send a request to an object may either establish a direct connection to the object (end-to-end architecture) or establish a connection to the network gateway, which is not constrained in memory or computation capabilities, and will be used as a broker between clients and objects (master-slave architecture). This purpose of the thesis is to understand and to spotlight the differences between those two kinds of architectures and to determine their viability in an IoT context
Hammi, Mohamed Tahar. "Sécurisation de l'Internet des objets". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006/document.
Testo completoInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Fayad, Achraf. "Protocole d’authentification sécurisé pour les objets connectés". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT051.
Testo completoThe interconnection of private resources on public infrastructure, user mobility and the emergence of new technologies (vehicular networks, sensor networks, Internet of things, etc.) have added new requirements in terms of security on the server side as well as the client side. Examples include the processing time, mutual authentication, client participation in the choice of security settings and protection against traffic analysis. Internet of Things (IoT) is in widespread use and its applications cover many aspects of today's life, which results in a huge and continuously increasing number of objects distributed everywhere.Security is no doubt the element that will improve and strengthen the acceptability of IoT, especially that this large scale deployment of IoT systems will attract the appetite of the attackers. The current cyber-attacks that are operational on traditional networks will be projected towards the Internet of Things. Security is so critical in this context given the underlying stakes; in particular, authentication has a critical importance given the impact of the presence of malicious node within the IoT systems and the harm they can cause to the overall system. The research works in this thesis aim to advance the literature on IoT authentication by proposing three authentication schemes that satisfy the needs of IoT systems in terms of security and performance, while taking into consideration the practical deployment-related concerns. One-Time Password (OTP) is an authentication scheme that represents a promising solution for IoT and smart cities environments. This research work extends the OTP principle and propose a new approach to generate OTP based on Elliptic Curve Cryptography (ECC) and Isogeny to guarantee the security of such protocol. The performance results obtained demonstrate the efficiency and effectiveness of our approach in terms of security and performance.We also rely on blockchains in order to propose two authentication solutions: first, a simple and lightweight blockchain-based authentication scheme for IoT systems based on Ethereum, and second, an adaptive blockchain-based authentication and authorization approach for IoT use cases. We provided a real implementation of our proposed solutions. The extensive evaluation provided, clearly shows the ability of our schemes to meet the different security requirements with a lightweight cost in terms of performance
Montoya, Maxime. "Sécurité adaptative et énergétiquement efficace dans l’Internet des Objets". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEM032.
Testo completoThe goal of this work is to propose new methods that provide both a high security and a high energy efficiency for integrated circuits for the IoT.On the one side, we study the security of a mechanism dedicated to energy management. Wake-up radios trigger the wake-up of integrated circuits upon receipt of specific wake-up tokens, but they are vulnerable to denial-of-sleep attacks, during which an attacker replays such a token indefinitely to wake-up a circuit and deplete its battery. We propose a new method to generate unpredictable wake-up tokens at each wake-up, which efficiently prevents these attacks at the cost of a negligible energy overhead.On the other side, we improve on the energy efficiency of hardware countermeasures against fault and side-channel attacks, with two different approaches. First, we present a new combined countermeasure, which increases by four times the power consumption compared to an unprotected implementation, introduces no performance overhead, and requires less than 8 bits of randomness. Therefore, it has a lower energy overhead than existing combined protections. It consists in an algorithm-level power balancing that inherently detects faults. Then, we propose an adaptive implementation of hardware countermeasures, which consists in applying or removing these countermeasures on demand, during the execution of the protected algorithm, in order to tune the security level and the energy consumption. A security evaluation of all the proposed countermeasures indicates that they provide an efficient protection against existing hardware attacks
Hammi, Mohamed Tahar. "Sécurisation de l'Internet des objets". Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006.
Testo completoInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Khalil, Ahmad. "Gestion autonome de la qualité de service et de la sécurité dans un environnement Internet des objets". Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCK068.
Testo completoNowadays, the Internet of Things (IoT) is becoming important in our daily lives thanks to technological advances. This paradigm aims to improve the quality of human life through automating several tasks. In this context, service level guarantee within IoT environments is a major challenge while considering a massive deployment of IoT applications and services as well as extending their usage to different domains. The IoT service level can be characterized in two parts: Quality of Service (QoS) and security. Moreover, this service level must be managed in an autonomic manner within the IoT environment given the heterogeneity and the size of its infrastructure making it difficult, even impossible, their management in a manual manner by the administrators. In this thesis, we propose a QoS based channel access control mechanism, called QBAIoT (QoS Based Access for IoT environments), to ensure a differentiated processing of existing traffics in the IoT environment. The differentiated processing allows satisfying the requirements of each traffic according to different QoS parameters (i.e., delay, jitter, packet delivery ratio, etc.). Then, QBAIoT is improved and upgraded to integrate self-management capabilities thanks to two important functions of the closed control loop: self-configuration and self-optimization. In addition, to offer a better QoS within the IoT environment, it is necessary to optimize the energy consumption of resources’ constrained components. Thus, we propose an adaptation of QBAIoT allowing to reduce its energy consumption in an autonomic manner while respecting the data accuracy. Our contribution concerning the second part of service level guarantee within an IoT environment, which is security, consists is a mechanism enabling IoT objects access control to IoT gateways, called IoT-MAAC (IoT Multiple Attribute Access Control). This mechanism takes into account different parameters that are specific to IoT environments (i.e., IoT object trust, IoT object identifier, IoT object fingerprint, etc.). Finally, the decision making process regarding IoT object access control is autonomously managed by IoT gateways and aims to meet the requirements of IoT environment in terms of trust
Libri sul tema "Internet des objets – Dispositifs de sécurité"
Piette-Coudol, Thierry. Les objets connectés: Sécurité juridique et technique. Paris: Lexis Nexis, 2015.
Cerca il testo completoCampione, Mary. The Java tutorial: Object-oriented programming for the Internet. Reading, Mass: Addison Wesley, 1996.
Cerca il testo completoKathy, Walrath, a cura di. The Java tutorial: Object-oriented programming for the Internet. Reading, Mass: Addison Wesley, 1996.
Cerca il testo completoKathy, Walrath, a cura di. The Java tutorial: Object-oriented programming for the Internet. 2a ed. Reading, Mass: Addison-Wesley, 1998.
Cerca il testo completoInternet of Things, Threats, Landscape, and Countermeasures. Taylor & Francis Group, 2021.
Cerca il testo completoKolokotronis, Nicholas, e Stavros Shiaeles. Internet of Things Threats Landscape and Countermeasures. Taylor & Francis Group, 2021.
Cerca il testo completoSecurity and Privacy in the Internet of Things. Taylor & Francis Group, 2020.
Cerca il testo completoZahra, Syed Rameem, e Mohammad Ahsan Chishti. Security and Privacy in the Internet of Things. Taylor & Francis Group, 2020.
Cerca il testo completoZahra, Syed Rameem, e Mohammad Ahsan Chishti. Security and Privacy in the Internet of Things. Taylor & Francis Group, 2020.
Cerca il testo completoZahra, Syed Rameem, e Mohammad Ahsan Chishti. Security and Privacy in the Internet of Things. Taylor & Francis Group, 2020.
Cerca il testo completoCapitoli di libri sul tema "Internet des objets – Dispositifs de sécurité"
KHALIL, Ahmad, Nader MBAREK e Olivier TOGNI. "Adaptation du contrôle d’accès pour la sécurité de l’IoT". In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 169–204. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch7.
Testo completoKHALIL, Ahmad, Nader MBAREK e Olivier TOGNI. "Optimisation de la consommation énergétique des dispositifs IoT". In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 79–106. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch4.
Testo completoHADJADJ-AOUL, Yassine, e Soraya AIT-CHELLOUCHE. "Utilisation de l’apprentissage par renforcement pour la gestion des accès massifs dans les réseaux NB-IoT". In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 27–55. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch2.
Testo completoHONBA HONBA, Cédric. "Sémiotique et archive d’images". In Corpus audiovisuels, 125–46. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.5705.
Testo completo