Teses / dissertações sobre o tema "Système Véhiculaire"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 48 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Système Véhiculaire".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.
Ricard, Quentin. "Détection autonome de trafic malveillant dans les réseaux véhiculaires". Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30149.
Texto completo da fonteThe growth of intelligent transport systems brings new highly connected vehicles on the roads of the world. These vehicles now embed new devices and services meant to increase road safety, reduce the environmental impact of the vehicles and improve the user experience. However, these new communication channels between vehicles and the rest of the world, especially cellular networks bring new vulnerabilities. Vehicles are now depending on the information provided by the network and are therefore subject to malfunction and anomalies due to such network. Worse, they become vulnerable to malicious actors of the cyber-space. Mainstream information networks have been confronted with security problems for a long time. Numerous approaches have been designed in order to detect anomalies an intrusion inside such networks. However, these methods cannot be applied directly to the automotive context. In fact, the specific nature of the communications, the anomalies and the execution of intrusion detection systems inside the vehicles must be considered. Therefore, we present a new anomaly detection system dedicated to vehicular networks and their vulnerabilities. Our detection is based on the creation of instantaneous description windows that are linked together thanks to an ontology. Thanks to these relations, the results of the detection are fed with the communication context of the vehicle during an anomaly. Consequently, the diagnostic from the administrator is made easier and we ensure the traceability of the anomaly. We evaluate the performances of our system thanks to a dataset produced by our tool named Autobot. It produces realistic communications, anomalies and attacks on cellular vehicular networks. We aim to evaluate our system based on the quality of the detection of different kinds of attacks while minimizing the number of false positives. We compare the results of two unsupervised machine learning algorithms that are used during the detection named HTM and LSTM
Ben, Jemaa Inès. "Communication multicast pour les systèmes véhiculaires coopératifs". Thesis, Paris, ENMP, 2014. http://www.theses.fr/2014ENMP0065/document.
Texto completo da fonteVehicular communications allow emerging new multicast applications such as fleet management and point of interest (POI). Both applications require Internet-to-vehicle multicasting. These approaches could not be applied to vehicular networks (VANET) due to their dynamic and distributed nature. In order to enable such multicasting, our work deals with two aspects. First, reachability of the moving vehicles to the multicast service and second, multicast message dissemination in VANET. We introduce first a self-configuring multicast addressing scheme that allows the vehicles to auto-configure a dynamic multicast address without a need to exchange signalling messages with the Internet. Second, we propose a simplified approach that extends Mobile IP and Proxy Mobile IP. This approach aims at optimizing message exchange between vehicles and entities responsible for managing their mobility in Internet. To study the dissemination mechanisms that are suitable for fleet management applications, we propose to revisit traditional multicast routing techniques that rely on a tree structure. For this purpose, we study their application to vehicular networks. In particular, as vehicular networks are known to have changing topology, we present a theoretical study of the link lifetime between vehicles in urban environments. Then, using simulations, we study the application of Multicast Adhoc On Demand Vector, MAODV. We propose then Motion-MAODV, an improved version of MAODV that aims at enhancing routes built by MAODV in vehicular networks and guarantee longer route lifetime. Finally, to enable geographic dissemination as required by POI applications, we propose a routing protocol Melody that provides a geocast dissemination in urban environments. Through simulations, Melody ensures more reliable and efficient packet delivery to a given geographic area compared to traditional geo-brodcasting schemes in highly dense scenarios
Cenerario, Nicolas. "Partage d’informations dans les réseaux de communication inter-véhiculaire". Valenciennes, 2010. http://ged.univ-valenciennes.fr/nuxeo/site/esupversions/b15fc5ca-0eb6-4394-bba7-f843d69afc90.
Texto completo da fonteThis thesis is interested in the information sharing in inter-vehicle communication networks. Today, thanks to the positioning systems and to the wireless communication capacities, vehicles can exchange data relating different kind of events (emergency brake, traffic jam, available parking spot, etc. ) in order to provide new assistance systems for the drivers. In this work, we focused on vehicle-to-vehicle communication (V2V). The absence of any fixed communication infrastructure and the high nodes' mobility (i. E. Vehicles) in the network raise particularly interesting problems in term of data management, for example, in term of relevance estimation in these particularly dynamic environments. In this context, our main contributions concern : the proposal of mechanisms, based on the computation of an encounter probability, allowing to estimate the relevance of information exchanged between vehicles ; mechanisms of continuous query processing in decentralized environments allowing to keep information updated ; a dissemination protocol, exploiting our encounter probability, allowing to route data to vehicles potentially interested. Our proposals were evaluated in the VESPA (Vehicular Event Sharing with a mobile Peer-to-peer Architecture) system as well as through numerous simulations
Boutahala, Ramzi. "Mécanismes de sécurisation des communications véhiculaires". Electronic Thesis or Diss., Reims, 2023. http://www.theses.fr/2023REIMS047.
Texto completo da fonteIn this thesis, we consider the problem of communication channel overload in the context of cooperative intelligent transport systems (C-ITS). We aim to improve the communication mechanism between vehicles and focus on the security part of communication, which is the most costly in terms of resources. In Europe and the USA, adapted communication protocols have been proposed to ensure communication and cooperation among all relevant actors (vehicles, road infrastructure, pedestrians, etc). These protocols enable vehicles to communicate with each other by exchanging specific messages. Each vehicle periodically sends application beacons denoted CAM (Cooperative Awareness Message). This CAM contains information about the vehicle status (speed, location, heading, etc). In order to guarantee the integrity and the authentication of the exchanged messages, signatures that are computed using various Pseudonym Certificates (PC) are included in all sent messages. We propose a different approach that enables vehicles to send CAMs, without having to send security information, with each transmission, as required by current standards. Instead of exhaustive authentication, our approach enables vehicles to reduce data security and build trust by creating trusted environments. This reduces the need for frequent exchanges of signed CAMs and eliminates the need for an extensive verification and signature process, effectively conserving bandwidth. In addition, we propose a trust verification process that checks this trust to avoid malicious activities. Our strategy incorporates a two-fold mechanism: an extrapolation method that sets thresholds for the detection of inconsistent behavior, followed by an unsupervised deep learning model trained on calibrated data, consistently evaluating variations in neighbor behavior. The effectiveness of our approach is supported using traffic data from the A4 Reims-Paris highway in France, with simulations performed in OMNeT++, SUMO and Artery environments. The performance of all considered methods was comparatively assessed under identical testing conditions
Mariyasagayam, Nestor. "Communication Véhiculaires par géolocalisation pour Systèmes de Transports Intelligents". Phd thesis, Ecole Polytechnique X, 2011. http://tel.archives-ouvertes.fr/tel-00613174.
Texto completo da fonteAmadou, Maranga Abdoulaye. "Techniques mixtes de positionnement et la navigation véhiculaire". Mémoire, Université de Sherbrooke, 2015. http://hdl.handle.net/11143/6921.
Texto completo da fonteWilhelm, Geoffrey. "Etude des interactions réseaux véhiculaires et Cloud". Thesis, Reims, 2018. http://www.theses.fr/2018REIMS032/document.
Texto completo da fonteVehicular Ad-hoc Networks (VANETs) are a new kind of networks which allow to connect vehicles between them and with the road infrastructures. It make possible to deploy safety applications (colision avoidance, roadworks advertisement, etc.), real time application (driver assistance, automated driving, etc.), comfort application (automatic toll payment, access to multimedia contents via internet, etc.). In order to be functioning completely, the vehicle needs more and more computing power and a connection with almost no interruption. To guarantee this constraints, VANETs are using more and more often the Cloud Computing. This thesis aims to explore the differents intereactions between VANETs and the Cloud
Schmidt-Knorreck, Carina. "Architectures radio-logicielles appliquées aux réseaux véhiculaires". Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0057.
Texto completo da fonteDealing with the requirements of reconfigurable radio architectures in the vehicular domain is a very challenging task. Solutions can be found in the context of Software Defined Radio (SDR). Under its umbrella, flexible hardware platforms that support a wide range of different wireless communication standards are designed. One of them is the OpenAirInterface ExpressMIMO platform that is developed by Eurecom and Télécom ParisTech. Main objectives of this thesis are to propose the first receiver chain prototype for ExpressMIMO, to assess the applicability of the platform for latency critical standards, to identify design bottlenecks and to propose and implement solutions to overcome the identified limitations. Standard of interest in this context is IEEE 802.11p which is required for the Car-to-Car communication. Our analysis reveals that the Front-End Processing (FEP) DSP engine is heavily charged and that the required configuration time outreaches the pure execution time for short vectors. To meet this challenge we introduce an Application Specific Instruction-Set Processor (ASIP) as the solution of choice when dealing with strong latency requirements. To complete the receiver chain we further present a first Preprocessor prototype which connects the external A/D and D/A converters with the remaining baseband engine. In this context we focus on a generic, flexible and hardware optimized Sample Rate Converter (SRC) that is operating on fractional ratios. As the combination of Car-to-Car and Car-to-Infrastructure communications within only device enables various new applications for future cars we finally investigate on a possible multimodal execution of 802.11p and DAB on the chosen target platform
Schmidt-Knorreck, Carina. "Architectures radio-logicielles appliquées aux réseaux véhiculaires". Thesis, Paris, ENST, 2012. http://www.theses.fr/2012ENST0057/document.
Texto completo da fonteDealing with the requirements of reconfigurable radio architectures in the vehicular domain is a very challenging task. Solutions can be found in the context of Software Defined Radio (SDR). Under its umbrella, flexible hardware platforms that support a wide range of different wireless communication standards are designed. One of them is the OpenAirInterface ExpressMIMO platform that is developed by Eurecom and Télécom ParisTech. Main objectives of this thesis are to propose the first receiver chain prototype for ExpressMIMO, to assess the applicability of the platform for latency critical standards, to identify design bottlenecks and to propose and implement solutions to overcome the identified limitations. Standard of interest in this context is IEEE 802.11p which is required for the Car-to-Car communication. Our analysis reveals that the Front-End Processing (FEP) DSP engine is heavily charged and that the required configuration time outreaches the pure execution time for short vectors. To meet this challenge we introduce an Application Specific Instruction-Set Processor (ASIP) as the solution of choice when dealing with strong latency requirements. To complete the receiver chain we further present a first Preprocessor prototype which connects the external A/D and D/A converters with the remaining baseband engine. In this context we focus on a generic, flexible and hardware optimized Sample Rate Converter (SRC) that is operating on fractional ratios. As the combination of Car-to-Car and Car-to-Infrastructure communications within only device enables various new applications for future cars we finally investigate on a possible multimodal execution of 802.11p and DAB on the chosen target platform
Sahraoui, Sélima. "Contribution à l'estimation des canaux relatifs aux signaux utile et interférent dans un système full-duplex dédié aux communications véhiculaires". Thesis, Valenciennes, 2019. http://www.theses.fr/2019VALE0008.
Texto completo da fonteIn this work of thesis, we propose new channel estimation approaches for a full-duplex system dédicated to vehicular communications. Both the self-interference (SI) and intended (SOI) channel are estimated. We propose different estimation méthods according to whether the pilots of the signals are transmitted jointly or separately. In the separate transmission, an estimation based on a new pilot configuration is proposed as well as a hybrid method which use both pilot configuration and training sequences.We also propose an optimisation of the conventional training-based method.It consists of improving the estimation of each training symbole. In the joint transmission, we propose two algorithms that aims to improve the estimation performances compared to the existing methods. In the first proposed method, the two channels are first estimated in the frequency domain using the Landweber iterations. The second proposition consists of using a projection matrix to manipulate only the pilots and avoid the noise that is caused by the SOI unknown datas. Finally, we propose a time and frequency-selective channel estimation for low and medium doppler frequency. Some of the proposed estimators are implemented on a real Full Duplex communication system which use Multi-reconfigurable antennas to perform the passive cancellation
Idir, Lilia. "Dissémination de données dans les réseaux véhiculaires". Electronic Thesis or Diss., Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCB157.
Texto completo da fonteThe number of vehicles on the roads in the world increased from 500 million in 1986 to 1 billion vehicles in 2010. Such a huge road network has brought some comfort to many drivers but on the other hand it represented around 1.24 million accidents in 2010. With the progress and development of wireless technologies these recent years, vehicular networks quickly evolved. Many car manufacturers and countries have built and imagined different applications in vehicular networks: road safety applications, others for traffic information, and entertainment applications. This last category of applications is distinguished from others by the quantity and volume of exchanged data, and represents a real problem due to the lossy nature of vehicular communications. In this thesis, we address the problem of data dissemination in distributed vehicular systems. Our main objective is to provide practical and workable solutions to disseminate data in realistic vehicular environments. The concept of data dissemination is large and significant. In this context, we call data dissemination each time there is a certain amount of data which must be distributed on in wireless network. The data is sent to multiple destinations who are interested to recover all or part of the information. As examples, we can consider the file sharing applications, streaming multimedia files and so on. We discuss in this thesis the data dissemination problem in vehicular networks, specifically the dissemination of large volumes of data such as content distribution. With the evolution in recent years of vehicular networks thanks to many car manufacturers support (eg Toyota, Nissan, BMW, Ford, etc.), the amount of exchanged data has increased exponentially over the years. Unfortunately, despite the advancement of wireless communications technologies, exchange large volumes of data in vehicular networks remains a challenge because of wireless communications features and those specific to vehicular networks
Gu, Pengwenlong. "Détection des comportements malveillants dans les réseaux véhiculaires". Electronic Thesis or Diss., Paris, ENST, 2018. https://pastel.hal.science/tel-03689506.
Texto completo da fonteThis thesis has been dedicated to addressing the misbehaviour detection problem in vehicular networks. Specifically, we focus on two major issues in PHY layer and application layer respectively: Radio Frequency (RF) Jamming attacks and Sybil attacks. Specifically, we adopted three different machine learning methods including Distance based clustering, Support Vector Machine (SVM) and k-nearest neighbours (kNN) in Sybil nodes detection. Based on variation between benign vehicles and Sybil nodes in their driving patterns, the non-existent virtual nodes can be detected. For RF jamming attacks, we focused on the design of countermeasure for the control channel jamming issue in vehicular networks, which is of vital importance to the safety of I2V communications. We proposed to adopt the cooperative relaying techniques to address the control channel jamming problem in vehicular networks, which is based on the idea that the vehicles outside of the jamming area can serve as relays to help forward the control channel signal to the victim vehicles through other the jamming-free service channels. Thus, we extended the jamming issues in multi-antenna RSU scenarios, where the RSU can serve multiple groups of vehicles simultaneously using the multi-group multicast beamforming technique. As a solution, we propose a two stage anti-jamming scheme, whereby the vehicles who have successfully decoded the signal received in the first stage will be selected as relays to cooperatively serve the victim vehicles in the second stage using the coordinated beamforming techniques over a jamming-free service channel
Idir, Lilia. "Dissémination de données dans les réseaux véhiculaires". Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCB157.
Texto completo da fonteThe number of vehicles on the roads in the world increased from 500 million in 1986 to 1 billion vehicles in 2010. Such a huge road network has brought some comfort to many drivers but on the other hand it represented around 1.24 million accidents in 2010. With the progress and development of wireless technologies these recent years, vehicular networks quickly evolved. Many car manufacturers and countries have built and imagined different applications in vehicular networks: road safety applications, others for traffic information, and entertainment applications. This last category of applications is distinguished from others by the quantity and volume of exchanged data, and represents a real problem due to the lossy nature of vehicular communications. In this thesis, we address the problem of data dissemination in distributed vehicular systems. Our main objective is to provide practical and workable solutions to disseminate data in realistic vehicular environments. The concept of data dissemination is large and significant. In this context, we call data dissemination each time there is a certain amount of data which must be distributed on in wireless network. The data is sent to multiple destinations who are interested to recover all or part of the information. As examples, we can consider the file sharing applications, streaming multimedia files and so on. We discuss in this thesis the data dissemination problem in vehicular networks, specifically the dissemination of large volumes of data such as content distribution. With the evolution in recent years of vehicular networks thanks to many car manufacturers support (eg Toyota, Nissan, BMW, Ford, etc.), the amount of exchanged data has increased exponentially over the years. Unfortunately, despite the advancement of wireless communications technologies, exchange large volumes of data in vehicular networks remains a challenge because of wireless communications features and those specific to vehicular networks
Thierry, Philippe. "Systèmes véhiculaires à domaines de sécurité et de criticité multiples : une passerelle systronique temps réel". Thesis, Paris Est, 2014. http://www.theses.fr/2014PEST1102/document.
Texto completo da fonteNowadays, vehicular systems are composed of more and more interconnected systems. Those systems manage a lot of complex functions and must comply with various safety-critical requirements (such as real-time) but also more and more with security requirements. With the new connected vehicles, it is necessary to make these various systems communicate, in order to manage locally or remotely the overall vetronic system. Make these systems communicate, moreover in military vehicles, implies to support various constraints. Theses constraints need to be supported by specific elements, used as gateways between each vehicle system needing external communication. This gateway has to protect each system in term of safety and security, but also has to guarantee an efficient upper-bounded transfer between them. In this thesis, we have proposed a software architecture for these gateways, compliant with the various vehicular security and safety requirements. The solution is proposed as a framework, supporting a modular configuration and able to aggregate various modules on a partitioned software architecture. Such an aggregation is then able to respond to the various vehicular specific needs such as security and real-time
Hasrouny, Hamssa. "Gestion de confiance et solutions de sécurité pour les réseaux véhiculaires". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0001.
Texto completo da fonteVANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular framework for Misbehavior Detection and Revocation Management
Mezghani, Farouk. "La dissémination de contenus dans les réseaux véhiculaires". Phd thesis, Toulouse, INPT, 2015. http://oatao.univ-toulouse.fr/14471/1/Mezghani_Farouk_INPT.pdf.
Texto completo da fonteTan, Heng Chuan. "Vers des communications de confiance et sécurisées dans un environnement véhiculaire". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0063.
Texto completo da fonteRouting and key management are the biggest challenges in vehicular networks. Inappropriate routing behaviour may affect the effectiveness of communications and affect the delivery of safety-related applications. On the other hand, key management, especially due to the use of PKI certificate management, can lead to high latency, which may not be suitable for many time-critical applications. For this reason, we propose two trust models to assist the routing protocol in selecting a secure end-to-end path for forwarding. The first model focusses on detecting selfish nodes, including reputation-based attacks, designed to compromise the “true” reputation of a node. The second model is intended to detect forwarders that modify the contents of a packet before retransmission. In key management, we have developed a Secure and Authentication Key Management Protocol (SA-KMP) scheme that uses symmetric cryptography to protect communication, including eliminating certificates during communication to reduce PKI-related delays
Toufga, Soufian. "Vers des réseaux véhiculaires (VANET) programmables grâce à la technologie SDN (software defined network)". Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30128.
Texto completo da fonteThe vehicular network concept, which initially focused on vehicle-to-vehicle communication, is opening up to other types of communications involving vehicles and infrastructure (network), cloud or pedestrians, etc. to meet the needs of the wide variety of new applications envisaged in the framework of the Intelligent Transportation System (ITS). The multitude of network access technologies, the very high mobility of vehicles and their high density in urban areas, and the predominance of wireless communications make it a heterogeneous network, with very dynamic characteristics, some of which are difficult to predict, and subject to scalability problems. Given these issues, one direction, considered by the scientific community, is to apply the SDN (Software Defined Network) paradigm to vehicular networks as a means of, on the one hand, enabling the hybridization and unification of control of different network access technologies and, on the other hand, taking advantage of the centralized view of the network and contextual data from the cloud to develop new control algorithms that can potentially rely on the prediction/estimation of the network state and thus anticipate certain control decisions. Therefore, this thesis is part of this framework. Its contributions aim at developing the concept of SDVN (Software Defined Vehicular Network). Four contributions are developed. The first one specifies the architecture of a hybrid SDN vehicular network capable of meeting the challenges described above. This architecture is complemented by an SDN controller placement solution. We propose a dynamic approach capable of adjusting the optimal placement of controllers according to network topology changes due to road traffic fluctuations. This work also covers the problem of global network vision that an SDN controller can build up, which is a prerequisite and the cornerstone of any network control function. To this problem, we propose amendments and extensions to the "de facto" topology discovery service designed for wired networks to adapt it to the vehicular context. As a complement to the discovery service, we also propose a topology estimation service based on Machine Learning techniques to provide network control functions with a potential vision of the future state of the network and thus open them to proactive and intelligent network control
Hrizi, Fatma. "Mécanismes de contrôle pour les applications coopératives de sécurité routière dans les systèmes de transport intelligents". Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00998531.
Texto completo da fonteMiao, Lusheng. "Ordonnancement et qualité de service dans les réseaux sans fil véhiculaires". Thesis, Paris Est, 2014. http://www.theses.fr/2014PEST1163/document.
Texto completo da fonteVehicular ad-hoc Networks (VANETs) are becoming more and more popular as a means to increase the traffic safety and comfort. VANETs have some characteristics due to the vehicle's high speeds mobility such as rapid changes of topology, potentially large-scale, veritable network density and so on. These characteristics have important implications for design of MAC protocol in VANETs. 802.11p standard are attracting increasingly more attention as an important part of the WAVE protocol in VANETs. However the QoS of 802.11p standard can not yet meet the requirements of the realistic vehicular communication networks. Three sub-problems are identified in this study: (i) CCH and SCHs duty cycle problem, (ii) QoS analysis problem and (iii) Multichannel MAC protocol designing problem. Based on these problems, three approaches are proposed in this study: (i) To propose a duty cycle adaptive MAC protocol in which the duty cycle of CCH and SCH will be adapted based on the realtime network traffic; (ii) To propose a model to analyze the QoS in VANETs with various SCH interval settings; (iii) To propose a scheduling and QoS enhancement multi-channel MAC protocol in VANETs. All the proposed algorithms are implemented and validated in discrete event simulator. The simulation results demonstrate that the important QoS metrics such as the reliability, throughput, successful throughput, network capacity and channel utilization are improved by the proposed algorithms in this project
Tan, Heng Chuan. "Vers des communications de confiance et sécurisées dans un environnement véhiculaire". Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0063/document.
Texto completo da fonteRouting and key management are the biggest challenges in vehicular networks. Inappropriate routing behaviour may affect the effectiveness of communications and affect the delivery of safety-related applications. On the other hand, key management, especially due to the use of PKI certificate management, can lead to high latency, which may not be suitable for many time-critical applications. For this reason, we propose two trust models to assist the routing protocol in selecting a secure end-to-end path for forwarding. The first model focusses on detecting selfish nodes, including reputation-based attacks, designed to compromise the “true” reputation of a node. The second model is intended to detect forwarders that modify the contents of a packet before retransmission. In key management, we have developed a Secure and Authentication Key Management Protocol (SA-KMP) scheme that uses symmetric cryptography to protect communication, including eliminating certificates during communication to reduce PKI-related delays
Hasrouny, Hamssa. "Gestion de confiance et solutions de sécurité pour les réseaux véhiculaires". Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0001/document.
Texto completo da fonteVANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular framework for Misbehavior Detection and Revocation Management
Abdl, Ghani Hasan. "Synthèse d’algοrithmes d’estimatiοn intelligents en vue du cοntrôle de trajectοire d’une flοtte de véhicules autοnοmes en platοοning (cοnvοi)". Electronic Thesis or Diss., Normandie, 2024. http://www.theses.fr/2024NORMR088.
Texto completo da fonteThis thesis explores advanced observer designs to improve state estimation and system performance in vehicle dynamic environments. The research is divided into three parts, where each part focuses on a specific aspect of observer design and its practical application to ground vehicles.Part One introduces a novel observer design using a multi-layer neural network for autonomous ground vehicles. This part of the study proposes a continuous-discrete time neural network observer, that is designed for systems that have significant non-linearity and without the necessity for prior knowledge of system dynamics. The observer, which is designed as a three-layer feedforward neural network, trained using the error backpropagation learning algorithm, and enhanced with an e-modification term for robustness. A closed-loop output predictor is added to the design of the neural network observer to solve the challenge of discrete time measurement in vehicle systems.Part two of this thesis introduces a novel approach using radial basis function neural networks, which is used to enhance observer designs for nonlinear dynamic systems. In this part, we propose a new weight updating function that improves the performance of RBF networks, which was designed for systems with both partially or completely unknown dynamics. The proposed observers are also designed to manage the discrete-time measurements with delay measurements to ensure accurate state estimation and improved performance of the system under these conditions.Part Three focuses on robust platooning in multi-agent systems to address the challenges that are posed by internal and communication delays, measurements uncertainties, and the system heterogeneity. A consensus-based high-gain observer and a novel-based observer are presented to enhance the stability and coordination of platoons under different conditions. These methods here are validated by extensive simulations that shows the efficiency of the observers to maintain synchronization and robustness under challenging scenarios.Overall, this thesis contributes in the field of ground vehicle control systems that offers valuable understanding and practical solutions for developing advanced observer systems that are capable of solving the complexities of modern vehicle dynamics
Hamouda, Ossama Mohamed Fawzi. "Modélisation et évaluation de la sûreté de fonctionnement d'applications véhiculaires basées sur des réseaux ad-hoc mobiles". Toulouse 3, 2010. http://thesesups.ups-tlse.fr/998/.
Texto completo da fonteThis thesis focuses on developing methods and models making it possible to evaluate quantitative measures characterizing the dependability of mobile services as perceived by the users. These models and measures are aimed at providing support to the designers during the selection and analysis of candidate architectures that are well suited to fulfill the dependability requirements. We consider the case of vehicular applications using inter-vehicle communications based on ad-hoc networks and may have access to services located on fixed infrastructure. We propose an approach combining: 1) dependability models based on stochastic activity networks, in order to describe the system failure modes and associated recovery mechanisms, and 2) simulation and analytical models allowing the estimation of connectivity characteristics, taking into account different mobility scenarios and environment. This approach is illustrated on three case studies including a virtual black box based on cooperative data replication and backup, and an automated highway system (Platooning application)
Petit, Jonathan. "Surcoût de l'authentification et du consensus dans la sécurité des réseaux sans fil véhiculaires". Phd thesis, Toulouse 3, 2011. http://thesesups.ups-tlse.fr/1587/.
Texto completo da fonteIn 2007, road accidents have cost 110 deaths, 4600 injuries and €438 millions daily in the European Union. The damage is similarly devastating in the United States with 102 deaths, 7900 injuries and 30 millions daily. Therefore, industry consortia, governments, and automotive companies, have made the reduction of vehicular fatalities a top priority. To raise this challenge, a main idea is to make vehicles and roads smarter thanks to wireless communications. Indeed, wireless communications will increase the line-of-sight of the driver and make vehicles aware of their environment. Smart vehicles and roads will form a wireless vehicular network (VANET). The VSC Project details 75 applications that could be deployed on vehicular networks. Applications are divided in three categories: safety-related, traffic optimization and infotainment. Automotive safety-related applications aim to assist drivers in avoiding vehicular accidents, by providing advisories and early warnings to drivers, using broadcast vehicle-to-vehicle (V2V) communications. Vehicles typically communicate as per the Dedicated Short Range Communication standard (DSRC), and broadcast messages in response to certain notified events (emergency message) or periodically (beacon message). In this thesis, we focus on V2V communications in Local Danger Warning (LDW) application, which is considered one of the most promising active safety applications for inter-vehicle communication. Since drivers of vehicles participating in V2V communications are expected to act on messages received from other participants, it is clearly necessary that these messages be transmitted in a secure fashion. Unfortunately, security mechanisms come with overhead that impact the performance of the V2V communications, and hence that of the safety applications. The IEEE 1609. 2 standard for vehicular ad hoc networks is based on the ECDSA algorithm for supporting the authentication mechanism. The main goal of this work is to define a formula, which assesses the authentication overhead in VANET. We also introduce the problem of consensus, which is an additional mechanism that impacts the total time overhead of ECDSA. Indeed, when you receive a message, you could legitimately ask: "Should I trust this message?". The consensus aims at increasing trust. But consensus mechanism comes with overheads. We investigate the network performance and propose new decision methods and techniques to reduce these overheads
Khoder, Rami. "Etude de la mobilité et de la qualité de service des communications véhiculaires optiques". Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG045.
Texto completo da fonteThe thesis topic is a part of the global interest in wireless vehicular networks. Over the past decade, the number of road accidents has increased quickly with the growth of the automotive sector. Statistics have demonstrated that the high number of accidents on the road is primarily due to the high traffic density and the lack of information about other drivers' decisions. Recent studies have shown the importance of vehicular communications, which allow the exchange of real-time traffic safety information between vehicles and thus contribute to accidents avoidance.Through vehicular communication, known as vehicle-to-everything (V2X), which includes vehicle-to-vehicle (V2V) and vehicle-to-infrastructure, vehicles can exchange road safety and traffic management messages with low latency. Platoon formation is considered an interactive option that can improve V2X communication and ensure more safety. The vehicle platoon is defined as a group of vehicles following each other, moving in a straight line with a very short inter-vehicle space. Several vehicle platoon formation strategies have been defined in order to manage the platoon's lifetime and stability. However, none of these strategies has taken into account traffic congestion and speed constraints.The first objective of our work is to propose a new platoon formation algorithm called speed platoon splitting (SPS) where vehicles are grouped according to their destination (the leading vehicle has the farthest destination and the latest vehicle has the nearest destination). The main purpose of SPS is to target alleviating congestion by using a ticket pool and classify platoons according to their velocity in two different lanes. Performance analysis shows that SPS provides platoon stability and reduces highway congestion.V2X communications can be achieved via radio frequency (RF) technologies, especially the 802.11p standard. However, due to the accelerated growth in the number of devices, this technology suffers from several problems such as high latency and channel congestion. An alternative communication solution is provided by visible light communication (VLC). VLC is the usage of visible light as a wireless data transmission technique. VLC reduces complexity and cost, enables high precision positioning and increases network scalability and security.The second objective of this thesis tackles the performance of VLC in V2V among the platoon members. For this purpose, we considered two mathematical models validated by simulations for two different scenarios (we have taken an M/M/1 and an M/GI/1 queues for the first and the second scenarios respectively). The performance evaluations present a detailed study of the VLC in the presence of disruptive vehicles and they are used to derive computations of the Quality of Service parameters. The main conclusion drawn is that VLC technology is considered an efficient technique but it is affected by disruptive vehicles.The third objective of the thesis focuses on proposing a mechanism for vertical handover (VHO) between VLC and RF technologies. This objective is composed of two parts, the first one is based on the threshold value to make a vertical handover decision or by using machine learning techniques. The second part is to choose the appropriate technology after VHO using the utility function or the cooperative game.Throughout the thesis, the performance evaluation of the VLC is based on mathematical modelling. Moreover, the simulation is performed to validate this mathematical modelling
Petit, Jonathan. "Surcoût de l'authentification et du consensus dans la sécurité des réseaux sans fil véhiculaires". Phd thesis, Université Paul Sabatier - Toulouse III, 2011. http://tel.archives-ouvertes.fr/tel-00609445.
Texto completo da fonteAhmad, Abdel Mehsen. "Techniques de transmission et d'accès sans fil dans les réseaux ad-hoc véhiculaires (VANETS)". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2012. http://www.theses.fr/2012TELE0036.
Texto completo da fonteVehicular networks are the subject of active research in the field of networks as well as transport. The potential for vehicular networks to provide services such as traffic information in real time or accident makes this technology a very important research domain. These networks may support vehicle-to-vehicle communications (V2V), vehicle-to-infrastructure (V2I), or a combination of both. The IEEE 1609.4 is the specification of multichannel operations for IEEE802 .11p/WAVE vehicular networks (VANETs). It uses seven channels; one being a control channel (CCH) which is listened periodically by the vehicles and the other six channels are used as service channels (SCH). It also defines a time division between alternating CCH and SCH intervals. The purpose of this thesis is to evaluate the performance of VANETs in the case of vehicular communications without infrastructure, and at the lower layers of IEEE 802.11p standard. In the first part, we propose an opportunistic multichannel MAC allocation in an environment without infrastructure. This approach is consistent with the standard IEEE1609.4 -2010/WAVE for a multi-channel operation, and it is designed for data services applications (non-urgent), while ensuring the transmission of road safety messages and control packets. To maintain the quality of service of the two types of messages (urgent and non-urgent) by exploiting the channel capacity, two solutions are proposed. In the second part, when the vehicle selects its channel and controls its temporal alternation between CCH and SCH, it starts transmitting its packets, particularly on the CCH, which have an expiration time. We present an approach to minimize collisions between transmitters while avoiding contention at the beginning of CCH interval, especially in a context of high vehicular density. Although the mechanisms proposed above reduce the collision rate, it is not possible to completely remove these collisions. In the third part, we address the problem of collisions between broadcast packets on the CCH, especially when the load of transmitted messages exceeds the channel capacity. For this purpose, we propose a new analog network coding mechanism adapted to QPSK modulation for broadcast messages on the CCH. In this approach, known symbols are sent before sending the packets to estimate the channel parameters and an explicit solution is used to reverse the system of the superposition of two packets
Ribouh, Soheyb. "Identification de l'environnement basée sur l'estimation de canal et génération de clés de sécurité pour les communications véhiculaires". Thesis, Valenciennes, Université Polytechnique Hauts-de-France, 2020. http://www.theses.fr/2020UPHF0029.
Texto completo da fonteAutonomous connected vehicles are expected to see prevalent usage as part ofthe next generation of transportation systems and the smart road vision Since thevehicular environment is highly mobile, the transmitted messages are affected by thewireless channel effect. This makes channel estimation one of the challenging tasksin Vehicle-To-Everything (V2X) communications. In this context, we propose a novelMultiple Sequential Constraint Removal (MSCR) algorithm of channel estimation,dedicated to OFDM systems based-V2X communications. In addition, identifyingthe environment where the vehicle is driving along is quite important in order toallow the vehicle to make the correct self- driving decisions. Thus by exploiting theestimated wireless channel characteristics, we propose a novel vehicular environmentidentification approach based on deep learning, where the estimated channel stateinformation (CSI) are used as input features for the proposed model. Besides that,as the vehicular environment is open access exchanged messages through V2X communicationare vulnerable to attacks. Therefore, we propose a novel physical layerkey generation algorithm in order to secure vehicular communications, where the CSIvalues are used as a source of randomness. Our key generation algorithm has beenimplemented on USRP Software-Defined Radios (SDR) cards and has been tested ona real-world testbed vehicular environment. The performance evaluation results of allthe proposed methods (MSCR channel estimation algorithm, environment identificationsapproach, and key generation algorithm), show that they meet the performancesrequired in a vehicular environment
Ahmad, Abdel Mehsen. "Techniques de transmission et d'accès sans fil dans les réseaux ad-hoc véhiculaires (VANETS)". Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00762633.
Texto completo da fonteBelmekki, Baha Eddine Youcef. "Interference modeling of wireless cooperative systems". Thesis, Toulouse, INPT, 2020. http://www.theses.fr/2020INPT0052.
Texto completo da fonteThe main goal of this thesis is to study the impact of interference on cooperative vehicular communications (VCs) with the aid of stochastic geometry tools. This thesis also proposes a framework to model interference in cooperative VCs. First, we study the effects of interference dependence on the received node for several transmission schemes, different channel models, and two mobility models. The performance in terms of outage probability is investigated. Second, we investigate the improvement of using non-orthogonal multiple access (NOMA) in the performance in terms of outage probability and average achievable rate for several transmission schemes. The results show that NOMA improves significantly the performance. We also investigate conditions in which NOMA outperforms OMA. Finally, studies are conducted: 1) an adaptive cooperative NOMA protocol is proposed, 2) an analysis of millimeter waves (mmWave) vehicular networks is carried out, 3) extension scenarios are investigated such as multiple relays, multiple hops, or multiples lanes
Dahmouni, Nor El Islam. "Caractérisation multidimensionnelle du canal de propagation et contribution de l'intelligence artificielle à la classification des scénarios de propagation pour les communications véhiculaires". Electronic Thesis or Diss., Université de Lille (2022-....), 2024. http://www.theses.fr/2024ULILN014.
Texto completo da fonteOver the past few years, mobile networks have significantly improved theirperformance, especially with the advent of 5G offering much higher data rate than4G. These advancements are attributable to technological progress in various areassuch as integrated antenna systems and electronic components that combine highresponse time with low power consumption. 5G ushers in an era of diversifiedservices including the Internet of Things (IoT) and vehicular communications, fromVehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V). In this context, 5Gintroduces a class of communication (URLLC) offering ultra-low latency andincreased reliability.To enhance the performance of 5G in terms of spectral efficiency, the number ofusers, and latency time, research began in October 2022 as part of the 3GPP Release18 with the goal of exploring the potential that Artificial Intelligence (AI) andMachine Learning (ML) models could bring to the radio interface. This project aimsto optimize the channel estimation technique and resource allocation, as well aspositioning accuracy.As part of these studies, this thesis focuses on V2I links in suburban environmentsand tunnels. Its objective is to create an experimental database of the most relevantparameters of the propagation channel, which will then allow for the training of MLmodels. On this point, the state of the art only concerns indoor environments or theurban environment with satellite links.The originality of the work lies in : i) measurement campaigns carried out inrealistic environments and scenarios, ii) the multidimensional characterization(time-space-frequency-polarization) of the propagation channel considering MIMO(Multiple Input Multiple Output-MIMO) antenna networks at the transmission andreception, iii) the analysis of the temporal and spatial variability of MIMO channels,and, iv) the adaptation of machine learning models for the classification ofpropagation scenarios.These works have led to the creation of an experimental database obtained fromthe exploitation of measurements made in suburban sites and tunnels, andrespectively on approximately 100k and 200k V2I channel matrices. The ML modelfor the classification of propagation scenarios, either in line of sight (LOS) or Non lineof sight (NLOS), shows prediction performances of 97.9% ; the number of points inLOS and NLOS is balanced to feed the model
Thomas, Kévin. "Communications Bluetooth pour les Systèmes de Transport Intelligents Coopératifs". Thesis, Reims, 2020. http://www.theses.fr/2020REIMS016.
Texto completo da fonteThis thesis proposes a solution to transmit traffic information via Wireless Personal Area Networks (WPAN).Through this thesis, we propose a communication architecture that fits within the Cooperative Intelligent Transport Systems (C-ITS). This architecture will use Bluetooth Low Energy (BLE) to transmit traffic information. In addition, we have adapted the Decentralized Event Notification Message (DENM) message known from the C-ITS world to be sent in a BLE network. This adaptation provides sufficient vital information to ensure the characterization of an event. This architecture is validated by road tests.Then, we will present solutions to identify the path on which the event takes place. They must allow vehicles to know if the event is on the lane on which they are travelling. These solutions are the subject of experiments. We have selected those that give the best performance.We shall present an extended architecture proposing the extension of the coverage of our network by installing intermediate stations. These stations make it possible to consider different functionalities to be added to the architecture
Hrizi, Fatma. "Mécanismes de contrôle pour les applications coopératives de sécurité routière dans les systèmes de transport intelligents". Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0081.
Texto completo da fonteIn the last decades, Intelligent Transportation Systems (ITS) have been considered as one of the most emerging research area due to their promising role in promoting traffic efficiency and enhancing road safety. ITS cooperative safety applications, being the most vital and critical, have gained a lot of attention. The effectiveness of these applications depends widely on the efficient exchange of two main types of information. The periodic awareness corresponding to the one-hop location information of surrounding environment and the multi-hop event-driven information generated at the detection of a safety situation. Due to the large scale characteristic of ITS, this information is expected to be subject to severe congestion which might impact its reliable reception. The goal of this thesis is to focus on the reliable and robust control of safety-related information by reducing the channel congestion and at the same time taking into account the requirements of safety applications. We address first the event-driven safety information. We proposed a multi-hop policy showed to improve the dissemination of the event-driven information. However, it remains strongly sensitive to the channel load resulting from periodic awareness transmissions. On the other hand, the effective transmission of event-driven information depends primarily on the accurate detection of safety events and accordingly on the accuracy of awareness. Thus, we provide an efficient awareness control mechanism in order to provide better accuracy and limit the channel congestion. The approaches proposed in this thesis have deeply investigated the trade-off between ensuring the requirements of cooperative safety and the efficient management of congestion in vehicular network
Baron, Benjamin. "Transport intermodal de données massives pour le délestage des réseaux d'infrastructure". Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066454/document.
Texto completo da fonteIn this thesis, we exploit the daily mobility of vehicles to create an alternative transmission medium. Our objective is to draw on the many vehicular trips taken by cars or public transports to overcome the limitations of conventional data networks such as the Internet. In the first part, we take advantage of the bandwidth resulting from the mobility of vehicles equipped with storage capabilities to offload large amounts of delay-tolerant traffic from the Internet. Data is transloaded to data storage devices we refer to as offloading spots, located where vehicles stop often and long enough to transfer large amounts of data. Those devices act as data relays, i.e., they store data it is until loaded on and carried by a vehicle to the next offloading spot where it can be dropped off for later pick-up and delivery by another vehicle. We further extend the concept of offloading spots according to two directions in the context of vehicular cloud services. In the first extension, we exploit the storage capabilities of the offloading spots to design a cloud-like storage and sharing system for vehicle passengers. In the second extension, we dematerialize the offloading spots into pre-defined areas with high densities of vehicles that meet long enough to transfer large amounts of data. The performance evaluation of the various works conducted in this thesis shows that everyday mobility of entities surrounding us enables innovative services with limited reliance on conventional data networks
Bouyahia, Tarek. "Metrics for security activities assisted by argumentative logic". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0013/document.
Texto completo da fonteThe growth and diversity of services offered by modern systems make the task of securing these systems a complex exercise. On the one hand, the evolution of the number of system services increases the risk of causing vulnerabilities. These vulnerabilities can be exploited by malicious users to reach some intrusion objectives. On the other hand, the most recent competitive systems are those that ensure a certain level of performance and quality of service while maintaining the safety state. Thus, modern security systems must consider the user requirements during the security process.In addition, reacting in critical contexts against an attack after its execution can not always mitigate the adverse effects of the attack. In these cases, security systems should be in a phase ahead of the attacker in order to take necessary measures to prevent him/her from reaching his/her intrusion objective. To address those problems, we argue in this thesis that the reaction process must follow a smart reasoning. This reasoning allows the system, according to a detected attack, to preview the related attacks that may occur and to apply the best possible countermeasures. On the one hand, we propose an approach that generates potential attack scenarios given a detected alert. Then, we focus on the generation process of an appropriate set of countermeasures against attack scenarios generated among all system responses defined for the system. A generated set of countermeasures is considered as appropriate in the proposed approach if it presents a coherent set (i.e., it does not contain conflictual countermeasures) and it satisfies security administrator requirements (e.g., performance, availability). We argue in this thesis that the reaction process can be seen as two agents arguing against each other. On one side the attacker chooses his arguments as a set of actions to try to reach an intrusion objective, and on the other side the agent defending the target chooses his arguments as a set of countermeasures to block the attacker's progress or mitigate the attack effects. On the other hand, we propose an approach based on a recommender system using Multi-Criteria Decision Making (MCDM) method. This approach assists security administrators while selecting countermeasures among the appropriate set of countermeasures generated from the first approach. The assistance process is based on the security administrator decisions historic. This approach permits also, to automatically select appropriate system responses in critical cases where the security administrator is unable to select them (e.g., outside working hours, lack of knowledge about the ongoing attack). Finally, our approaches are implemented and tested in the automotive system use case to ensure that our approaches implementation successfully responded to real-time constraints
Baron, Benjamin. "Transport intermodal de données massives pour le délestage des réseaux d'infrastructure". Electronic Thesis or Diss., Paris 6, 2016. http://www.theses.fr/2016PA066454.
Texto completo da fonteIn this thesis, we exploit the daily mobility of vehicles to create an alternative transmission medium. Our objective is to draw on the many vehicular trips taken by cars or public transports to overcome the limitations of conventional data networks such as the Internet. In the first part, we take advantage of the bandwidth resulting from the mobility of vehicles equipped with storage capabilities to offload large amounts of delay-tolerant traffic from the Internet. Data is transloaded to data storage devices we refer to as offloading spots, located where vehicles stop often and long enough to transfer large amounts of data. Those devices act as data relays, i.e., they store data it is until loaded on and carried by a vehicle to the next offloading spot where it can be dropped off for later pick-up and delivery by another vehicle. We further extend the concept of offloading spots according to two directions in the context of vehicular cloud services. In the first extension, we exploit the storage capabilities of the offloading spots to design a cloud-like storage and sharing system for vehicle passengers. In the second extension, we dematerialize the offloading spots into pre-defined areas with high densities of vehicles that meet long enough to transfer large amounts of data. The performance evaluation of the various works conducted in this thesis shows that everyday mobility of entities surrounding us enables innovative services with limited reliance on conventional data networks
Mejri, Mohamed Nidhal. "Securing Vehicular Networks Against Denial of Service Attacks". Thesis, Sorbonne Paris Cité, 2016. http://www.theses.fr/2016USPCD038/document.
Texto completo da fonteIn this thesis we interested in securing Vehicular Ad hoc Networks (VANETs) against Denial of Service attacks (DoS) judged to be the most dangerous attacks to such networks. Our work can be divided into three main parts. First, we studied all the various possible existing vulnerabilities to which are exposed VANETs, we focused especially on denial of service attacks. Based on our expertise in cryptography, we explored, identified and classified the possible solutions to a wide range of VANET security breaches from a cryptographic point of view. Indeed, we showed that cryptography with its primitives and fairly powerful tools solves many VANET security problems. Our first contribution in this direction is a secure group key generation algorithm for VANET platoons. In our second contribution, we have developed two new techniques to detect denial of service attacks in VANET networks mainly characterized by the high mobility and frequent disconnections which considerably complicate the detection. Our first detection algorithm is based on the linear regression mathematical concept, fuzzy logic and three newly defined VANET appropriate metrics. In our second algorithm we define a new Shannon Entropy based metric that we introduced for the first time to detect DoS attacks in VANET. Our third contribution was devoted to the reaction against the detected attacks. For that, we used the techniques offered by game theory. We have proposed two non-cooperative reaction games in strategic and extensive forms. For both detection and reaction proposed schemes, experiments were made essentially for the greedy behavior and jamming attacks. All our proposed algorithms present the advantage of rapidity, to be executed by any node of the network and do not require any modification of the 802.11p MAC layer protocol used as a standard for VANETs. In this work, we have participated in securing VANETs, however we believe that much remains to be done. Namely, for example the study of cryptographic solutions we have conducted, allowed us to discover how the use of cryptography for VANET security is a fairly broad topic which needs to be better explored. This will be for us a very promising subject
Chebbi, Emna. "De la modélisation formelle à la simulation à évènements discrets : application à la conception et à l'évaluation de protocoles sûrs et sécurisés pour les communications dans les transports". Thesis, Littoral, 2019. http://www.theses.fr/2019DUNK0538.
Texto completo da fonteThe design of communication protocols is generally based on functional models developed from the system needs. In Intelligent Transport Systems (ITS), the studied functionalities include self-organization, routing, reliability, quality of service and security. Simulation evaluations of ITS protocols mainly focus on performance in specific scenarios. However, the evolution of transportation towards autonomous vehicles requires robust protocols offering guarantees on some of their properties. Formal approaches make it possible to provide automatic proof of certain properties, but for others it is necessary to use interactive proof involving the knowledge of an Expert. The work carried out in this thesis aims to develop, in the DEVS formalism (Discrete Event System Specification), models of an ITS whose simulation would make it possible to observe the properties, possibly verified by a formal approach, in a broader scenario and to generate data on the models that could feed an interactive proof loop instead of an Expert. Targeting the CBL-OLSR (Chain-Branch-Leaf in Optimized Link State Routing) protocol, this thesis shows how a DEVS model and an equivalent formal Event-B model can be built from the same functional specification of an ad hoc network where nodes use this protocol. Safety and security properties are introduced into the formal Event-B model to be verified, and a methodology is proposed to transfer them to an equivalent DEVS model in the form of constraints, choices or observables according to preproposed criteria. Finally, this thesis also opens up the prospects for automating this design process, integrating real data on both road traffic and vehicle application flows into DEVS simulation, and interacting with specialized simulators for the various components (e. g. MATLAB for propagation models, OPNET or NS3 for communications, SUMO for mobility models); the aim being to evaluate the protocol in a very realistic system context
Diao, Xunxing. "A resource-aware embedded commucation system for highly dynamic networks". Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2011. http://tel.archives-ouvertes.fr/tel-00715649.
Texto completo da fonteLebre, Marie-Ange. "De l'impact d'une décision locale et autonome sur les systèmes de transport intelligent à différentes échelles". Thesis, Lyon, 2016. http://www.theses.fr/2016LYSEI007/document.
Texto completo da fonteIn this thesis we present vehicular applications across different scales: from small scale that allows real tests of communication and services; to larger scales that include more constraints but allowing simulations on the entire network. In this context, we highlight the importance of real data and real urban topology in order to properly interpret the results of simulations. We describe different services using V2V and V2I communication. In each of them we do not pretend to take control of the vehicle, the driver is present in his vehicle, our goal is to show the potential of communication through services taking into account the difficulties outlined above. In the small scale, we focus on a service with a traffic light that improves travel times, waiting times and CO2 and fuel consumption. The medium scale is a roundabout, it allows, through a decentralized algorithm, to improve the same parameters. It also shows that with a simple and decentralized decision-making process, the system is robust to packet loss, density, human behavior or equipment rate. Finally on the scale of a city, we show that local and decentralized decisions, with only a partial access to information in the network, lead to results close to centralized solutions. The amount of data in the network is greatly reduced. We also test the response of these systems in case of significant disruption in the network such as roadworks, terrorist attack or natural disaster. Models, allowing local decision thanks to information delivered around the vehicle, show their potential whatsoever with the V2I communication or V2V
Abualhoul, Mohammad. "Communications par lumière visible et radio pour la conduite coopérative autonome : application à la conduite en convois". Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEM084/document.
Texto completo da fonteThis thesis effort contributes to the autonomous vehicular communication and urban mobility improvements. The work addresses the main radio-based V2V communication limitations and challenges for ITS hard-safety applications and intends to deploy the vehicular lighting system as a supportive communication solution for platooning of IVC-enabled autonomous vehicles. The ultimate objectives of this Ph.D research are to integrate the VLC system within the existing C-ITS architecture by developing a VLC prototype, together with sufficient, hand-over algorithms enabling VLC, RF, and perception-based solutions in order to ensure the maximum safety requirements and the continuous information exchange between vehicles. The feasibility and efficiency of the VLC-RF system implementation and hand-over algorithms were subjects to deep investigations over six self-contained chapters meant to facilitate a logical progression of materials and to enable a relatively easy access. In addition to the improvement in road capacity by utilizing the convoy-based autonomous driving systems. The carried out simulations followed-up by experimental results proved that the integration of VLC with the existed RF solutions lead to a definite benefit in the communication channel quality and safety requirements of a platooning system when a proper hand-over algorithm is utilized
Khabaz, Sehla. "Radio Resource Allocation in C-V2X : From LTE-V2X to 5G-V2X". Electronic Thesis or Diss., Sorbonne université, 2022. https://theses.hal.science/tel-03922955.
Texto completo da fonteVehicular networks have attracted a lot of research attention in the last decades. The main goal of vehicular communication is to ensure road safety by enabling the periodic communications between vehicles and between vehicles and other participants, such as roadside units. Cellular-Vehicle-to-Everything (C-V2X) is a leading technology for vehicular networks. LTE-V2X is the first C-V2X technology, followed by 5G-V2X, and in both, resource allocation mechanisms play an important role in their performance. The resource allocation algorithms proposed in C-V2X must meet the requirements of V2X applications. Certainly, the safety-related applications are the most critical and time-constrained V2X applications. For this reason, in the first part of this thesis, we propose a clustering-based resource allocation algorithm for safety V2V communications, the Maximum Inter-Centroids Reuse Distance (MIRD), which aims to improve the reliability of safety V2V communications. In the second part of this thesis, we address resource allocation in 5G-V2X technology. Before performing resource allocation in 5G-V2X, we first consider the flexibility of the NR frame structure of 5G by focusing our interest on the 5G numerology concept. Therefore, we first investigate the impact of 5G numerologies on V2X application performance. Through simulations, we showed that choosing the appropriate numerology is a trade-off between V2X applications requirements, Inter-Carrier Interference (ICI) and Inter-Symbol Interference (ISI). Next, we propose a new resource allocation algorithm, namely the Priority and Satisfaction-based Resource Allocation in Mixed Numerology (PSRA-MN). In the PSRA-MN algorithm, we first select the appropriate numerology considering the channel conditions and the vehicle speed. Then, we apply a prioritization policy in favor of the safety-related traffic to ensure the required resources for the safety-related traffic, and the remaining resources after the safety allocation are optimally allocated to the non-safety vehicles so that the average satisfaction rate is maximized. The proposed PSRA-MN algorithm is validated by simulations. The obtained results show that PSRA-MN outperforms the traditional resource allocation algorithms in terms of average allocation rate, average satisfaction rate and average delay
Russo, Jean-Nicola. "Evaluation du risque de téléscopage dans un contexte de véhicules communicants par la méthode des réseaux Bayésiens". Thesis, Mulhouse, 2018. http://www.theses.fr/2018MULH2947.
Texto completo da fonteTechnological advances and the globalization of transport have led to an increase flow of passengers. However, in the automotive sector, technical or human problems lead to accidents that still cause thousands of injuries and deaths each year. As a result, government authorities and car manufacturers are working on new regulations and technical advances to ensure safety of every road user. To ensure that cut of deaths and injuries, an interesting research approach is to merge information from the vehicle, the driver and the environment in order to warn the driver of the risk he is taking or even to act directly on the vehicle. Thus, after defining the risk we consider, we are interested here in its modelling and estimation in real time. In this context, the deceleration of the leading vehicle is monitored and studied then we analyze and process the data through a Bayesian network in order to evaluate the rear-end risk that will be shared through vehicular communication thanks to VANet
Mouawad, Nadia. "SDN based Mobility Management and Quality of Service Provisioning for 5G Vehicular Networks". Thesis, université Paris-Saclay, 2020. http://www.theses.fr/2020UPASV003.
Texto completo da fonteVehicle to everything (V2X), including vehicle-to-vehicle (V2V) and vehicle-to-infrastructure(V2I), is the umbrella for the vehicular communication system, where active road safety, infotainment and traffic management messages are transmitted over high-bandwidth, low-latency, high-reliability links, paving the way to fully autonomous driving. The ultimate objective of next generation V2X communication systems is enabling accident-free cooperative driving that uses the available roadway efficiently. To achieve this goal, the communication system will need to enable a diverse set of use cases, each with a specific set of requirements.The main use case categories requirements analysis, specifically the critical realtime applications, points out the need for an efficient V2X system design that could fulfill the network performance. The Fifth Generation (5G) technology, with its provisioned QoS features in terms of high capacity and low latency, is advocated as a prominent solution to cope with the firm requirements imposed by V2X applications.In this multifaceted vehicular 5G ecosystem, diverse communication technologies are envisioned, spanning from IEEE 802.11p, LTE, LTE-V to vehicular visible light communications. Therefore, the heterogeneity of radio access technologies will raise a concern regarding the seamless mobility management and the quality of service guarantee.This thesis provides a novel mobility management scheme devised for 5G vehicular networks based on the emerging Software Defined Networking (SDN) technology.SDN provides network programmability that strives to achieve an efficient network resource allocation and mobility management.Our research work tackles three objectives. At a first stage, we design a software defined vehicular network topology. On the top of this topology, we implement twoSDN applications, namely Network Selection Application and Mobility Management Application. The proposed architecture is enhanced by a controller placement solution that aims at reducing communication latency. Moreover, a special concern is devoted to design a SDN road active safety application that controls speed traps placement. The proposed application aims at reducing accidents rate which is a main purpose of future Intelligent Transportation System.The second objective of this thesis tackles the mobility management problem. This is achieved by implementing SDN mobility related applications on the top of the adopted network topology. The first application is dedicated to solve the network selection problem; it aims at mapping running V2X sessions to the corresponding technology. The second application is conceived to solve the handover procedure; this is achieved using packets duplication and introducing an efficient routing algorithm.The third thesis objective is focused on QoS provisioning for V2X communications
Garbiso, Julian Pedro. "Fair auto-adaptive clustering for hybrid vehicular networks". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0061.
Texto completo da fonteFor the development of innovative Intelligent Transportation Systems applications, connected vehicles will frequently need to upload and download position-based information to and from servers. These vehicles will be equipped with different Radio Access Technologies (RAT), like cellular and vehicle-to-vehicle (V2V) technologies such as LTE and IEEE 802.11p respectively. Cellular networkscan provide internet access almost anywhere, with QoS guarantees. However, accessing these networks has an economic cost. In this thesis, a multi-hop clustering algorithm is proposed in the aim of reducing the cellular access costs by aggregating information and off-loading data in the V2V network, using the Cluster Head as a single gateway to the cellular network. For the example application of uploading aggregated Floating Car Data, simulation results show that this approach reduce cellular data consumption by more than 80% by reducing the typical redundancy of position-based data in a vehicular network. There is a threefold contribution: First, an approach that delegates the Cluster Head selection to the cellular base station in order to maximize the cluster size, thus maximizing aggregation. Secondly, a self-adaptation algorithm that dynamically changes the maximum number of hops, addressing the trade-off between cellular access reduction and V2V packet loss. Finally, the incorporation of a theory of distributive justice, for improving fairness over time regarding the distribution of the cost in which Cluster Heads have to incur, thus improving the proposal’s social acceptability. The proposed algorithms were tested via simulation, and the results show a significant reduction in cellular network usage, a successful adaptation of the number of hops to changes in the vehicular traffic density, and an improvement in fairness metrics, without affecting network performance
Garbiso, Julian Pedro. "Fair auto-adaptive clustering for hybrid vehicular networks". Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0061/document.
Texto completo da fonteFor the development of innovative Intelligent Transportation Systems applications, connected vehicles will frequently need to upload and download position-based information to and from servers. These vehicles will be equipped with different Radio Access Technologies (RAT), like cellular and vehicle-to-vehicle (V2V) technologies such as LTE and IEEE 802.11p respectively. Cellular networkscan provide internet access almost anywhere, with QoS guarantees. However, accessing these networks has an economic cost. In this thesis, a multi-hop clustering algorithm is proposed in the aim of reducing the cellular access costs by aggregating information and off-loading data in the V2V network, using the Cluster Head as a single gateway to the cellular network. For the example application of uploading aggregated Floating Car Data, simulation results show that this approach reduce cellular data consumption by more than 80% by reducing the typical redundancy of position-based data in a vehicular network. There is a threefold contribution: First, an approach that delegates the Cluster Head selection to the cellular base station in order to maximize the cluster size, thus maximizing aggregation. Secondly, a self-adaptation algorithm that dynamically changes the maximum number of hops, addressing the trade-off between cellular access reduction and V2V packet loss. Finally, the incorporation of a theory of distributive justice, for improving fairness over time regarding the distribution of the cost in which Cluster Heads have to incur, thus improving the proposal’s social acceptability. The proposed algorithms were tested via simulation, and the results show a significant reduction in cellular network usage, a successful adaptation of the number of hops to changes in the vehicular traffic density, and an improvement in fairness metrics, without affecting network performance
Bouallegue, Sélima. "Contribution à l'estimation des canaux relatifs aux signaux utile et interférent dans un système full-duplex dédié aux communications véhiculaires". Thesis, 2019. http://www.theses.fr/2019VALE0008.
Texto completo da fonteIn this work of thesis, we propose new channel estimation approaches for a full-duplex system dédicated to vehicular communications. Both the self-interference (SI) and intended (SOI) channel are estimated. We propose different estimation méthods according to whether the pilots of the signals are transmitted jointly or separately. In the separate transmission, an estimation based on a new pilot configuration is proposed as well as a hybrid method which use both pilot configuration and training sequences.We also propose an optimisation of the conventional training-based method.It consists of improving the estimation of each training symbole. In the joint transmission, we propose two algorithms that aims to improve the estimation performances compared to the existing methods. In the first proposed method, the two channels are first estimated in the frequency domain using the Landweber iterations. The second proposition consists of using a projection matrix to manipulate only the pilots and avoid the noise that is caused by the SOI unknown datas. Finally, we propose a time and frequency-selective channel estimation for low and medium doppler frequency. Some of the proposed estimators are implemented on a real Full Duplex communication system which use Multi-reconfigurable antennas to perform the passive cancellation