Добірка наукової літератури з теми "Réseaux locaux industriels (informatique) – Mesures de sûreté"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Réseaux locaux industriels (informatique) – Mesures de sûreté".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Дисертації з теми "Réseaux locaux industriels (informatique) – Mesures de sûreté":
Haj-Hassan, Ali. "Securing communication protocols for the Internet of Things." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0002.
The fusion of IP-enabled networks with low-power wireless technology has given birth tothe Industrial Internet of Things (IIoT). Due the large scale and dynamic nature of IIoT, thesecurity of such network is of paramount importance. One of the most critical attacks arethose conducted during the joining phase of new nodes to an IIoT network. In this thesis, we focus our study on securing the joining phase of such networks.Joining phases in IoT rely on mutual authentication methods based on a pre-shared key (PSK) shared between the network coordinator and the joining node. Standardization often lacks clear PSK sharing guidelines, which in large-scale and dynamic networks like IIoT makes pre-configuring each device with a unique key impractical. To address these concerns, this thesis introduces an autonomous mutual authentication and key establishment protocol for IIoT networks. In this solution, the network coordinator first authenticates the joining node via a certificate, and reciprocally, the joining node authenticates the network coordinator using a novel and lightweight consensus mechanism based on Shamir Secret Sharing. Once this mutual authentication is accomplished, a key is established between the network coordinator and the joining node over a public channel. Our solution was integrated into the 6TiSCH framework, ensuring robust security with high authentication success, even when dealing with malicious nodes. Additionally, it proved efficient in terms of communication, latency, and energy usage across various network scenarios, even on resource-constrained devices.Moreover, during the IoT network joining process, proxy nodes play a pivotal role in forwarding Join Requests and Join Responses between the joining node and the network coordinator. Securing this phase is vital, as malicious proxy nodes can disturb new node joins or redirect them another entity impersonating the coordinator. Therefore, we present a robust system focused on identifying malicious proxy nodes during the joining phase. Centered around the coordinator, this system maintains a log table tracking each node’s participation as a proxy node. Post each joining phase, the coordinator receives an End-to-End encrypted packet from the joining node, detailing any encounters with malicious proxy nodes. This information is utilized to calculate the number of legitimate proxy node involvements for each node. The detection system utilizes these metrics, in conjunction with adjustable parameters, to categorize nodes as either malicious or trustworthy. Additionally, our solution accounts for potential attacks on the detection process, originating from both proxy nodes and joining nodes
Teles, Hermeto Rodrigo. "Standard improvements and predictable performance for industrial Internet of things in indoor deployments." Thesis, Strasbourg, 2019. https://publication-theses.unistra.fr/public/theses_doctorat/2019/Teles-Hermeto_Rodrigo_2019_ED269.pdf.
Industrial networks are typically used to monitor safety-related processes, where high reliability and an upper-bounded delay must be ensured. To attend these requirements, IEEE 802.15.4-2015 standard was published in 2016, defining the Time-Slotted Channel Hopping (TSCH) mode. TSCH allows the scheduling of transmissions, such that each device has enough opportunities for communicating while avoiding collisions. In addition, slow-channel hopping mechanism allows the nodes to combat the effect of external interference. Although TSCH increases the reliability, packet losses keep on occurring due to variations on the radioconditions, very common in indoor environments. The goal of this work is to improve the reliability of low-power wireless networks in indoor scenarios, where obstacles and external interference are the rule. We focus mostly on experimental research to identify the limits and in which circumstances these networks fail at providing a predictable performance
Rubio, Hernan Jose Manuel. "Detection of attacks against cyber-physical industrial systems." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015.
We address security issues in cyber-physical industrial systems. Attacks against these systems shall be handled both in terms of safety and security. Control technologies imposed by industrial standards already cover the safety dimension. From a security standpoint, the literature has shown that using only cyber information to handle the security of cyber-physical systems is not enough, since physical malicious actions are ignored. For this reason, cyber-physical systems have to be protected from threats to their cyber and physical layers. Some authors handle the attacks by using physical attestations of the underlying processes, f.i., physical watermarking to ensure the truthfulness of the process. However, these detectors work properly only if the adversaries do not have enough knowledge to mislead crosslayer data. This thesis focuses on the aforementioned limitations. It starts by testing the effectiveness of a stationary watermark-based fault detector, to detect, as well, malicious actions produced by adversaries. We show that the stationary watermark-based detector is unable to identify cyber-physical adversaries. We show that the approach only detects adversaries that do not attempt to get any knowledge about the system dynamics. We analyze the detection performance of the original design under the presence of adversaries that infer the system dynamics to evade detection. We revisit the original design, using a non-stationary watermark-based design, to handle those adversaries. We also propose a novel approach that combines control and communication strategies. We validate our solutions using numeric simulations and training cyber-physical testbeds
Han, Fangyuan. "Cadres pour l'analyse multi-perspective des infrastructures critiques." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLC011/document.
Critical infrastructures (CIs) provide essential goods and service for modern society. Their safety and reliability are primary concerns. The complexity of CIs calls for approaches of system analysis capable of viewing the problem from multiple perspectives. The focus of the present thesis is on the integration of the control perspective into the safety and reliability analysis of CIs. The integration is first approached by investigating the control properties of a small network system, i.e., an electric power microgrid. A simulation-based scheme is developed for the analysis from different perspectives: supply service, controllability and topology. An optimization-based model predictive control framework is proposed to analyze the microgrid under various failure scenarios. Then, a multi-perspective framework is developed to analyze CIs with respect to supply service, controllability and topology. This framework enables identifying the role of the CI elements and quantifying the consequences of scenarios of multiple failures, with respect to the different perspectives considered. To demonstrate the analysis framework, a benchmark network representative of a real gas transmission network across several countries of the European Union (EU) is considered as case study. At last, a multi-objective optimization framework is proposed for complex CIs design: design of network topology and allocation of link capacities are performed in an optimal way to minimize the non-supplied demand and the structural complexity of the system, while at the same time to maximize the system controllability. Investigation on the multiple objectives considered is performed to retrieve useful insights for system design. The findings of this thesis demonstrate the importance of developing frameworks of analysis of CIs that allow considering different perspectives relevant for CIs design, operation and protection
Rubio, Hernan Jose Manuel. "Detection of attacks against cyber-physical industrial systems." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015/document.
We address security issues in cyber-physical industrial systems. Attacks against these systems shall be handled both in terms of safety and security. Control technologies imposed by industrial standards already cover the safety dimension. From a security standpoint, the literature has shown that using only cyber information to handle the security of cyber-physical systems is not enough, since physical malicious actions are ignored. For this reason, cyber-physical systems have to be protected from threats to their cyber and physical layers. Some authors handle the attacks by using physical attestations of the underlying processes, f.i., physical watermarking to ensure the truthfulness of the process. However, these detectors work properly only if the adversaries do not have enough knowledge to mislead crosslayer data. This thesis focuses on the aforementioned limitations. It starts by testing the effectiveness of a stationary watermark-based fault detector, to detect, as well, malicious actions produced by adversaries. We show that the stationary watermark-based detector is unable to identify cyber-physical adversaries. We show that the approach only detects adversaries that do not attempt to get any knowledge about the system dynamics. We analyze the detection performance of the original design under the presence of adversaries that infer the system dynamics to evade detection. We revisit the original design, using a non-stationary watermark-based design, to handle those adversaries. We also propose a novel approach that combines control and communication strategies. We validate our solutions using numeric simulations and training cyber-physical testbeds
Soury, Ayoub. "Approches de sûreté de fonctionnement sur Ethernet temps réel : application à une nouvelle génération d’ascenseur." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT029/document.
The design of a communication network with a real-time Ethernet-based security that meets the requirements of the PESSRAL standard, derived from IEC 61508, is the basis of our work. In order to achieve this goal, we implement mechanisms reducing the residual error probability and achieving Safety Integrity Levels (SIL) via a deterministic electronic system. Through a single communication channel, our system must be able to integrate critical and non-critical functions without compromising the system certification.According to this commitment, we suggest an industrial communication system based on real-time Ethernet. The proposed communication interfaces meet the requirements of responsiveness and determinism in order to guarantee the temporal constraints imposed by the process and the standard. To ensure the functional safety of the interfaces, we have proposed a "safety" overlay that implements security functions according to the concept of the black channel defined in IEC 61508. Based on these properties, we have managed to classify the Ethernet-based real-time solutions into three classes in terms of cycle time. The overlay "safety", based on the redundancy of data, made it possible to give up the solution of physical redundancy. This data redundancy duplicates the initial cycle time of the network, which nonetheless satisfies the security and time conditions of the standard
Kuntz, Romain. "Medium access control facing the dvnamics of wireless sensor networks." Strasbourg, 2010. https://publication-theses.unistra.fr/public/theses_doctorat/2010/KUNTZ_Romain_2010.pdf.
A WSN consists in spatially distributed autonomous and embedded devices that cooperatively monitor physical or environmental conditions in a less intrusive fashion. The data collected by each sensor node (such as temperature, vibrations, sounds, movements etc. ) are reported to a sink station in a hop-by-hop fashion using wireless transmissions. In the last decade, the challenges raised by WSN have naturally attracted the interest of the research community. Especially, signicant improvements to the communication stack of the sensor node have been proposed in order to tackle the energy, computation and memory constraints induced by the use of embedded devices. A number of successful deployments already denotes the growing interest in this technology. Recent advances in embedded systems and communication protocols have stimulated the elaboration of more complex use cases. They target dense and dynamic networks with the use of mobile sensors or multiple data collection schemes. For example, mobility in WSN can be employed to extend the network coverage and connectivity, as well as improve the routing performances. However, these new scenarios raise novel challenges when designing communication protocols. The work presented in this thesis focuses on the issues raised at the MAC layer when confronted to dynamic WSN. We have rst studied the impact of mobility and dened two new MAC protocols (Machiavel and X-Machiavel) which improve the medium access of mobile sensor nodes in dense networks. Our second contribution is an auto-adaptive algorithm for preamble sampling protocols. It aims at minimizing the global energy consumption in networks with antagonist trafic patterns by obtaining an optimal configuration on each node. This mechanism is especially energy-efficient during burst transmissions that could occur in such dynamic networks
Zaïbi, Ghada. "Sécurisation par dynamiques chaotiques des réseaux locaux sans fil au niveau de la couche MAC." Phd thesis, Toulouse 2, 2012. http://tel.archives-ouvertes.fr/tel-00867469.
Aljnidi, Mohamad. "Vers un système d'administration de la sécurité pour les réseaux autonomes." Phd thesis, Télécom ParisTech, 2009. http://pastel.archives-ouvertes.fr/pastel-00570696.
Nguyen, Phuong Anh. "La programmation DC et DCA pour la sécurité de la couche physique des réseaux sans fil." Electronic Thesis or Diss., Université de Lorraine, 2020. http://www.theses.fr/2020LORR0023.
Physical layer security is to enable confidential data transmission through wireless networks in the presence of illegitimate users, without basing on higher-layer encryption. The essence of physical layer security is to maximize the secrecy rate, that is the maxi- mum rate of information without intercepted by the eavesdroppers. Besides, the design of physical layer security considers the transmit power minimization. These two objectives conflict with each other. Consequently, the research on physical layer security designs often focuses on the two main classes of optimization problems: maximizing secrecy rate under the transmit power constraint and minimizing power consumption while guaranteeing the secrecy rate constraint. These problems are nonconvex, thus, hard to solve. In this thesis, we focus on developing optimization approaches to solve these two optimization problem classes. Our methods are based on DC (Difference of Convex functions) programming and DCA (DC Algorithm) which well-known as one of the most powerful approaches in optimization. In the first part, we consider three classes of secrecy rate maximization problems (chapters 2, 3, 4). In particular, chapter 2 studies the secure information transmission in a multiple-input single-output (MISO) relay system by using joint beamforming and artificial noise strategy under the deterministic uncertainty channel models of all links. Without using a relay, chapter 3 addresses the problem of transfer wireless information and power simultaneously in MISO secure system where scenarios of perfect channel state information and deterministic uncertainty channel models are concerned. Transmit beamforming without artificial noise and that with artificial noise are investigated. Under the assumption of statistical channel state information to eavesdroppers, chapter 4 studies the probability constrained secrecy rate maximization problem in multiuser MISO simultaneous wireless information and power transfer (SWIPT) system. The unified approach based on DC programming and DCA is proposed to solve three classes of optimization problems. The optimization problem in chapter 2 is recast as two general DC programs. The general DCA schemes are proposed to solve these two DC programs. In chapter 3, we consider four optimization problems in accordance with four scenarios. Exploiting the special structures of these original optimization problems, we transform it into four general DC programs for which the corresponding general DCA based algorithms are developed. In chapter 4, we first transform the considered problem into a tractable form. We then develop an alternating scheme to solve the transformed problem. Two general DC programs are proposed in each step of the alternating scheme. For solving these DC programs, we study a variant of general DCA, namely, DCA−ρ scheme. The convergence of alternating general DCA−ρ scheme is proven. The second part studies the transmit power optimization problem under the probability constraints of secrecy rate and harvested energy in a MISO SWIPT system (chapter 5). We reformulate the original problem as three general DC programs for which the corresponding general DCA-based algorithms are investigated. Numerical results demonstrate the efficiency of the proposed algorithms
Книги з теми "Réseaux locaux industriels (informatique) – Mesures de sûreté":
Charles, Miller. Microcomputer and LAN security =: La sécurité des micro-ordinateurs et des réseaux locaux. Hull, Qué: Minister of Government Services Canada = Ministre des services gouvernementaux Canada, 1993.
Vinatier, Emmanuel. Hacking. Micro Application, 2003.