Literatura científica selecionada sobre o tema "Sécurités des IoT"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Sécurités des IoT".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Sécurités des IoT"
Bruguier, F., P. Benoit, L. Dalmasso, B. Pradarelli, E. Lecointre e L. Torres. "AMUSE : l'escape game pour s'évader en toute sécurité". J3eA 18 (2019): 1017. http://dx.doi.org/10.1051/j3ea/20191017.
Texto completo da fonteRoussel, N., O. Potin, J. B. Rigaud e J. M. Dutertre. "Implémentation matérielle d’un algorithme de cryptographie légère pour objets connectés". J3eA 21 (2022): 1004. http://dx.doi.org/10.1051/j3ea/20221004.
Texto completo da fonteZacklad, Manuel, Didier Joubert e Aline Gérard. "Co-design de dispositifs de prévention collaboratifs au service de la prévention des rixes et de la police de sécurité". Approches Théoriques en Information-Communication (ATIC) N° 6, n.º 1 (21 de julho de 2023): 61–87. http://dx.doi.org/10.3917/atic.006.0061.
Texto completo da fonteAsensio Ferreiro, Mª Dolores. "Desarrollo de la expresión oral en FLE: la Francofonía y las TIC". Anales de Filología Francesa, n.º 29 (24 de novembro de 2021): 53–73. http://dx.doi.org/10.6018/analesff.481831.
Texto completo da fonteGrignani, Giovanni, Piotr Rutkowski, Celeste Lebbe, Natalie Prinzi, Jean-jaques Grob, Enrica Teresa Tanda, Michele Guida et al. "545 A phase 2 study of retifanlimab in patients with advanced or metastatic merkel cell carcinoma (MCC) (POD1UM-201)". Journal for ImmunoTherapy of Cancer 9, Suppl 2 (novembro de 2021): A574—A575. http://dx.doi.org/10.1136/jitc-2021-sitc2021.545.
Texto completo da fonteSybord, Christine, e Bruno Fedrici. "Impacts des objets connectés dans le secteur de la chimie – Cas du projet OSIRIS 4.0". Management & Data Science, agosto de 2020. http://dx.doi.org/10.36863/mds.a.13977.
Texto completo da fonteTeses / dissertações sobre o assunto "Sécurités des IoT"
Su, Runbo. "Trust Management in Service-Oriented Internet of Things (SO-IoT)". Electronic Thesis or Diss., Université de Lorraine, 2024. http://www.theses.fr/2024LORR0054.
Texto completo da fonteUnlike Trust in Social Science, in which interactions between humans are measured, thanks to the integration of numerous smart devices, Trust in IoT security focuses more on interactions between nodes. Moreover, As IoT nodes can somehow benefit from 'Group'/'Community' since they form by similar interests or functionalities, the assessment of Group-Individual and Inter-Individual Trust is also important. However, handling limitations brought by potential threats and inherent vulnerability due to TM architecture remains challenging. This thesis investigates Trust from three perspectives in the Service-Oriented Internet of Things (SO-IoT): Inter-Group Trust, Group-Individual Trust, and Inter-Individual Trust. Firstly, a role-based dynamic model is developed to assess intra- and inter-community(group), enhancing service-oriented activities and addressing security issues within and between communities. A locally centralized four-phase approach is employed, focusing on countermeasures against attacks on services within the community. Additionally, a three-phase mechanism is devised to measure cooperativeness between communities. An implementation based on the ROS 2 system was implemented to analyze the performance of the proposed model based on the preliminary results. Secondly, to address misbehavior in SO-IoT in terms of Inter-Individual trust, a Stochastic Bayesian Game (SBG) is introduced, which considers the heterogeneity of IoT nodes, and complex behavioral schemes of service providers are incorporated, encouraging cooperation and penalizing malicious strategical actions. Lastly, the work of assessing the Trust of V2X messages in IoV demonstrates the possibility of implementing Trust Management in a concrete IoT environment
Hemmer, Adrien. "Méthodes de détection pour la sécurité des systèmes IoT hétérogènes". Electronic Thesis or Diss., Université de Lorraine, 2023. http://www.theses.fr/2023LORR0020.
Texto completo da fonteThis thesis concerns new detection methods for the security of heterogenous IoT systems, and fits within the framework of the SecureIoT European project. We have first proposed a solution exploiting the process mining together with pre-treatment techniques, in order to build behavioral models, and identifying anomalies from heterogenous systems. We have then evaluated this solution from datasets coming from different application domains : connected cars, industry 4.0, and assistance robots.. This solution enables to build models that are more easily understandable. It provides better detection results than other common methods, but may generate a longer detection time. In order to reduce this time without degrading detection performances, we have then extended our method with an ensemble approach, which combines the results from several detection methods that are used simultaneously. In particular, we have compared different score aggregation strategies, as well as evaluated a feedback mechanism for dynamically adjusting the sensitivity of the detection. Finally, we have implemented the solution as a prototype, that has been integrated into a security platform developed in collaboration with other European industrial partners
Mahamat, charfadine Salim. "Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets". Thesis, Reims, 2019. http://www.theses.fr/2019REIMS011/document.
Texto completo da fonteWith the exponential evolution of the Internet of Things (IoT), ensure the network security has become a big challenge for networkadministrators. Traditionally, the network security is based on multiple independent devices such as firewall, IDS/IPS, NAC where the main role is to monitor the information exchanged between the inside and the outside perimeters of the enterprises networks. However, the administration of these network devices can be complex and tedious with an independent manual configuration. Recently, with the introduction of the Software Defined Networking concept (SDN) and the OpenFlow protocol offers many opportunities by providing a centralized and programmable network administration.As part of this research work, we proposed a new approach to secure the network traffic flows exchanges based on a method of events detection, in an automated manner. This solution is based on the SDN approach coupled to an intrusion detection system which allows analyze, detect and remove security threats. With the implementation, we contribute to change the paradigm of secure the network traffic flows exchanges using the SDN principle, coupled with an IDS in a real use case architecture. In this way, the management of network security becomes simplified, dynamic and scalable
Moinet, Axel. "Définition d'une architecture IoT sécurisée et adaptative basée sur la blockchain". Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCK010.
Texto completo da fonteDuring the last fifteen years, the rise of smart and wireless enabled embedded devices lead to the development of wireless sensor networks (WSN). In the same time, the emerging of Cloud computing with the development of the Internet and the Web as an everyday technology thanks to the rise of bandwidth and processing power leads to new network paradigms. The Internet of Things (IoT) primary goal is to bridge the gap between these technologies and bring WSN sensing and actuating abilities to Cloud applications. We count a significant amount of work targetting the IoT in the last decade, however they lack proper solutions to ensure data privacy and security. Gartner investigations shows that 70 % of connected and smart devices provide little or no security policies and solutions, making both user and devices vulnerable to attackers. In the field of digital currencies, Bitcoin proposed a new authenticated and trustless data structure dedicated to transactions logging in a decentralized network with the help of a consensus protocol : the blockchain. This thesis is focused on bringing the blockchain technology as a new solutions for security in decentralized WSN in the IoT, providing the basis for a secure and adaptative agent-based middleware and execution framework. This framework attempt to federate existing work regarding the architecture of the IoT, but also to tackle security issues regarding network access, agent execution and trust evaluation. To achieve this goal, we propose Network Service Loader (NSL), an agent-based middleware constructed of existing protocols in a new way, along with a new solution called Blockchain Authentication and Trust Module (BATM) dedicated to node and users authentication, access control policies, and trust evaluation through our new Maximum Likelihood Trust Estimator (MLTE) algorithm
Mansouri, Mohamad. "Performance and Verifiability of IoT Security Protocols". Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS065.
Texto completo da fonteThe Internet of Things (IoT) is one of the most important technologies in our current world. It is composed of connected devices with sensors and processing abilities, all connected to a single platform that orchestrates them. The integration of these IoT devices into many real-life applications (eg., transportation, industries, ...) implies significant performance and efficiency improvements. As a consequence, we have seen a boom in the number of IoT devices deployed and their corresponding platforms. These IoT devices use real-time data from their deployment environment and send them to the platform. The collected data by these devices often consist of sensitive information belonging to the individual who uses this technology. Hence, the privacy of users' data is one of the important concerns in IoT. Moreover, IoT applications rely on automating frequent tasks to achieve better efficiency. Unfortunately, moving control of usually human-controlled operations to the IoT presents some non-negligible risks to the safety of IoT users. This thesis deals with the privacy and safety concerns raised by IoT. We propose security protocols that preserve the privacy of the users' data. In addition to privacy, we design verifiable solutions that guarantee the correctness of the computations performed by the IoT devices and the platform and hence increase trust toward this technology. We design these solutions while focusing on their performance. More precisely, we propose protocols that are scalable to cope with the increasing number of IoT devices. We also consider protocols that are fault-tolerant to cope with the frequent dropouts of IoT devices. We particularly focus on two security protocols: Secure Aggregation and Remote Attestation. Secure aggregation is a protocol where an aggregator computes the sum of the private inputs of a set of users. In this thesis, we propose the first verifiable secure aggregation protocol (VSA) that gives formal guarantees of security in the malicious model. Our solution preserves the privacy of users' inputs and the correctness of the aggregation result. Moreover, we propose a novel fault-tolerant secure aggregation protocol (FTSA) based on additively-homomorphic encryption. The scheme allows users in secure aggregation to drop from the protocol and offers a mechanism to recover the aggregate without affecting the privacy of the data. We show that FTSA outperforms the state-of-the-art solutions in terms of scalability with respect to the number of users. On the other hand, a remote attestation protocol is a protocol that allows an IoT device (acting as a prover) to prove its software integrity to the IoT platform (acting as the verifier). We propose a new collaborative remote attestation protocol (FADIA) in which devices collect attestations from each other and aggregate them. FADIA deals with the heterogeneity and dynamic nature of IoT by considering fairness in its design. The evaluation of FADIA shows an increase in the lifetime of the overall network
Smache, Meriem. "La sécurité des réseaux déterministes de l’Internet des objets industriels (IIoT)". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEM033.
Texto completo da fonteTime synchronization is a crucial requirement for the IEEE802.15.4e based Industrial Internet of Things (IIoT). It is provided by the application of the Time-Slotted Channel-Hopping (TSCH) mode of the IEEE802.15.4e. TSCH synchronization allows reaching low-power and high-reliability wireless networking. However, TSCH synchronization resources are an evident target for cyber-attacks. They can be manipulated by attackers to paralyze the whole network communications. In this thesis, we aim to provide a vulnerability analysis of the TSCH asset synchronization. We propose novel detection metrics based on the internal process of the TSCH state machine of every node without requiring any additional communications or capture or analysis of the packet traces. Then, we design and implement novel self-detection and self-defence techniques embedded in every node to take into account the intelligence and learning ability of the attacker, the legitimate node and the real-time industrial network interactions. The experiment results show that the proposed mechanisms can protect against synchronization attacks
Fleury, Xavier. "Corrélation entre dégradation des composants internes et sécurité de fonctionnement des batteries Li-ion". Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAI060/document.
Texto completo da fonteLithium-ion batteries have undeniable assets to meet several of the requirements for embedded applications. They provide high energy density and long cycle life. Nevertheless, they can face irreversible damage during their lives which could cause safety issues like the thermal runaway of the battery and its explosion. It is then essential to understand the degradation mechanisms of all the internal components of an accumulator (i.e. electrode materials, collectors, separator and electrolyte) and the progress of events in abusive conditions that can lead to an accident scenario. The aim of this thesis is to work on the security aspects of Lithium-ion batteries in order to understand these degradation mechanisms and to help to prevent future incidents.Even if the degradation mechanisms of all the internal components are studied in this work, a special attention is given to the separator. This component is indeed one of the most important safety devices of a battery and have to be electrochemically, mechanically and thermally characterized after ageing. Different washing methods have been study in order to characterize the separator without any degradation product of the electrolyte which could interfere. Porosity and tortuosity associated with the ionic conductivity of the separator have been tested.The results show that even if the separator is electrochemically inactive, its porosity can decrease because of the degradation of the negative graphite electrode. Indeed, SEI components obstruct the surface porosity of the separator. This porosity change do not cause any mechanical degradation but decrease separator performances at high current rate and promote lithium dendrite growth
Alouache, Lylia. "Protocoles de Routage SDN, Multi-critères et Sécurisés Dans un Environnement IoV Collaboratif". Thesis, Cergy-Pontoise, 2019. http://www.theses.fr/2019CERG1041.
Texto completo da fonteNowadays, Big Data, Cloud Computing, and Internet of Things (IoT) have encouraged the generalization of the Vehicular Ad Hoc Networks (VANET) to the Internet of Vehicles (IoV), where vehicles evolve from passive actors of transportation to smart entities with new perception and communication capabilities. Vehicles become active members of a smart city, they provide an omnipresent connectivity, a wide range of applications and services relating to road safety, intelligent transport and the comfort of users. In addition, the large amount of data generated by IoV applications is a major challenge in their management, storage, and manipulation. These services depend greatly on the vehicles in question, which act as transmitters, relays, and receivers. Vehicles carry out their own communications but serve simultaneously as information relays for communication between other vehicles as well. Consequently, reliable dissemination process and connectivity are required. However, the dynamic nature of the IoV entities, the disturbances related to the mobile network as well as the security challenges lead to frequent link failure. In fact, some vehicles
Fayad, Achraf. "Protocole d’authentification sécurisé pour les objets connectés". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT051.
Texto completo da fonteThe interconnection of private resources on public infrastructure, user mobility and the emergence of new technologies (vehicular networks, sensor networks, Internet of things, etc.) have added new requirements in terms of security on the server side as well as the client side. Examples include the processing time, mutual authentication, client participation in the choice of security settings and protection against traffic analysis. Internet of Things (IoT) is in widespread use and its applications cover many aspects of today's life, which results in a huge and continuously increasing number of objects distributed everywhere.Security is no doubt the element that will improve and strengthen the acceptability of IoT, especially that this large scale deployment of IoT systems will attract the appetite of the attackers. The current cyber-attacks that are operational on traditional networks will be projected towards the Internet of Things. Security is so critical in this context given the underlying stakes; in particular, authentication has a critical importance given the impact of the presence of malicious node within the IoT systems and the harm they can cause to the overall system. The research works in this thesis aim to advance the literature on IoT authentication by proposing three authentication schemes that satisfy the needs of IoT systems in terms of security and performance, while taking into consideration the practical deployment-related concerns. One-Time Password (OTP) is an authentication scheme that represents a promising solution for IoT and smart cities environments. This research work extends the OTP principle and propose a new approach to generate OTP based on Elliptic Curve Cryptography (ECC) and Isogeny to guarantee the security of such protocol. The performance results obtained demonstrate the efficiency and effectiveness of our approach in terms of security and performance.We also rely on blockchains in order to propose two authentication solutions: first, a simple and lightweight blockchain-based authentication scheme for IoT systems based on Ethereum, and second, an adaptive blockchain-based authentication and authorization approach for IoT use cases. We provided a real implementation of our proposed solutions. The extensive evaluation provided, clearly shows the ability of our schemes to meet the different security requirements with a lightweight cost in terms of performance
Zhu, Xiaoyang. "Building a secure infrastructure for IoT systems in distributed environments". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI038/document.
Texto completo da fonteThe premise of the Internet of Things (IoT) is to interconnect not only sensors, mobile devices, and computers but also individuals, homes, smart buildings, and cities, as well as electrical grids, automobiles, and airplanes, to mention a few. However, realizing the extensive connectivity of IoT while ensuring user security and privacy still remains a challenge. There are many unconventional characteristics in IoT systems such as scalability, heterogeneity, mobility, and limited resources, which render existing Internet security solutions inadequate to IoT-based systems. Besides, the IoT advocates for peer-to-peer networks where users as owners intend to set security policies to control their devices or services instead of relying on some centralized third parties. By focusing on scientific challenges related to the IoT unconventional characteristics and user-centric security, we propose an IoT secure infrastructure enabled by the blockchain technology and driven by trustless peer-to-peer networks. Our IoT secure infrastructure allows not only the identification of individuals and collectives but also the trusted identification of IoT things through their owners by referring to the blockchain in trustless peer-to-peer networks. The blockchain provides our IoT secure infrastructure with a trustless, immutable and public ledger that records individuals and collectives identities, which facilitates the design of the simplified authentication protocol for IoT without relying on third-party identity providers. Besides, our IoT secure infrastructure adopts socialized IoT paradigm which allows all IoT entities (namely, individuals, collectives, things) to establish relationships and makes the IoT extensible and ubiquitous networks where owners can take advantage of relationships to set access policies for their devices or services. Furthermore, in order to protect operations of our IoT secure infrastructure against security threats, we also introduce an autonomic threat detection mechanism as the complementary of our access control framework, which can continuously monitor anomaly behavior of device or service operations
Livros sobre o assunto "Sécurités des IoT"
Parikka, Jussi. Digital contagions: A media archaeology of computer viruses. New York: Peter Lang, 2007.
Encontre o texto completo da fonteKevin, Behr, e Spafford George, eds. The phoenix project: A novel about IT, DevOps, and helping your business win. Portland, Or: IT Revolution Press, 2013.
Encontre o texto completo da fonteAnderson, Ross. Security engineering: A guide to building dependable distributed systems. 2a ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Encontre o texto completo da fonteMcDougall, Allan. Transportation systems security. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2008.
Encontre o texto completo da fonteAnderson, Ross. Security engineering: A guide to building dependable distributed systems. 2a ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Encontre o texto completo da fonteKatz, Jonathan. Introduction to modern cryptography. Boca Raton: Chapman & Hall/CRC, 2008.
Encontre o texto completo da fonteTanenbaum, Andrew S. Modern operating systems. Sudbury, Ont: École des traducteurs et interprètes, Université Laurentienne, 1993.
Encontre o texto completo da fonteTanenbaum, Andrew S. Modern operating systems. 3a ed. Upper Saddle River, N.J: Pearson/Prentice Hall, 2008.
Encontre o texto completo da fonteTanenbaum, Andrew S. Modern operating systems. Englewood Cliffs, N.J: Prentice Hall, 1992.
Encontre o texto completo da fonteTanenbaum, Andrew S. Modern operating systems. London: Prentice Hall International, 1992.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Sécurités des IoT"
KHALIL, Ahmad, Nader MBAREK e Olivier TOGNI. "Adaptation du contrôle d’accès pour la sécurité de l’IoT". In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 169–204. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch7.
Texto completo da fonteCOPPOLA, Marcello, e George KORNAROS. "Automatisation pour l’industrie 4.0 avec des passerelles LoRaWan sécurisées". In Systèmes multiprocesseurs sur puce 2, 71–93. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9022.ch3.
Texto completo da fonteSYLLA, Tidiane, Mohamed-Aymen CHALOUF e Francine KRIEF. "Adaptation du niveau de sécurité des applications IoT". In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 251–75. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch10.
Texto completo da fonteAzaïs, P., e P. Kuntz. "16 Normes et sécurité". In Batteries Li-ion, 371–410. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-2410-6-017.
Texto completo da fonteAzaïs, P., e P. Kuntz. "16 Normes et sécurité". In Batteries Li-ion, 371–410. EDP Sciences, 2020. http://dx.doi.org/10.1051/978-2-7598-2410-6.c017.
Texto completo da fonteAYMEN CHALOUF, Mohamed, Hana MEJRI e Omessaad HAMDI. "Intelligence artificielle pour la sécurité en e-santé". In Gestion de la sécurité en e-santé, 213–35. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9179.ch9.
Texto completo da fonteKHALIL, Ahmad, Nader MBAREK e Olivier TOGNI. "Optimisation de la consommation énergétique des dispositifs IoT". In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 79–106. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch4.
Texto completo da fonteGAUTIER, Matthieu, e Olivier BERDER. "Adaptation de la qualité de service dans les dispositifs IoT à récupération d’énergie". In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 137–68. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch6.
Texto completo da fonteE. NAVAS, Renzo, Laurent TOUTAIN e Georgios Z. PAPADOPOULOS. "Techniques de Moving Target Defense pour l’IoT". In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 277–304. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch11.
Texto completo da fonteBENMAMMAR, Badr. "Optimisation des performances de l’IoT : une approche basée sur la radio intelligente". In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 57–77. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch3.
Texto completo da fonteRelatórios de organizações sobre o assunto "Sécurités des IoT"
Kamaté, Caroline. Industrial safety in a changing world. Foundation for an Industrial Safety Culture, setembro de 2023. http://dx.doi.org/10.57071/240fut.
Texto completo da fonte