Tesi sul tema "Sécurités des IoT"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-44 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Sécurités des IoT".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Su, Runbo. "Trust Management in Service-Oriented Internet of Things (SO-IoT)". Electronic Thesis or Diss., Université de Lorraine, 2024. http://www.theses.fr/2024LORR0054.
Testo completoUnlike Trust in Social Science, in which interactions between humans are measured, thanks to the integration of numerous smart devices, Trust in IoT security focuses more on interactions between nodes. Moreover, As IoT nodes can somehow benefit from 'Group'/'Community' since they form by similar interests or functionalities, the assessment of Group-Individual and Inter-Individual Trust is also important. However, handling limitations brought by potential threats and inherent vulnerability due to TM architecture remains challenging. This thesis investigates Trust from three perspectives in the Service-Oriented Internet of Things (SO-IoT): Inter-Group Trust, Group-Individual Trust, and Inter-Individual Trust. Firstly, a role-based dynamic model is developed to assess intra- and inter-community(group), enhancing service-oriented activities and addressing security issues within and between communities. A locally centralized four-phase approach is employed, focusing on countermeasures against attacks on services within the community. Additionally, a three-phase mechanism is devised to measure cooperativeness between communities. An implementation based on the ROS 2 system was implemented to analyze the performance of the proposed model based on the preliminary results. Secondly, to address misbehavior in SO-IoT in terms of Inter-Individual trust, a Stochastic Bayesian Game (SBG) is introduced, which considers the heterogeneity of IoT nodes, and complex behavioral schemes of service providers are incorporated, encouraging cooperation and penalizing malicious strategical actions. Lastly, the work of assessing the Trust of V2X messages in IoV demonstrates the possibility of implementing Trust Management in a concrete IoT environment
Hemmer, Adrien. "Méthodes de détection pour la sécurité des systèmes IoT hétérogènes". Electronic Thesis or Diss., Université de Lorraine, 2023. http://www.theses.fr/2023LORR0020.
Testo completoThis thesis concerns new detection methods for the security of heterogenous IoT systems, and fits within the framework of the SecureIoT European project. We have first proposed a solution exploiting the process mining together with pre-treatment techniques, in order to build behavioral models, and identifying anomalies from heterogenous systems. We have then evaluated this solution from datasets coming from different application domains : connected cars, industry 4.0, and assistance robots.. This solution enables to build models that are more easily understandable. It provides better detection results than other common methods, but may generate a longer detection time. In order to reduce this time without degrading detection performances, we have then extended our method with an ensemble approach, which combines the results from several detection methods that are used simultaneously. In particular, we have compared different score aggregation strategies, as well as evaluated a feedback mechanism for dynamically adjusting the sensitivity of the detection. Finally, we have implemented the solution as a prototype, that has been integrated into a security platform developed in collaboration with other European industrial partners
Mahamat, charfadine Salim. "Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets". Thesis, Reims, 2019. http://www.theses.fr/2019REIMS011/document.
Testo completoWith the exponential evolution of the Internet of Things (IoT), ensure the network security has become a big challenge for networkadministrators. Traditionally, the network security is based on multiple independent devices such as firewall, IDS/IPS, NAC where the main role is to monitor the information exchanged between the inside and the outside perimeters of the enterprises networks. However, the administration of these network devices can be complex and tedious with an independent manual configuration. Recently, with the introduction of the Software Defined Networking concept (SDN) and the OpenFlow protocol offers many opportunities by providing a centralized and programmable network administration.As part of this research work, we proposed a new approach to secure the network traffic flows exchanges based on a method of events detection, in an automated manner. This solution is based on the SDN approach coupled to an intrusion detection system which allows analyze, detect and remove security threats. With the implementation, we contribute to change the paradigm of secure the network traffic flows exchanges using the SDN principle, coupled with an IDS in a real use case architecture. In this way, the management of network security becomes simplified, dynamic and scalable
Moinet, Axel. "Définition d'une architecture IoT sécurisée et adaptative basée sur la blockchain". Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCK010.
Testo completoDuring the last fifteen years, the rise of smart and wireless enabled embedded devices lead to the development of wireless sensor networks (WSN). In the same time, the emerging of Cloud computing with the development of the Internet and the Web as an everyday technology thanks to the rise of bandwidth and processing power leads to new network paradigms. The Internet of Things (IoT) primary goal is to bridge the gap between these technologies and bring WSN sensing and actuating abilities to Cloud applications. We count a significant amount of work targetting the IoT in the last decade, however they lack proper solutions to ensure data privacy and security. Gartner investigations shows that 70 % of connected and smart devices provide little or no security policies and solutions, making both user and devices vulnerable to attackers. In the field of digital currencies, Bitcoin proposed a new authenticated and trustless data structure dedicated to transactions logging in a decentralized network with the help of a consensus protocol : the blockchain. This thesis is focused on bringing the blockchain technology as a new solutions for security in decentralized WSN in the IoT, providing the basis for a secure and adaptative agent-based middleware and execution framework. This framework attempt to federate existing work regarding the architecture of the IoT, but also to tackle security issues regarding network access, agent execution and trust evaluation. To achieve this goal, we propose Network Service Loader (NSL), an agent-based middleware constructed of existing protocols in a new way, along with a new solution called Blockchain Authentication and Trust Module (BATM) dedicated to node and users authentication, access control policies, and trust evaluation through our new Maximum Likelihood Trust Estimator (MLTE) algorithm
Mansouri, Mohamad. "Performance and Verifiability of IoT Security Protocols". Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS065.
Testo completoThe Internet of Things (IoT) is one of the most important technologies in our current world. It is composed of connected devices with sensors and processing abilities, all connected to a single platform that orchestrates them. The integration of these IoT devices into many real-life applications (eg., transportation, industries, ...) implies significant performance and efficiency improvements. As a consequence, we have seen a boom in the number of IoT devices deployed and their corresponding platforms. These IoT devices use real-time data from their deployment environment and send them to the platform. The collected data by these devices often consist of sensitive information belonging to the individual who uses this technology. Hence, the privacy of users' data is one of the important concerns in IoT. Moreover, IoT applications rely on automating frequent tasks to achieve better efficiency. Unfortunately, moving control of usually human-controlled operations to the IoT presents some non-negligible risks to the safety of IoT users. This thesis deals with the privacy and safety concerns raised by IoT. We propose security protocols that preserve the privacy of the users' data. In addition to privacy, we design verifiable solutions that guarantee the correctness of the computations performed by the IoT devices and the platform and hence increase trust toward this technology. We design these solutions while focusing on their performance. More precisely, we propose protocols that are scalable to cope with the increasing number of IoT devices. We also consider protocols that are fault-tolerant to cope with the frequent dropouts of IoT devices. We particularly focus on two security protocols: Secure Aggregation and Remote Attestation. Secure aggregation is a protocol where an aggregator computes the sum of the private inputs of a set of users. In this thesis, we propose the first verifiable secure aggregation protocol (VSA) that gives formal guarantees of security in the malicious model. Our solution preserves the privacy of users' inputs and the correctness of the aggregation result. Moreover, we propose a novel fault-tolerant secure aggregation protocol (FTSA) based on additively-homomorphic encryption. The scheme allows users in secure aggregation to drop from the protocol and offers a mechanism to recover the aggregate without affecting the privacy of the data. We show that FTSA outperforms the state-of-the-art solutions in terms of scalability with respect to the number of users. On the other hand, a remote attestation protocol is a protocol that allows an IoT device (acting as a prover) to prove its software integrity to the IoT platform (acting as the verifier). We propose a new collaborative remote attestation protocol (FADIA) in which devices collect attestations from each other and aggregate them. FADIA deals with the heterogeneity and dynamic nature of IoT by considering fairness in its design. The evaluation of FADIA shows an increase in the lifetime of the overall network
Smache, Meriem. "La sécurité des réseaux déterministes de l’Internet des objets industriels (IIoT)". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEM033.
Testo completoTime synchronization is a crucial requirement for the IEEE802.15.4e based Industrial Internet of Things (IIoT). It is provided by the application of the Time-Slotted Channel-Hopping (TSCH) mode of the IEEE802.15.4e. TSCH synchronization allows reaching low-power and high-reliability wireless networking. However, TSCH synchronization resources are an evident target for cyber-attacks. They can be manipulated by attackers to paralyze the whole network communications. In this thesis, we aim to provide a vulnerability analysis of the TSCH asset synchronization. We propose novel detection metrics based on the internal process of the TSCH state machine of every node without requiring any additional communications or capture or analysis of the packet traces. Then, we design and implement novel self-detection and self-defence techniques embedded in every node to take into account the intelligence and learning ability of the attacker, the legitimate node and the real-time industrial network interactions. The experiment results show that the proposed mechanisms can protect against synchronization attacks
Fleury, Xavier. "Corrélation entre dégradation des composants internes et sécurité de fonctionnement des batteries Li-ion". Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAI060/document.
Testo completoLithium-ion batteries have undeniable assets to meet several of the requirements for embedded applications. They provide high energy density and long cycle life. Nevertheless, they can face irreversible damage during their lives which could cause safety issues like the thermal runaway of the battery and its explosion. It is then essential to understand the degradation mechanisms of all the internal components of an accumulator (i.e. electrode materials, collectors, separator and electrolyte) and the progress of events in abusive conditions that can lead to an accident scenario. The aim of this thesis is to work on the security aspects of Lithium-ion batteries in order to understand these degradation mechanisms and to help to prevent future incidents.Even if the degradation mechanisms of all the internal components are studied in this work, a special attention is given to the separator. This component is indeed one of the most important safety devices of a battery and have to be electrochemically, mechanically and thermally characterized after ageing. Different washing methods have been study in order to characterize the separator without any degradation product of the electrolyte which could interfere. Porosity and tortuosity associated with the ionic conductivity of the separator have been tested.The results show that even if the separator is electrochemically inactive, its porosity can decrease because of the degradation of the negative graphite electrode. Indeed, SEI components obstruct the surface porosity of the separator. This porosity change do not cause any mechanical degradation but decrease separator performances at high current rate and promote lithium dendrite growth
Alouache, Lylia. "Protocoles de Routage SDN, Multi-critères et Sécurisés Dans un Environnement IoV Collaboratif". Thesis, Cergy-Pontoise, 2019. http://www.theses.fr/2019CERG1041.
Testo completoNowadays, Big Data, Cloud Computing, and Internet of Things (IoT) have encouraged the generalization of the Vehicular Ad Hoc Networks (VANET) to the Internet of Vehicles (IoV), where vehicles evolve from passive actors of transportation to smart entities with new perception and communication capabilities. Vehicles become active members of a smart city, they provide an omnipresent connectivity, a wide range of applications and services relating to road safety, intelligent transport and the comfort of users. In addition, the large amount of data generated by IoV applications is a major challenge in their management, storage, and manipulation. These services depend greatly on the vehicles in question, which act as transmitters, relays, and receivers. Vehicles carry out their own communications but serve simultaneously as information relays for communication between other vehicles as well. Consequently, reliable dissemination process and connectivity are required. However, the dynamic nature of the IoV entities, the disturbances related to the mobile network as well as the security challenges lead to frequent link failure. In fact, some vehicles
Fayad, Achraf. "Protocole d’authentification sécurisé pour les objets connectés". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT051.
Testo completoThe interconnection of private resources on public infrastructure, user mobility and the emergence of new technologies (vehicular networks, sensor networks, Internet of things, etc.) have added new requirements in terms of security on the server side as well as the client side. Examples include the processing time, mutual authentication, client participation in the choice of security settings and protection against traffic analysis. Internet of Things (IoT) is in widespread use and its applications cover many aspects of today's life, which results in a huge and continuously increasing number of objects distributed everywhere.Security is no doubt the element that will improve and strengthen the acceptability of IoT, especially that this large scale deployment of IoT systems will attract the appetite of the attackers. The current cyber-attacks that are operational on traditional networks will be projected towards the Internet of Things. Security is so critical in this context given the underlying stakes; in particular, authentication has a critical importance given the impact of the presence of malicious node within the IoT systems and the harm they can cause to the overall system. The research works in this thesis aim to advance the literature on IoT authentication by proposing three authentication schemes that satisfy the needs of IoT systems in terms of security and performance, while taking into consideration the practical deployment-related concerns. One-Time Password (OTP) is an authentication scheme that represents a promising solution for IoT and smart cities environments. This research work extends the OTP principle and propose a new approach to generate OTP based on Elliptic Curve Cryptography (ECC) and Isogeny to guarantee the security of such protocol. The performance results obtained demonstrate the efficiency and effectiveness of our approach in terms of security and performance.We also rely on blockchains in order to propose two authentication solutions: first, a simple and lightweight blockchain-based authentication scheme for IoT systems based on Ethereum, and second, an adaptive blockchain-based authentication and authorization approach for IoT use cases. We provided a real implementation of our proposed solutions. The extensive evaluation provided, clearly shows the ability of our schemes to meet the different security requirements with a lightweight cost in terms of performance
Zhu, Xiaoyang. "Building a secure infrastructure for IoT systems in distributed environments". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI038/document.
Testo completoThe premise of the Internet of Things (IoT) is to interconnect not only sensors, mobile devices, and computers but also individuals, homes, smart buildings, and cities, as well as electrical grids, automobiles, and airplanes, to mention a few. However, realizing the extensive connectivity of IoT while ensuring user security and privacy still remains a challenge. There are many unconventional characteristics in IoT systems such as scalability, heterogeneity, mobility, and limited resources, which render existing Internet security solutions inadequate to IoT-based systems. Besides, the IoT advocates for peer-to-peer networks where users as owners intend to set security policies to control their devices or services instead of relying on some centralized third parties. By focusing on scientific challenges related to the IoT unconventional characteristics and user-centric security, we propose an IoT secure infrastructure enabled by the blockchain technology and driven by trustless peer-to-peer networks. Our IoT secure infrastructure allows not only the identification of individuals and collectives but also the trusted identification of IoT things through their owners by referring to the blockchain in trustless peer-to-peer networks. The blockchain provides our IoT secure infrastructure with a trustless, immutable and public ledger that records individuals and collectives identities, which facilitates the design of the simplified authentication protocol for IoT without relying on third-party identity providers. Besides, our IoT secure infrastructure adopts socialized IoT paradigm which allows all IoT entities (namely, individuals, collectives, things) to establish relationships and makes the IoT extensible and ubiquitous networks where owners can take advantage of relationships to set access policies for their devices or services. Furthermore, in order to protect operations of our IoT secure infrastructure against security threats, we also introduce an autonomic threat detection mechanism as the complementary of our access control framework, which can continuously monitor anomaly behavior of device or service operations
Lobe, kome Ivan Marco. "Identity and consent in the internet of persons, things and services". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0131/document.
Testo completoThe constant efforts of miniaturization of computing machines is transforming our relationships with machines and their role in society. The number of tiny computers remotely controlled is skyrocketing and those connected things are now more and more asked to do things on human behalf. The trend consists in making room for these specific machines into the Internet, in other words, building communication protocols adapted to their limited resources. This trend is commonly known as the Internet of Things (IoT) which consist of appliances and mechanisms different from those meant to be used exclusively by humans, the Internet of Persons (IoP). This conceptual separation being adopted, how would a Person exchange information with Things ?Sorts of brokers can help bridging that gap. The networking of those brokers led to the concept of Internetof Services (IoS). Persons and Things are connected through Services. This global networking is called the Internet of Persons Things and Services (IoPTS). Our work is on the edge of these 3 Internet areas and our contributions are two fold. In the first hand, we tackle the secure biding of devices’ and persons’ identities while preserving the Integrity, Anonymity and Confidentiality security properties. On the other hand, we address the problem of the secrecy of data on constrained Internet-connected devices. Other mechanisms must be created in order to seamlessly bind these conceptual areas of IoP, IoT andIoS. In this quest for a better integration of Internet connected-devices into the Internet of Persons, our work contributes to the definition of protocols on application and network layers, with IoT concerns and security at heart
Leduc, Guilain. "Performance et sécurité d'une Blockchain auto-adaptative et innovante". Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0220.
Testo completoResearch on blockchain application frameworks rarely offers performance evaluation. This thesis proposes a comprehensive methodology to help software integrators better understand and measure the influence of configuration parameters on the overall quality of long-term service performance. In order to improve performance, the new adaptive consensus protocol Sabine (Self-Adaptive BlockchaIn coNsEnsus) is proposed to dynamically modify one of these parameters in the PBFT consensus. The configuration parameter of this consensus is the number of validators involved and result of a trade-off between security and performance. The Sabine protocol maximises this number provided that the output rate matches the input rate. Sabine is evaluated and validated in real-world settings, the results of which show that Sabine has an acceptable relative error between the requested and committed transaction rates. Two new validator selection algorithms are proposed that reverse the random paradigm of current protocols to select the nodes leading to better performance. The first is based on a reputation system that rewards the fastest nodes. The second selects the closest nodes by imposing a continuous rotation of the selection. These two algorithms have been simulated and their impact on decentralisation discussed. This selection, associated with Sabine, improves security by giving the system more margin to increase the number of validators. This work opens the way to more reactive chains, with less latency and more throughput
Khalil, Ahmad. "Gestion autonome de la qualité de service et de la sécurité dans un environnement Internet des objets". Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCK068.
Testo completoNowadays, the Internet of Things (IoT) is becoming important in our daily lives thanks to technological advances. This paradigm aims to improve the quality of human life through automating several tasks. In this context, service level guarantee within IoT environments is a major challenge while considering a massive deployment of IoT applications and services as well as extending their usage to different domains. The IoT service level can be characterized in two parts: Quality of Service (QoS) and security. Moreover, this service level must be managed in an autonomic manner within the IoT environment given the heterogeneity and the size of its infrastructure making it difficult, even impossible, their management in a manual manner by the administrators. In this thesis, we propose a QoS based channel access control mechanism, called QBAIoT (QoS Based Access for IoT environments), to ensure a differentiated processing of existing traffics in the IoT environment. The differentiated processing allows satisfying the requirements of each traffic according to different QoS parameters (i.e., delay, jitter, packet delivery ratio, etc.). Then, QBAIoT is improved and upgraded to integrate self-management capabilities thanks to two important functions of the closed control loop: self-configuration and self-optimization. In addition, to offer a better QoS within the IoT environment, it is necessary to optimize the energy consumption of resources’ constrained components. Thus, we propose an adaptation of QBAIoT allowing to reduce its energy consumption in an autonomic manner while respecting the data accuracy. Our contribution concerning the second part of service level guarantee within an IoT environment, which is security, consists is a mechanism enabling IoT objects access control to IoT gateways, called IoT-MAAC (IoT Multiple Attribute Access Control). This mechanism takes into account different parameters that are specific to IoT environments (i.e., IoT object trust, IoT object identifier, IoT object fingerprint, etc.). Finally, the decision making process regarding IoT object access control is autonomously managed by IoT gateways and aims to meet the requirements of IoT environment in terms of trust
Kircheva, Nina. "Contribution de l'émission acoustique pour la gestion et la sécurité des batteries Li-ion". Phd thesis, Université de Grenoble, 2013. http://tel.archives-ouvertes.fr/tel-00960011.
Testo completoCozzi, Emanuele. "Binary Analysis for Linux and IoT Malware". Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS197.
Testo completoFor the past two decades, the security community has been fighting malicious programs for Windows-based operating systems. However, the increasing number of interconnected embedded devices and the IoT revolution are rapidly changing the malware landscape. Malicious actors did not stand by and watch, but quickly reacted to create "Linux malware", showing an increasing interest in Linux-based operating systems and platforms running architectures different from the typical Intel CPU. As a result, researchers must react accordingly. Through this thesis, we navigate the world of Linux-based malicious software and highlight the problems we need to overcome for their correct analysis.After a systematic exploration of the challenges involved in the analysis of Linux malware, we present the design and implementation of the first malware analysis pipeline, specifically tailored to study this emerging phenomenon. We use our platform to analyze over 100K samples and collect detailed statistics and insights that can help to direct future works.We then apply binary code similarity techniques to systematically reconstruct the lineage of IoT malware families, and track their relationships, evolution, and variants. We show how the free availability of source code resulted in a very large number of variants, often impacting the classification of antivirus systems.Last but not least, we address a major problem we encountered in the analysis of statically linked executables. In particular, we present a new approach to identify the boundary between user code and third-party libraries, such that the burden of libraries can be safely removed from binary analysis tasks
Junges, Pierre-Marie. "Évaluation à l'échelle de l'Internet du niveau d'exposition des objets connectés face aux risques de sécurité". Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0078.
Testo completoNowadays, the use of Internet of Things (IoT) devices in our personal and work space makes our everyday life easier, but those IoT devices often suffer from security issues. The objective of this thesis is to evaluate the security of IoT devices. On one hand, we investigate the risk of user privacy leakage introduced by IoT hubs (or IoT gateways). Those IoT hubs act as a middlebox between a user and the IoT devices. Existing passive fingerprinting techniques are not applicable in this configuration considering that the network traffic of each individual IoT device attached to the IoT hub is not accessible. We propose a passive fingerprinting technique to infer the user actions by analysing the network traffic of the IoT gateway. Our method works on encrypted network traffic, and consists of decomposing a packet payload size into a set of, potential, user actions. We applied our technique on one IoT gateway controlling up to 16 IoT devices and show that an attacker, located on the Internet, is able to infer the user actions in more than 91.2% of the investigated cases.In a further step, we propose a hybrid firmware analysis technique to evaluate the security of an IoT device by inspecting the content of its firmware. Our analysis combines a dynamic analysis and a static analysis to improve our chances to extract data. Our objectives are not to detect unknown vulnerabilities but only the known ones, and inspect if the binaries included are deprecated. We applied our analysis on 4,730 firmwares belonging to IoT devices released between 2009 and 2019, and noticed the widespread use of a small set of binaries, notably to deploy HTTP and SSH services. From 2017, we observed that IoT manufacturers implemented many updates which reduced the exposure to known vulnerabilities.Using those firmwares, we defined an active fingerprinting technique allowing an attacker to infer details about a connected IoT devices, such as its brand or the binary used to deploy the HTTP server. Thanks to the firmware content, we can 1) obtain precise information about the binaries (name, version), and 2) assume the services actually deployed by the device i.e., the results of a TCP/UDP port scans. Considering those two aspects, our method consists of training classifiers to predict one particular property of a connected IoT device from, among others, the supposed results of a TCP/UDP port scans. Our method allows to predict fine details such as the name or version of a binary, the usernames or the passwords present in an IoT device. Using our approach, we noticed that the predictions of the name and version of the HTTP, SSH and DNS binaries are achieved with a precision superior to 73.14%. On the other hand, the prediction of at least one valid password is more challenging and requires up to two tries. Our method is more effective and furtive than a naive brute-force method.Knowing the vulnerabilies present in a IoT device does not guarantee that attackers use them on a regular basis. Hence, we propose in our fourth contribution, a high interaction honeypot capable of intercepting cyberattacks targeting IoT devices. The defined honeypot is based on an existing emulation technique that uses IoT devices firmwares. Implementing an honeypot is hard, and because of the stealth constraint, the existing emulation technique could not be used as-is. Due to this constraint, we implemented a framework capable of emulating IoT devices while assuring their furtivity, and adding honeypot-specific capabilities, such as exfiltrating the attackers activities. We then compared our approach to the state of the art one, and showed that ours can emulate up to 825 (82.5%) devices compared to 454 (45.4%). Our honeypot was deployed on one server during about one year and captured unknown and recent attacks from botnets, and sometimes humans
Ahmad, Abbas. "Model-Based Testing for IoT Systems : Methods and tools". Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD008/document.
Testo completoThe Internet of Things (IoT) is nowadays globally a mean of innovation and transformation for many companies. Applications extend to a large number of domains, such as smart cities, smart homes, healthcare, etc. The Gartner Group estimates an increase up to 21 billion connected things by 2020. The large span of "things" introduces problematic aspects, such as conformance and interoperability due to the heterogeneity of communication protocols and the lack of a globally-accepted standard. The large span of usages introduces problems regarding secure deployments and scalability of the network over large-scale infrastructures. This thesis deals with the problem of the validation of the Internet of Things to meet the challenges of IoT systems. For that, we propose an approach using the generation of tests from models (MBT). We have confronted this approach through multiple experiments using real systems thanks to our participation in international projects. The important effort which is needed to be placed on the testing aspects reminds every IoT system developer that doing nothing is more expensive later on than doing it on the go
Conceicao, Filipe. "Network survival with energy harvesting : secure cooperation and device assisted networking". Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL020/document.
Testo completoThe 5th Generation Cellular Network Technology (5G) will be the network supporting the Internet of Things (IoT) and it introduced a major feature, Device-to-Device (D2D) communications. D2D allows energy-constrained wireless devices to save energy by interacting in proximity at a lower transmission power. Cooperation and device-assisted networking therefore raise signicant interest with respect to energy saving, and can be used in conjunction with energy harvesting to prolong the lifetime of battery-powered devices. However, cooperation schemes increase networking between devices, increasing the need for security mechanisms to be executed to assure data protection and trust relations between network nodes. This leads to the use of cryptographic primitives and security mechanisms with a much higher frequency.Security mechanisms are fundamental for protection against malicious actions but they also represent an important source of energy consumption, often neglected due to the importance of data protection. Authentication procedures for secure channel establishment can be computationally and energetically expensive, especially if the devices are resource constrained. Security features such as condentiality and data authentication have a low energetic cost but are used constantly in a device engaged in data exchanges. It is therefore necessary to properly quantify the energy consumption due to security in a device. A security based energy model is proposed to achieve this goal.In User Equipment (UE) D2D networks, mobility is a key characteristic. It can be explored for connecting directly in proximity with IoT objects. A lightweight authentication solution is presented that allows direct UE-IoT communications, extending coverage and potentially saving signicant energy amounts. This approach can be particularly useful in Public Protection and Disaster Relief (PPDR) scenarios where the network infrastructure may not be available.Security features such as condentiality or data authentication are a significant source of consumption. Devices equipped with Energy Harvesting (EH) hardware can have a surplus or a deficit of energy. The applied security can therefore be adjusted to the available energy of a device, introducing an energy aware secure channel. After in depth analysis of 5G standards, it was found that D2D UE networks using this type of channel would spend a signicant amount of energy and be generally less secure. A lightweight rekeying mechanism is therefore proposed to reduce the security overhead of adapting security to energy. To complete the proposed rekeying mechanism, a security parameter bootstrapping method is also presented. The method denes the Core Network (CN) as the security policy maker, makes the overall network more secure and helps preventing communication outages.Adapting security features to energy levels raises the need for the study of the energy/security tradeoff. To this goal, an Markov Decision Process (MDP) modeling a communication channel is presented where an agent chooses the security features to apply to transmitted packets. This stochastic control optimization problem is solved via several dynamic programming and Reinforcement Learning (RL) algorithms. Results show that adapting security features to the available energy can signicantly prolong battery lifetime, improve data reliability while still providing security features. A comparative study is also presented for the different RL learning algorithms. Then a Deep Q-Learning (DQL) approach is presented and tested to improve the learning speed of the agent. Results confirm the faster learning speed. The approach is then tested under difficult EH hardware stability. Results show robust learning properties and excellent security decision making from the agent with a direct impact on data reliability. Finally, a memory footprint comparison is made to demonstrate the feasibility of the presented system even on resource constrained devices
Kouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes". Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.
Testo completoThe Internet of things (IoT) is a new technology that aims to connect billions of physical devices to the Internet. The components of IoT communicate and collaborate between each other in distributed and dynamic environments, which are facing several security challenges. In addition, the huge number of connected objects and the limitation of their resources make the security in IoT very difficult to achieve. In this thesis, we focus on the application of lightweight cryptographic approaches and blockchain technology to address security problems in IoT, namely : authentication and trust management. First, we were interested on some kind of IoT applications where we need to control remotely the execution of smart actuators using IoT devices. To solve this problem, we proposed an efficient and fine-grained access controlsolution, based on the Attribute Based Encryption (ABE) mechanism and oneway hash chains. Using formal security tools, we demonstrated the security of our scheme against malicious attacks. Second, we tackled the problem of authentication in IoT based fog computing environments. Existing authentication techniques do not consider latency constraints introduced in the context of fog computing architecture. In addition, some of them do not provide mutual authentication between devices and fog servers. To overcome these challenges, we proposed a novel, efficient and lightweight mutual authentication scheme based on blockchain technologyand secret sharing technique. We demonstrated the efficiency of our authentication scheme through extensive simulations. The third problem treated in this work is the trust management in IoT. Existing trust management protocols do not meet the new requirements introduced in IoT such as heterogeneity, mobility and scalability. To address these challenges, we proposed a new scalable trust management protocol based on consortium blockchain technology and fog computing paradigm, with mobility support. Our solution allows IoT devices to accurately assess and share trust recommendations about other devices in a scalable way without referring to any pre-trusted entity. We confirmed the efficiency of our proposal through theoretical analysis and extensive simulations. Finally, we showed that our protocol outperforms existing solutions especially in terms of scalability, mobility support, communication and computation
Forestier, Coralie. "Influence de l'électrolyte sur la sécurité des batteries Li-ion : rôle des additifs et du sel de lithium". Thesis, Amiens, 2017. http://www.theses.fr/2017AMIE0006/document.
Testo completoThe electrolyte influence on the Li-ion batteries thermal runaway was studied through the role of additives and lithium salt. The thermal behavior analysis of lithiated graphite/electrolyte interface was performed using DSC along with other analytical techniques (IR, GC/MS…). Among tested commercial "SEI forming improver" additives (VC, FEC, VEC, 1,3-PS, SA), those leading to the formation of polymers (VC, FEC) were found to be the most efficient on both lithiated graphite thermal stability and electrochemical performances at 45°C. A new additives family, named dicyanoketene, was also investigated and showed beneficial effect on the safety and cyclability. The 0.33 M LiFSI and 0.66 M LiPF6 salt ratio can be used until 4.2 V without facing aluminum corrosion and it was found to improve the thermal behavior of lithiated graphite/electrolyte in presence of VC. Thermal stability tests on low capacity (~600 mAh) NMC/graphite prototypes allowed to confirm the effects observed at the negative electrode scale. Moreover, the strong contribution of the positive electrode in the thermal runaway phenomenon was highlighted as well as the key role of back pressure
Shahid, Mustafizur Rahman. "Deep learning for Internet of Things (IoT) network security". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS003.
Testo completoThe growing Internet of Things (IoT) introduces new security challenges for network activity monitoring. Most IoT devices are vulnerable because of a lack of security awareness from device manufacturers and end users. As a consequence, they have become prime targets for malware developers who want to turn them into bots. Contrary to general-purpose devices, an IoT device is designed to perform very specific tasks. Hence, its networking behavior is very stable and predictable making it well suited for data analysis techniques. Therefore, the first part of this thesis focuses on leveraging recent advances in the field of deep learning to develop network monitoring tools for the IoT. Two types of network monitoring tools are explored: IoT device type recognition systems and IoT network Intrusion Detection Systems (NIDS). For IoT device type recognition, supervised machine learning algorithms are trained to perform network traffic classification and determine what IoT device the traffic belongs to. The IoT NIDS consists of a set of autoencoders, each trained for a different IoT device type. The autoencoders learn the legitimate networking behavior profile and detect any deviation from it. Experiments using network traffic data produced by a smart home show that the proposed models achieve high performance.Despite yielding promising results, training and testing machine learning based network monitoring systems requires tremendous amount of IoT network traffic data. But, very few IoT network traffic datasets are publicly available. Physically operating thousands of real IoT devices can be very costly and can rise privacy concerns. In the second part of this thesis, we propose to leverage Generative Adversarial Networks (GAN) to generate bidirectional flows that look like they were produced by a real IoT device. A bidirectional flow consists of the sequence of the sizes of individual packets along with a duration. Hence, in addition to generating packet-level features which are the sizes of individual packets, our developed generator implicitly learns to comply with flow-level characteristics, such as the total number of packets and bytes in a bidirectional flow or the total duration of the flow. Experimental results using data produced by a smart speaker show that our method allows us to generate high quality and realistic looking synthetic bidirectional flows
Roux, Jonathan. "Détection d'intrusion dans des environnements connectés sans-fil par l'analyse des activités radio". Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30011.
Testo completoThe massive deployment of connected objects, forming the Internet of Things (IoT), is now disrupting traditional network environments. These objects, previously connectivity-free, are now likely to introduce additional vulnerabilities into the environments that integrate them. The literature today paints an unflattering picture of the security of these objects, which are increasingly becoming prime targets for attackers who see them as new exploitable surfaces to penetrate previously secure environments. In addition, the wireless means of communication used by these objects are numerous, with very heterogeneous characteristics at all protocol levels. Particularly in terms of the frequencies used, which make it difficult to analyse and monitor the environments that are equipped with them. These issues, and in particular the strong heterogeneity of these numerous protocols, call into question the traditional solutions used to ensure the security of the exchanges carried out. However, the explosion in the number of these objects requires security architectures that are adapted to these new issues. In this thesis, we are interested in monitoring and detecting anomalies that may occur in any wireless means of communication used in the IoT. We found a critical lack of solutions with the ability to analyze all exchanges, regardless of the protocol used. To answer this question, we propose a new security architecture based on the monitoring of physical radio signals, making it possible to free oneself from protocol knowledge and therefore to be generic. Its objective is to learn the model of legitimate radio behaviour in an environment using radio probes, then to identify deviations from this model, which may correspond to anomalies or attacks. The description of this architecture is the first contribution of this thesis. We then studied the applicability of our solution in different contexts, each with its own characteristics. The first study, corresponding to our second contribution, consists in proposing an implementation and deployment of our approach in connected homes. The evaluation of the latter in the face of real attacks injected into radio space and its results show the relevance of our approach in these environments. Finally, the last contribution studies the adaptation and deployment of our generic solution to professional environments where the presence of expert users promotes the integration of advanced diagnostic information to identify the origins of an anomaly. The subsequent evaluation and the results associated with each of the diagnostic mechanisms implemented demonstrate the value of our approach in heterogeneous environments
Stefan, Claudia-Simona. "Etude de la sécurité des batteries lithium-ion et de leurs performances à chaud, par utilisation de liquides ioniques". Thesis, Tours, 2008. http://www.theses.fr/2008TOUR4039.
Testo completoThis work is dedicated to a series of ionic liquid (Pxy-TFSI), composed of a voluminous organic cation of pyrrolidinium type (Pxy+) substituted by 2 alkyl chains and of bis(trifluoromethanesulfonyl) imide as anion (TFSI). Our aim is to investigate their potential use as electrolyte or electrolyte components in Li-ion batteries. Ionic liquids (IL) like (Pxy-TFSI) allow to considerably increase the safety of Lithium-ion accumulators without notable performance loss in terms of capacity or power. Pure ILs should be used as electrolyte in high temperature Li-ion batteries (50 to 150°C. As for mixtures consisting of an IL and a classic electrolyte (reference electrolyte) and composed of a mixture of alkylcarbonates and of a lithium salt (PC/EC/3DMC+LiPF6IM+VC1%), they could find applications in high capacity accumulator batteries in the electric vehicle field. Pure ILs have a negligible vapor pressure and a very high thermal stability, without mass loss under 300°C. They are not flammable and when they are mixed to flammable organic solvents (reference electrolyte), they make the electrolyte globally self-extinguishable when they represent 20 to 30% of the electrolyte mass content, non flammable when their content is above 30%. First, we studied transport properties of Pxy-TFSI such as ionic conductivity, dynamic viscosity and self-diffusion coefficients of cations (Li+ and Pxy+). Obtained results show that these ionic liquids present a high viscosity and a relatively weak conductivity at ordinary temperature. However, these properties can be largely improved by raising the temperature (from 50 to 90°C). A modelization of viscosity and conductivity can be obtained by applying the VTF theory and Angell's fragility theory. As the latter theory argue, the Pxy-TFSI IL are fragile, which makes them usable in electrochemical applications at temperatures higher than the ambient temperature. The conductivity and the viscosity of mixtures containing 20 to 30% Pxy-TFSI are concerned, they do not differ much from those of the reference electrolyte under similar temperature conditions. The width of the electrochemical window of pure Pxy-TFSI is 5,84V vs Li+/Li, which is enough for the use of high potential positive electrodes like LiCoO2. The electrochemical window is even larger than that of the reference electrolyte. The fact that electrodes get soaked in pure IL or in a mixture of IL and reference electrolyte constitutes no obstacle to their practical use. But separators cannot get almost totally soaked unless using the Séparion separators made of PET matrix covered in Al2O3/SiO2 particles, instead of Celgard polyolefine separators. An electrolyte must also be able to dissolve generated gases (especially CO2) whilst the accumulator is working. The solutibility of CO2 is improved when Pxy-TFSI ILs are added. The Pxy-TFSI ILs used in half-accumulators with Li4Ti5O12 and LixCoO2 graphite electrodes present a good cyclability at 90°C. The best cycling results are obtained when the reference electrolyte is mixed with Pxy-TFSI containing 20 to 30% IL at ambiant temperature. Thus, the ILs can be used in high temperature Li-ion application as well as in high capacity batteries used under normal temperature conditions
Vallois, Valentin. "Securing industrial internet of things architectures through Blockchain". Electronic Thesis or Diss., Université Paris Cité, 2022. http://www.theses.fr/2022UNIP7335.
Testo completoIt's been ten years since blockchain technology was created. This amalgam of cryptography and peer-to-peer application brings many innovations and securities services beyond financial services to regular information systems and offers new use cases for distributed applications in industrial context. Meanwhile, IoT became prominent in the industry as the future industrial revolution, bringing new applications but paving the way for security vulnerabilities. During this thesis, we explored the main issues facing the Internet of Things. We studied how IIoT platform providers address these challenges by comparing the measures they have implemented with the ITU recommendations using the Analytic Hierarchical Process (AHP). This study allowed us to identify areas of improvement and use cases for the blockchain. Identity management is a recurring problem in the IIoT literature, and we propose an identity management approach for distributed systems assisted by blockchain to guarantee the uniqueness of identities and the integrity of the directory. From this work, we have developed a blockchain-secured firmware update distribution and validation system using the machine learning algorithm Locality Sensitive Hashing (LSH)
Chaabouni, Nadia. "Détection et prévention des intrusions pour les systèmes IoT en utilisant des techniques d’apprentissage". Thesis, Bordeaux, 2020. http://www.theses.fr/2020BORD0070.
Testo completoWith the expansion of the Internet of Things (IoT) and the evolution of attack techniques, IoT security has become a more critical concern. OneM2M is a global standardization initiative for the IoT, therefore its security implies the security of the IoT ecosystem. Hence, we focus our work on the security of the oneM2M standard. In this thesis, we propose an Intrusion Detection and Prevention System (IDPS) based on Machine Learning (ML) for the oneM2M-based IoT systems. In order to adopt emerging technologies and especially with its interesting results already proven in the security domain, ML techniques are used in our IDPS strategy. Our oneM2M-IDPS detects potential threats and responds immediately. It detects and classifies threats on three different ML levels and reacts quickly with appropriate actions. OneM2M-IDPS not only handles known threats (security attacks and abnormal behaviors), it is also able to detect unknown/zero-day threats. In addition, the IDPS is equipped with a continuous learning module that allows it to continuously learn new behaviors in order to be up to date
Kuntz, Pierre. "Evolution du comportement sécuritaire de batterie lithium-ion pendant leur vieillissement". Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALI069.
Testo completoLithium-ion battery technology is more and more widespread due to its high energy density and good cycleability. Today electric vehicles runs with Lithium-ion technologies. Despite Lithium-ion technology has numerous advantages, it has been proved that lithium-ion battery are the cause of many accidental car fires. Thereby battery safety is a key issue to continue to develop more performant and enduring vehicle, but also to ensure the user’s safety. Depending on the condition of use, different aging mechanisms inside the cell could be activated and induce physical and chemical modifications of the internal components. Therefore, aging of a cell has a strong influence on its safety behavior. Three references of commercial 18650-type lithium-ion cells are investigated using BEV (Battery Electric Vehicle) representative aging at various temperatures (-20°C, 0°C, 25°C, 45°C) according to the international standard IEC 62-660. Ante-mortem and post-mortem analyses (half coin cell at the electrode level, SEM, EDX, GD-OES, XRD, GCMS, DSC, FTIR…) are performed on internal components in order to identify clearly, which aging mechanism occurs in accordance to the cell characteristics and the aging conditions. Then safety test are performed (ARC, short-circuit and overcharge) to evaluate the safety behavior of each cell. By comparing safety behavior of fresh cell vs. aged cells, it will be possible to understand the impact of each aging mechanism on cell safety behavior
Abada, Sara. "Compréhension et modélisation de l'emballement thermique de batteries Li-ion neuves et vieillies". Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066684/document.
Testo completoLi-ion secondary batteries are currently the preferred solution to store energy since a decade for stationary applications or electrical traction. However, because of their safety issues, Li-ion batteries are still considered as a critical part. Thermal runaway has been identified as a major concern with Li-ion battery safety. In this context, IFPEN, INERIS and LISE launched a collaboration to promote a PhD thesis so called « understanding and modeling of thermal runaway events pertaining to new and aged Li-ion batteries ». To achieve this goal, a double approach with modeling and experimental investigation is used. A 3D thermal runaway model is developed at cell level, coupling thermal and chemical phenomena, and taking into account the growth of the SEI layer as main ageing mechanism on negative electrode. Advanced knowledge of cells thermal behavior in over-heated conditions is obtained particularly for commercial LFP / C cylindrical cells: A123s (2,3Ah), LifeBatt (15Ah), and NMC / C pouch cells: PurePower (30 Ah). The model was calibrated for LFP / C cells, and then it was validated with thermal abuse tests on A123s and LifeBatt cells. This model is helpful to study the influence of cell geometry, external conditions, and even ageing on the thermal runaway initiation and propagation. This study opens up new possibilities for improving the prediction of various events taking place during Li-ion batteries thermal runaway, at various scales for further practical applications for safety management of LIBs
Beucher, Laure. "Determination of residues in food based on enhanced ion separation based analysis". Nantes, 2016. http://www.theses.fr/2016NANT080F.
Testo completoGodquin, Tanguy. "Sécurisation adaptative des objets de l'IoT par méthodes logicielles (White box) et combinées (hardware et software)". Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC222.
Testo completoThe Internet of Things (IoT) has been on the rise for several years now. Following recent attacks on these systems, studies have shown that most of these devices were not sufficiently secured. The ideal solution to this problem would be to provide security mechanisms on all IoT devices however, this solution is not always achievable.An alternative strategy to secure these systems would be to deploy security services at the edge of the network to bring the security mechanisms as close as possible to unsecured devices.The purpose of this thesis is to design an adaptive security framework for IoT devices relying on security services positioning. This work is divided into three contributions, each of which affects different aspects of our approach.The first contribution provides a strategy for deploying security services that minimizes the cost of deployment. This method expresses our positioning constraints into a graph problem which we suggest solving using graph theory.The second contribution formalizes the service placement problems and models them into an ontology. The latter is then used to solve those problems and to compare their different solutions.The third contribution focuses on security services that implement \textit{whitebox} cryptography. In this contribution, we present a mechanism for anchoring these implementations on an IoT network to prevent code lifting attacks and device theft.Finally, we present an adaptive security framework for IoT objects in which we position all the contributions made during this thesis
Chancelier, Léa. "Développement de solutions innovantes d'électrolytes pour sécuriser les accumulateurs lithium-ion". Thesis, Lyon 1, 2014. http://www.theses.fr/2014LYO10208/document.
Testo completoLithium-ion batteries are dominating both the nomad device and electric vehicle markets. However they raise safety concerns related to their electrolyte, which consists of flammable and volatile carbonate mixtures and toxic salts. The replacement of the latter by ionic liquids (IL), liquid salts claimed to be thermally stable and non-flammable, could provide a safer alternative. Yet this often claimed feature has been poorly examined by experiments. The work of this thesis investigates IL behaviour under abuse conditions such as overheating, fire or overcharge. Decomposition temperatures of IL based on differently substituted imidazolium or pyrrolidinium cations and the bis(trifluoromethanesulfonyl)imide anion were determined by thermogravimetric analysis (TGA). A critical study of gathered data (from literature and our work) led to the determination of an optimised procedure to obtain reproducible and comparable results. Electrolytes based on carbonates mixtures or IL and containing lithium salt were studied by dynamic and isothermal TGA, and their decomposition products were identified. Their combustion behaviour was also tested by measuring heats of combustion and ignition delays. Emitted gases were analysed and quantified. Electrochemical cycling tests were carried out with these electrolytes in lithium-ion systems based on Li4Ti5O12 and LiNi1/3Mn1/3Co1/3O2 electrodes. The evolution of the electrolytes and electrodes surface was also examined under overcharge
Eshetu, Gebrekidan Gebresilassie. "In-depth safety-focused investigation of electrolytes used in lithium-ion batteries with a focus on the role of the salts LiPF6 and LiFSI". Amiens, 2013. http://www.theses.fr/2013AMIE0119.
Testo completoUse of analytical techniques either alone or hyphenated in order to systematically trace the degradation mechanism of electrolytes used in LIB and thereby ensure a precise appraisal of their risk was at the center of this thesis. The thesis work enabled the detailed investigation of the multi-step exothermic phenomena that takes place at the lithiated graphite/electrolyte interface in the presence of 1M LiPFe in EC/DMC (1/1, %wt) using DSC along with other analytical tools such as GC/MS, GC/FTIR etc. The study was able to highlight the reactivity of the thermally generated PF5 with the SEI layer reference compounds. The effect of parameters such as formation temperature of the SEI layer, electrolyte composition including solvents, salts, and additives on the exothermic phenomena was investigated. An in-depth examination on the thermal reactivity of LiFSI sait using DSC, NMR, GC/MS, GC/FTIR, ESI-HRMS and chemical simulation tests were conducted. Combustion tests on numerous single solvents, solvent mixtures, electrolytes and lithium-ion cell prototypes including different salts (LiPFe and LiFSI) were perfonned using Tewarson calorimeter. Well controlled combustion conditions enabled the determination of a number of fire-induced rating indicators such as thermal threats (ignitability, power of the fire, effective beat of combustion, beat release rate. . . ) and Chemical threats (identification and quantification of toxic gases). Each electrolyte compounds (ratio between linear and cyclic carbonates, nature of the salt) was found to play an important role both on the thermal reactivity and combustion chemistry of solvents, electrolytes and cells
Gaulupeau, Bertrand. "Apport de la spectrométrie de masse en temps réel à l’étude de la dégradation thermique d’électrolytes de batteries lithium-ion au contact de matériaux d’électrode positive". Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0120.
Testo completoThe use of lithium-ion batteries is now a technology of choice for the automotive sector especially for its use in hybrid and electric vehicles, due to a high density of energy available as well as a high power density necessary to the traction of a vehicle. However, due to the high on-board energy, the safety of such devices must be enhanced. It has been reported that under abusive thermal conditions the cumulative effect of degradation of a LiPF6-based electrolyte and the catalytic effect of positive electrode materials leads to the formation of fluoro-organic species such as 2-fluoroethanol. This thesis aims to deepen the understanding of the role of positive electrode materials towards the degradation of LiPF6-based electrolyte, in particular by studying the nature of the gases produced under abusive thermal conditions. To carry out this project, a device allowing an in situ analysis of the formed gases has been developed. The role of water on the formation of fluoro-organic species is also the subject of a particular attention. The influence of several positive electrode materials on the nature of the degradation products of the electrolyte has been demonstrated. This work allowed to evaluate the influence of different parameters on the thermal degradation of the electrolyte in order to predict the choice of the various constituents of a lithium-ion battery
Hammi, Mohamed Tahar. "Sécurisation de l'Internet des objets". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006/document.
Testo completoInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Khalid, Ahmad. "A secure localization framework of RAIN RFID objects for ambient assisted living". Phd thesis, Toulouse, INPT, 2017. http://oatao.univ-toulouse.fr/19518/1/KHALID_Ahmad.pdf.
Testo completoPestourie, Baptiste. "UWB based Secure Ranging and Localization". Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALT067.
Testo completoLocation services are foreseen as one of the major IoT features in the next years, and have gained a lot of interest over the last decade from the literature of Wireless Sensors Networks, (WSN) and Vehicular Ad Hoc Networks (VANet). Impulse-Radio Ultra-Wideband (UWB), standardized in IEEE 802.15.4-2003, is currently the most performant radio positioning technology with centimeter-level accuracy and is used widely in industrial applications. It has been proven in the literature that UWB positioning is not completely tamper-proof, as various physical and link layers vulnerabilities have been identified in 802.15.4. Most of the major attacks against IR-UWB are physical-level attacks, such as Early-Detection/Late-Commit (ED/LC). Considering their cost, complexity, and sometimes lack of maturity, they are not necessarily the most realistic attacks against cheap IoT systems. On the other hand, protocol-level flaws expose IR-UWB positioning against attacks that can be mounted with limited expertise and cheap hardware. Hence, the aim of this work is to identify the most critical vulnerabilities of 802.15.4 IR-UWB, evaluate real-world attacks against UWB IPS and propose low-cost countermeasures suitable for IoT applications. An open platform for IR-UWB positioning security evaluation, SecureLoc, is part of the contributions. We propose and evaluate various spoofed acknowledgment-based attack schemes against IR-UWB. Several countermeasures, at the physical, medium access and system level, are proposed, including notably a novel weak PUF-based authentication protocol, a spoofing resilient acknowledgment scheme, a tamper-proof ranging approach, and a cooperative verification protocol for rogue node detection. All the proposed attacks and countermeasures have been implemented and evaluated on SecureLoc
Martin-Mazé, Médéric. "Le gouvernement international des frontières d’Asie centrale". Thesis, Paris, Institut d'études politiques, 2013. http://www.theses.fr/2013IEPP0050.
Testo completoThe international government of Central Asian Borders (Kyrgyzstan, Tajikistan, Uzbekistan, Kazakhstan, Turkmenistan) refers to projects in the field of border management that have been implemented by the OSCE, the European Commission, the UNODC and IOM between 1992 and 2012. These activities import and export a type of expertise aimed at bringing state boundaries in line with an imperative of mobility and security. But how does this border knowledge circulate across borders in the first place? During their life cycle, projects go through three different social universes. Firstly, they connect with Central Asian societies where control and flows intersect. They provide some equipment which only frames checks and controls to some extent. The steering committees deciding over these investments are embedded in a particular social universe that we call the field of operation. This second space is configured according to a capital whose volume corresponds to the level of autonomy that each implementing agency holds, and whose structure refers to their specialization in development and/or security. The practical logic of this field positively sanctions the accumulation of social capital by individual brokers. The authorization-giving arenas, finally, are situated in a transnational space polarized around Brussels and Vienna. Whilst Central Asia is constructed as a place of secondary interest within the field of Eurocracy, actors working from Vienna perceive this region as a more important issue. Subaltern transnational elites tend establish themselves in such unattractive areas because they gain leeway where they can re-establish themselves as important players from there
Conceicao, Filipe. "Network survival with energy harvesting : secure cooperation and device assisted networking". Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL020.
Testo completoThe 5th Generation Cellular Network Technology (5G) will be the network supporting the Internet of Things (IoT) and it introduced a major feature, Device-to-Device (D2D) communications. D2D allows energy-constrained wireless devices to save energy by interacting in proximity at a lower transmission power. Cooperation and device-assisted networking therefore raise signicant interest with respect to energy saving, and can be used in conjunction with energy harvesting to prolong the lifetime of battery-powered devices. However, cooperation schemes increase networking between devices, increasing the need for security mechanisms to be executed to assure data protection and trust relations between network nodes. This leads to the use of cryptographic primitives and security mechanisms with a much higher frequency.Security mechanisms are fundamental for protection against malicious actions but they also represent an important source of energy consumption, often neglected due to the importance of data protection. Authentication procedures for secure channel establishment can be computationally and energetically expensive, especially if the devices are resource constrained. Security features such as condentiality and data authentication have a low energetic cost but are used constantly in a device engaged in data exchanges. It is therefore necessary to properly quantify the energy consumption due to security in a device. A security based energy model is proposed to achieve this goal.In User Equipment (UE) D2D networks, mobility is a key characteristic. It can be explored for connecting directly in proximity with IoT objects. A lightweight authentication solution is presented that allows direct UE-IoT communications, extending coverage and potentially saving signicant energy amounts. This approach can be particularly useful in Public Protection and Disaster Relief (PPDR) scenarios where the network infrastructure may not be available.Security features such as condentiality or data authentication are a significant source of consumption. Devices equipped with Energy Harvesting (EH) hardware can have a surplus or a deficit of energy. The applied security can therefore be adjusted to the available energy of a device, introducing an energy aware secure channel. After in depth analysis of 5G standards, it was found that D2D UE networks using this type of channel would spend a signicant amount of energy and be generally less secure. A lightweight rekeying mechanism is therefore proposed to reduce the security overhead of adapting security to energy. To complete the proposed rekeying mechanism, a security parameter bootstrapping method is also presented. The method denes the Core Network (CN) as the security policy maker, makes the overall network more secure and helps preventing communication outages.Adapting security features to energy levels raises the need for the study of the energy/security tradeoff. To this goal, an Markov Decision Process (MDP) modeling a communication channel is presented where an agent chooses the security features to apply to transmitted packets. This stochastic control optimization problem is solved via several dynamic programming and Reinforcement Learning (RL) algorithms. Results show that adapting security features to the available energy can signicantly prolong battery lifetime, improve data reliability while still providing security features. A comparative study is also presented for the different RL learning algorithms. Then a Deep Q-Learning (DQL) approach is presented and tested to improve the learning speed of the agent. Results confirm the faster learning speed. The approach is then tested under difficult EH hardware stability. Results show robust learning properties and excellent security decision making from the agent with a direct impact on data reliability. Finally, a memory footprint comparison is made to demonstrate the feasibility of the presented system even on resource constrained devices
Srour, Hassan. "Développement d’un électrolyte à base de liquide ionique pour accumulateur au Lithium". Thesis, Lyon 1, 2013. http://www.theses.fr/2013LYO10160/document.
Testo completoIn lithium ion batteries, the electrolyte plays an important role because its physicochemical and electrochemical properties determine their efficiency. Currently, the used organic electrolytes induce difficulties in the manufacturing and the use of the battery (volatile and flammable components). New electrolytes based on molten salts at room temperature, called ionic liquids, are safer potential candidates (low flammability, low vapor pressure, high flash point) with a wide electrochemical window. The first stage of this PhD was to design new and more efficient synthetic routes, taking into account the environmental requirements (waste minimization, no solvent) and allowing the elaboration of ionic liquids with high purity> 99.5%, compatible with an industrial production. New ionic liquids derived from imidazolium cation were then designed in order to modulate their physicochemical properties, and to optimize their performance in batteries. They were evaluated in various battery technologies (Graphite/LiFePO4) and (Li4Ti5O12/LiFePO4) under different experimental conditions, 298 K and 333 K, when the conventional lithium ion batteries (organic electrolyte) are used only under 313 K. This PhD work has identified the chemical modifications to yield the most promising electrolytes, and highlighted the importance of the study on the understanding of ionic liquid/electrode interphase phenomena
Bresch, Cyril. "Approches, Stratégies, et Implémentations de Protections Mémoire dans les Systèmes Embarqués Critiques et Contraints". Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALT043.
Testo completoThis thesis deals with the memory safety issue in life-critical medical devices. Over the last few years, several vulnerabilities such as memory exploits have been identified in various Internet of Medical Things (IoMT) devices. In the worst case, such vulnerabilities allow an attacker to remotely force an application to execute malicious actions. While many countermeasures against software exploits have beenproposed so far, only a few of them seem to be suitable for medical devices. Indeed,these devices are constrained by their size, real-time performances, and safety requirements making the integration of security challenging. To address this issue,the thesis proposes two approaches. Both address the memory safety issue fromthe software design-time to its run-time on the hardware. A first approach assumesthat memory defenses can be implemented both in hardware and software. Thisapproach results in TrustFlow, a framework composed of a compiler able to generatesecure code for an extended processor that can prevent, detect, log, andself-heal critical applications from memory attacks. The second approach considersthat hardware is immutable. Following this constraint, defenses only rely uponsoftware. This second approach results in BackGuard a modified compiler that efficiently hardens embedded applications while ensuring control-flow integrity
Hammi, Mohamed Tahar. "Sécurisation de l'Internet des objets". Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006.
Testo completoInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Motii, Anas. "Engineering secure software architectures : patterns, models and analysis". Thesis, Toulouse 3, 2017. http://www.theses.fr/2017TOU30274/document.
Testo completoNowadays most organizations depend on Information and Communication Technologies (ICT) to perform their daily tasks (sometimes highly critical). However, in most cases, organizations and particularly small ones place limited value on information and its security. In the same time, achieving security in such systems is a difficult task because of the increasing complexity and connectivity in ICT development. In addition, security has impacts on many attributes such as openness, safety and usability. Thus, security becomes a very important aspect that should be considered in early phases of development. In this work, we propose an approach in order to secure ICT software architectures during their development by considering the aforementioned issues. The contributions of this work are threefold: (1) an integrated design framework for the specification and analysis of secure software architectures, (2) a novel model- and pattern-based methodology and (3) a set of supporting tools. The approach associates a modeling environment based on a set of modeling languages for specifying and analyzing architecture models and a reuse model repository of modeling artifacts (security pattern, threat and security property models) which allows reuse of capitalized security related know-how. The approach consists of the following steps: (a) model-based risk assessment performed on the architecture to identify threats, (b) selection and instantiation of security pattern models towards the modeling environment for stopping or mitigating the identified threats, (c) integration of security pattern models into the architecture model, (d) analysis of the produced architecture model with regards to other non-functional requirements and residual threats. In this context, we focus on real-time constraints satisfaction preservation after application of security patterns. Enumerating the residual threats is done by checking techniques over the architecture against formalized threat scenarios from the STRIDE model and based on existing threat references (e.g., CAPEC). As part of the assistance for the development of secure architectures, we have implemented a tool chain based on SEMCO and Eclipse Papyrus to support the different activities based on a set of modeling languages compliant with OMG standards (UML and its profiles). The assessment of our work is presented via a SCADA system (Supervisory Control And Data Acquisition) case study
Shaafi, Aymen. "Secured and trusted remote wireless health monitoring systems for assisted living of elderly people". Electronic Thesis or Diss., Université Paris Cité, 2021. http://www.theses.fr/2021UNIP5208.
Testo completoAging population is one of the key problems for the vast majority of many countries. The number of elderly people who suffer from multiple diseases and need continuous monitoring of their vital signs increases everyday, resulting in additional healthcare costs. Modern healthcare systems in geriatric medicine often require elderly presence at the hospital which conflict with their demand for independence and privacy. Recent developments on remote e-health monitoring, provides a wide range of solutions. However, most of the devices are designed for specific medical sensing and operate independently from each other. There is still a lack of integrated framework with high interoperability and continuous online monitoring support for further correlation analysis. This thesis is a step towards a remote, complete, and continuous data gathering system for elderly people with various types of health problems. Our research spirit is motivated by immediate demand in a secured and trusted remote wireless health monitoring System for assisted living Elderly people, combining various data sources. To create such a complete system we divide it into subsystems, in order to make it feasible and easy to implement, thus allowing us to update each subsystem individually in the future studies without affecting other integrated subsystems. The main focus is on a complete remote e-health monitoring system. The list of main contributions contains (1) propose a new approach for security of monitored devices and propose a solution to prevent MiTM attacks and reduce energy consumption, (2) we propose reliable fall detection,(3) investigating and developing a novel recognition method of daily activities for monitored elderly patient, (4) propose an approach to enhance the reliability of the system and to reduce false alarms and unnecessary interventions, (5) propose and develop a sign language to text converter algorithm using multi-sensor fusion analysis. As a result, we expect to provide a monitoring system with reliable accuracy in the detection of abnormal events, and raise an alarm upon detection of such events to seek help and assistance
Shrivastwa, Ritu Ranjan. "Enhancements in Embedded Systems Security using Machine Learning". Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAT051.
Testo completoThe list of connected devices (or IoT) is growing longer with time and so is the intense vulnerability to security of the devices against targeted attacks originating from network or physical penetration, popularly known as Cyber Physical Security (CPS) attacks. While security sensors and obfuscation techniques exist to counteract and enhance security, it is possible to fool these classical security countermeasures with sophisticated attack equipment and methodologies as shown in recent literature. Additionally, end node embedded systems design is bound by area and is required to be scalable, thus, making it difficult to adjoin complex sensing mechanism against cyberphysical attacks. The solution may lie in Artificial Intelligence (AI) security core (soft or hard) to monitor data behaviour internally from various components. Additionally the AI core can monitor the overall device behaviour, including attached sensors, to detect any outlier activity and provide a smart sensing approach to attacks. AI in hardware security domain is still not widely acceptable due to the probabilistic behaviour of the advanced deep learning techniques, there have been works showing practical implementations for the same. This work is targeted to establish a proof of concept and build trust of AI in security by detailed analysis of different Machine Learning (ML) techniques and their use cases in hardware security followed by a series of case studies to provide practical framework and guidelines to use AI in various embedded security fronts. Applications can be in PUFpredictability assessment, sensor fusion, Side Channel Attacks (SCA), Hardware Trojan detection, Control flow integrity, Adversarial AI, etc
Sontag, Koenig Sophie. "Les droits de la défense face aux technologies de l'information et de la communication". Thesis, Poitiers, 2013. http://www.theses.fr/2013POIT3001.
Testo completoThe rights of the defense come from a time when individuals undergoing trial and damage that may result to their rights and freedoms. Protean, they are born guaranteed from the notion of a fair trial as defined by the European Court of Human Rights. Taking a specific color in the criminal trial, this notion appears embodied in itself, the criminal lawyer who, in harmony with his specialty, must adapt to the changes which it has sometimes been. Technologies of Information and Communication have gradually invested the field of Justice and in particular the criminal sphere. Educated the results of experiments conducted abroad, France has also decided to modernize its judicial procedures using these new techniques. Copernican revolution, full of hope at the managerial level and the administration of justice, modern technologies raise fears facto resistance due to their relative complexity and novelty. Thus, a technical difficulty that limits the positive impact of the reforms, in addition symbolic aspects concerning the conduct of judicial ritual, introducing a new dialectic between stakeholders "criminal justice system" and changing the relationship of legal professionals as well as those that unites justice and litigants. It follows a change of management of the trial and, correspondingly, a restructuring of the thought patterns of the rights of defense and the practice of criminal defense