Дисертації з теми "Internet des objets – Matériaux"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Internet des objets – Matériaux".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Mekki, Kaïs. "Gestion de l'information embarquée dans des matériaux communicants à l'aide de protocoles de réseaux de capteurs sans fil." Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0034/document.
A new Internet of Things area is coming with communicating materials, which are able to provide diverse functionalities to users all along the product lifecycle. As example, it can track its own evolution which leads to gather helpful information. This new paradigm is fulfilled via the integration of specific electronic components into the product material. In this thesis, ultra-small wireless sensor nodes are used for concrete precast field. Indeed, storage of lifecycle information and data dissemination in communicating materials are very important issues. Therefore, this thesis provides a new protocol (USEE) for storing data by a systematic dissemination through the integrated sensor nodes. It guarantees that information could be retrieved in each piece of the concrete by intelligently managing data replication among each neighborhood of the sensor network. The protocol considers in the same set uniformity storage in the whole network, the data importance level, and the resource constraints of sensor nodes. Then, another new data retrieval protocol (RaWPG) is developed to extract the stored information. Castalia/OMNeT++ simulator is used to evaluate the performances of the proposed protocols
Contal, Emmanuel. "Synthèse de nano-objets lipidiques et leur fonctionnalisation interne par réaction « click »." Strasbourg, 2010. https://publication-theses.unistra.fr/public/theses_doctorat/2010/CONTAL_Emmanuel_2010.pdf.
The objective of this work was to synthesize polymerized micelles and Photo-polymerized Lipid Assemblies (PLA). Their post-functionalisation in the hydrophobic core was possible thanks to the use of functional lipids. To this end, lipids were synthesized possessing a polar head and a long carbon chain conferring their amphiphile properties, and a diacetylene moiety in the middle of the carbon chain that can be polymerized under UV irradiation (254 nm). When they were in aqueous solution, these synthetic lipids formed self-assemblies as spherical micelles. When carbon nanotubes were added to these micelles, lipids were spontaneously adsorbed on the carbon nanotubes surface to form self-assemblies represented as cylindrical hemi-micelles. These lipid constructs were stabilized during a step of polymerisation to furnish carbon nanotubes/ photo-polymerized lipid assemblies (CNT/PLA). An aqueous solution of nano-objects was obtained after extraction of theses self-assemblies from carbon nanotubes. The functionalisation in the hydrophobic core of non polymerized and polymerized micelles was realized with a fluorescent probe by “click” reaction. This methodology was then applied to various functionalisations of micelles or PLA
Wan, Hang. "Matériaux communicants : modélisation et gestion de la consommation d’énergie." Electronic Thesis or Diss., Université de Lorraine, 2021. http://www.theses.fr/2021LORR0131.
With the popularization of the Internet of Things, more and more intelligent products appear in our daily life. The McBIM project (Materials communicating with the Building Information Modelling) aims to design a new type of “communicating concrete”: concrete elements equipped with embedded wireless sensor network (WSN). This communicating concrete can measure the physical environment, store the information and exchange data with BIM platforms. One objective is to demonstrate the usefulness of the concept over the whole building lifecycle and the energy management is one of the facing challenges. Meanwhile, the product, user information as well as the large amount of monitoring data bring challenges regarding data management. To solve both issues, this work proposes to couple the physical communicating concrete to an external, digital and intelligent system in order to extend network lifetime. In this thesis, these physical and digital parts are both studied. In the physical part, energy saving methods are reviewed, to understand how to extend the network lifetime. Network routing, in-network data processing and time synchronization are considered to build an energy model for periodic data collection. This energy model is validated with an Arduino-XBee based platform. The experiment shows that the analytic energy estimation model provides an approximate but accurate remaining energy level. It can be used online by nodes or remotely by user to the remaining energy. Energy-related data and collection modes can be managed by the digital part, based on a multi-agent system (MAS). The MAS can not only store monitoring data of communicating elements but also provide energy efficient data collection or organization strategies. Composition of communicating elements may happen in construction or exploitation lifecycle’s phase to reduce energy consumption. A recursive multi-agent architecture is proposed to meet high flexibility requirements. This multi-agent system is implemented on a 3D simulation platform to visualize the communicating concrete and verify the usefulness of our analytic energy model. The recursive multi-agent architecture provides energy efficiency solutions to extend network lifetime and respond to environmental changes
Mekki, Kaïs. "Gestion de l'information embarquée dans des matériaux communicants à l'aide de protocoles de réseaux de capteurs sans fil." Electronic Thesis or Diss., Université de Lorraine, 2016. http://www.theses.fr/2016LORR0034.
A new Internet of Things area is coming with communicating materials, which are able to provide diverse functionalities to users all along the product lifecycle. As example, it can track its own evolution which leads to gather helpful information. This new paradigm is fulfilled via the integration of specific electronic components into the product material. In this thesis, ultra-small wireless sensor nodes are used for concrete precast field. Indeed, storage of lifecycle information and data dissemination in communicating materials are very important issues. Therefore, this thesis provides a new protocol (USEE) for storing data by a systematic dissemination through the integrated sensor nodes. It guarantees that information could be retrieved in each piece of the concrete by intelligently managing data replication among each neighborhood of the sensor network. The protocol considers in the same set uniformity storage in the whole network, the data importance level, and the resource constraints of sensor nodes. Then, another new data retrieval protocol (RaWPG) is developed to extract the stored information. Castalia/OMNeT++ simulator is used to evaluate the performances of the proposed protocols
Arico, Cassandra. "Micro-supercondensateurs à porosité contrôlée pour des applications à forte densité d’énergie sur substrats rigide et flexible." Thesis, Lille 1, 2020. http://www.theses.fr/2020LIL1I055.
Continuous development and further miniaturization of electronic devices greatly stimulate the research for miniaturized and compact electrochemical energy storage (EES) devices, allowing thus the development of autonomous, sustainable and connected devices. Small footprint storage sources should be sufficient efficient in terms of power, autonomy and lifespan and fixed directly on chip. To fulfil the requirements, the combination of a micro-battery (μ-Bat) with a micro- supercapacitor (μ-SC) would constitute an ideal EES microdevice where μ-Bat is dedicated to long-term applications and μ-SC ensures power demand. As promising electrode candidate for high power microdevice, carbide-derived carbons (CDCs) have been identified to load to important capacitance gains. In addition, niobium oxide (Nb2O5) stores higher levels of charges and offers the prospect of achieving energy densities of Li-ion battery materials but with the ability to operate at high power. In the present study, Nb2O5 thin films were deposited on silicon wafer by sputtering and crystallized by a rapid thermal annealing into an orthorhombic phase T-Nb2O5. We investigated porous T-Nb2O5 in which rapid insertion of lithium throughout the entire material. Then, titanium carbide (TiC) thin films were deposited on silicon wafer by sputtering and partial chlorinated into strongly adherent TiC-CDC films. Hybrid micro-supercapacitors CDC/Nb2O5 were successfully prepared and characterized in 1M LiClO4 (EC/DMC : 1/1). Finally, direct laser writing onto KaptonTM of Nb2O5 and carbon-based electrodes open the way for the design of flexible micro-supercapacitors
Dinh, Khac Huy. "Fabrication of solid state Micro-Supercapacitors based on transition metal nitride thin films for powering the Internet of Things." Electronic Thesis or Diss., Université de Lille (2022-....), 2023. https://pepite-depot.univ-lille.fr/ToutIDP/EDENGSYS/2023/2023ULILN021.pdf.
The rapid growth of Internet of Things (IoT) applications has led in an increased demand for energy storage devices. Micro-supercapacitors (MSCs) have emerged as promising candidates for high-speed applications due to their high-rate capabilities, long cycle life and environmental friendliness. However, the main challenge to be addressed for the widespread industrial use of MSCs is their relatively low energy density. To address this issue, various solutions have been explored to increase the capacitance or the cell voltage by playing with the electrolyte used, electrode materials and device topologies to achieve high-performance MSCs. This work focuses on the investigation of thin film electrode materials prepared by magnetron sputtering deposition. In particular, vanadium tungsten nitride (VWN) and ruthenium nitride (RuN) have been investigated as efficient pseudocapacitive electrode materials. This work was carried out in the frame of the CAMISOL project selected by the Lille university through the PEARL program (Program for EArly-stage Researchers in Lille) cofunded by the European Commission, where the motivation was to fabricate solid-state VN (or VWN) // RuN asymmetric micro-supercapacitors (AMSC). VWN thin films were synthesized using co-sputtering and nanolaminate approaches and demonstrated excellent performance challenging the best multicatonic materials reported for MSCs. Advanced characterization mapping techniques were used to explore the correlation between the structural, electrical, mechanical, and electrochemical properties of the films. This approach offers new perspectives and provides a powerful characterization tool for the next generation of electrochemical materials fabricated by thin film deposition methods at Lille University.In the following part of the thesis, RuN films were investigated as efficient electrode materials, and solid-state VN // RuN AMSC was presented as a proof of concept. Sputtering parameters were carefully optimized to maximize the film porosity while maintaining high electrical conductivity. Various advanced techniques were employed to reveal the complexity of the structure and charge storage mechanism of RuN films. Taking advantage from the complementary working window of VN and RuN films in a 1M KOH aqueous electrolyte, the cell voltage of the VN // RuN AMSC device was significantly increased, reaching up to 1.15 V. As a result, the VN // RuN AMSC exhibited one of the highest areal energy densities reported so far for AMSCs based on transition metal nitride thin films. Finally, the study of the use of solid-state electrolyte, PVA/KOH hydrogel electrolyte and ionic liquids in the fabrication of all-solid-state AMSCs was presented
Lemoine, Frédéric. "Internet des Objets centré service autocontrôlé." Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1235/document.
In the digital era, the number of connected objects continues to grow and diversify. To support this increasing complexity, we wanted to bring a maximum of automatisms to the Internet of Things in order to guarantee end-to-end quality of service (QoS). To do this, a self-controlled service component is proposed to integrate the object into the digital ecosystem. Thanks to the calibration of each service, which makes it possible to know the behaviour, an automated composition becomes possible. We have illustrated the feasibility of our approach on a case study. We also have shown how connected objects can assemble themselves, cooperating to achieve a common objective, while meeting global QoS requirements
Lemoine, Frédéric. "Internet des Objets centré service autocontrôlé." Electronic Thesis or Diss., Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1235.
In the digital era, the number of connected objects continues to grow and diversify. To support this increasing complexity, we wanted to bring a maximum of automatisms to the Internet of Things in order to guarantee end-to-end quality of service (QoS). To do this, a self-controlled service component is proposed to integrate the object into the digital ecosystem. Thanks to the calibration of each service, which makes it possible to know the behaviour, an automated composition becomes possible. We have illustrated the feasibility of our approach on a case study. We also have shown how connected objects can assemble themselves, cooperating to achieve a common objective, while meeting global QoS requirements
Gyrard, Amélie. "Concevoir des applications internet des objets sémantiques." Thesis, Paris, ENST, 2015. http://www.theses.fr/2015ENST0018/document.
According to Cisco's predictions, there will be more than 50 billions of devices connected to the Internet by 2020.The devices and produced data are mainly exploited to build domain-specific Internet of Things (IoT) applications. From a data-centric perspective, these applications are not interoperable with each other.To assist users or even machines in building promising inter-domain IoT applications, main challenges are to exploit, reuse, interpret and combine sensor data.To overcome interoperability issues, we designed the Machine-to-Machine Measurement (M3) framework consisting in:(1) generating templates to easily build Semantic Web of Things applications, (2) semantically annotating IoT data to infer high-level knowledge by reusing as much as possible the domain knowledge expertise, and (3) a semantic-based security application to assist users in designing secure IoT applications.Regarding the reasoning part, stemming from the 'Linked Open Data', we propose an innovative idea called the 'Linked Open Rules' to easily share and reuse rules to infer high-level abstractions from sensor data.The M3 framework has been suggested to standardizations and working groups such as ETSI M2M, oneM2M, W3C SSN ontology and W3C Web of Things. Proof-of-concepts of the flexible M3 framework have been developed on the cloud (http://www.sensormeasurement.appspot.com/) and embedded on Android-based constrained devices
Gyrard, Amélie. "Concevoir des applications internet des objets sémantiques." Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0018.
According to Cisco's predictions, there will be more than 50 billions of devices connected to the Internet by 2020.The devices and produced data are mainly exploited to build domain-specific Internet of Things (IoT) applications. From a data-centric perspective, these applications are not interoperable with each other.To assist users or even machines in building promising inter-domain IoT applications, main challenges are to exploit, reuse, interpret and combine sensor data.To overcome interoperability issues, we designed the Machine-to-Machine Measurement (M3) framework consisting in:(1) generating templates to easily build Semantic Web of Things applications, (2) semantically annotating IoT data to infer high-level knowledge by reusing as much as possible the domain knowledge expertise, and (3) a semantic-based security application to assist users in designing secure IoT applications.Regarding the reasoning part, stemming from the 'Linked Open Data', we propose an innovative idea called the 'Linked Open Rules' to easily share and reuse rules to infer high-level abstractions from sensor data.The M3 framework has been suggested to standardizations and working groups such as ETSI M2M, oneM2M, W3C SSN ontology and W3C Web of Things. Proof-of-concepts of the flexible M3 framework have been developed on the cloud (http://www.sensormeasurement.appspot.com/) and embedded on Android-based constrained devices
Bondu, Mathilde. "Ethique et objets connectés." Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/67170.
Ce projet de recherche porte sur l’opportunité de l’éthique comme mode de régulation des objets connectés. Actuellement au cœur d’une véritable course à l’innovation se faisant de plus en plus pressante, nous relèverons qu’il s’agit de biens complexes rendant difficile leur appréhension par le droit. Ce sujet se focalisera ensuite sur le cadre juridique applicable à cette technologie au regard des données personnelles récoltées de manière massives pour pouvoir enrichir et assurer le fonctionnement de ces objets. Démontrant certaines limites de ce régime légal au regard du poids de l’économie de la donnée, l’éthique sera étudiée de manière théorique dans le contexte du numérique comme outil de régulation, y compris son utilité mais aussi son inévitable manipulation par les acteurs du numérique. Ce projet aura pour objectif enfin de dresser un bilan concret des initiatives véritablement destinées à assurer une meilleure régulation des objets connectés par l’éthique, finalement débitrice d’une forte collaboration entre les trois acteurs principaux du numérique : pouvoirs publics, entreprises et citoyens.
Bui, Do Hanh Ngan. "Antennes souples imprimables pour la récupération de champs électromagnétiques ambiants." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT062/document.
Internet-of-Things means a growing development of interconnected objects that are likely to change many services within the industry as well as for the individual. Several barriers, including the energy autonomy of objects or production processes that are economically acceptable and respectful of the planet, hamper current developments. In this context, energy recovery is a widespread theme using a wide range of sources (mechanical, thermal, electromagnetic, etc.). This thesis is oriented towards the recovery of ambient electromagnetic energy. The second characteristic point of this thesis is to focus on flexible and, if possible, recyclable substrates. The challenge is to recover energy from an extremely low ambient electromagnetic field: this concerns the antenna, which must also meet a requirement for flexibility for its future integration with a flexible and deformable object, and the electronics of energy processing.The work of this thesis conducted in three phases.In the first phase, it was the study of the antenna structures compatible with frequency and power received with the energy harvesting application and a physical realization on flexible base (paper, textile, etc.). This phase allowed presenting the different approaches to combining the RF sources.In the second phase, the study on the role of rectifying circuit in the system of recovering wireless energy was presented. Methods for extracting parameters were discussed by separating each element and its roles. Numerous measurements have been conducted to compare different models of the diode, taking into account also the actual impact of the manufacturing process and the measurement process.A third phase allows the optimization of the antenna and electronic assembly (rectenna) for various scenarios and the monitoring of variability to keep the losses of the system at minima. The production of relevant demonstrators, test and characterization were presented
Hammi, Mohamed Tahar. "Sécurisation de l'Internet des objets." Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006.
Internet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Hammi, Mohamed Tahar. "Sécurisation de l'Internet des objets." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006/document.
Internet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Aïssaoui, François. "Autonomic Approach based on Semantics and Checkpointing for IoT System Management." Thesis, Toulouse 1, 2018. http://www.theses.fr/2018TOU10061/document.
Ciortea, Andrei-Nicolae. "Tisser le Web Social des Objets : Permettre une Interaction Autonome et Flexible dans l’Internet des Objets." Thesis, Lyon, 2016. http://www.theses.fr/2016EMSE0813/document.
The Internet of Things (IoT) aims to create a global ubiquitous ecosystem composed of large numbers of heterogeneous devices. To achieve this vision, the World Wide Web is emerging as a suitable candidate to interconnect IoT devices and services at the application layer into a Web of Things (WoT).However, the WoT is evolving towards large silos of things, and thus the vision of a global ubiquitous ecosystem is not fully achieved. Furthermore, even if the WoT facilitates mashing up heterogeneous IoT devices and services, existing approaches result in static IoT mashups that cannot adapt to dynamic environments and evolving user requirements. The latter emphasizes another well-recognized challenge in the IoT, that is enabling people to interact with a vast, evolving, and heterogeneous IoT.To address the above limitations, we propose an architecture for an open and self-governed IoT ecosystem composed of people and things situated and interacting in a global environment sustained by heterogeneous platforms. Our approach is to endow things with autonomy and apply the social network metaphor to createflexible networks of people and autonomous things. We base our approach on results from multi-agent and WoT research, and we call the envisioned IoT ecosystem the Social Web of Things.Our proposal emphasizes heterogeneity, discoverability and flexible interaction in the IoT. In the same time, it provides a low entry-barrier for developers and users via multiple layers of abstraction that enable them to effectively cope with the complexity of the overall ecosystem. We implement several application scenarios to demonstrate these features
Bouchereau, Aymeric. "Les objets connectés au service de l'apprentissage." Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCC018.
Learning - a vital principle of evolution - ensures the transformation of primary data captured by our senses into useful knowledge or abstract and general ideas that can be used in new situations and contexts. Cognitive neuroscience shows that the mechanisms of learning are stimulated by cognitive (e.g. wondering, evaluating errors), physical (e.g. manipulating, moving) and social (e.g. debating, collaborating) engagement. The learner builds knowledge through experience, by exploring his environment, formulating hypotheses and experimenting.Learning is crucial in a context where the exponential evolution of information and communication technologies is changing objects, practices and uses. The development of the Internet of Things (IoT) transforms common objects (e.g. light bulbs, watches, cars) into connected devices (CD) that can collect data and act on the user's environment. Learning becomes both biological and artificial and allows the creation of artificial intelligence systems (AIS) that analyse large volumes of data to automate tasks and assist individuals.Technologies can support learning when the technical possibilities they offer are used to support the process of knowledge construction. Thus, this thesis focuses on learning in the context of IoT and examines how the specificities of CD can be articulated with the mechanisms of learning.In order to identify the characteristics of learning in the context of IoT, we studied existing uses of CD. Based on the state of the art, we proposed a conceptual tool describing the IoT through four dimensions of analysis: Data, Interfaces, Agents and Pervasiveness. This tool enabled us to identify, list, classify and ultimately analyse the uses of CD for learning. In the context of these uses, learning is characterised by physical commitment, contextualisation of knowledge and bringing pedagogical activities closer to reality.Building on the results of this initial work, we have developed an approach to put the specificities of CD to learn sciences. The abstract and often counter-intuitive aspect of scientific knowledge hinders their learning, partly because our perception of reality is subjective and limited by our senses. However, data collected by CD and analysed by AIS provide information about the environment that can be used to extend human perception.Therefore, the objective of our approach, translated by the Data - Representations - Interactions (DRI) model, aims at exploiting OCs and SIAs to facilitate the observation of physical phenomena. According to the DRI model, the learner interacts with representations of a physical phenomenon generated by CD and AIS. In accordance with the mechanisms of learning (e.g. constructivism, role of experience), the learner is led to make observations and manipulations, formulate hypotheses and test them. In order to evaluate the effects and constraints of the DRI model, we have designed LumIoT devices dedicated to the learning of photometric quantities (e.g. luminous flux, luminous intensity, illuminance). Then, we conducted an experiment with 17 students of the Master 1 Multimedia Products and Services of the University of Franche-Comté (Montbéliard).The results of the experiment show that the LumIoT devices, based on the DRI model, have facilitated the observation and understanding of photometric quantities. By making abstract knowledge accessible, the DRI model paves the way for learning devices using CD and AIS to mediate knowledge
Fayad, Achraf. "Protocole d’authentification sécurisé pour les objets connectés." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT051.
The interconnection of private resources on public infrastructure, user mobility and the emergence of new technologies (vehicular networks, sensor networks, Internet of things, etc.) have added new requirements in terms of security on the server side as well as the client side. Examples include the processing time, mutual authentication, client participation in the choice of security settings and protection against traffic analysis. Internet of Things (IoT) is in widespread use and its applications cover many aspects of today's life, which results in a huge and continuously increasing number of objects distributed everywhere.Security is no doubt the element that will improve and strengthen the acceptability of IoT, especially that this large scale deployment of IoT systems will attract the appetite of the attackers. The current cyber-attacks that are operational on traditional networks will be projected towards the Internet of Things. Security is so critical in this context given the underlying stakes; in particular, authentication has a critical importance given the impact of the presence of malicious node within the IoT systems and the harm they can cause to the overall system. The research works in this thesis aim to advance the literature on IoT authentication by proposing three authentication schemes that satisfy the needs of IoT systems in terms of security and performance, while taking into consideration the practical deployment-related concerns. One-Time Password (OTP) is an authentication scheme that represents a promising solution for IoT and smart cities environments. This research work extends the OTP principle and propose a new approach to generate OTP based on Elliptic Curve Cryptography (ECC) and Isogeny to guarantee the security of such protocol. The performance results obtained demonstrate the efficiency and effectiveness of our approach in terms of security and performance.We also rely on blockchains in order to propose two authentication solutions: first, a simple and lightweight blockchain-based authentication scheme for IoT systems based on Ethereum, and second, an adaptive blockchain-based authentication and authorization approach for IoT use cases. We provided a real implementation of our proposed solutions. The extensive evaluation provided, clearly shows the ability of our schemes to meet the different security requirements with a lightweight cost in terms of performance
Claeys, Timothy. "Sécurité pour l'internet des objets : une approche des bas en haut pour un internet des objets sécurisé et normalisé." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM062.
The rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Formany of these products, security was merely an afterthought. Due to their advanced sensing and actuatingfunctionalities, poorly-secured IoT devices endanger the privacy and safety of their users.While the IoT contains hardware with varying capabilities, in this work, we primarily focus on the constrainedIoT. The restrictions on energy, computational power, and memory limit not only the processingcapabilities of the devices but also their capacity to protect their data and users from attacks. To secure theIoT, we need several building blocks. We structure them in a bottom-up fashion where each block providessecurity services to the next one.The first cornerstone of the secure IoT relies on hardware-enforced mechanisms. Various security features,such as secure boot, remote attestation, and over-the-air updates, rely heavily on its support. Sincehardware security is often expensive and cannot be applied to legacy systems, we alternatively discusssoftware-only attestation. It provides a trust anchor to remote systems that lack hardware support. In thesetting of remote attestation, device identification is paramount. Hence, we dedicated a part of this work tothe study of physical device identifiers and their reliability.The IoT hardware also frequently provides support for the second building block: cryptography. Itis used abundantly by all the other security mechanisms, and recently much research has focussed onlightweight cryptographic algorithms. We studied the performance of the recent lightweight cryptographicalgorithms on constrained hardware.A third core element for the security of the IoT is the capacity of its networking stack to protect the communications.We demonstrate that several optimization techniques expose vulnerabilities. For example,we show how to set up a covert channel by exploiting the tolerance of the Bluetooth LE protocol towardsthe naturally occurring clock drift. It is also possible to mount a denial-of-service attack that leverages theexpensive network join phase. As a defense, we designed an algorithm that almost completely alleviates theoverhead of network joining.The last building block we consider is security architectures for the IoT. They guide the secure integrationof the IoT with the traditional Internet. We studied the IETF proposal concerning the constrainedauthentication and authorization framework, and we propose two adaptations that aim to improve its security.Finally, the deployment of the IETF architecture heavily depends on the security of the underlying communicationprotocols. In the future, the IoT will mainly use the object security paradigm to secure datain flight. However, until these protocols are widely supported, many IoT products will rely on traditionalsecurity protocols, i.e., TLS and DTLS. For this reason, we conducted a performance study of the most criticalpart of the protocols: the handshake phase. We conclude that while the DTLS handshake uses fewerpackets to establish the shared secret, TLS outperforms DTLS in lossy networks
Patrigeon, Guillaume. "Systèmes intégrés adaptatifs ultra basse consommation pour l’Internet des Objets." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS036.
The Internet of Things is an infrastructure enabling advanced services by interconnecting things. Although the large variety of Internet of Things applications involve many kinds of technical solutions, many of those are based on a typical architecture that can be divided in three layers: the perception layer, the transport layer and the services layer. The dispositive that composed the perception layer, called “sensor nodes”, are subject of technical requirements: size, security, reliability, autonomous, and long lifetime. Sensor nodes’ energy efficiency is the most critical point where traditional technologies show their limitations. New strategies and solutions are proposed to overcome this technical challenge; however, how can those be evaluated, with which tools and at which level? How emerging technologies can be optimized and integrated inside microcontrollers for Internet of Things applications? Which are the new strategies for energy management to adopt with technologies such as 28 nm FD-SOI and non-volatiles memories? What are their limitations? Will they be sufficient?To evaluate the integration of emerging technologies inside low power microcontrollers, we propose a new methodology using an FPGA-based sensor node prototyping platform. Able to operate in already deployed wireless sensor networks, we use it to perform fast and precise evaluations, taking account of the application context. We studied and evaluated multiple memory architecture configurations based on STT magnetic memories as a replacement of traditional solutions, and showed that the non-volatile STT memory technology can improve a microcontroller’s energy efficiency for embedded applications
Mebrek, Adila. "Fog Computing pour l’Internet des objets." Thesis, Troyes, 2020. http://www.theses.fr/2020TROY0028.
Fog computing is a promising approach in the context of the Internet of Things (IoT) as it provides functionality and resources at the edge of the network, closer to end users. This thesis studies the performance of fog computing in the context of latency sensitive IoT applications. The first issue addressed is the mathematical modeling of an IoT-fogcloud system, and the performance metrics of the system in terms of energy consumed and latency. This modeling will then allow us to propose various effective strategies for content distribution and resource allocation in the fog and the cloud. The second issue addressed in this thesis concerns the distribution of content and object data in fog / cloud systems. In order to simultaneously optimize offloading and system resource allocation decisions, we distinguish between two types of IoT applications: (1) IoT applications with static content or with infrequent updates; and (2) IoT applications with dynamic content. For each type of application, we study the problem of offloading IoT requests in the fog. We focus on load balancing issues to minimize latency and the total power consumed by the system
Do, Tuan Anh. "Modélisation multiphysique des matériaux magnétoélectriques de seconde génération : application aux objets nomades connectés." Thesis, Sorbonne université, 2019. http://www.theses.fr/2019SORUS486.
Magnetoelectric materials (ME) are functional composite materials composed of piezoelectric and magnetostrictive phases that have the particularity of transforming magnetic energy into electrical energy through the mediation of mechanical energy. The ME effect can be characterized by a magnetoelectric coefficient (V/Oe). This particular property generates growing interests in the scientific research and more specifically in the application of new energy transducers, magnetic sensors or variable inductances. It is in this context that the L2E began since 2012 the development of multiphysics finite element codes to study the ME materials. This thesis is the development of a 3D model combining the existence models of piezoelectric and magnetostrictive for the investigation of ME behavior from three aspects: Modeling of laminate composite, taking into account the nonlinearity of magnetostrictive through a multiscale model and the effect of eddy currents in dynamic regime; Study of different ME composite structures and the influence of geometries parameters on the performance of this material; Application of the homogenization principle to analyze the magnetoelectric behavior of ME composites composed of granular nanoparticles type 0-3 or fiber composite type 1-3
Adomnicai, Alexandre. "Cryptographie légère pour l'internet des objets : implémentations et intégrations sécurisées." Thesis, Lyon, 2019. https://tel.archives-ouvertes.fr/tel-02868017.
While the internet of things (IoT) promises many advances for businesses, administrations and citizens, its deployment is a real challenge in terms of privacy and security. In order to ensure the confidentiality and the authenticity of information transmitted by these objects, numerous IoT protocols incorporate cryptographic algorithms within their specification. To date, these algorithms are the same as the ones used in traditionnal internet security protocols and thus, have not been designed with constrainted plateforms in mind. This thesis focuses on lightweight cryptography which aims at reduce as much as possible the cost of its implementation.Apart from the main goal of lightweight cryptography which is to consume less ressources than traditional algorithms, it is also valuable to take into account the integration of countermeasures against physical attacks during the design phase in order to limit their impact. Although this kind of attacks require a physical access to the target, this can be a realistic scenario as connected objets might be deployed everywhere and thus, potentially accessible by malicious people. Our works focus on the study of three lightweight cryptographic algorithms, each having a potential for industrial applications. Especially, we highlight the need of secure implementations by introducing two new side-channel attacks : one against ChaCha20, standardized by the IETF and now used in TLS 1.3, and another one against ACORN, an algorithm being part of the CAESAR portfolio
Kamgueu, Patrick Olivier. "Configuration dynamique et routage pour l'internet des objets." Electronic Thesis or Diss., Université de Lorraine, 2017. http://www.theses.fr/2017LORR0241.
In recent years, the growing interest of scientific and industrial community has led to the standardization of new protocols that consider the unique requirements of Wireless Sensor Networks (WSN) nodes. At network layer, RPL (IPv6 Routing Protocol for Low-power and Lossy Network) has been proposed by IETF as the routing standard for network that uses LLN nodes, namely, those where both nodes and their interconnects are constrained. They operate on low-power embedded batteries and use lossy links, making communications unreliable and lead to a significant data loss rates. This thesis aims to optimize the routing in WSNs (especially those using TCP/IP protocol stack), as well as their efficient and cost-effective connection to the Internet. First, we have proposed two new RPL objective functions. The first uses as unique routing criterion, the node remaining energy with the goal of maximizing the network lifetime. An energy model that allows the nodes to dynamically estimate their remaining energy at runtime has been implemented and integrate to the protocol. The second objective function uses fuzzy logic reasoning to combine several criteria to take Quality of Service into account. Indeed, this scheme provides a good trade-off on several inputs and requires a low memory footprint. In the last part of this thesis, we designed and implemented an architecture that enable an efficient integration of several RPL based WSNs to the Internet to achieve the Internet of Things vision
Kamgueu, Patrick Olivier. "Configuration dynamique et routage pour l'internet des objets." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0241/document.
In recent years, the growing interest of scientific and industrial community has led to the standardization of new protocols that consider the unique requirements of Wireless Sensor Networks (WSN) nodes. At network layer, RPL (IPv6 Routing Protocol for Low-power and Lossy Network) has been proposed by IETF as the routing standard for network that uses LLN nodes, namely, those where both nodes and their interconnects are constrained. They operate on low-power embedded batteries and use lossy links, making communications unreliable and lead to a significant data loss rates. This thesis aims to optimize the routing in WSNs (especially those using TCP/IP protocol stack), as well as their efficient and cost-effective connection to the Internet. First, we have proposed two new RPL objective functions. The first uses as unique routing criterion, the node remaining energy with the goal of maximizing the network lifetime. An energy model that allows the nodes to dynamically estimate their remaining energy at runtime has been implemented and integrate to the protocol. The second objective function uses fuzzy logic reasoning to combine several criteria to take Quality of Service into account. Indeed, this scheme provides a good trade-off on several inputs and requires a low memory footprint. In the last part of this thesis, we designed and implemented an architecture that enable an efficient integration of several RPL based WSNs to the Internet to achieve the Internet of Things vision
Kubler, Sylvain. "Premiers travaux relatifs au concept de matière communicante : Processus de dissémination des informations relatives au produit." Phd thesis, Université Henri Poincaré - Nancy I, 2012. http://tel.archives-ouvertes.fr/tel-00759600.
Moudoud, Hajar. "Intégration de la Blockchain à l’Internet des Objets." Electronic Thesis or Diss., Troyes, 2022. http://www.theses.fr/2022TROY0006.
The Internet of Things (IoT) is transforming traditional industry into a smart industry where decisions are made based on data. The IoT interconnects many objects that perform complex tasks. However, the intrinsic characteristics of the IoT lead to several problems, such as decentralization and privacy and security issues. Blockchain has emerged as a key technology to address the challenges of IoT. Due to its salient features such as decentralization, immutability, and security, blockchain has been proposed to establish trust in several applications, including IoT. The integration of blockchain with IoT opens the door to new possibilities that inherently improve trustworthiness, reputation, and transparency for all parties involved, while enabling security. However, conventional blockchains are computationally expensive, have limited scalability, and require high bandwidth, making them unsuitable for resource constrained IoT environments. The main objective of this thesis is to use blockchain as a key tool to improve IoT. To achieve our goal, we address the challenges of data reliability and security in IoT by using blockchain as well as new emerging technologies, including artificial intelligence
Bui, Duy-Hieu. "Système avancé de cryptographie pour l'internet des objets ultra-basse consommation." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAT001/document.
The Internet of Things (IoT) has been fostered by accelerated advancements in communication technologies, computation technologies,sensor technologies, artificial intelligence, cloud computing, and semiconductor technologies. In general, IoT contains cloud computing to do data processing, communication infrastructure including the Internet, and sensor nodes which can collect data, send them through the network infrastructure to the Internet, and receive controls to react to the environment. During its operations, IoT may collect, transmit and process secret data, which raise security problems. Implementing security mechanisms for IoT is challenging because IoT organizations include millions of devices integrated at multiple layers, whereas each layer has different computation capabilities and security requirements. Furthermore, sensor nodes in IoT are intended to be battery-based constrained devices with limited power budget, limited computation, and limited memory footprint to reduce costs. Implementing security mechanisms on these devices even encounters more challenges. This work is therefore motivated to focus on implementing data encryption to protect IoT sensor nodes and systems with the consideration of hardware cost, throughput and power/energy consumption. To begin with, a ultra-low-power block cipher crypto-accelerator with configurable parameters is proposed and implemented in ST 28nm FDSOI technology in SNACk test chip with two cryptography modules: AES and PRESENT. AES is a widely used data encryption algorithm for the Internet and currently used for new IoT proposals, while PRESENT is a lightweight algorithm which comes up with reduced security level but requires with much smaller hardware area and lower consumption. The AES module is a 32-bit datapath architecture containing multiple optimization strategies supporting multiple security levels from 128-bit keys up to 256-bit keys. The PRESENT module contains a 64-bit round-based architecture to maximize its throughput. The measured results indicate that this crypto-accelerator can provide medium throughput (around 20Mbps at 10MHz) while consumes less than 20uW at normal condition and sub-pJ of energy per bit. However, the limitation of crypto-accelerator is that the data has to be read into the crypto-accelerator and write back to memory which increases the power consumption. After that, to provide a high level of security with flexibility and configurability to adapt to new standards and to mitigate to new attacks, this work looks into an innovative approach to implement the cryptography algorithm which uses the new proposed In-Memory-Computing SRAM. In-Memory Computing SRAM can provide reconfigurable solutions to implement various security primitives by programming the memory's operations. The proposed scheme is to carry out the encryption in the memory using the In-Memory-Computing technology. This work demonstrates two possible mapping of AES and PRESENT using In-Memory Computing
Lemke, Laurent. "Modèles partagés et infrastructures ouverte pour l'internet des objets de la ville Intelligente." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM022/document.
Nowadays cities face several challenges and are concerned by ecological, energetic, economical, and demographical aspects. Smart cities, equipped with sensors, actuators, and digital infrastructures, are meant to tackle these issues.Current smart cities are operated by several actors without sharing sensor data or accesses to the actuators. This is a vertical organization, in which each actor deploys its own sensors and actuators, and manages its own digital infrastructure. Each actor may be interested in a different aspect of city management, for instance traffic management, air control, etc. The current trend is a transition towards a more horizontal organization, based on an open and shared mediation platform. In such a platform, sensor data and accesses to actuators can be shared among several actors. The costs related to nfrastructure deployment and management are therefore reduced for each individual actor. This PhD is a contribution to this volution towards horizontal organizations, with open and shared platforms. We propose: (1) an abstraction layer for the ontrol and supervision of the city; (2) a concurrency management mechanism; (3) a coordination mechanism that helps haring actuators; (4) a proof-of-concept implementation of these contributions. The abstraction layer we propose helps users control and supervise a city. It is based upon formal models inspired by the ones used in the programming of reactive systems. They represent the physical elements present in each smart city, with genericity principles. In order to ease application development, the interface of those models is made uniform. Since applications, especially control ones, may ave real-time constraints, we also list the constraints this poses on distributed infrastructures. As soon as actuators are shared, conflicts may occur between users. Our proposals include a concurrency management mechanism, based on eservation principles. We also provide a coordination mechanism for the users to be able to perform several actions in an tomic way.All these principles have been implemented as a proof of concept. We review several use cases, to demonstrate he potential benefits of our proposals
Naas, Mohammed Islam. "Placement des données de l'internet des objets dans une infrastructure de fog." Thesis, Brest, 2019. http://www.theses.fr/2019BRES0014/document.
In the coming years, Internet of Things (IoT) will be one of the applications generating the most data. Nowadays, IoT data is stored in the Cloud. As the number of connected objects increases, transmitting the large amount of produced data to the Cloud will create bottlenecks. As a result, latencies will be high and unpredictable. In order to reduce these latencies, Fog computing has been proposed as a paradigm extending Cloud services to the edge of the network. It consists of using any equipment located in the network (e.g. router) to store and process data. Therefore, the Fog presents a heterogeneous infrastructure. Indeed, its components have differences in computing performance, storage capacity and network interconnections. This heterogeneity can further increase the latency of the service. This raises a problem: the wrong choice of data storage locations can increase the latency of the service. In this thesis, we propose a solution to this problem in the form of four contributions: 1. A formulation of the IoT data placement problem in the Fog as a linear program. 2. An exact solution to solve the data placement problem using the CPLEX, a mixed linear problem solver. 3. Two heuristics based on the principle of “divide and conquer” to reduce the time of placement computation. 4. An experimental platform for testing and evaluating solutions for IoT data placement in the Fog, integrating data placement management with iFogSim, a Fog and IoT environment simulator
Billet, Benjamin. "Système de gestion de flux pour l'Internet des objets intelligents." Thesis, Versailles-St Quentin en Yvelines, 2015. http://www.theses.fr/2015VERS012V/document.
The Internet of Things (IoT) is currently characterized by an ever-growing number of networked Things, i.e., devices which have their own identity together with advanced computation and networking capabilities: smartphones, smart watches, smart home appliances, etc. In addition, these Things are being equipped with more and more sensors and actuators that enable them to sense and act on their environment, enabling the physical world to be linked with the virtual world. Specifically, the IoT raises many challenges related to its very large scale and high dynamicity, as well as the great heterogeneity of the data and systems involved (e.g., powerful versus resource-constrained devices, mobile versus fixed devices, continuously-powered versus battery-powered devices, etc.). These challenges require new systems and techniques for developing applications that are able to (i) collect data from the numerous data sources of the IoT and (ii) interact both with the environment using the actuators, and with the users using dedicated GUIs. To this end, we defend the following thesis: given the huge volume of data continuously being produced by sensors (measurements and events), we must consider (i) data streams as the reference data model for the IoT and (ii) continuous processing as the reference computation model for processing these data streams. Moreover, knowing that privacy preservation and energy consumption are increasingly critical concerns, we claim that all the Things should be autonomous and work together in restricted areas as close as possible to the users rather than systematically shifting the computation logic into powerful servers or into the cloud. For this purpose, our main contribution can be summarized as designing and developing a distributed data stream management system for the IoT. In this context, we revisit two fundamental aspects of software engineering and distributed systems: service-oriented architecture and task deployment. We address the problems of (i) accessing data streams through services and (ii) deploying continuous processing tasks automatically, according to the characteristics of both tasks and devices. This research work lead to the development of a middleware layer called Dioptase, designed to run on the Things and abstract them as generic devices that can be dynamically assigned communication, storage and computation tasks according to their available resources. In order to validate the feasability and the relevance of our work, we implemented a prototype of Dioptase and evaluated its performance. In addition, we show that Dioptase is a realistic solution which can work in cooperation with legacy sensor and actuator networks currently deployed in the environment
Hachem, Sara. "Middleware pour l'Internet des Objets Intelligents." Phd thesis, Université de Versailles-Saint Quentin en Yvelines, 2014. http://tel.archives-ouvertes.fr/tel-00960026.
Connier, Jean. "Conception et réalisation d'un système multi-fonctionnel d'aide à la mobilité pour personnes mavoyantes et aveugles." Thesis, Université Clermont Auvergne (2017-2020), 2019. http://www.theses.fr/2019CLFAC097.
Visual impairment and blindness are sources of mobility difficulties for the affected people. In orderto lighten the burden of these difficulties, many mobility aids have been imagined, designed, tested, and more or less adopted. Designers of such assistive systems soon run into the complexity of the issue, which stands at the intersection of three domains that are, by themselves, complex: visual impairment, mobility, and perception.Having decided to design an electronic assistive system from the beginning, we tried to step back and analyzed a wide range of blind aids: white canes, mobile electronic devices serving different mobility purposes, urban systems, and systems not primarily designed for mobility. Their diversity helped us analyze assistive systems through several prisms: according to their technical characteristics, their functions, their shape, and their dependence to an infrastructure. Taken individually, each of these approaches quickly shows its limits, but, together, they draw an interesting portrait of the existing devices. Besides these rather classical approaches, we propose a new model for analyzing assistive systems, which relies on the way these systems take place in a person's perception / mobility process. This model has the advantages of being, a priori, relevant forall assistive systems – in spite of their dissimilarity – and meaningful for both evaluation and classification.We have designed and built an electronic mobility aid, called the 2SEES system. Like its predecessor, the SEES system, the 2SEES relies on three platforms: a smart cane, a smartphone, anda cloud computing back-end. The issues of energy consumption and geographical universality, essential for any mobile device, are made explicit and studied. A novelty of the 2SEES resides in its account of reliability issues ; it is thus designed around the complex equilibrium between energy consumption, universality, and reliability. Despite their importance in a system destined to be adopted by end users, these three notions are scarcely visible in the relevant literature.To concurrently enhance robustness and autonomy, we have integrated several sensors and processors in the smart cane, both by introducing redundancy, for fault tolerance, and by integratingheterogeneous sensors, for robustness against the diversity of environments.Two aspects of this equilibrium have been further studied. First, the need for robustness has been highlighted by a study of affinities between obstacle sensors and several types of potential obstacle materials. Secondly, we have tried to develop an energy-efficient indoor localization function that islittle dependent on infrastructures, and therefore easily scalable. This function works with embedded sensors (wheel encoder, inertial measurement unit) and a simplified particle filter, which estimates the position by checking the coherence of trajectories derived from sensor data against themap of the location.In addition to this work on the balance between robustness, energy consumption, and universality, we have developed a novel function, named SO2SEES, which allows communication between usersof the 2SEES and smart objects. This function enables users to ask, in natural language, questions tothe 2SEES, which are answered using information coming from surrounding smart objects. In orderto keep the system simple, users do not formulate their own questions, but are instead invited to pick them in a set of predefined questions, which are proposed by the system according to the nearby objects and the information they offer. This mode of operation shifts the system from a natural language processing artificial intelligence to an expert system working on dynamic and distributed knowledge bases. In this latter configuration, the main issue is the interoperability between the 2SEES and the smart objects and their back-ends that take part in the functionality
Ben, Fredj Sameh. "Intergiciel sémantique pour la recherche des services de l'internet des objets." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0063/document.
With the advent of the Internet of Things (IoT), we are facing a proliferation of connected devices distributed over physical locations, so called smart spaces and offering IoT services. Enabling an easy and seamless discovery of these IoT services is crucial for the success of the Internet of Things. The characteristics of IoT services, such as their sheer number, their heterogeneity and their dynamicity induced by the mobility of the related devices, make discovering them a challenge. In this thesis, we propose a system architecture and the associated mechanisms to enable efficient and scalable semantic-based IoT service discovery supporting dynamic contexts. Our approach relies on distributed semantic gateways that embed clustering, information aggregation and semantic routing mechanisms
Pittoli, Philippe. "Influence d'une architecture de type maître-esclave dans les problématiques de sécurité de l'Internet des objets." Thesis, Strasbourg, 2019. http://www.theses.fr/2019STRAD006/document.
The Internet of things is a network design where "things" are connected to the Internet, such as thermometers or lights. These objects are constrained in memory, computational capacity and communication (packet size, shared medium). The thesis is focused on issues around those constraints. A client willing to send a request to an object may either establish a direct connection to the object (end-to-end architecture) or establish a connection to the network gateway, which is not constrained in memory or computation capabilities, and will be used as a broker between clients and objects (master-slave architecture). This purpose of the thesis is to understand and to spotlight the differences between those two kinds of architectures and to determine their viability in an IoT context
Xia, Ye. "Combining Heuristics for Optimizing and Scaling the Placement of IoT Applications in the Fog." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAM084/document.
As fog computing brings processing and storage resources to the edge of the network, there is an increasing need of automated placement (i.e., host selection) to deploy distributed applications. Such a placement must conform to applications' resource requirements in a heterogeneous fog infrastructure, and deal with the complexity brought by Internet of Things (IoT) applications tied to sensors and actuators. This paper presents four heuristics to address the problem of placing distributed IoT applications in the fog. By combining proposed heuristics, our approach is able to deal with large scale problems, and to efficiently make placement decisions fitting the objective: minimizing placed applications' average response time. The proposed approach is validated through comparative simulation of different heuristic combinations with varying sizes of infrastructures and applications
Abdelghani, Wafa. "A multi-dimensional trust-model for dynamic, scalable and resources-efficient trust-management in social internet of things." Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30231.
The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by giving them the ability to connect to the Internet, communicate and interact. The integration of the social component in the IoT has given rise to the Social Internet of Things (SIoT), which has overcome various issues such as interoperability, navigability and resource/service discovery. In this type of environment, participants compete to offer a variety of attractive services. Some of them resort to malicious behavior to propagate poor quality services. They launch so-called Trust-Attacks (TA) and break the basic functionality of the system. Several works in the literature have addressed this problem and have proposed different trust-models. Most of them have attempted to adapt and reapply trust models designed for traditional social networks or peer-to-peer networks. Despite the similarities between these types of networks, SIoT ones have specific particularities. In SIoT, there are different types of entities that collaborate: humans, devices, and services. Devices can have very limited computing and storage capacities, and their number can be as high as a few million. The resulting network is complex and highly dynamic, and the impact of Trust-Attacks can be more compromising. In this work, we propose a Multidimensional, Dynamic, Resources-efficient and Scalable trust-model that is specifically designed for SIoT environments. We, first, propose features to describe the behavior of the three types of nodes involved in SIoT networks and to quantify the degree of trust according to the three resulting Trust-Dimensions. We propose, secondly, an aggregation method based on Supervised Machine-Learning and Deep Learning that allows, on the one hand, to aggregate the proposed features to obtain a trust score allowing to rank the nodes, but also to detect the different types of Trust-Attacks and to counter them. We then propose a hybrid propagation method that allows spreading trust values in the network, while overcoming the drawbacks of centralized and distributed methods. The proposed method ensures scalability and dynamism on the one hand, and minimizes resource consumption (computing and storage), on the other. Experiments applied to synthetic data have enabled us to validate the resilience and performance of the proposed model
Borges, caldas da silva Pedro Victor. "Middleware support for energy awareness in the Internet of Things (IoT)." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS016.
The Internet of Things (IoT) is characterized by a myriad of geographically dispersed devices and software components as well as high heterogeneity in terms of hardware, data, and protocols. Over the last few years, IoT platforms have been used to provide a variety of services to applications such as device discovery, context management, and data analysis. However, the lack of standardization makes each IoT platform come with its abstractions, APIs, and interactions. As a consequence, programming the interactions between a consuming IoT application and an IoT platform is often time-consuming, error-prone, and depends on the developers' level of knowledge about the IoT platform. IoT middleware are proposed to alleviate such heterogeneity, provide relevant services, and ease application development.As the energy efficiency of digital technology becomes a priority, the increase in IoT systems brings energy concerns. In this context, carefully designing interactions between IoT consumer applications and IoT systems with an energy-efficiency concern becomes essential. IoT middleware should not solely consider energy efficiency as a non-functional requirement. Instead, it needs to be at the solution's core as the middleware is expected to be shared by many applications and offer facilities to ease application development.This work presents three contributions regarding energy-efficiency/awareness in IoT middleware for IoT consumer applications.The first contribution is the proposal of an IoT middleware for IoT consumer applications called IoTVar that abstracts IoT virtual sensors in IoT variables that are automatically updated by the middleware.The second contribution is the evaluation of the energy consumption of the interactions between IoT consumer applications and IoT platforms through the HTTP and MQTT protocols. This evaluation has led to the proposal of guidelines to improve energy efficiency when developing applications.The third contribution is the proposal of strategies for energy efficiency to be integrated into IoT middleware. Those strategies have been integrated into the IoTVar middleware to provide energy efficiency, but also energy awareness through an energy model and the management of an energy budget driven by user requirements. The implementations of the IoT middleware architecture, with and without energy-efficiency strategies, have been evaluated, and the results show that we have a difference of up to 60% the energy used by IoT applications by applying strategies to reduce energy consumption at the middleware level
Gatouillat, Arthur. "Towards smart services with reusable and adaptable connected objects : An application to wearable non-invasive biomedical sensors." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEI123/document.
The rapid growth of fixed and mobile smart objects raises the issue of their integration in everyday environment, e.g. in e-health or home-automation contexts. The main challenges of these objects are the interoperability, the handling of the massive amount of data that they generate, and their limited resources. Our goal is to take a bottom-up approach in order to improve the integration of smart devices to smart services. To ensure the efficient development of our approach, we start with the study of the design process of such devices regardless of specific hardware or software through the consideration of their cyber-physical properties. We thus develop two research directions: the specification of a service-oriented design method for smart devices with formal considerations in order to validate their behavior, and the proposal of a self-adaptation framework in order to handle changing operating context through self-reasoning and the definition of a declarative self-adaptation objectives specification language. The testing of these contributions will be realized through the development of a large-scale experimental framework based on a remote diagnostics case-study relying on non-invasive wearable biomedical sensors
Han, Ngoc Son. "Semantic service provisioning for 6LoWPAN : powering internet of things applications on Web." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0018/document.
This dissertation proposes a complete solution to provision 6LoWPAN services with semantic annotation that enables the development of IoT applications on Web. We aim to bring smart object services to the Web and make them accessible by plenty of existing Web APIs in consideration of 6LoWPAN constraints such as limited resources (ROM, RAM, and CPU), low-power, and low-bitrate communication links. There are four contributions: (i) The first contribution is about the overall architecture of the semantic service provisioning for IoT application on Web consisting of three subsystems: service communication, service provisioning, and service integration. (ii) The second contribution studies the internetworking model between 6LoWPAN and regular IPv6 networks by a design, implementation, and performance evaluation of a 6LoWPAN consisting of MTM-CM5000-MSP TelosB motes with TI MSP430F1611 microprocessors and CC2420 IEEE 802.15.4 radio transceivers for smart objects, and Raspberry Pi for an edge router; (iii) The third contribution presents the detailed architecture, algorithms, and mechanisms for provisioning reliable, scalable, and secure smart object services with respect to its resource-constrained requirements; (iv) The fourth contribution is in application domain for service integration in which we apply the proposed architecture on two innovative IoT applications on Web: a building automation system (SamBAS) and a Social IoT platform (ThingsChat)
Le, Kim-Hung. "Mécanismes d’interopérabilité pour les applications industrielles de l’Internet des Objets et la Ville Intelligente." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS225.
With the rapid growth of Internet technologies as well as the explosion of connected objects, Internet of Things (IoT) is considered an Internet revolution that positively affects several life aspects. The integration of IoT solutions and cloud computing, namely cloud-based IoT, is a crucial concept to meet these demands. However, two major challenges of the cloud-based IoT are interoperability and reliability. In this thesis, our main objective is to deal with the interoperability and reliability issues that arise from large-scale deployment. The proposed solutions spread over architectures, models, and algorithms, ultimately covering most of the layers of the IoT architecture. At the communication layer, we introduce a method to interoperate heterogeneous IoT connections by using a connector concept. We then propose an error and change point detection algorithm powered by active learning to enhance IoT data reliability. To maximize usable knowledge and business value from this cleaned data and make it more interoperable, we introduce a virtual sensor framework that simplifies creating and configuring virtual sensors with programmable operators. Furthermore, we provide a novel descriptive language, which semantically describes groups of Things. To ensure the device reliability, we propose an algorithm that minimizes energy consumption by real-time estimating the optimal data collection frequency. The efficiency of our proposals has been practically demonstrated in a cloud-based IoT platform of a start-up company
Patel, Pankesh. "Environnement de développement d'applications pour l'Internet des objets." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2013. http://tel.archives-ouvertes.fr/tel-00927150.
Chahadih, Abdallah. "Photo-croissance organisée de nano-objets métalliques ou semiconducteurs dans les matériaux diélectriques destinés à la photonique." Thesis, Lille 1, 2012. http://www.theses.fr/2012LIL10060/document.
The thesis project aims to master the localization and organization of metallic and semiconducting nano-objects formed inside sol-gel silica materials for novel applications. The nanostructuration method used in this thesis is based on the laser irradiation and, if necessary, heat-treatment. The local character of the matter-light interaction leads to the formation of nano-objects only in the irradiated areas. Hence, it is possible to control the spatial distribution of the nano-crystallites as well as their size distribution by varying the irradiation parameters. In this thesis, porous silica monoliths produced via the sol-gel process were doped and densified. Different kinds of semiconductors (CdS, PbS) and metallic (Au, Ag) nanoparticles incorporated inside the porous SiO2 matrix have been precipitated with the assistance of laser irradiation at room temperature or by an annealing process. The local generation of nanoparticles could be performed directly on the surface of the silica xerogel using a visible continuous laser or inside the volume of the matrix by a femtosecond laser irradiation. Moreover, it has been shown that the nanoparticle size could be adjusted by choosing the concentration of the precursors in the post-doping solution, the laser wavelength, the irradiation power and/or the annealing temperature in the case of thermal precipitation. Furthermore, different methods were used to precipitate metallic nanoparticles (Ag or Cu) inside dense silica matrix. Those techniques are based on laser irradiations and/or heat treatments. Under pulsed laser irradiation, the space selective growth of noble metal nanoparticles was achieved in two steps: first, metallic nucleation centres were generated by the pulsed laser (nanosecond or femtosecond) in the irradiated areas; next, the metallic nanoparticles growth was obtained by annealing at 600°C. Besides, the doping of glassy matrices with copper nanoparticles allows foreseeing their use in the core of microstructured optical fibres. First capillary drawings have shown that the copper nanoparticles can be preserved after undergoing a melting at 2000°C
Challal, Yacine. "Sécurité de l'Internet des Objets : vers une approche cognitive et systémique." Habilitation à diriger des recherches, Université de Technologie de Compiègne, 2012. http://tel.archives-ouvertes.fr/tel-00866052.
Bouchaud, François. "Analyse forensique des écosystèmes intelligents communicants de l'internet des objets." Thesis, Lille, 2021. http://www.theses.fr/2021LILUI014.
With the development of the Internet of Things, searching for data in a digital environment is an increasingly difficult task for the forensic investigator. It is a real challenge, especially given the heterogeneity of the connected objects. There is a lack of standardization in communication architectures and data management policies. It is accompanied by dependencies between connected ecosystems, especially through hidden links and fragmented information. In this thesis, we suggest adjusting the traditional approach of digital investigation to the constraints of the Internet of Things. We develop methodologies and tools to understand and analyze the connected environment. We assume that the crime scene is a connected whole and not an aggregate of independent digital objects. It contains key data for understanding and contextualizing a past event or phenomenon as evidence for the criminal trial. Digital forensics is considered to be the og extit{application of science to the identification, collection, examination, and analysis, of data while preserving the integrity of the information and maintaining a strict chain of custody for the data fg~ (National Institute of Standards and Technology). Faced with a crime scene, the investigator seeks to understand the criminal event. He examines the data stored in the physical medium and/or in a remote part of the cloud. Our work develops a process of rapid identification of the phenomenon according to four phases: detection, localization, object recognition and information crosschecking. It is enriched with radio signature search tools~: single-sensor and multi-sensor mesh network. This approach is built around the problem of apprehending a multiform connected environment, containing devices that are not always visible or identifiable during a field approach. We integrate in our study the strategy of equipment collection. The challenge lies in the ability to extract one or more connected objects, without compromising the stored data, to place them in a controlled and secure environment. The object is maintained in a state that guarantees the non-alteration or loss of data. The study includes a first phase of understanding the physical environment and dependencies. It seeks to determine the mechanisms of information migration to online platforms and to isolate groups of objects by intelligently breaking the connections. Devices are extracted, then packaged and sealed according to their technical characteristics and the connected infrastructure. We then deepen the exploitation of the information collected using forensic methods. The data is then analyzed according to temporal, spatial and contextual axes. We also propose a classification and a prioritization of the connected structure according to the characteristics of the desired data. The work gives a reading of the life cycle of the data within the Internet of Things infrastructure. In a prospective approach, we deepen the questions of the fine identification of the connected object according to these hardware and software characteristics. The acoustic signature of electronics appears as a relevant physical property in the study of equipment. This feature completes our range of tools in the identification of connected objects
Denis, Nathanaël. "For a private and secure Internet of things with usage control and distributed ledger technology." Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAS007.
IoT devices represent one of the major targets for malicious activities. The grounds for this are manifold: first, to reduce the cost of security, manufacturers may sell vulnerable products, leaving users with security concerns. Second, many IoT devices have performance constraints and lack the processing power to execute security software. Third, the heterogeneity of applications, hardware, and software widens the attack surface.As a result, IoT networks are subject to a variety of cyber threats. To counter such a variety of attacks, the IoT calls for security and privacy-preserving technologies.For privacy concerns, usage control grants the users the power to specify how their data can be used and by whom. Usage control extends classic access control by introducing obligations, i.e., actions to be performed to be granted access, and conditions that are related to the system state, such as the network load or the time.This thesis aims at providing answers to the challenges in the Internet of Things in terms of performance, security and privacy. To this end, distributed ledger technologies (DLTs) are a promising solution to Internet of Things constraints, in particular for micro-transactions, due to the decentralization they provide. This leads to three related contributions:1. a framework for zero-fee privacy-preserving transactions in the Internet of Things designed to be scalable;2. an integration methodology of usage control and distributed ledgers to enable efficient protection of users' data;3. an extended model for data usage control in distributed systems, to incorporate decentralized information flow control and IoT aspects.A proof of concept of the integration (2) has been designed to demonstrate feasibility and conduct performance tests. It is based on IOTA, a distributed ledger using a directed acyclic graph for its transaction graph instead of a blockchain. The results of the tests on a private networkshow an approximate 90% decrease in the time needed to push transactionsand make access decisions in the integrated setting
Hamidouche, Ranida. "Paradigme bio-inspiré dans les réseaux intelligents dynamiques au service de l’internet des objets." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG066.
Today the Internet makes it possible to connect billions of heterogeneous electronic devices and ensures communication between them. These devices have sensors designed with resource constraints that significantly affect data collection, especially memory and battery size limitations. The divergences in the characteristics of these objects require new intelligent methods to ensure communication between them. Heuristic solutions become obsolete or powerless to satisfy the user's requirement, hence a search for new methods becomes necessarily necessary to satisfy users. Among these solutions, we have those based on bio-inspired models. In this context, intending to minimize data loss, we propose different bio-inspired approaches for the mobility of the data collector and the choice of meeting points for data collection.First of all, we propose mobility inspired by the movement of Escherichia Coli bacteria. Then, we propose a technique inspired by the grouping of grey wolves and whales for the choice of meeting points. Afterward, we improve the mobility of the collector by mobility inspired by salps.Finally, we combine these approaches by taking into account the urgency of the data. The different contributions were evaluated using simulations and then were compared with similar existing work.The results obtained are very promising in terms of energy consumption and the amount of data collected
Baqa, Hamza. "Realization of trust by a semantic self-adaptation in the Internet of Things." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS004.
In the blooming era of the Internet of Things (IoT), trust has become a vital factor for provisioning reliable smart services without human intervention by reducing risk in autonomous decision making. However, the merging of physical objects, cyber components and humans in the IoT infrastructure has introduced new concerns for the evaluation of trust. Consequently, a large number of trust-related challenges have been unsolved yet due to the ambiguity of the concept of trust and the variety of divergent trust indicators, models and management mechanisms in different IoT scenarios. In this PhD thesis, my ultimate goal is to propose an efficient and practical trust evaluation for any IoT ecosystems. To achieve this goal, the first important objective is to augment the generic trust concept and conceptual model of trust in order to come up with a comprehensive understanding of trust, influencing factor and relevant Trust Indicators (TI) in the context of IoT. Following the catalyst, as the second objective, a trust model called REK comprised of the triad Reputation, Experience and Knowledge TIs is proposed which covers multi-dimensional aspects of trust by incorporating heterogeneous information from direct observation, personal experiences to global opinions. Knowledge TI is as “direct trust” rendering a trustor’s understanding of a trustee in respective scenarios that can be obtained based on limited available information about characteristics of the trustee, environment and the trustor’s perspective using a variety of techniques. Experience and Reputation TIs are originated from social features and extracted based on previous interactions among entities in IoT. The mathematical models and calculation mechanisms for the Experience and Reputation TIs also proposed leveraging sociological behaviours of humans in the real-world; and being inspired by the Google PageRank in the web-ranking area, respectively. Things are expected to live in different “domains” and “contexts” during their lifetime. Information generated/associated with Things should be manageable by multiple, diverse stakeholders with different roles, information and functionalities with many access levels, ecosystems with different trust level and security primitives. In that sense, as third objective of this thesis, a novel blockchain-enhanced IoT data-sharing framework named Semantic Smart Contract (SSC) is proposed taking full advantage of the provisions offered by the blockchain and semantics.The feasibility and effectiveness of the REK model, based on the proposed trust indicator, and associated Trust sharing mechanisms are proved not only by the theoretical analysis but also by real-world applications deployed in our Wise-IoT and SMESEC EU projects
Asgharzadeh, Mohammadmahdi. "Étude et développement d'un système de communication radio à haute sensibilité destiné à l'internet des objets." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAT096.
The Internet of Things (IoT) is a new approach in which the Internet connection extends into real-world objects to make them communicate with each other. The communication for IoT can be established using cellular networks or the licence-free frequencies in the Industrial, Scientific and Medical (ISM) bands. There are many communication standards for IoT applications. There are also many modulation techniques. Nevertheless, there is no perfect solution for all the needs and requirements in all domains. The choice of the right communication standard and modulation technique is unique for each use-case and depends on each specific application.In this research, instead of developing a new communication standard or a new modulation technique, we improved the receiver sensitivity while using the existing modulation technique and communication standards. Improving the receiver sensitivity increases the link budget. A better link budget, under certain propagation conditions, increases the communication distance. Different radio communication standards and conventional techniques based on Low Power Wide Area Networks (LPWAN) are presented in the first chapter.The theoretical basis of the time-synchronous averaging (TSA) method as a powerful signal processing method to improve the sensitivity of the RF receiver and the simulation methodologies are presented in chapter two. We also study the impact of phase noise on the MSK modulator in this chapter.The synchronisation problem, as well as the different solutions to improve it, are presented in chapter three. Synchronisation in phase and frequency are studied separately, and an innovative method has been developed to combine the synchronisation process with averaging.The performance of the synchronised averaging method with and without new synchronisation techniques was measured, and the results are presented in chapter four. The processing gain from the theoretical calculation is compared with the measurement results too
Ben, Fredj Sameh. "Intergiciel sémantique pour la recherche des services de l'internet des objets." Electronic Thesis or Diss., Paris, ENST, 2014. http://www.theses.fr/2014ENST0063.
With the advent of the Internet of Things (IoT), we are facing a proliferation of connected devices distributed over physical locations, so called smart spaces and offering IoT services. Enabling an easy and seamless discovery of these IoT services is crucial for the success of the Internet of Things. The characteristics of IoT services, such as their sheer number, their heterogeneity and their dynamicity induced by the mobility of the related devices, make discovering them a challenge. In this thesis, we propose a system architecture and the associated mechanisms to enable efficient and scalable semantic-based IoT service discovery supporting dynamic contexts. Our approach relies on distributed semantic gateways that embed clustering, information aggregation and semantic routing mechanisms