Rozprawy doktorskie na temat „IoT Internet des objets”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „IoT Internet des objets”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Aïssaoui, François. "Autonomic Approach based on Semantics and Checkpointing for IoT System Management". Thesis, Toulouse 1, 2018. http://www.theses.fr/2018TOU10061/document.
Pełny tekst źródłaLaarouchi, Mohamed Emine. "A safety approach for CPS-IoT". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS010.
Pełny tekst źródłaFor several years, we have been witnessing a convergence between cyber-physical systems (CPS) and the Internet of Things (IoT). CPS integrate embedded systems with their physical and human environment by ensuring communication between different sensors and actuators. The IoT targets the network and communication protocols between connected objects. This convergence offers prospects for various applications ranging from connected vehicles to smart grids and the factories of the future. The aim of this thesis is to ensure and guarantee the operational safety of CPS-IoT systems. For this, we have considered a specific case study throughout the thesis which is UAVs. Initially, we focused on the different methods of analysis of operational safety that already exist. These methods have proved their worth for the design and implementation of on-board systems. Throughout this process, we tried to answer the following question: are these existing methods adequate to perform the necessary safety analyses for CPS-IoT? It was concluded that new approaches to analyse the safety of operation of CPS-IoT systems are needed due to the significant complexity of these systems. As a second step, a methodology for predictive analysis of the resilience of CPS-IoTs was proposed. Resilience is defined as being the ability of a system to tolerate failures, to continue to provide the requested service while considering the various internal and external constraints of the system. Two different types of resilience have been differentiated: endogenous and exogenous resilience. Endogenous resilience is the inherent ability of the system to detect and deal with internal faults and malicious attacks. Exogenous resilience is the ongoing ability of the system to maintain safe operation in its surrounding environment. The last part of our work was to investigate the impact of artificial intelligence on the safe operation of CPS-IoTs. More specifically, we looked at how artificial intelligence could be used to enhance UAV safety in the path planning phase. The results obtained were compared with existing planning algorithms
Hassan, Basma Mostafa. "Monitoring the Internet of Things (IoT) Networks". Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS100.
Pełny tekst źródłaBy connecting billions of things to the Internet, IoT created a plethora of applications that touch every aspect of human life. Time-sensitive, mission-critical services, require robust connectivity and strict reliability constraints. On the other hand, the IoT relies mainly on Low-power Lossy Networks, which are unreliable by nature due to their limited resources, hard duty cycles, dynamic topologies, and uncertain radio connectivity. Faults in LLNs are common rather than rare events, therefore, maintaining continuous availability of devices and reliability of communication, are critical factors to guarantee a constant, reliable flow of application data.After a comprehensive literature review, and up to our knowledge, it is clear that there is a call for a new approach to monitoring the unreliable nodes and links in an optimized, energy-efficient, proactive manner, and complete interoperability with IoT protocols. To target this research gap, our contributions address the correct assignment (placement) of the monitoring nodes. This problem is known as the minimum assignment problem, which is NP-hard. We target scalable monitoring by mapping the assignment problem into the well-studied MVC problem, also NP-hard. We proposed an algorithm to convert the DODAG into a nice-tree decomposition with its parameter (treewidth) restricted to the value one. As a result of these propositions, the monitor placement becomes only Fixed-Parameter Tractable, and can also be polynomial-time solvable.To prolong network longevity, the monitoring role should be distributed and balanced between the entire set of nodes. To that end, assuming periodical functioning, we propose in a second contribution to schedule between several subsets of nodes; each is covering the entire network. A three-phase centralized computation of the scheduling was proposed. The proposition decomposes the monitoring problem and maps it into three well-known sub-problems, for which approximation algorithms already exist in the literature. Thus, the computational complexity can be reduced.However, the one major limitation of the proposed three-phase decomposition is that it is not an exact solution. We provide the exact solution to the minimum monitor assignment problem with a duty-cycled monitoring approach, by formulating a Binary Integer Program (BIP). Experimentation is designed using network instances of different topologies and sizes. Results demonstrate the effectiveness of the proposed model in realizing full monitoring coverage with minimum energy consumption and communication overhead while balancing the monitoring role between nodes.The final contribution targeted the dynamic distributed monitoring placement and scheduling. The dynamic feature of the model ensures real-time adaptation of the monitoring schedule to the frequent instabilities of networks, and the distributed feature aims at reducing the communication overhead
Ammar, Nesrine. "Autonomous IoT device type identification". Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS073.
Pełny tekst źródłaWith the proliferation of smart devices, more and more people buy IP devices and home appliances to benefit from new services, allowing them to control their home anywhere, anytime and to remain informed about. The number of services enabled by the IoT devices is quickly increasing, and so is the diversity of types of such devices: cameras, sensors, smart phones, tablets, speakers coming from several vendors and with different models. Devices and IoT service management systems in a home network needs to find out which IoT devices are connected to the network. A device management system for all kinds of devices being connected to the home network is necessary. In this thesis, we propose a methodology based on the analysis of network protocol messages to extract relevant information about the devices in order to identify their type. Then, we proposed another identification methodology based on Machine Learning algorithms. Our classification approach is based on the combination of textual features extracted from packets payload and statistical network communication features. We evaluate our proposal and show that it outperforms the state of the art in this field with an accuracy equal to 0.98
Brun-Laguna, Keoma. "Deterministic Networking for the Industrial IoT". Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS157.
Pełny tekst źródłaThe Internet of Things (IoT) evolved from a connected toaster in 1990 to networks of hundreds of tiny devices used in industrial applications. Those “Things” usually are tiny electronic devices able to measure a physical value (temperature, humidity, etc.) and/or to actuate on the physical world (pump, valve, etc). Due to their cost and ease of deployment, battery-powered wireless IoT networks are rapidly being adopted. The promise of wireless communication is to offer wire-like connectivity. Major improvements have been made in that sense, but many challenges remain as industrial application have strong operational requirements. This section of the IoT application is called Industrial IoT (IIoT). The main IIoT requirement is reliability. Every bit of information that is transmitted in the network must not be lost. Current off-the-shelf solutions offer over 99.999% reliability. That is, for every 100k packets of information generated, less than one is lost. Then come latency and energy-efficiency requirements. As devices are battery-powered, they need to consume as little as possible to be able to operate during years. The next step for the IoT is to target time-critical applications. Industrial IoT technologies are now adopted by companies over the world, and are now a proven solution. Yet, challenges remain and some of the limits of the technologies are still not fully understood. In this work we address TSCH-based Wireless Sensor Networks and study their latency and lifetime limits under real-world conditions. We gathered 3M network statistics 32M sensor measurements on 11 datasets with a total of 170,037 mote hours in real-world and testbeds deployments. We assembled what we believed to be the largest dataset available to the networking community. Based on those datasets and on insights we learned from deploying networks in real-world conditions, we study the limits and trade-offs of TSCH-based Wireless Sensor Networks. We provide methods and tools to estimate the network performances of such networks in various scenarios. We believe we assembled the right tools for protocol designer to built deterministic networking to the Industrial IoT
Borges, caldas da silva Pedro Victor. "Middleware support for energy awareness in the Internet of Things (IoT)". Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS016.
Pełny tekst źródłaThe Internet of Things (IoT) is characterized by a myriad of geographically dispersed devices and software components as well as high heterogeneity in terms of hardware, data, and protocols. Over the last few years, IoT platforms have been used to provide a variety of services to applications such as device discovery, context management, and data analysis. However, the lack of standardization makes each IoT platform come with its abstractions, APIs, and interactions. As a consequence, programming the interactions between a consuming IoT application and an IoT platform is often time-consuming, error-prone, and depends on the developers' level of knowledge about the IoT platform. IoT middleware are proposed to alleviate such heterogeneity, provide relevant services, and ease application development.As the energy efficiency of digital technology becomes a priority, the increase in IoT systems brings energy concerns. In this context, carefully designing interactions between IoT consumer applications and IoT systems with an energy-efficiency concern becomes essential. IoT middleware should not solely consider energy efficiency as a non-functional requirement. Instead, it needs to be at the solution's core as the middleware is expected to be shared by many applications and offer facilities to ease application development.This work presents three contributions regarding energy-efficiency/awareness in IoT middleware for IoT consumer applications.The first contribution is the proposal of an IoT middleware for IoT consumer applications called IoTVar that abstracts IoT virtual sensors in IoT variables that are automatically updated by the middleware.The second contribution is the evaluation of the energy consumption of the interactions between IoT consumer applications and IoT platforms through the HTTP and MQTT protocols. This evaluation has led to the proposal of guidelines to improve energy efficiency when developing applications.The third contribution is the proposal of strategies for energy efficiency to be integrated into IoT middleware. Those strategies have been integrated into the IoTVar middleware to provide energy efficiency, but also energy awareness through an energy model and the management of an energy budget driven by user requirements. The implementations of the IoT middleware architecture, with and without energy-efficiency strategies, have been evaluated, and the results show that we have a difference of up to 60% the energy used by IoT applications by applying strategies to reduce energy consumption at the middleware level
Shahid, Mustafizur Rahman. "Deep learning for Internet of Things (IoT) network security". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS003.
Pełny tekst źródłaThe growing Internet of Things (IoT) introduces new security challenges for network activity monitoring. Most IoT devices are vulnerable because of a lack of security awareness from device manufacturers and end users. As a consequence, they have become prime targets for malware developers who want to turn them into bots. Contrary to general-purpose devices, an IoT device is designed to perform very specific tasks. Hence, its networking behavior is very stable and predictable making it well suited for data analysis techniques. Therefore, the first part of this thesis focuses on leveraging recent advances in the field of deep learning to develop network monitoring tools for the IoT. Two types of network monitoring tools are explored: IoT device type recognition systems and IoT network Intrusion Detection Systems (NIDS). For IoT device type recognition, supervised machine learning algorithms are trained to perform network traffic classification and determine what IoT device the traffic belongs to. The IoT NIDS consists of a set of autoencoders, each trained for a different IoT device type. The autoencoders learn the legitimate networking behavior profile and detect any deviation from it. Experiments using network traffic data produced by a smart home show that the proposed models achieve high performance.Despite yielding promising results, training and testing machine learning based network monitoring systems requires tremendous amount of IoT network traffic data. But, very few IoT network traffic datasets are publicly available. Physically operating thousands of real IoT devices can be very costly and can rise privacy concerns. In the second part of this thesis, we propose to leverage Generative Adversarial Networks (GAN) to generate bidirectional flows that look like they were produced by a real IoT device. A bidirectional flow consists of the sequence of the sizes of individual packets along with a duration. Hence, in addition to generating packet-level features which are the sizes of individual packets, our developed generator implicitly learns to comply with flow-level characteristics, such as the total number of packets and bytes in a bidirectional flow or the total duration of the flow. Experimental results using data produced by a smart speaker show that our method allows us to generate high quality and realistic looking synthetic bidirectional flows
Xia, Ye. "Combining Heuristics for Optimizing and Scaling the Placement of IoT Applications in the Fog". Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAM084/document.
Pełny tekst źródłaAs fog computing brings processing and storage resources to the edge of the network, there is an increasing need of automated placement (i.e., host selection) to deploy distributed applications. Such a placement must conform to applications' resource requirements in a heterogeneous fog infrastructure, and deal with the complexity brought by Internet of Things (IoT) applications tied to sensors and actuators. This paper presents four heuristics to address the problem of placing distributed IoT applications in the fog. By combining proposed heuristics, our approach is able to deal with large scale problems, and to efficiently make placement decisions fitting the objective: minimizing placed applications' average response time. The proposed approach is validated through comparative simulation of different heuristic combinations with varying sizes of infrastructures and applications
Rosseel, Joachim. "DÉCODAGE DE CODES CORRECTEURS D'ERREURS ASSISTÉ PAR APPRENTISSAGE POUR L'IOT". Electronic Thesis or Diss., CY Cergy Paris Université, 2023. http://www.theses.fr/2023CYUN1260.
Pełny tekst źródłaWireless communications, already very present in our society, still raise new challengesas part of the deployment of the Internet of Things (IoT) such as the development of newdecoding methods at the physical layer ensuring good performance for the transmission ofshort messages. In particular, Low Density Parity Check (LDPC) codes are a family of errorcorrecting codes well-known for their excellent asymptotic error correction performanceunder iterative Belief Propagation (BP) decoding. However, the error correcting capacity ofthe BP algorithm is severely deteriorated for short LDPC codes. Thus, this thesis focuses on improving the decoding of short LDPC codes, thanks in particular to machine learning tools such as neural networks.After introducing the notions and characteristics of LDPC codes and BP decoding, aswell as the modeling of the BP algorithm by a Recurrent Neural Network (BP-RecurrentNeural Network or BP-RNN), we develop new training methods specializing the BP-RNN ondecoding error events sharing similar structural properties. These specialization approaches are subsequently associated decoding architectures composed of several specialized BP-RNNs, where each BP-RNN is trained to decode a specific kind of error events (decoding diversity). Secondly, we are interested in the post-processing of the BP (or the BP-RNN) with an Ordered Statistics Decoding (OSD) in order to close the gap the maximum likelihood (ML) decoding performance. To improve the post-processing performance, we optimize its input thanks to a single neuron and we introduce a multiple OSD post-processing decoding strategy. We then show that this strategy effectively takes advantage of the diversity of its inputs, thus providing an effective way to close the gap with ML decoding
De, Moura Donassolo Bruno. "L'orchestration des applications IoT dans le Fog". Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALM051.
Pełny tekst źródłaInternet of Things (IoT) continues its evolution, causing a drastically growth of traffic and processing demands. Consequently, 5G players are urged to rethink their infrastructures. In this context, Fog computing bridges the gap between Cloud and edge devices, providing nearby devices with analytics and data storage capabilities, increasing considerably the capacity of the infrastructure.However, the Fog raises several challenges which decelerate its adoption. Among them, the orchestration is crucial, handling the life-cycle management of IoT applications. In this thesis, we are mainly interested in: i) the provisioning problem, i.e., placing multi-component IoT applications on the heterogeneous Foginfrastructure; and ii) the reconfiguration problem, i.e., how to dynamically adapt the placement of applications, depending on application needs and evolution of resource usage.To perform the orchestration studies, we first propose FITOR, an orchestration system for IoT applications in the Fog environment. This solution addresses the lack of practical Fog solutions, creating a realistic environment on which we can evaluate the orchestration proposals.We study the Fog service provisioning issue in this practical environment. In this regard, we propose two novel strategies, OFSP and GOFSP, which optimize the placement of IoT application components while coping with their strict performance requirements. To do so, we first propose an Integer Linear Programming formulation for the IoT application provisioning problem. Based on extensive experiments, the results obtained show that the proposed strategies are able to decrease the provisioning cost while meeting the applicationrequirements.Finally, we tackle the reconfiguration problem, proposing and evaluating a series of reconfiguration algorithms, based on both online scheduling and online learning approaches. Through an extensive set of experiments, we demonstrate that the performance strongly depends on the quality and availability of information from Fog infrastructure and IoT applications. In addition, we show that a reactive and greedy strategy can overcome the performance of state-of-the-art online learning algorithms, as long as the strategy has access to a little extra information
Zgheib, Rita. "SeMoM, a semantic middleware for IoT healthcare applications". Thesis, Toulouse 3, 2017. http://www.theses.fr/2017TOU30250/document.
Pełny tekst źródłaNowadays, the adoption of the Internet of Things (IoT) has received a considerable interest from both academia and industry. It provides enhancements in quality of life, business growth and efficiency in multiple domains. However, the heterogeneity of the "Things" that can be connected in such environments makes interoperability among them a challenging problem. Moreover, the observations produced by these "Things" are made available with heterogeneous vocabularies and data formats. This heterogeneity prevents generic solutions from being adopted on a global scale and makes difficult to share and reuse data for other purposes than those for which they were originally set up. In this thesis, we address these challenges in the context of healthcare applications considering how we transform raw data to cognitive knowledge and ontology-based information shared between IoT system components. With respect to heterogeneity and integration challenges, our main contribution is an ontology-based IoT architecture allowing the deployment of semantic IoT applications. This approach allows sharing of sensors observations, contextualization of data and reusability of knowledge and processed information. Specific contributions include: * Design of the Cognitive Semantic Sensor Network ontology (CoSSN) ontology: CoSSN aims at overcoming the semantic interoperability challenges introduced by the variety of sensors potentially used. It also aims at describing expert knowledge related to a specific domain. * Design and implementation of SeMoM: SeMoM is a flexible IoT architecture built on top of CoSSN ontology. It relies on a message oriented middleware (MoM) following the publish/subscribe paradigm for a loosely coupled communication between system components that can exchange semantic observation data in a flexible way. From the applicative perspective, we focus on healthcare applications. Indeed, specific approaches and individual prototypes are preeminent solutions in healthcare which straighten the need of an interoperable solution especially for patients with multiple affections. With respect to these challenges, we elaborated two case studies 1) bedsore risk detection and 2) Activities of Daily Living (ADL) detection as follows: * We developed extensions of CoSSN to describe each domain concepts and we developed specific applications through SeMoM implementing expert knowledge rules and assessments of bedsore and human activities. * We implemented and evaluated the SeMoM framework in order to provide a proof of concept of our approach. Two experimentations have been realized for that target. The first is based on a deployment of a system targeting the detection of ADL activities in a real smart platform. The other one is based on ADLSim, a simulator of activities for ambient assisted living that can generate a massive amount of data related to the activities of a monitored person
Fayad, Achraf. "Protocole d’authentification sécurisé pour les objets connectés". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT051.
Pełny tekst źródłaThe interconnection of private resources on public infrastructure, user mobility and the emergence of new technologies (vehicular networks, sensor networks, Internet of things, etc.) have added new requirements in terms of security on the server side as well as the client side. Examples include the processing time, mutual authentication, client participation in the choice of security settings and protection against traffic analysis. Internet of Things (IoT) is in widespread use and its applications cover many aspects of today's life, which results in a huge and continuously increasing number of objects distributed everywhere.Security is no doubt the element that will improve and strengthen the acceptability of IoT, especially that this large scale deployment of IoT systems will attract the appetite of the attackers. The current cyber-attacks that are operational on traditional networks will be projected towards the Internet of Things. Security is so critical in this context given the underlying stakes; in particular, authentication has a critical importance given the impact of the presence of malicious node within the IoT systems and the harm they can cause to the overall system. The research works in this thesis aim to advance the literature on IoT authentication by proposing three authentication schemes that satisfy the needs of IoT systems in terms of security and performance, while taking into consideration the practical deployment-related concerns. One-Time Password (OTP) is an authentication scheme that represents a promising solution for IoT and smart cities environments. This research work extends the OTP principle and propose a new approach to generate OTP based on Elliptic Curve Cryptography (ECC) and Isogeny to guarantee the security of such protocol. The performance results obtained demonstrate the efficiency and effectiveness of our approach in terms of security and performance.We also rely on blockchains in order to propose two authentication solutions: first, a simple and lightweight blockchain-based authentication scheme for IoT systems based on Ethereum, and second, an adaptive blockchain-based authentication and authorization approach for IoT use cases. We provided a real implementation of our proposed solutions. The extensive evaluation provided, clearly shows the ability of our schemes to meet the different security requirements with a lightweight cost in terms of performance
Hammi, Mohamed Tahar. "Sécurisation de l'Internet des objets". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006/document.
Pełny tekst źródłaInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Ozeer, Umar Ibn Zaid. "Autonomic resilience of distributed IoT applications in the Fog". Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM054.
Pełny tekst źródłaRecent computing trends have been advocating for more distributed paradigms, namelyFog computing, which extends the capacities of the Cloud at the edge of the network, thatis close to end devices and end users in the physical world. The Fog is a key enabler of theInternet of Things (IoT) applications as it resolves some of the needs that the Cloud failsto provide such as low network latencies, privacy, QoS, and geographical requirements. Forthis reason, the Fog has become increasingly popular and finds application in many fieldssuch as smart homes and cities, agriculture, healthcare, transportation, etc.The Fog, however, is unstable because it is constituted of billions of heterogeneous devicesin a dynamic ecosystem. IoT devices may regularly fail because of bulk production andcheap design. Moreover, the Fog-IoT ecosystem is cyber-physical and thus devices aresubjected to external physical world conditions which increase the occurrence of failures.When failures occur in such an ecosystem, the resulting inconsistencies in the applicationaffect the physical world by inducing hazardous and costly situations.In this Thesis, we propose an end-to-end autonomic failure management approach for IoTapplications deployed in the Fog. The approach manages IoT applications and is composedof four functional steps: (i) state saving, (ii) monitoring, (iii) failure notification,and (iv) recovery. Each step is a collection of similar roles and is implemented, taking intoaccount the specificities of the ecosystem (e.g., heterogeneity, resource limitations). Statesaving aims at saving data concerning the state of the managed application. These includeruntime parameters and the data in the volatile memory, as well as messages exchangedand functions executed by the application. Monitoring aims at observing and reportinginformation on the lifecycle of the application. When a failure is detected, failure notificationsare propagated to the part of the application which is affected by that failure.The propagation of failure notifications aims at limiting the impact of the failure and providinga partial service. In order to recover from a failure, the application is reconfigured and thedata saved during the state saving step are used to restore a cyber-physical consistent stateof the application. Cyber-physical consistency aims at maintaining a consistent behaviourof the application with respect to the physical world, as well as avoiding dangerous andcostly circumstances.The approach was validated using model checking techniques to verify important correctnessproperties. It was then implemented as a framework called F3ARIoT. This frameworkwas evaluated on a smart home application. The results showed the feasibility of deployingF3ARIoT on real Fog-IoT applications as well as its good performances in regards to enduser experience
Chelle, Hugo. "Contrôle de charge des réseaux IoT : D'une étude théorique à une implantation réelle". Thesis, Toulouse, INPT, 2018. http://oatao.univ-toulouse.fr/24349/1/Chelle_hugo.pdf.
Pełny tekst źródłaMekbungwan, Preechai. "In-network Computation for IoT in Named Data Networking". Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS151.
Pełny tekst źródłaActiveNDN is proposed to extend Named Data Networking (NDN) with in-network computation by embedding functions in an additional entity called Function Library, which is connected to the NDN forwarder in each NDN router. Function calls can be expressed as part of the Interest names with proper name prefixes for routing, with the results of the computation returned as NDN Data packets, creating an ActiveNDN network. Our main focus is on performing robust distributed computation, such as analysing and filtering raw data in real-time, as close as possible to sensors in an environment with intermittent Internet connectivity and resource-constrained computable IoT nodes. In this thesis, the design of ActiveNDN is illustrated with a small prototype network as a proof of concept. Extensive simulation experiments were conducted to investigate the performance and effectiveness of ActiveNDN in large-scale wireless IoT networks. The real-time processing capability of ActiveNDN is also compared with centralized edge computing approaches. Finally, the ActiveNDN is demonstrated over the wireless sensor network testbed with real-world applications that provide sufficiently accurate hourly PM2.5 predictions using linear regression model. It shows the ability to distribute the computational load across many nodes, which makes ActiveNDN suitable for large-scale IoT deployments
Le, Xuan Sang. "Co-conception Logiciel/FPGA pour Edge-computing : promotion de la conception orientée objet". Thesis, Brest, 2017. http://www.theses.fr/2017BRES0041/document.
Pełny tekst źródłaCloud computing is often the most referenced computational model for Internet of Things. This model adopts a centralized architecture where all sensor data is stored and processed in a sole location. Despite of many advantages, this architecture suffers from a low scalability while the available data on the network is continuously increasing. It is worth noting that, currently, more than 50% internet connections are between things. This can lead to the reliability problem in realtime and latency-sensitive applications. Edge-computing which is based on a decentralized architecture, is known as a solution for this emerging problem by: (1) reinforcing the equipment at the edge (things) of the network and (2) pushing the data processing to the edge.Edge-centric computing requires sensors nodes with more software capability and processing power while, like any embedded systems, being constrained by energy consumption. Hybrid hardware systems consisting of FPGA and processor offer a good trade-off for this requirement. FPGAs are known to enable parallel and fast computation within a low energy budget. The coupled processor provides a flexible software environment for edge-centric nodes.Applications design for such hybrid network/software/hardware (SW/HW) system always remains a challenged task. It covers a large domain of system level design from high level software to low-level hardware (FPGA). This result in a complex system design flow and involves the use of tools from different engineering domains. A common solution is to propose a heterogeneous design environment which combining/integrating these tools together. However the heterogeneous nature of this approach can pose the reliability problem when it comes to data exchanges between tools.Our motivation is to propose a homogeneous design methodology and environment for such system. We study the application of a modern design methodology, in particular object-oriented design (OOD), to the field of embedded systems. Our choice of OOD is motivated by the proven productivity of this methodology for the development of software systems. In the context of this thesis, we aim at using OOD to develop a homogeneous design environment for edge-centric systems. Our approach addresses three design concerns: (1) hardware design where object-oriented principles and design patterns are used to improve the reusability, adaptability, and extensibility of the hardware system. (2) hardware / software co-design, for which we propose to use OOD to abstract the SW/HW integration and the communication that encourages the system modularity and flexibility. (3) middleware design for Edge Computing. We rely on a centralized development environment for distributed applications, while the middleware facilitates the integration of the peripheral nodes in the network, and allows automatic remote reconfiguration. Ultimately, our solution offers software flexibility for the implementation of complex distributed algorithms, complemented by the full exploitation of FPGAs performance. These are placed in the nodes, as close as possible to the acquisition of the data by the sensors† in order to deploy a first effective intensive treatment
Hammi, Mohamed Tahar. "Sécurisation de l'Internet des objets". Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006.
Pełny tekst źródłaInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Ahmad, Abbas. "Model-Based Testing for IoT Systems : Methods and tools". Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD008/document.
Pełny tekst źródłaThe Internet of Things (IoT) is nowadays globally a mean of innovation and transformation for many companies. Applications extend to a large number of domains, such as smart cities, smart homes, healthcare, etc. The Gartner Group estimates an increase up to 21 billion connected things by 2020. The large span of "things" introduces problematic aspects, such as conformance and interoperability due to the heterogeneity of communication protocols and the lack of a globally-accepted standard. The large span of usages introduces problems regarding secure deployments and scalability of the network over large-scale infrastructures. This thesis deals with the problem of the validation of the Internet of Things to meet the challenges of IoT systems. For that, we propose an approach using the generation of tests from models (MBT). We have confronted this approach through multiple experiments using real systems thanks to our participation in international projects. The important effort which is needed to be placed on the testing aspects reminds every IoT system developer that doing nothing is more expensive later on than doing it on the go
Christophe, Benoit. "Semantic based middleware to support nomadic users in IoT-enabled smart environments". Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066669/document.
Pełny tekst źródłaWith the growth in Internet of Things, the realization of environments composed of diverse connected resources (devices, sensors, services, data, etc.) becomes a tangible reality. Together with the preponderant place that smartphones take in the daily life of users, these nascent smart spaces pave the way to the development of novel types of applications; carried by the phones of nomadic users and dynamically reconfiguring themselves to make use of such appropriate connected resources. Creating these applications however goes hand-in-hand with the design of tools supporting the nomadic users roaming in these spaces, in particular by enabling the efficient selection of resources. While such a selection calls for the design of theoretically grounded descriptions, it should also consider the profile and preferences of the users. Finally, the rise of (possibly mobile) connected resources calls for designing a scalable process underlying this selection. Progress in the field is however sluggish especially because of the ignorance of the stakeholders (and the interactions between them) composing this eco-system of “IoT-enabled smart environments”. Thus, the multiplicity of diverse connected resources entails interoperability and scalability problems. While the Semantic Web helped in solving the interoperability issue, it however emphasizes the scalability one. Thus, misreading of the ecosystem led to producing models partially covering connected resource characteristics.Revolving from our research works performed over the last 6 years, this dissertation identifies the interactions between the stakeholders of the nascent ecosystem to further propose formal representations. The dissertation further designs a framework providing search capabilities to support the selection of connected resources through a semantic analysis. In particular, the framework relies on a distributed architecture that we design in order to manage scalability issues. The framework is embodied in a VR Gateway further deployed in a set of interconnected smart places and that has been assessed by several experimentations
Marcastel, Alexandre. "Allocation de puissance en ligne dans un réseau IoT dynamique et non-prédictible". Thesis, Cergy-Pontoise, 2019. http://www.theses.fr/2019CERG0995/document.
Pełny tekst źródłaOne of the key challenges in Internet of Things (IoT) networks is to connect numerous, heterogeneous andautonomous devices. These devices have different types of characteristics in terms of: application, computational power, connectivity, mobility or power consumption. These characteristics give rise to challenges concerning resource allocation such as: a) these devices operate in a highly dynamic and unpredictable environments; b) the lack of sufficient information at the device end; c) the interference control due to the large number of devices in the network. The fact that the network is highly dynamic and unpredictable implies that existing solutions for resource allocation are no longer relevant because classical solutions require a perfect or statistical knowledge of the network. To address these issues, we use tools from online optimization and machine learning. In the online optimization framework, the device only needs to have strictly causal information to define its online policy. In order to evaluate the performance of a given online policy, the most commonly used notion is that of the regret, which compares its performance in terms of loss with a benchmark policy, i.e., the best fixed strategy computed in hindsight. Otherwise stated, the regret measures the performance gap between an online policy and the best mean optimal solution over a fixed horizon. In this thesis, we focus on an online power minimization problem under rate constraints in a dynamic IoT network. To address this issue, we propose a regret-based formulation that accounts for arbitrary network dynamics, using techniques used to solve the multi-armed bandit problem. This allows us to derive an online power allocation policy which is provably capable of adapting to such changes, while relying solely on strictly causal feedback. In so doing, we identify an important tradeoff between the amount of feedback available at the transmitter side and the resulting system performance. We first study the case in which the device has access to a vector, either the gradient or an unbiased estimated of the gradient, as information feedback. To limit the feedback exchange in the network our goal is to reduce it as mush as possible. Therefore, we study the case in which the device has access to only a loss-based information (scalar feedback). In this case, we propose a second online algorithm to determine an efficient and adaptative power allocation policy
Aguiari, Davide. "Exploring Computing Continuum in IoT Systems : sensing, communicating and processing at the Network Edge". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS131.
Pełny tekst źródłaAs Internet of Things (IoT), originally comprising of only a few simple sensing devices, reaches 34 billion units by the end of 2020, they cannot be defined as merely monitoring sensors anymore. IoT capabilities have been improved in recent years as relatively large internal computation and storage capacity are becoming a commodity. In the early days of IoT, processing and storage were typically performed in cloud. New IoT architectures are able to perform complex tasks directly on-device, thus enabling the concept of an extended computational continuum. Real-time critical scenarios e.g. autonomous vehicles sensing, area surveying or disaster rescue and recovery require all the actors involved to be coordinated and collaborate without human interaction to a common goal, sharing data and resources, even in intermittent networks covered areas. This poses new problems in distributed systems, resource management, device orchestration,as well as data processing. This work proposes a new orchestration and communication framework, namely CContinuum, designed to manage resources in heterogeneous IoT architectures across multiple application scenarios. This work focuses on two key sustainability macroscenarios: (a) environmental sensing and awareness, and (b) electric mobility support. In the first case a mechanism to measure air quality over a long period of time for different applications at global scale (3 continents 4 countries) is introduced. The system has been developed in-house from the sensor design to the mist-computing operations performed by the nodes. In the second scenario, a technique to transmit large amounts of fine-time granularity battery data from a moving vehicle to a control center is proposed jointly with the ability of allocating tasks on demand within the computing continuum
Garzone, Guillaume. "Approche de gestion orientée service pour l'Internet des objets (IoT) considérant la Qualité de Service (QoS)". Thesis, Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0027/document.
Pełny tekst źródłaThe Internet of Things (IoT) is already everywhere today: home automation, connected buildings or smart city, many initiatives and innovations are ongoing and yet to come. The number of connected objects continues to grow to the point that billions of objects are expected in the near future.The approach of this thesis sets up an autonomic management architecture for systems based on connected objects, combining them with other services such as weather services accessible on the Internet. The proposed models enable an autonomous decision making based on the analysis of events and the planning of actions executed automatically. Parameters such as execution time or consumed energy are also considered in order to optimize the choices of actions to be performed and of services used. A concrete prototype was realized in a smart city scenario with connected buses in the investment for future project: S2C2
Beaulaton, Delphine. "Security Analysis of IoT Systems using Attack Trees". Thesis, Lorient, 2019. http://www.theses.fr/2019LORIS548.
Pełny tekst źródłaLoT is a rapidly emerging paradigm that provides a way to the user to instrument and control a large variety of objects interacting between each other over the Internet. In IoT systems, the security risks are multiplied as they involve hetero- geneous devices that are connected to a shared network and that carry critical tasks, and hence, are targets for malicious users. In this thesis, we propose a security-based framework for modeling IoT systems where attack trees are defined alongside the model to detect and prevent security risks in the system. The language we implemented aims to model the IoT paradigm in a simple way. The IoT systems are composed of entities having some communication capabilities between each other. Two entities can communicate if (i) they are connected through a communication protocol and (ii) they satisfy some constraints imposed by the protocol. In order to identify and analyze attacks on the security of a system we use attack trees which are an intuitive and practical formal method to do so. A successful attack can be a rare event in the execution of a well-designed system. When rare, such attacks are hard to detect with usual model checking techniques. Hence, we use importance splitting as a statistical model checking technique for rare events
Zheng, Ce. "Impulsive and dependent interference in IoT networks". Thesis, Lille 1, 2020. http://www.theses.fr/2020LIL1I064.
Pełny tekst źródłaThe number of devices in wireless Internet of Things (IoT) networks is now rapidly increasing and is expected to continue growing in the coming years. To support this massive connectivity, a number of new technologies, collectively known as Low Power Wide Area Network (LPWAN), have been developed. Many devices in LPWANs limit their transmissions by duty cycle constraints; i.e., the proportion of time allocated for transmission. For nearby wireless networks using the same time-frequency resources, the increasing number of devices leads to a high level of unintended signals, known as interference. In this thesis, we characterize the statistics of interference arising from LPWANs, with a focus on protocols related to Narrowband IoT (NB-IoT) and emerging approaches such as Sparse Code Multiple Access (SCMA). Such a characterization is critical to improve signal processing at the receiver in order to mitigate the interference. We approach the characterization of the interference statistics by exploiting a mathematical model of device locations, signal attenuation, and the access protocols of individual interfering devices. While there has been recent work developing empirical models for the interference statistics, this has been limited to studies of the interference power, which has limited utility in receiver design. The approach adopted in this thesis has the dual benefits of providing a model for the amplitude and phase statistics and while also yielding insights into the impact of key network parameters. The first contribution in this work is to revisit interference in a single subcarrier system, which is widely used in current implementations of IoT networks. A basic model in this scenario distributes interfering devices according to a homogeneous Poisson point process. It has been long known that the resulting interference is well approximated via an α-stable model, rather than a Gaussian model. In this work, the α-stable model is shown via theoretical and simulation results to be valid in a wider range of models, including the presence of guard zones, finite network radii, and non-Poisson point processes governing device locations. The second contribution in this thesis is the study, for the first time, of interference statistics in multi-carrier IoT networks, including those that exploit NB-IoT and SCMA. Motivated by the results in the single subcarrier setting, a multivariate model based on α-stable marginals and copula theory is developed. This model is verified by extensive simulations and further justified via a new, near-optimal, parameter estimation algorithm, which has very low complexity.The third part of this thesis applies the characterizations of the interference statistics to receiver design. A new design for nonlinear receivers is proposed that can significantly outperform the state-of-the-art in multicarrier IoT systems. When receivers are restricted to be linear, the optimal structure is identified and the bit error rate characterized. Numerical results also illustrate how the average quantity of data interfering devices are required to transmit affects the receiver performance
Khalil, Ahmad. "Gestion autonome de la qualité de service et de la sécurité dans un environnement Internet des objets". Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCK068.
Pełny tekst źródłaNowadays, the Internet of Things (IoT) is becoming important in our daily lives thanks to technological advances. This paradigm aims to improve the quality of human life through automating several tasks. In this context, service level guarantee within IoT environments is a major challenge while considering a massive deployment of IoT applications and services as well as extending their usage to different domains. The IoT service level can be characterized in two parts: Quality of Service (QoS) and security. Moreover, this service level must be managed in an autonomic manner within the IoT environment given the heterogeneity and the size of its infrastructure making it difficult, even impossible, their management in a manual manner by the administrators. In this thesis, we propose a QoS based channel access control mechanism, called QBAIoT (QoS Based Access for IoT environments), to ensure a differentiated processing of existing traffics in the IoT environment. The differentiated processing allows satisfying the requirements of each traffic according to different QoS parameters (i.e., delay, jitter, packet delivery ratio, etc.). Then, QBAIoT is improved and upgraded to integrate self-management capabilities thanks to two important functions of the closed control loop: self-configuration and self-optimization. In addition, to offer a better QoS within the IoT environment, it is necessary to optimize the energy consumption of resources’ constrained components. Thus, we propose an adaptation of QBAIoT allowing to reduce its energy consumption in an autonomic manner while respecting the data accuracy. Our contribution concerning the second part of service level guarantee within an IoT environment, which is security, consists is a mechanism enabling IoT objects access control to IoT gateways, called IoT-MAAC (IoT Multiple Attribute Access Control). This mechanism takes into account different parameters that are specific to IoT environments (i.e., IoT object trust, IoT object identifier, IoT object fingerprint, etc.). Finally, the decision making process regarding IoT object access control is autonomously managed by IoT gateways and aims to meet the requirements of IoT environment in terms of trust
Laroui, Mohammed. "Distributed edge computing for enhanced IoT devices and new generation network efficiency". Electronic Thesis or Diss., Université Paris Cité, 2022. http://www.theses.fr/2022UNIP7078.
Pełny tekst źródłaTraditional cloud infrastructure will face a series of challenges due to the centralization of computing, storage, and networking in a small number of data centers, and the long-distance between connected devices and remote data centers. To meet this challenge, edge computing seems to be a promising possibility that provides resources closer to IoT devices. In the cloud computing model, compute resources and services are often centralized in large data centers that end-users access from the network. This model has an important economic value and more efficient resource-sharing capabilities. New forms of end-user experience such as the Internet of Things require computing resources near to the end-user devices at the network edge. To meet this need, edge computing relies on a model in which computing resources are distributed to the edge of a network as needed, while decentralizing the data processing from the cloud to the edge as possible. Thus, it is possible to quickly have actionable information based on data that varies over time. In this thesis, we propose novel optimization models to optimize the resource utilization at the network edge for two edge computing research directions, service offloading and vehicular edge computing. We study different use cases in each research direction. For the optimal solutions, First, for service offloading we propose optimal algorithms for services placement at the network edge (Tasks, Virtual Network Functions (VNF), Service Function Chain (SFC)) by taking into account the computing resources constraints. Moreover, for vehicular edge computing, we propose exact models related to maximizing the coverage of vehicles by both Taxis and Unmanned Aerial Vehicle (UAV) for online video streaming applications. In addition, we propose optimal edge-autopilot VNFs offloading at the network edge for autonomous driving. The evaluation results show the efficiency of the proposed algorithms in small-scale networks in terms of time, cost, and resource utilization. To deal with dense networks with a high number of devices and scalability issues, we propose large-scale algorithms that support a huge amount of devices, data, and users requests. Heuristic algorithms are proposed for SFC orchestration, maximum coverage of mobile edge servers (vehicles). Moreover, The artificial intelligence algorithms (machine learning, deep learning, and deep reinforcement learning) are used for 5G VNF slices placement, edge-autopilot VNF placement, and autonomous UAV navigation. The numerical results give good results compared with exact algorithms with high efficiency in terms of time
Bernard, Antoine. "Solving interoperability and performance challenges over heterogeneous IoT networks : DNS-based solutions". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS012.
Pełny tekst źródłaThe Internet of Things (IoT) evolved from its theoretical possibility to connect anything and everything to an ever-increasing market of goods and services. Its underlying technologies diversified and IoT now encompasses various communication technologies ranging from short-range technologies as Bluetooth, medium-range technologies such as Zigbee and long-range technologies such as Long Range Wide Area Network.IoT systems are usually built around closed, siloed infrastructures. Developing interoperability between these closed silos is crucial for IoT use-cases such as Smart Cities. Working on this subject at the application level is a first step that directly evolved from current practice regarding data collection and analysis in the context of the development of Big Data. However, building bridges at the network level would enable easier interconnection between infrastructures and facilitate seamless transitions between IoT technologies to improve coverage at low cost.The Domain Name System (DNS) basically developed to translate human-friendly computer host-names on a network into their corresponding IP addresses is a known interoperability facilitator on the Internet. It is one of the oldest systems deployed on the Internet and was developed to support the Internet infrastructure's growth at the end of the 80s. Despite its old age, it remains a core service on the Internet and many changes from its initial specifications are still in progress, as proven by the increasing number of new suggestions to modify its standard.DNS relies on simple principles, but its evolution since its first developments allowed to build complex systems using its many configuration possibilities. This thesis investigates possible improvements to IoT services and infrastructures. Our key problem can be formulated as follow: Can the DNS and its infrastructure serve as a good baseline to support IoT evolution as it accompanied the evolution of the Internet?We address this question with three approaches. We begin by experimenting with a federated roaming model IoT networks exploiting the strengths of the DNS infrastructure and its security extensions to improve interoperability, end-to-end security and optimize back-end communications. Its goal is to propose seamless transitions between networks based on information stored on the DNS infrastructure. We explore the issues behind DNS and application response times, and how to limit its impact on constrained exchanges between end devices and radio gateways studying DNS prefetching scenarios in a city mobility context. Our second subject of interest consists of studying how DNS can be used to develop availability, interoperability and scalability in compression protocols for IoT. Furthermore, we experimented around compression paradigms and traffic minimization by implementing machine learning algorithms onto sensors and monitoring important system parameters, particularly transmission performance and energy efficiency
Lobe, kome Ivan Marco. "Identity and consent in the internet of persons, things and services". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0131/document.
Pełny tekst źródłaThe constant efforts of miniaturization of computing machines is transforming our relationships with machines and their role in society. The number of tiny computers remotely controlled is skyrocketing and those connected things are now more and more asked to do things on human behalf. The trend consists in making room for these specific machines into the Internet, in other words, building communication protocols adapted to their limited resources. This trend is commonly known as the Internet of Things (IoT) which consist of appliances and mechanisms different from those meant to be used exclusively by humans, the Internet of Persons (IoP). This conceptual separation being adopted, how would a Person exchange information with Things ?Sorts of brokers can help bridging that gap. The networking of those brokers led to the concept of Internetof Services (IoS). Persons and Things are connected through Services. This global networking is called the Internet of Persons Things and Services (IoPTS). Our work is on the edge of these 3 Internet areas and our contributions are two fold. In the first hand, we tackle the secure biding of devices’ and persons’ identities while preserving the Integrity, Anonymity and Confidentiality security properties. On the other hand, we address the problem of the secrecy of data on constrained Internet-connected devices. Other mechanisms must be created in order to seamlessly bind these conceptual areas of IoP, IoT andIoS. In this quest for a better integration of Internet connected-devices into the Internet of Persons, our work contributes to the definition of protocols on application and network layers, with IoT concerns and security at heart
Loukil, Faiza. "Towards a new data privacy-based approach for IoT". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSE3044.
Pełny tekst źródłaThe Internet of Things (IoT) connects and shares data collected from smart devices in several domains, such as smart home, smart grid, and healthcare. According to Cisco, the number of connected devices is expected to reach 500 Billion by 2030. Five hundred zettabytes of data will be produced by tremendous machines and devices. Usually, these collected data are very sensitive and include metadata, such as location, time, and context. Their analysis allows the collector to deduce personal habits, behaviors and preferences of individuals. Besides, these collected data require the collaboration of several parties to be analyzed. Thus, due to the high level of IoT data sensitivity and lack of trust on the involved parties in the IoT environment, the collected data by different IoT devices should not be shared with each other, without enforcing data owner privacy. In fact, IoT data privacy has become a severe challenge nowadays, especially with the increasing legislation pressure. Our research focused on three complementary issues, mainly (i) the definition of a semantic layer designing the privacy requirements in the IoT domain, (ii) the IoT device monitoring and the enforcement of a privacy policy that matches both the data owner's privacy preferences and the data consumer's terms of service, and (iii) the establishment of an end-to-end privacy-preserving solution for IoT data in a decentralized architecture while eliminating the need to trust any involved IoT parties. To address these issues, our work contributes to three axes. First, we proposed a new European Legal compliant ontology for supporting preserving IoT PrivacY, called LIoPY that describes the IoT environment and the privacy requirements defined by privacy legislation and standards. Then, we defined a reasoning process whose goal is generating a privacy policy by matching between the data owner's privacy preferences and the data consumer's terms of service. This privacy policy specifies how the data will be handled once shared with a specific data consumer. In order to ensure this privacy policy enforcement, we introduced an IoT data privacy-preserving framework, called PrivBlockchain, in the second research axis. PrivBlockchain is an end-to-end privacy-preserving framework that involves several parties in the IoT environment for preserving IoT data privacy during the phases of collection, transmission, storage, and processing. The proposed framework relied on, on the one hand, the blockchain technology, thus supporting a decentralized architecture while eliminating the need to trust any involved IoT parties and, on the other hand, the smart contracts, thus supporting a machine-readable and self-enforcing privacy policy whose goal is to preserve the privacy during the whole data lifecycle, covering the collection, transmission, storage and processing phases. Finally, in the third axis, we designed and implemented the proposal in order to prove its feasibility and analyze its performances
Baqa, Hamza. "Realization of trust by a semantic self-adaptation in the Internet of Things". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS004.
Pełny tekst źródłaIn the blooming era of the Internet of Things (IoT), trust has become a vital factor for provisioning reliable smart services without human intervention by reducing risk in autonomous decision making. However, the merging of physical objects, cyber components and humans in the IoT infrastructure has introduced new concerns for the evaluation of trust. Consequently, a large number of trust-related challenges have been unsolved yet due to the ambiguity of the concept of trust and the variety of divergent trust indicators, models and management mechanisms in different IoT scenarios. In this PhD thesis, my ultimate goal is to propose an efficient and practical trust evaluation for any IoT ecosystems. To achieve this goal, the first important objective is to augment the generic trust concept and conceptual model of trust in order to come up with a comprehensive understanding of trust, influencing factor and relevant Trust Indicators (TI) in the context of IoT. Following the catalyst, as the second objective, a trust model called REK comprised of the triad Reputation, Experience and Knowledge TIs is proposed which covers multi-dimensional aspects of trust by incorporating heterogeneous information from direct observation, personal experiences to global opinions. Knowledge TI is as “direct trust” rendering a trustor’s understanding of a trustee in respective scenarios that can be obtained based on limited available information about characteristics of the trustee, environment and the trustor’s perspective using a variety of techniques. Experience and Reputation TIs are originated from social features and extracted based on previous interactions among entities in IoT. The mathematical models and calculation mechanisms for the Experience and Reputation TIs also proposed leveraging sociological behaviours of humans in the real-world; and being inspired by the Google PageRank in the web-ranking area, respectively. Things are expected to live in different “domains” and “contexts” during their lifetime. Information generated/associated with Things should be manageable by multiple, diverse stakeholders with different roles, information and functionalities with many access levels, ecosystems with different trust level and security primitives. In that sense, as third objective of this thesis, a novel blockchain-enhanced IoT data-sharing framework named Semantic Smart Contract (SSC) is proposed taking full advantage of the provisions offered by the blockchain and semantics.The feasibility and effectiveness of the REK model, based on the proposed trust indicator, and associated Trust sharing mechanisms are proved not only by the theoretical analysis but also by real-world applications deployed in our Wise-IoT and SMESEC EU projects
Cluzel, Sylvain. "Système M2M/IoT par satellite pour l'hybridation d'un réseau NB-IoT via une constellation LEO". Thesis, Toulouse, ISAE, 2019. http://www.theses.fr/2019ESAE0007/document.
Pełny tekst źródłaThe aim of this thesis is to study the implementation of Internet-based services of Thing (IoT) and Machine to Machine (M2M) through a satellite link. This type of system have to deal with two issues: first the physical layer level: terminal related constraints (limited in power, energy, and antenna size), channel (potentially with masking and multipath) and the space segment involve the implementation of different techniques (interleaving, interference cancellation,) to ensure proper link budget allowing the communication. On the other hand , the need to provide access to the resource to a large number of terminals requiring low throughput involves the use of optimized contention access techniques , as well as taking into account the level of access issues energy saving. The access layer should also be able to interface with larger networks architectures. Internet architectures for example include supporting IP services for Iota, with sporadic services, such as the ones found in the DTN networks, or 4G architectures / 5G for the implementation of mobile services. This thesis will investigate two innovative approaches and different techniques as well as physical layer access layer (potentially coupled) to their implementation. The first scenario involves the use of a very low throughput satellite relay terminal (unlike in the conventional case found in the literature based on broadband terminals), interfacing with terrestrial access technology sensors. Innovative resource management and energy saving techniques through a dedicated access layer (not DVB) could absorb the large number of terminals in this type of architecture. The second scenario is based on direct communication with sensors / objects via satellite constellation. This approach raises the question of the efficiency of the waveform for extremely sporadic services and the reliability of communication. DLR works on this type of waveform including the definition of S -MIM. However, this solution seems to be complex and many optimizations can be made. From the access layer point of view, E -SSA (asynchronous spread spectrum communication with SIC) defined by the ESA is also interesting even if its implementation to the system and its complexity level should be consolidated
Bahri, Maroua. "Improving IoT data stream analytics using summarization techniques". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT017.
Pełny tekst źródłaWith the evolution of technology, the use of smart Internet-of-Things (IoT) devices, sensors, and social networks result in an overwhelming volume of IoT data streams, generated daily from several applications, that can be transformed into valuable information through machine learning tasks. In practice, multiple critical issues arise in order to extract useful knowledge from these evolving data streams, mainly that the stream needs to be efficiently handled and processed. In this context, this thesis aims to improve the performance (in terms of memory and time) of existing data mining algorithms on streams. We focus on the classification task in the streaming framework. The task is challenging on streams, principally due to the high -- and increasing -- data dimensionality, in addition to the potentially infinite amount of data. The two aspects make the classification task harder.The first part of the thesis surveys the current state-of-the-art of the classification and dimensionality reduction techniques as applied to the stream setting, by providing an updated view of the most recent works in this vibrant area.In the second part, we detail our contributions to the field of classification in streams, by developing novel approaches based on summarization techniques aiming to reduce the computational resource of existing classifiers with no -- or minor -- loss of classification accuracy. To address high-dimensional data streams and make classifiers efficient, we incorporate an internal preprocessing step that consists in reducing the dimensionality of input data incrementally before feeding them to the learning stage. We present several approaches applied to several classifications tasks: Naive Bayes which is enhanced with sketches and hashing trick, k-NN by using compressed sensing and UMAP, and also integrate them in ensemble methods
Mahamat, charfadine Salim. "Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets". Thesis, Reims, 2019. http://www.theses.fr/2019REIMS011/document.
Pełny tekst źródłaWith the exponential evolution of the Internet of Things (IoT), ensure the network security has become a big challenge for networkadministrators. Traditionally, the network security is based on multiple independent devices such as firewall, IDS/IPS, NAC where the main role is to monitor the information exchanged between the inside and the outside perimeters of the enterprises networks. However, the administration of these network devices can be complex and tedious with an independent manual configuration. Recently, with the introduction of the Software Defined Networking concept (SDN) and the OpenFlow protocol offers many opportunities by providing a centralized and programmable network administration.As part of this research work, we proposed a new approach to secure the network traffic flows exchanges based on a method of events detection, in an automated manner. This solution is based on the SDN approach coupled to an intrusion detection system which allows analyze, detect and remove security threats. With the implementation, we contribute to change the paradigm of secure the network traffic flows exchanges using the SDN principle, coupled with an IDS in a real use case architecture. In this way, the management of network security becomes simplified, dynamic and scalable
Acosta, Padilla Francisco Javier. "Self-adaptation for Internet of things applications". Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S094/document.
Pełny tekst źródłaThe Internet of Things (IoT) is covering little by little every aspect on our lives. As these systems become more pervasive, the need of managing this complex infrastructure comes with several challenges. Indeed, plenty of small interconnected devices are now providing more than a service in several aspects of our everyday life, which need to be adapted to new contexts without the interruption of such services. However, this new computing system differs from classical Internet systems mainly on the type, physical size and access of the nodes. Thus, typical methods to manage the distributed software layer on large distributed systems as usual cannot be employed on this context. Indeed, this is due to the very different capacities on computing power and network connectivity, which are very constrained for IoT devices. Moreover, the complexity which was before managed by experts on several fields, such as embedded systems and Wireless Sensor Networks (WSN), is now increased by the larger quantity and heterogeneity of the node’s software and hardware. Therefore, we need efficient methods to manage the software layer of these systems, taking into account the very limited resources. This underlying hardware infrastructure raises new challenges in the way we administrate the software layer of these systems. These challenges can be divided into: intra-node, on which we face the limited memory and CPU of IoT nodes, in order to manage the software layer and ; inter-node, on which a new way to distribute the updates is needed, due to the different network topology and cost in energy for battery powered devices. Indeed, the limited computing power and battery life of each node combined with the very distributed nature of these systems, greatly adds complexity to the distributed software layer management. Software reconfiguration of nodes in the Internet of Things is a major concern for various application fields. In particular, distributing the code of updated or new software features to their final node destination in order to adapt it to new requirements, has a huge impact on energy consumption. Most current algorithms for disseminating code over the air (OTA) are meant to disseminate a complete firmware through small chunks and are often implemented at the network layer, thus ignoring all guiding information from the application layer. First contribution: A models@runtime engine able to represent an IoT running application on resource constrained nodes. The transformation of the Kevoree meta-model into C code to meet the specific memory constraints of an IoT device was performed, as well as the proposition of modelling tools to manipulate a model@runtime. Second contribution: Component decoupling of an IoT system as well as an efficient component distribution algorithm. Components decoupling of an application in the context of the IoT facilitates its representation on the model@runtime, while it provides a way to easily change its behaviour by adding/removing components and changing their parameters. In addition, a mechanism to distribute such components using a new algorithm, called Calpulli is proposed
Nicot, John. "Remote Powering of Wireless IoT Nodes". Thesis, Bordeaux, 2021. http://www.theses.fr/2021BORD0061.
Pełny tekst źródłaThe world is becoming increasingly interested in the IoT (Internet of Things) and the associated ecosystem. In order to minimize the environmental impact and the maintenance costs associated with such nodes, it is necessary to minimize the use of batteries for both environmental and maintenance costs. This thesis aims to study the architectural feasibility of such nodes and their robustness, in order to draw conclusions about techniques and implementation methods that will be necessary for real-world applications. It will also study their limits or possible optimizations for certain situations (data rate, types of data to be captured, frequency of transmission, etc.)
Christophe, Benoit. "Semantic based middleware to support nomadic users in IoT-enabled smart environments". Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066669.
Pełny tekst źródłaWith the growth in Internet of Things, the realization of environments composed of diverse connected resources (devices, sensors, services, data, etc.) becomes a tangible reality. Together with the preponderant place that smartphones take in the daily life of users, these nascent smart spaces pave the way to the development of novel types of applications; carried by the phones of nomadic users and dynamically reconfiguring themselves to make use of such appropriate connected resources. Creating these applications however goes hand-in-hand with the design of tools supporting the nomadic users roaming in these spaces, in particular by enabling the efficient selection of resources. While such a selection calls for the design of theoretically grounded descriptions, it should also consider the profile and preferences of the users. Finally, the rise of (possibly mobile) connected resources calls for designing a scalable process underlying this selection. Progress in the field is however sluggish especially because of the ignorance of the stakeholders (and the interactions between them) composing this eco-system of “IoT-enabled smart environments”. Thus, the multiplicity of diverse connected resources entails interoperability and scalability problems. While the Semantic Web helped in solving the interoperability issue, it however emphasizes the scalability one. Thus, misreading of the ecosystem led to producing models partially covering connected resource characteristics.Revolving from our research works performed over the last 6 years, this dissertation identifies the interactions between the stakeholders of the nascent ecosystem to further propose formal representations. The dissertation further designs a framework providing search capabilities to support the selection of connected resources through a semantic analysis. In particular, the framework relies on a distributed architecture that we design in order to manage scalability issues. The framework is embodied in a VR Gateway further deployed in a set of interconnected smart places and that has been assessed by several experimentations
El, May Wissem. "Développement d'antennes textiles pour des applications IoT". Thesis, Université Côte d'Azur, 2021. http://www.theses.fr/2021COAZ4096.
Pełny tekst źródłaThanks to the progress of the connected objects in the recent years, the design of intelligent networks, such as Wireless Body Area Network (WBAN) has experienced a very high growth, which explains the great interest of the industry around the new technology. New concepts of emerging applications that can detect physiological, environmental and more specifically human-centric phenomena using sensors and antennas that can communicate and collect information in real time to ensure an intelligent interaction of the human body and its environment thanks to the development of a physical interface which can detect, react and adapt, such as smart clothes. In this context, we have focused on this research, the design and implementation of textile antennas that can be integrated into clothing for the Internet of Things (IoT) applications, these antennas are designed to operate in the Wi-Fi band (2.45 GHz, 5.8GHz) and the 5G below 6 GHz (3.5 GHz). We have also been using metamaterial structures of the electromagnetic bandgap (EBG) in order to increase their radiation performance and reduce the coupling effect with the human body. Recently, the millimeter band has been promoted for the development of wireless communication networks. The interest of this band in 5G and IoT applications is explained by the advantages it provides compared to the lower frequency bands (possibility of data rates higher than 10 Gbit/s, reduced interference with neighbor networks), compact devices, etc. In the second study, the first textile antenna designed to cover the 5G-26 GHz frequency band has been presented. An enhancement of the gain and a limitation of the interaction with the body have been obtained thanks to a new improvement technique using EBG surfaces. The measurement results performed validated well the developed design and demonstrated that there are many opportunities to exploit these prototypes for future IoT applications
Dufrene, Louis-Adrien. "Etude et optimisation de solutions reposant sur les réseaux cellulaires existants pour l'internet des objets". Thesis, Rennes, INSA, 2017. http://www.theses.fr/2017ISAR0022/document.
Pełny tekst źródłaThe Internet of Things (loT) is a concept, where a large number of connected devices are communicating together through the same network, constituting an autonomous and intelligent entity. The increasing number of connected devices and IoT services confirms the growing interest for the loT and its applications. To provide connectivity to the devices, several dedicated wireless low power and wide area networks have been created. Recently, with the Release 13, the 3GPP decided to modify the 2G and 4G technologies, to be able to also provide such connectivity for the loT devices, creating the field of Cellular-loT. These evolutions imply a coverage extension compared to the legacy technologies. To obtain this extension, these new standards especially use a blind repetition mechanism. In this context, this thesis studies the performance of several diversity combiners at the receiver, and observes the impact of the temporal evolution of the propagation channel and of imperfections in the receiver. The 2G GSM system is chosen as the application case. Firstly, we consider a receiver without imperfection. Secondly, we consider imperfect frequency synchronization in the receiver. Then, we consider imperfect channel estimation and propose a hybrid combining scheme, obtained by mixing two different combining mechanisms. Finally, in the last part of our study, we carry out a hardware implementation of the system into a software-radio platform. With the theoretical and simulation results provided in this thesis, one can better evaluate the potential of each combining scheme proposed in the framework of loT communications to efficiently benefit from blind repetition mechanisms
Bouali, Baghli Rayhana. "Approche sémantique de la conception de services connectés : cadre d'architecture, algorithmique de composition, application à la maison connectée". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0072.
Pełny tekst źródłaIn the context of the Internet of Things, the design of connected services - that is, services supported by connected objects - requires an end-to-end approach to not only meet the expectations of the recipients of these services but also to adapt the operation of these services to a wide range of execution conditions spreading from smart homes to smart cities. The semantic approach proposed in this thesis provides a level of abstraction that allows service designers to focus on the functional aspects of services and objects. It is part of a larger architecture framework that addresses, in addition to this semantic level, the more operational aspects of implementation of these services (Artifacts level) in potentially heterogeneous technical environments (Resources level). By proposing this semantic design approach, the thesis aims at achieving several objectives that can be grouped into three categories. The first category of objectives is to decompartmentalize the current world of connected services by decoupling services from connected objects and allowing the sharing of objects by several connected services. The openness induced by these first objectives leads to a second category of objectives that relates to the composition of connected services. Each service will have to be aware and adopt a behavior compatible with the other elements of its execution context. These contextual elements include of course the other services but also the physical phenomena and the actions of the occupants of the spaces concerned. Finally, the third category of objectives focusses on at the recipients of connected services in order to optimize the user experience through better requirement management and automatisms respectful of human behaviors. The theoretical basis of the semantic approach proposed in this thesis is a meta-model that defines the modeling elements needed to model services, connected objects and service behaviors in a declarative form
Ben, Fredj Sameh. "Intergiciel sémantique pour la recherche des services de l'internet des objets". Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0063/document.
Pełny tekst źródłaWith the advent of the Internet of Things (IoT), we are facing a proliferation of connected devices distributed over physical locations, so called smart spaces and offering IoT services. Enabling an easy and seamless discovery of these IoT services is crucial for the success of the Internet of Things. The characteristics of IoT services, such as their sheer number, their heterogeneity and their dynamicity induced by the mobility of the related devices, make discovering them a challenge. In this thesis, we propose a system architecture and the associated mechanisms to enable efficient and scalable semantic-based IoT service discovery supporting dynamic contexts. Our approach relies on distributed semantic gateways that embed clustering, information aggregation and semantic routing mechanisms
Shaikh, Yasir Saleem. "Privacy preserving internet of things recommender systems for smart cities". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS001.
Pełny tekst źródłaDuring the past decade, the Internet of Things (IoT) technology has revolutionized almost all the fields of daily life and has boosted smart cities. Smart cities use IoT technology to collect various types of sensors’ data and then use such data to offer a variety of applications. Since the smart cities’ applications are used by the citizens, therefore providing the customized recommendation services to the citizens based on their preferences, locations and profiles, as well as by exploiting the IoT data (e.g., traffic congestion and parking occupancy) is of great importance which could be provided by an IoT recommender. However, since the IoT recommender utilizes the private data of citizens (e.g., profiles, preferences and habits), it breaches the privacy of the users because the IoT recommender could track the routines and habits of the users by analyzing the historical database or by analyzing the regular recommendation services it offers. Therefore, it is important to preserve the privacy of the users from the IoT recommender. In this thesis, we propose a novel privacy preserving IoT recommender system for smart cities that provides recommendations by exploiting the IoT data of sensors and by considering various metrics. Our approach is organized in three parts. Firstly, we develop an EU General Data Protection Regulation (GDPR)-compliant IoT recommender system for smart parking system that provides recommendations of parking spots and routes by exploiting the data of parking and traffic sensors. For this, we first propose an approach for the mapping of traffic sensors with route coordinates in order to analyze the traffic conditions (e.g., the level of congestion) on the roadways and then developed an IoT recommender. The IoT recommender has been integrated into the smart parking use case of an H2020 EU-KR WISE-IoT project and has been evaluated by the citizens of Santander, Spain through a prototype. Additionally, we develop an IoT recommender for smart skiing that provides skiing routes comprised of specific types of slopes, as well as the nearest slope. For skiing routes, there does not exist any stable routing engine. Therefore, a novel routing engine for skiing routes was developed. This work has also been integrated into the smart skiing use case of WISE-IoT project. Secondly, although the developed IoT recommender for smart parking is GDPR-compliant, however, it does not fully protect the privacy of users. Because, an indiscriminately sharing of users’ data with untrusted third-party IoT parking recommender system causes a breach of privacy, as user’s behavior and mobility patterns can be inferred by analyzing the past travelling history of users. Therefore, we preserve privacy of users against parking recommender system while analyzing their past parking history using k-anonymity and differential privacy techniques. Lastly, since the smart cities applications are developed in a vertical manner and do not talk/communicate with each other, i.e., each application is developed for a certain scenario which generally does not share data with other smart cities applications. Therefore, we proposed two frameworks for the recommendation services across smart cities applications using social IoT. Firstly, on how social IoT can be used for the recommendation services across smart cities applications, and secondly, we propose another type of communication of social IoT at a global level, i.e., social cross-domain application-to-application communications, that enables smart cities applications to communicate with each other and establish social relationships between them
Zhu, Xiaoyang. "Building a secure infrastructure for IoT systems in distributed environments". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI038/document.
Pełny tekst źródłaThe premise of the Internet of Things (IoT) is to interconnect not only sensors, mobile devices, and computers but also individuals, homes, smart buildings, and cities, as well as electrical grids, automobiles, and airplanes, to mention a few. However, realizing the extensive connectivity of IoT while ensuring user security and privacy still remains a challenge. There are many unconventional characteristics in IoT systems such as scalability, heterogeneity, mobility, and limited resources, which render existing Internet security solutions inadequate to IoT-based systems. Besides, the IoT advocates for peer-to-peer networks where users as owners intend to set security policies to control their devices or services instead of relying on some centralized third parties. By focusing on scientific challenges related to the IoT unconventional characteristics and user-centric security, we propose an IoT secure infrastructure enabled by the blockchain technology and driven by trustless peer-to-peer networks. Our IoT secure infrastructure allows not only the identification of individuals and collectives but also the trusted identification of IoT things through their owners by referring to the blockchain in trustless peer-to-peer networks. The blockchain provides our IoT secure infrastructure with a trustless, immutable and public ledger that records individuals and collectives identities, which facilitates the design of the simplified authentication protocol for IoT without relying on third-party identity providers. Besides, our IoT secure infrastructure adopts socialized IoT paradigm which allows all IoT entities (namely, individuals, collectives, things) to establish relationships and makes the IoT extensible and ubiquitous networks where owners can take advantage of relationships to set access policies for their devices or services. Furthermore, in order to protect operations of our IoT secure infrastructure against security threats, we also introduce an autonomic threat detection mechanism as the complementary of our access control framework, which can continuously monitor anomaly behavior of device or service operations
Tolza, Xavier. "Techniques embarquées de localisation indoor exploitant le protocole Bluetooth pour des objets connectés basse consommation". Thesis, Toulouse, INSA, 2020. http://www.theses.fr/2020ISAT0013.
Pełny tekst źródłaLocalization is an information used by many fields in both the civil and military sectors: war, exploration, aeronautical/naval/space navigation, construction, logistics, etc.Since the Second World War and the democratization of consumer radio equipment (telephones, GNSS receivers, etc.), localization by radio waves has gradually established itself as the standard method of localization in a large number of fields.From the last century until today, the capacities of localization systems have increased, thanks to the constant improvement of the computing power of integrated circuits and their miniaturization, making it possible to integrate localization functionalities in an increasing number mobile equipment. The measurement of radio signals and the calculations necessary for position estimation can now be performed on small on-board equipment.However, current solutions mostly use fixed and wired radio equipment to allow the location of mobile connected objects. However, it is preferable for many use cases that the entire system runs on batteries: temporary deployments, environments without a power network or too high installation costs. It is therefore necessary to assess and improve the energy autonomy of current location algorithms.Many connected objects are already in circulation, research around a location system compatible with those already existing equipment arouses great research interest. A large part of current connected objects using standardized protocols in the 2.4GHZ ISM band, numerous studies assess the relevance of those signals for indoor positioning. The Bluetooth standard is widely used and energy efficient, making it an attractive candidate for indoor location. The studies presenting a localization system using this protocol are numerous, but there is no conclusive comparison on the performances of the main existing algorithms using ultra low consumption equipment.The objective of this study is to study and develop a localization system applied to indoor localization, using the Bluetooth protocol and fully autonomous on battery. A comparison between the main existing techniques and algorithms (reception power (RSSI), arrival time (ToA) and angle of arrival (AoA)) will be carried out and energy autonomy will be assessed.First, the physical models of these three techniques are compared, and a parametric optimization to estimate a position from the raw measurements is presented. Different energy management strategies are presented and the methods used to carry out the measurements for location with low consumption are detailed.Finally, the energy performance of the system is evaluated, the overall autonomy is estimated and the position error distribution function is given for each of the three compared techniques
Chollet, Nicolas. "Embedded-AI-enabled semantic IoT platform for agroecology". Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG078.
Pełny tekst źródłaModern agriculture requires a profound transformation to address the challenges of sustainable development while qualitatively and quantitatively feeding the growing global population. In this light, farmers are adopting "Smart Farming" also called precision agriculture. It is an agricultural method that leverages technology to enhance the efficiency, productivity, and sustainability of agricultural production. This approach encompasses the use of sensors, the Internet of Things (IoT), Artificial Intelligence (AI), data analysis, robotics, and various other digital tools optimizing aspects such as soil management, irrigation, pest control, and livestock management. The goal is to increase production while reducing resource consumption, minimizing waste, and improving product quality. However, despite its benefits and successful deployment in various projects, smart agriculture encounters limitations, especially within the context of IoT. Firstly, platforms must be capable of perceiving data in the environment, interpreting it, and making decisions to assist in farm management. The volume, variety, and velocity of those data, combined with a wide diversity of objects and the advent of AI embedded in sensors, make communication challenging on wireless agricultural networks. Secondly, research tends to focus on projects addressing the issues of non-sustainable conventional agriculture, and projects related to small-scale farms focused on agroecology are rare. In this context, this thesis explores the creation of an IoT platform comprised of a network of semantic smart sensors, aiming to guide farmers in transitioning and managing their farm sustainably while minimizing human intervention
Le, Kim-Hung. "Mécanismes d’interopérabilité pour les applications industrielles de l’Internet des Objets et la Ville Intelligente". Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS225.
Pełny tekst źródłaWith the rapid growth of Internet technologies as well as the explosion of connected objects, Internet of Things (IoT) is considered an Internet revolution that positively affects several life aspects. The integration of IoT solutions and cloud computing, namely cloud-based IoT, is a crucial concept to meet these demands. However, two major challenges of the cloud-based IoT are interoperability and reliability. In this thesis, our main objective is to deal with the interoperability and reliability issues that arise from large-scale deployment. The proposed solutions spread over architectures, models, and algorithms, ultimately covering most of the layers of the IoT architecture. At the communication layer, we introduce a method to interoperate heterogeneous IoT connections by using a connector concept. We then propose an error and change point detection algorithm powered by active learning to enhance IoT data reliability. To maximize usable knowledge and business value from this cleaned data and make it more interoperable, we introduce a virtual sensor framework that simplifies creating and configuring virtual sensors with programmable operators. Furthermore, we provide a novel descriptive language, which semantically describes groups of Things. To ensure the device reliability, we propose an algorithm that minimizes energy consumption by real-time estimating the optimal data collection frequency. The efficiency of our proposals has been practically demonstrated in a cloud-based IoT platform of a start-up company
Abu, Oun Osama. "Conception d'une plate-forme multi-échelle hybride pour évaluer les performances de systèmes orientés internet des objets". Thesis, Besançon, 2015. http://www.theses.fr/2015BESA2015/document.
Pełny tekst źródłaResearchers across many domains are working to provide solutions that enable integration of objectsand systems into the Internet of Things (IoT). There are two domains which are among the mostimportant ones in IoT. First domain is IoT testing and evaluation. The billions of objects whichare connected to IoT would intercommunicate without any human intervention. Enterprises anddevelopers should be able to test and evaluate different operational scenarios of their systems indifferent environments. Testing environments should be able to exchange services. We present ourarchitecture IoTaaS (Internet of Things Testing As A Service). IoTaaS is a hierarchy of a distributedcloud for testing and evaluating IoT. We also present the pilot implementation of IoTaaS under thecode name CEMAT (Cloud Environment for Mobile Application Testing) which focuses on mobiledevices and their connected objects. The second domain is about communication methods andtechniques. Several IoT applications depend on public data exchange. We present our design toexchange small amount of public data on wireless network without establishing a connection. COLDE(Connectionless Data Exchange) is our extension to protocol the IEEE 802.11. COLDE utilizesthe management frames to allow Wi-Fi devices and access points to exchange small amounts ofdata without having any association. COLDE describes how we can exchange data without beingconnected. Lightweight services concept explains which data could be transferred using COLDE.Simulation experiments and real world implementation are presented along with their results
Aboubakar, Moussa. "Efficient management of IoT low power networks". Thesis, Compiègne, 2020. http://www.theses.fr/2020COMP2571.
Pełny tekst źródłaIn these recent years, several connected objects such as computer, sensors and smart watches became part of modern living and form the Internet of Things (IoT). The basic idea of IoT is to enable interaction among connected objects in order to achieve a desirable goal. IoT paradigm spans across many areas of our daily life such as smart transportation, smart city, smart agriculture, smart factory and so forth. Nowadays, IoT networks are characterized by the presence of billions of heterogeneous embedded devices with limited resources (e.g. limited memory, battery, CPU and bandwidth) deployed to enable various IoT applications. However, due to both resource constraints and the heterogeneity of IoT devices, IoT networks are facing with various problems (e.g. link quality deterioration, node failure, network congestion, etc.). Considering that, it is therefore important to perform an efficient management of IoT low power networks in order to ensure good performance of those networks. To achieve this, the network management solution should be able to perform self-configuration of devices to cope with the complexity introduced by current IoT networks (due to the increasing number of IoT devices and the dynamic nature of IoT networks). Moreover, the network management should provide a mechanism to deal with the heterogeneity of the IoT ecosystem and it should also be energy efficient in order to prolong the operational time of IoT devices in case they are using batteries. Thereby, in this thesis we addressed the problem of configuration of IoT low power networks by proposing efficient solutions that help to optimize the performance of IoT networks. We started by providing a comparative analysis of existing solutions for the management of IoT low power networks. Then we propose an intelligent solution that uses a deep neural network model to determine the efficient transmission power of RPL networks. The performance evaluation shows that the proposed solution enables the configuration of the transmission range that allows a reduction of the network energy consumption while maintaining the network connectivity. Besides, we also propose an efficient and adaptative solution for configuring the IEEE 802.15.4 MAC parameters of devices in dynamic IoT low power networks. Simulation results show that our proposal improves the end-to-end delay compared to the usage of the standard IEEE 802.15.4 MAC. Additionally, we develop a study on solutions for congestion control in IoT low power networks and propose a novel scheme for collecting the congestion state of devices in a given routing path of an IoT network so as to enable an efficient mitigation of the congestion by the network manager (the device in charge of configuration of the IoT network)
Barros, Cardoso Da Silva Luciano. "Overlay Cognitive Radio for IoT satellite communications". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0183.
Pełny tekst źródłaThe favorable projection towards the satellite segment could be sustained especially today, since the demand for the rising new services has increased considerably. This is justified by the unique satellite characteristics such as multicast and broadcasting capabilities, mobility aspects and global reach, besides the ability to cover and connect remote areas and hostile environments. As a typical example, we point out the use of satellite to support the Machine-to-Machine (M2M) communications. In this context, a main challenge is to develop techniques that enable a better coordination among legacy and future services. It is within this framework that the Cognitive Radio (CR) techniques have also become attractive for space applications. This doctoral thesis studies the feasibility of a Cognitive User (CU) transmission over the primary user infrastructure by using the CR techniques in the overlay paradigm applied to the satellite context. In this perspective, the first thesis contribution present a framework for overlay paradigms towards satellite communications. In this sense, a low complexity solution is proposed related to the Trellis Shaping based DPC encoder for the CU. Subsequently, we discuss an approach to control the CU output power by addressing the trellis shaping (TS) technique. Moreover, by using auxiliary bits as well as the proper mapping selection, further constellation expansion is performed in order to increase the number of shaping regions. The relation among these implemented techniques provides a trade-off between power efficiency,by the reduction of the modulo loss, and complexity, by the reduction of the encoder operations. Finally, we examine the proposed solutions at the light of a realistic satellite scenario. In this general contribution, by using examples of commercial off-the-shelf (COTS) parts and assuming practical link budget parameters
Ayeb, Neil. "Administration autonomique et décentralisée de flottes d'équipements de l'Internet des Objets". Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALM054.
Pełny tekst źródłaWith the expansion of Internet of Things (IoT) that relies on heterogeneous; dynamic; and massively deployed devices; Device Management (DM), which consists of firmware update, configuration, troubleshooting and tracking, is required for proper quality of service and user experience, deployment of new functions, bug fixes and distribution of security patches.Existing Home and IoT industrial DM platforms are already showing their limits with a few static home and IoT devices (e.g., routers, TV Decoders). Currently, these platforms are mainly manually operated by experts such as system administrators, and require extensive knowledge and skills. Heterogeneity implies that devices have diverse compute and network capabilities. Dynamicity translates to variation of devices environments (e.g., network quality, running services, nearby devices). The massive aspect is reflected in fleets composed of billions of devices as opposed to millions currently.Therefore, IoT device administration requires launching administration operations that assure the well-functioning of device fleets. These operations are to be adapted in terms of nature, speed, target, accordingly to devices current service requirements, computing capabilities and network conditions. Existing manually operated approaches cannot be applied on these massive and diverse devices forming the IoT.To tackle these issues, our work in an industrial research context, at Orange Labs, proposes applying autonomic computing to platform operation and distribution. It aims to ensure that administration requirements of a device fleet are automatically fulfilled using the optimal amount of resources and with the least amount of execution errors.Specifically, our contribution relies on four coordinated autonomic loops. The first two loops are responsible for handling fleet variation and update operations dispatching, while the remaining two others focus on vertical and horizontal scalability. Our approach allows automatic administration platform operation, more accurate and faster error diagnosis, vertical and horizontal scaling along with simpler IoT DM platform administration.For experimental validation, we developed two prototypes: one that demonstrates the usability of our approach with Orange's industrial IoT platform for its piloting, while the other one demonstrates vertical scalability using extended open-source remote administration software. Our prototypes show encouraging results, such as two times faster firmware upgrade operation execution speed, compared to existing legacy telecommunication operator approaches