Дисертації з теми "Internet industriel des objets"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Internet industriel des objets".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Brun-Laguna, Keoma. "Deterministic Networking for the Industrial IoT." Thesis, Sorbonne université, 2018. http://www.theses.fr/2018SORUS157.
The Internet of Things (IoT) evolved from a connected toaster in 1990 to networks of hundreds of tiny devices used in industrial applications. Those “Things” usually are tiny electronic devices able to measure a physical value (temperature, humidity, etc.) and/or to actuate on the physical world (pump, valve, etc). Due to their cost and ease of deployment, battery-powered wireless IoT networks are rapidly being adopted. The promise of wireless communication is to offer wire-like connectivity. Major improvements have been made in that sense, but many challenges remain as industrial application have strong operational requirements. This section of the IoT application is called Industrial IoT (IIoT). The main IIoT requirement is reliability. Every bit of information that is transmitted in the network must not be lost. Current off-the-shelf solutions offer over 99.999% reliability. That is, for every 100k packets of information generated, less than one is lost. Then come latency and energy-efficiency requirements. As devices are battery-powered, they need to consume as little as possible to be able to operate during years. The next step for the IoT is to target time-critical applications. Industrial IoT technologies are now adopted by companies over the world, and are now a proven solution. Yet, challenges remain and some of the limits of the technologies are still not fully understood. In this work we address TSCH-based Wireless Sensor Networks and study their latency and lifetime limits under real-world conditions. We gathered 3M network statistics 32M sensor measurements on 11 datasets with a total of 170,037 mote hours in real-world and testbeds deployments. We assembled what we believed to be the largest dataset available to the networking community. Based on those datasets and on insights we learned from deploying networks in real-world conditions, we study the limits and trade-offs of TSCH-based Wireless Sensor Networks. We provide methods and tools to estimate the network performances of such networks in various scenarios. We believe we assembled the right tools for protocol designer to built deterministic networking to the Industrial IoT
Amaro, da Cruz Mauro. "An enhanced multi-protocol middleware solution for Internet of things." Thesis, Mulhouse, 2021. https://www.learning-center.uha.fr/.
In Internet of Things (IoT), data is handled and stored by software known as middleware (located on a server). The evolution of the IoT concept led to the construction of many IoT middleware, software that plays a key role since it supports the communication among devices, users, and applications. Several aspects can impact the performance of a middleware. Based in a deep review of the related literature and in the proposal of a Reference Model for IoT middleware, this thesis proposes a new IoT middleware, called In.IoT, a scalable, secure, and innovative middleware solution based on a deep review of the state of the art and following the reference middleware architecture that was proposed along with this research work. In.IoT addresses the middleware concerns of the most popular solutions (security, usability, and performance) that were evaluated, demonstrated, and validated along this study, and it is ready and available for use. In.IoT architectural recommendations and requirements are detailed and can be replicated by new and available solutions. It supports the most popular application-layer protocols (MQTT, CoAP, and HTTP). Its performance is evaluated in comparison with the most promising solutions available in the literature and the results obtained by the proposed solution are extremely promising. Furthermore, this thesis studies the impact of the underlying programming language in the solution's overall performance through a performance evaluation study that included Java, Python, and Javascript, identifying that globally, Java demonstrates to be the most robust choice for IoT middleware. IoT devices communicate with the middleware through an application layer protocol that may differ from those supported by the middleware, especially when it is considered that households will have various devices from different brands. The thesis offers an alternative for such cases, proposing an application layer gateway, called MiddleBridge. MiddleBridge translates CoAP, MQTT, DDS, and Websockets messages into HTTP (HTTP is supported by most IoT middleware). With MiddleBridge, devices can send a smaller message to an intermediary (MiddleBridge), which restructures it and forwards it to a middleware, reducing the time that a device spends transmitting. The proposed solutions were evaluated in comparison with other similar solutions available in the literature, considering the metrics related to packet size, response times, requests per second, and error percentage, demonstrating their better results and tremendous potential. Furthermore, the study used XGBoost (a machine learning technique) to detect the occurrence of replication attacks where an attacker obtains device credentials, using it to generate false data and disturb the IoT environment. The obtained results are extremely promising. Thus, it is concluded that the proposed approach contributes towards the state of the art of IoT middleware solutions
Smache, Meriem. "La sécurité des réseaux déterministes de l’Internet des objets industriels (IIoT)." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEM033.
Time synchronization is a crucial requirement for the IEEE802.15.4e based Industrial Internet of Things (IIoT). It is provided by the application of the Time-Slotted Channel-Hopping (TSCH) mode of the IEEE802.15.4e. TSCH synchronization allows reaching low-power and high-reliability wireless networking. However, TSCH synchronization resources are an evident target for cyber-attacks. They can be manipulated by attackers to paralyze the whole network communications. In this thesis, we aim to provide a vulnerability analysis of the TSCH asset synchronization. We propose novel detection metrics based on the internal process of the TSCH state machine of every node without requiring any additional communications or capture or analysis of the packet traces. Then, we design and implement novel self-detection and self-defence techniques embedded in every node to take into account the intelligence and learning ability of the attacker, the legitimate node and the real-time industrial network interactions. The experiment results show that the proposed mechanisms can protect against synchronization attacks
Thubert, Pascal. "Converging over deterministic networks for an Industrial Internet." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0011/document.
Based on time, resource reservation, and policy enforcement by distributed shapers, Deterministic Networking provides the capability to carry specified unicast or multicast data streams for real-time applications with extremely low data loss rates and bounded latency, so as to support time-sensitive and mission-critical applications on a converged enterprise infrastructure.As of today, deterministic Operational Technology (OT) networks are purpose-built, mostly proprietary, typically using serial point-to-point wires, and operated as physically separate networks, which multiplies the complexity of the physical layout and the operational (OPEX) and capital (CAPEX) expenditures, while preventing the agile reuse of the compute and network resources.Bringing determinism in Information Technology (IT) networks will enable the emulation of those legacy serial wires over IT fabrics and the convergence of mission-specific OT networks onto IP. The IT/OT convergence onto Deterministic Networks will in turn enable new process optimization by introducing IT capabilities, such as the Big Data and the network functions virtualization (NFV), improving OT processes while further reducing the associated OPEX.Deterministic Networking Solutions and application use-cases require capabilities of the converged network that is beyond existing QOS mechanisms.Key attributes of Deterministic Networking are: - Time synchronization on all the nodes, often including source and destination - The centralized computation of network-wide deterministic paths - New traffic shapers within and at the edge to protect the network- Hardware for scheduled access to the media.Through multiple papers, standard contribution and Intellectual Property publication, the presented work pushes the limits of wireless industrial standards by providing: 1. Complex Track computation based on a novel ARC technology 2. Complex Track signaling and traceability, extending the IETF BIER-TE technology 3. Replication, Retry and Duplicate Elimination along the Track 4. Scheduled runtime enabling highly reliable delivery within bounded time 5. Mix of IPv6 best effort traffic and deterministic flows within a shared 6TiSCH mesh structureThis manuscript presents enhancements to existing low power wireless networks (LoWPAN) such as Zigbee, WirelessHART¿and ISA100.11a to provide those new benefits to wireless OT networks. It was implemented on open-source software and hardware, and evaluated against classical IEEE Std. 802.15.4 and 802.15.4 TSCH radio meshes. This manuscript presents and discusses the experimental results; the experiments show that the proposed technology can guarantee continuous high levels of timely delivery in the face of adverse events such as device loss and transient radio link down
Basselot, Vivien. "Contribution à la modélisation des chaînes informationnelles et des processus décisionnels associés à un produit "intelligent" : application à un connecteur de test industriel." Thesis, Valenciennes, Université Polytechnique Hauts-de-France, 2019. http://www.theses.fr/2019UPHF0009.
In recent years, “smart products” have been introduced in many areas such as industry, health and transportation systems. These products are sources of information during their use phases. Collecting, processing this information is a definite advantage to aid the various stakeholders involved in the product lifecycle to improve the value chain. The large number of stakeholders and the diversity of their needs make it difficult to implement the information chains between the product and the stakeholders in the use phase (as well as the generation of information flows towards the upstream and downstream phases of the life cycle). Based on the concepts developed by the Closed Loop Lifecycle Management (CL2M) community, this thesis proposes a model of generic architecture for modeling the information chains and decision-making processes associated with a product during its use phase. The proposed model relies on secondary functions associated with the product, on holonic concepts, on product context (i.e. environment, task and user(s)) and on decision-making processes. This last point is inspired on Rasmussen's typology to characterize different cognitive levels. A methodological guide is also proposed helping to transform the model into operational architecture implementing information chains. The proposed architecture is implemented and validated as part of a POC (Proof of Concept) platform. Both the model and the guide are evaluated through scenarios representative of the use of a "smart" industrial test connector in the automotive field
Lagos, Jenschke Tomas. "Toward reliable and bounded latency for internet of things." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0222.
The Low Power and Lossy Network (LLN) are wireless Internet of Things (IoT) technologies that operate with limited processing power, memory, or power. Furthermore, they have links characterized by high loss rates. However, due to their low cost and easy handling, they have become popular in the industry 4.0. Therefore, for these technologies to be incorporated into the industry, they need to ensure reliable, fast, and stable transmission. The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a distance vector routing protocol specialized in these IoT applications. Its adaptability has made it one of the most popular protocols for LLNs. However,its one-way upstream transmission is not sufficient to guarantee transmission reliability. This has resulted in a challenge to the industry and different functions and strategies have been proposed to address this problem. Unfortunately, many of these strategies cannot be replicated for different environments and require trade-offs in other areas. In this thesis,our goal is to provide a customized RPL so that it can ensure transmission reliability while maintaining a low delay and fluctuation. For this purpose, we propose different functions and algorithms that allow the extension of multi-path in RPL
Muñoz, Soto Jonathan Mauricio. "Km-scale Industrial Networking." Thesis, Sorbonne université, 2019. http://www.theses.fr/2019SORUS252.
The Internet of Things (IoT) aims to provide connectivity to millions of devices used in our day-to-day life. For the vast majority of applications, wired connections are unpractical and too expensive, therefore wireless connections is the only feasible way to provide connectivity to the devices. One of many wireless solutions is the standard IEEE802.15.4, specially designed for low power mesh networks. This standard is widely used for Smart Building, Home Automation and Industrial Applications.A subsequent amendment, the IEEE802.15.4g, defines 3 PHYs (FSK, OFDM and O-QPSK). This targets Smart Utility Networks(SUN) applications, i.e., Smart Metering, while providing extended coverage. In this thesis, we analyse the use of this standard outside the SUN environment and onto Industrial Networking applications.First, we conduct a series of experiments using IEEE802.15.4g compliant devices in order to measure the range coverage on radio links in real use case outdoor scenarios. Results show that highly reliable communications with data rates up to 800 kbps (with OFDM) can be achieved in urban environments at 540 m between nodes, and the longest useful radio link is obtained at 779 m (FSK). Sencond, regarding the robustness and high data rate of OFDM, we compare the performance of the IEEE802.15.4 with the IEEE802.15.4g OFDM in Smart Building scenarios. From experiments, we determine that IEEE802.15.4g OFDM outperforms IEEE802.15.4 and should be considered as a solution for further deployments in combination with a TSCH MAC approach. Finally, we introduce the concept of Network Agility: nodes that can dynamically change their PHY according to their needs and circumstances
Lemoine, Frédéric. "Internet des Objets centré service autocontrôlé." Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1235/document.
In the digital era, the number of connected objects continues to grow and diversify. To support this increasing complexity, we wanted to bring a maximum of automatisms to the Internet of Things in order to guarantee end-to-end quality of service (QoS). To do this, a self-controlled service component is proposed to integrate the object into the digital ecosystem. Thanks to the calibration of each service, which makes it possible to know the behaviour, an automated composition becomes possible. We have illustrated the feasibility of our approach on a case study. We also have shown how connected objects can assemble themselves, cooperating to achieve a common objective, while meeting global QoS requirements
Vancaelemont, Anne. "Matérialité et travail institutionnel des consommateurs. Le cas de l'industrie de la musique enregistrée face à la "dématérialisation" (1994-2014)." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLED039/document.
Consumers are most of the time left at the margins of neo-institutional theory. Yet, the institutional work concept makes it possible to consider consumer practices aimed at maintaining or disrupting formerly institutionalized practices or at creating new ones. Furthermore, taking into account the practices material dimension allows us to consider how objects play a role in consumer institutional work processes. The case of the French recorded music industry from 1994 to 2014 - when MP3 downloading then streaming overcame CD consumption practices - is studied with a grounded theory inductive approach. Our dissertation shows that consumers collaborate in order to perform institutional work (maintaining, disrupting and creating institutionalized practices). To disrupt institutionalized practices, they use « bricolage » to assemble available practices and objects, among themcommunity-objects that play a specific role: sharing information and objects. Moreover, material resilience, not only contributes to practice maintenance but also to disruption and new practices institutionalization
Chabot, Martial. "Tests automatisés dirigés par les exigences pour systèmes cyber-physiques." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAM056/document.
Nowadays, many major manufacturers in different fields are working towards the design of smart products to meet new market needs. The design of these systems is increasingly complex, as they are composed of many physical components controlled by applications running on processors. In order to support this multi-disciplinary design, the solution we propose in this thesis is to guide the system modeling and design by taking into account the test scenarios that will be used to validate its requirements. The method that we propose suggests reasoning at the system level and starting the design process by formalizing validation tests. In other words, it amounts to specifying the acceptance criterion(s) for the requirement as well as the test scenario necessary to verify it. Formalizing the tests in this way makes it possible to analyze the formulation of the requirements themselves and to remove any ambiguity. We propose a generic model of the structural view of the test infrastructure, and an associated UML profile. The behavioral view is modeled as SysML sequence diagrams. The test infrastructure interfaces provide testability constraints for the system to be designed. We have developed a tool, ARES (Automatic GeneRation of Executable Tests from SysML), which automatically transforms this structural/behavioral specification of the tests into simulatable or executable scenarios. These scenarios, analogous by construction, will be used to validate simulatable models of the system (Matlab/Simulink), then during the process of final verification of the product (with a TestStand environment). We present the application of this tool on various case studies associated with Schneider Electric products
Gyrard, Amélie. "Concevoir des applications internet des objets sémantiques." Thesis, Paris, ENST, 2015. http://www.theses.fr/2015ENST0018/document.
According to Cisco's predictions, there will be more than 50 billions of devices connected to the Internet by 2020.The devices and produced data are mainly exploited to build domain-specific Internet of Things (IoT) applications. From a data-centric perspective, these applications are not interoperable with each other.To assist users or even machines in building promising inter-domain IoT applications, main challenges are to exploit, reuse, interpret and combine sensor data.To overcome interoperability issues, we designed the Machine-to-Machine Measurement (M3) framework consisting in:(1) generating templates to easily build Semantic Web of Things applications, (2) semantically annotating IoT data to infer high-level knowledge by reusing as much as possible the domain knowledge expertise, and (3) a semantic-based security application to assist users in designing secure IoT applications.Regarding the reasoning part, stemming from the 'Linked Open Data', we propose an innovative idea called the 'Linked Open Rules' to easily share and reuse rules to infer high-level abstractions from sensor data.The M3 framework has been suggested to standardizations and working groups such as ETSI M2M, oneM2M, W3C SSN ontology and W3C Web of Things. Proof-of-concepts of the flexible M3 framework have been developed on the cloud (http://www.sensormeasurement.appspot.com/) and embedded on Android-based constrained devices
Bondu, Mathilde. "Ethique et objets connectés." Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/67170.
Ce projet de recherche porte sur l’opportunité de l’éthique comme mode de régulation des objets connectés. Actuellement au cœur d’une véritable course à l’innovation se faisant de plus en plus pressante, nous relèverons qu’il s’agit de biens complexes rendant difficile leur appréhension par le droit. Ce sujet se focalisera ensuite sur le cadre juridique applicable à cette technologie au regard des données personnelles récoltées de manière massives pour pouvoir enrichir et assurer le fonctionnement de ces objets. Démontrant certaines limites de ce régime légal au regard du poids de l’économie de la donnée, l’éthique sera étudiée de manière théorique dans le contexte du numérique comme outil de régulation, y compris son utilité mais aussi son inévitable manipulation par les acteurs du numérique. Ce projet aura pour objectif enfin de dresser un bilan concret des initiatives véritablement destinées à assurer une meilleure régulation des objets connectés par l’éthique, finalement débitrice d’une forte collaboration entre les trois acteurs principaux du numérique : pouvoirs publics, entreprises et citoyens.
Cichy, Bernard. "Recherches autour de l'objet artisanal et de l'objet industriel." Bordeaux 3, 2007. http://www.theses.fr/2007BOR30036.
The point is to show that we have moved from a consumerist society of the famous “thirty glorious years” (in the occidental area), to a type of neo-consumerist or post-consumerist society of the last thirty years through the materialization and the production of craft and industrial objects. While showing the different realities of these states through art, craft and design, I will show the birth of new concepts, new human behaviours, new or fake mythologies linked to the object. The objects stemmend from an industrial and still artisanal society oscillates between these two fabrication modes while it’s purpose value, refracted and absorbed by the consumer – actor, models new attitudes and shapes a new society, this time open. The core of the thesis will try to prove the asserted illusion of a society centered on industrial object to the detriment of a craft object, through the perceptible instalment, juxtaposition of system of thoughts, fabrication and creation leaving freedom between craft and industry. So, we will try to put forward the building of creation an “artisanial” or industrianal” objectology, purely obvious barbarism, to give an account of the ground realities and the multiple sides of creation applied to object. We will eventually understand the process or conception and fabrication methods in order to recenter our main reflection on the validity of an understanding between two worlds. On the one hand, that of industry and on the other hand, that of craft which overlap, penetrate, interfere with each other. It is with envy and respect that these two universe observe and borrow each other certain representation and fabrication codes, certain values through the subtle game of exchanges and compromises inside an economic system of our contemporanean societies and worlds
Noblet, Jocelyn de. "Les Langages de la culture matérielle : évolution comparée de la forme des objets produits industriellement." Paris 8, 1993. http://www.theses.fr/1993PA080737.
The aim of this thesis is to show that all man-made objects are endowed with a symbolic value of meaningful signifiance. When objects have been designed and produced, all their inherent contradictions have been revolved and they can be situated in their proper context, providing the keys to decode this contex are available. After analysing the origins of materail culture, the thesis seeks to define the implicit rules regulating the complex interactions between the technical and sybollic constraints. Which are the two essential ingrediants in the design of all products. A comparative analysis of material culture in the twenties (1919-1929) and the seventies eighties (1973-1990) highlihts the relationship between a civilization's dominant ideology and the objects it produces
Hammi, Mohamed Tahar. "Sécurisation de l'Internet des objets." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006/document.
Internet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Aïssaoui, François. "Autonomic Approach based on Semantics and Checkpointing for IoT System Management." Thesis, Toulouse 1, 2018. http://www.theses.fr/2018TOU10061/document.
Ciortea, Andrei-Nicolae. "Tisser le Web Social des Objets : Permettre une Interaction Autonome et Flexible dans l’Internet des Objets." Thesis, Lyon, 2016. http://www.theses.fr/2016EMSE0813/document.
The Internet of Things (IoT) aims to create a global ubiquitous ecosystem composed of large numbers of heterogeneous devices. To achieve this vision, the World Wide Web is emerging as a suitable candidate to interconnect IoT devices and services at the application layer into a Web of Things (WoT).However, the WoT is evolving towards large silos of things, and thus the vision of a global ubiquitous ecosystem is not fully achieved. Furthermore, even if the WoT facilitates mashing up heterogeneous IoT devices and services, existing approaches result in static IoT mashups that cannot adapt to dynamic environments and evolving user requirements. The latter emphasizes another well-recognized challenge in the IoT, that is enabling people to interact with a vast, evolving, and heterogeneous IoT.To address the above limitations, we propose an architecture for an open and self-governed IoT ecosystem composed of people and things situated and interacting in a global environment sustained by heterogeneous platforms. Our approach is to endow things with autonomy and apply the social network metaphor to createflexible networks of people and autonomous things. We base our approach on results from multi-agent and WoT research, and we call the envisioned IoT ecosystem the Social Web of Things.Our proposal emphasizes heterogeneity, discoverability and flexible interaction in the IoT. In the same time, it provides a low entry-barrier for developers and users via multiple layers of abstraction that enable them to effectively cope with the complexity of the overall ecosystem. We implement several application scenarios to demonstrate these features
Jadal, Idriss. "Un système pour l'identification et la localisation des objets en robotique." Paris 11, 1985. http://www.theses.fr/1985PA112238.
Third generation robotics is characterized by on line decision and advanced perception capabilities. The subject of this thesis is the realization of manufacturing parts recognition software to be used in future advanced robotics systems. This method proceeds by a date compression of the edge image of an object into a structural array describing outer and inner contour paths. The Fourier spectrum of each of these paths allows the object identification and ascertaining its orientation in the working area of the robot. This method is invariant under isomorphic transformations. It gives very good results recognizing objects whose edges are imperfect due to noise, shadows or specular reflexions. It is suited to most industrial parts and asks for a computing time compatible with real time handling
Bouchereau, Aymeric. "Les objets connectés au service de l'apprentissage." Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCC018.
Learning - a vital principle of evolution - ensures the transformation of primary data captured by our senses into useful knowledge or abstract and general ideas that can be used in new situations and contexts. Cognitive neuroscience shows that the mechanisms of learning are stimulated by cognitive (e.g. wondering, evaluating errors), physical (e.g. manipulating, moving) and social (e.g. debating, collaborating) engagement. The learner builds knowledge through experience, by exploring his environment, formulating hypotheses and experimenting.Learning is crucial in a context where the exponential evolution of information and communication technologies is changing objects, practices and uses. The development of the Internet of Things (IoT) transforms common objects (e.g. light bulbs, watches, cars) into connected devices (CD) that can collect data and act on the user's environment. Learning becomes both biological and artificial and allows the creation of artificial intelligence systems (AIS) that analyse large volumes of data to automate tasks and assist individuals.Technologies can support learning when the technical possibilities they offer are used to support the process of knowledge construction. Thus, this thesis focuses on learning in the context of IoT and examines how the specificities of CD can be articulated with the mechanisms of learning.In order to identify the characteristics of learning in the context of IoT, we studied existing uses of CD. Based on the state of the art, we proposed a conceptual tool describing the IoT through four dimensions of analysis: Data, Interfaces, Agents and Pervasiveness. This tool enabled us to identify, list, classify and ultimately analyse the uses of CD for learning. In the context of these uses, learning is characterised by physical commitment, contextualisation of knowledge and bringing pedagogical activities closer to reality.Building on the results of this initial work, we have developed an approach to put the specificities of CD to learn sciences. The abstract and often counter-intuitive aspect of scientific knowledge hinders their learning, partly because our perception of reality is subjective and limited by our senses. However, data collected by CD and analysed by AIS provide information about the environment that can be used to extend human perception.Therefore, the objective of our approach, translated by the Data - Representations - Interactions (DRI) model, aims at exploiting OCs and SIAs to facilitate the observation of physical phenomena. According to the DRI model, the learner interacts with representations of a physical phenomenon generated by CD and AIS. In accordance with the mechanisms of learning (e.g. constructivism, role of experience), the learner is led to make observations and manipulations, formulate hypotheses and test them. In order to evaluate the effects and constraints of the DRI model, we have designed LumIoT devices dedicated to the learning of photometric quantities (e.g. luminous flux, luminous intensity, illuminance). Then, we conducted an experiment with 17 students of the Master 1 Multimedia Products and Services of the University of Franche-Comté (Montbéliard).The results of the experiment show that the LumIoT devices, based on the DRI model, have facilitated the observation and understanding of photometric quantities. By making abstract knowledge accessible, the DRI model paves the way for learning devices using CD and AIS to mediate knowledge
Fayad, Achraf. "Protocole d’authentification sécurisé pour les objets connectés." Thesis, Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT051.
The interconnection of private resources on public infrastructure, user mobility and the emergence of new technologies (vehicular networks, sensor networks, Internet of things, etc.) have added new requirements in terms of security on the server side as well as the client side. Examples include the processing time, mutual authentication, client participation in the choice of security settings and protection against traffic analysis. Internet of Things (IoT) is in widespread use and its applications cover many aspects of today's life, which results in a huge and continuously increasing number of objects distributed everywhere.Security is no doubt the element that will improve and strengthen the acceptability of IoT, especially that this large scale deployment of IoT systems will attract the appetite of the attackers. The current cyber-attacks that are operational on traditional networks will be projected towards the Internet of Things. Security is so critical in this context given the underlying stakes; in particular, authentication has a critical importance given the impact of the presence of malicious node within the IoT systems and the harm they can cause to the overall system. The research works in this thesis aim to advance the literature on IoT authentication by proposing three authentication schemes that satisfy the needs of IoT systems in terms of security and performance, while taking into consideration the practical deployment-related concerns. One-Time Password (OTP) is an authentication scheme that represents a promising solution for IoT and smart cities environments. This research work extends the OTP principle and propose a new approach to generate OTP based on Elliptic Curve Cryptography (ECC) and Isogeny to guarantee the security of such protocol. The performance results obtained demonstrate the efficiency and effectiveness of our approach in terms of security and performance.We also rely on blockchains in order to propose two authentication solutions: first, a simple and lightweight blockchain-based authentication scheme for IoT systems based on Ethereum, and second, an adaptive blockchain-based authentication and authorization approach for IoT use cases. We provided a real implementation of our proposed solutions. The extensive evaluation provided, clearly shows the ability of our schemes to meet the different security requirements with a lightweight cost in terms of performance
Moeuf, Alexandre. "Identification des risques, opportunités et facteurs critiques de succès de l’industrie 4.0 pour la performance industrielle des PME." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLC025/document.
The SMEs, predominant actors of the industry, have to reach customer expectations that are more and more complex. One of the solutions is to improve the management of the industrial processes which includes production planning and control, performance measurement and evaluation. Lately the concept of industry 4.0 has emerged. This new approach allows the control of production processes by providing real time synchronization of flows and by enabling the production of unitary and customized products. This concept is based on emerging new technologies such as cloud computing and Internet of Things. Our research goal is to identify the industry 4.0 risks, opportunities and critical success factors regarding SMEs industrial performances. Our first work shows that the SMEs have their own specific managerial features that may undermine the adoption of the industry 4.0 concept. Our review of the scientific literature also shows that there are disparities between industry 4.0 business cases in SMEs. These business cases are also poorly documented a provide only few insights for SMEs managers. The inherent difficulty to identify detailed examples prevented us from conducting a statistical study of the industry 4.0 cases within SMEs. In order to reach our research goal, we conducted a prospective study by consulting experts. Our study shows that the major risks facing the adoption of the industry 4.0 concept in SMEs is the lack of expertise and the short-term strategy mindset. The study also shows that training is the most important success factor, that managers have a prominent role in the success and/or the failure of an industry 4.0 project, and that SMEs should be supported by external experts. Lastly, industry 4.0 offers a unique opportunity to redesign SMEs production processes and to adopt new business models. SMEs have decisive advantages toward this industrial revolution that they must use in order to keep their competitive advantages against large company
Claeys, Timothy. "Sécurité pour l'internet des objets : une approche des bas en haut pour un internet des objets sécurisé et normalisé." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM062.
The rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Formany of these products, security was merely an afterthought. Due to their advanced sensing and actuatingfunctionalities, poorly-secured IoT devices endanger the privacy and safety of their users.While the IoT contains hardware with varying capabilities, in this work, we primarily focus on the constrainedIoT. The restrictions on energy, computational power, and memory limit not only the processingcapabilities of the devices but also their capacity to protect their data and users from attacks. To secure theIoT, we need several building blocks. We structure them in a bottom-up fashion where each block providessecurity services to the next one.The first cornerstone of the secure IoT relies on hardware-enforced mechanisms. Various security features,such as secure boot, remote attestation, and over-the-air updates, rely heavily on its support. Sincehardware security is often expensive and cannot be applied to legacy systems, we alternatively discusssoftware-only attestation. It provides a trust anchor to remote systems that lack hardware support. In thesetting of remote attestation, device identification is paramount. Hence, we dedicated a part of this work tothe study of physical device identifiers and their reliability.The IoT hardware also frequently provides support for the second building block: cryptography. Itis used abundantly by all the other security mechanisms, and recently much research has focussed onlightweight cryptographic algorithms. We studied the performance of the recent lightweight cryptographicalgorithms on constrained hardware.A third core element for the security of the IoT is the capacity of its networking stack to protect the communications.We demonstrate that several optimization techniques expose vulnerabilities. For example,we show how to set up a covert channel by exploiting the tolerance of the Bluetooth LE protocol towardsthe naturally occurring clock drift. It is also possible to mount a denial-of-service attack that leverages theexpensive network join phase. As a defense, we designed an algorithm that almost completely alleviates theoverhead of network joining.The last building block we consider is security architectures for the IoT. They guide the secure integrationof the IoT with the traditional Internet. We studied the IETF proposal concerning the constrainedauthentication and authorization framework, and we propose two adaptations that aim to improve its security.Finally, the deployment of the IETF architecture heavily depends on the security of the underlying communicationprotocols. In the future, the IoT will mainly use the object security paradigm to secure datain flight. However, until these protocols are widely supported, many IoT products will rely on traditionalsecurity protocols, i.e., TLS and DTLS. For this reason, we conducted a performance study of the most criticalpart of the protocols: the handshake phase. We conclude that while the DTLS handshake uses fewerpackets to establish the shared secret, TLS outperforms DTLS in lossy networks
Mebrek, Adila. "Fog Computing pour l’Internet des objets." Thesis, Troyes, 2020. http://www.theses.fr/2020TROY0028.
Fog computing is a promising approach in the context of the Internet of Things (IoT) as it provides functionality and resources at the edge of the network, closer to end users. This thesis studies the performance of fog computing in the context of latency sensitive IoT applications. The first issue addressed is the mathematical modeling of an IoT-fogcloud system, and the performance metrics of the system in terms of energy consumed and latency. This modeling will then allow us to propose various effective strategies for content distribution and resource allocation in the fog and the cloud. The second issue addressed in this thesis concerns the distribution of content and object data in fog / cloud systems. In order to simultaneously optimize offloading and system resource allocation decisions, we distinguish between two types of IoT applications: (1) IoT applications with static content or with infrequent updates; and (2) IoT applications with dynamic content. For each type of application, we study the problem of offloading IoT requests in the fog. We focus on load balancing issues to minimize latency and the total power consumed by the system
Patrigeon, Guillaume. "Systèmes intégrés adaptatifs ultra basse consommation pour l’Internet des Objets." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS036.
The Internet of Things is an infrastructure enabling advanced services by interconnecting things. Although the large variety of Internet of Things applications involve many kinds of technical solutions, many of those are based on a typical architecture that can be divided in three layers: the perception layer, the transport layer and the services layer. The dispositive that composed the perception layer, called “sensor nodes”, are subject of technical requirements: size, security, reliability, autonomous, and long lifetime. Sensor nodes’ energy efficiency is the most critical point where traditional technologies show their limitations. New strategies and solutions are proposed to overcome this technical challenge; however, how can those be evaluated, with which tools and at which level? How emerging technologies can be optimized and integrated inside microcontrollers for Internet of Things applications? Which are the new strategies for energy management to adopt with technologies such as 28 nm FD-SOI and non-volatiles memories? What are their limitations? Will they be sufficient?To evaluate the integration of emerging technologies inside low power microcontrollers, we propose a new methodology using an FPGA-based sensor node prototyping platform. Able to operate in already deployed wireless sensor networks, we use it to perform fast and precise evaluations, taking account of the application context. We studied and evaluated multiple memory architecture configurations based on STT magnetic memories as a replacement of traditional solutions, and showed that the non-volatile STT memory technology can improve a microcontroller’s energy efficiency for embedded applications
Challita, Frédéric. "Massive MIMO channel characterization and propagation-based antenna selection strategies : application to 5G and industry 4.0." Thesis, Lille 1, 2019. http://www.theses.fr/2019LIL1I043/document.
Continuous efforts have been made to boost wireless systems performance, however, current wireless networks are not yet able to fulfill the many gaps from 4G and requirements for 5G. Thus, significant technological breakthroughs are still required to strengthen wireless networks. For instance, in order to provide higher data rates and accommodate many types of equipment, more spectrum resources are needed and the currently used spectrum requires to be efficiently utilized. 5G, or the fifth generation of mobile networks, is initially being labeled as an evolution, made available through improvements in LTE, but it will not be long before it becomes a revolution and a major step-up from previous generations. Massive MIMO has emerged as one of the most promising physical-layer technologies for future 5G wireless systems. The main idea is to equip base stations with large arrays (100 antennas or more) to simultaneously communicate with many terminals or user equipments. Using smart pre-processing at the array, massive MIMO promises to deliver superior system improvement with improved spectral efficiency, achieved by spatial multiplexing and better energy efficiency, exploiting array gain and reducing the radiated power. Massive MIMO can fill the gap for many requirements in 5G use-cases notably industrial IOT (internet of things) in terms of data rates, spectral and energy efficiency, reliable communication, optimal beamforming, linear processing schemes and so on. However, the hardware and software complexity arising from the sheer number of radio frequency chains is a bottleneck and some challenges are still to be tackled before the full operational deployment of massive MIMO. For instance, reliable channel models, impact of polarization diversity, optimal antenna selection strategies, mutual coupling and channel state information acquisition amongst other aspects, are all important questions worth exploring. Also, a good understanding of industrial channels is needed to bring the smart industry of the future ever closer.In this thesis, we try to address some of these questions based on radio channel data from a measurement campaign in an industrial scenario using a massive MIMO setup. The thesis' main objectives are threefold: 1) Characterization of massive MIMO channels in Industry 4.0 (industrial IoT) with a focus on spatial correlation, classification and impact of cross-polarization at transmission side. The setup consists in multiple distributed user-equipments in many propagation conditions. This study is based on propagation-based metrics such as Ricean factor, correlation, etc. and system-oriented metrics such as sum-rate capacity with linear precoding and power allocation strategies. Moreover, polarization diversity schemes are proposed and were shown to achieve very promising results with simple allocation strategies. This work provides comprehensive insights on radio channels in Industry 4.0 capable of filling the gap in channel models and efficient strategies to optimize massive MIMO setups. 2) Proposition of antenna selection strategies using the receiver spatial correlation, a propagation metric, as a figure of merit. The goal is to reduce the number of radio frequency chain and thus the system complexity by selecting a set of distributed antennas. The proposed strategy achieves near-optimal sum-rate capacity with less radio frequency chains. This is critical for massive MIMO systems if complexity and cost are to be reduced. 3) Proposition of an efficient strategy for overhead reduction in channel state information acquisition of FDD (frequency-division-duplex) systems. The strategy relies on spatial correlation at the transmitter and consists in solving a set of simple autoregressive equations (Yule-Walker equations). The results show that the proposed strategy achieves a large fraction of the performance of TDD (time-division-duplex) systems initially proposed for massive MIMO
Adomnicai, Alexandre. "Cryptographie légère pour l'internet des objets : implémentations et intégrations sécurisées." Thesis, Lyon, 2019. https://tel.archives-ouvertes.fr/tel-02868017.
While the internet of things (IoT) promises many advances for businesses, administrations and citizens, its deployment is a real challenge in terms of privacy and security. In order to ensure the confidentiality and the authenticity of information transmitted by these objects, numerous IoT protocols incorporate cryptographic algorithms within their specification. To date, these algorithms are the same as the ones used in traditionnal internet security protocols and thus, have not been designed with constrainted plateforms in mind. This thesis focuses on lightweight cryptography which aims at reduce as much as possible the cost of its implementation.Apart from the main goal of lightweight cryptography which is to consume less ressources than traditional algorithms, it is also valuable to take into account the integration of countermeasures against physical attacks during the design phase in order to limit their impact. Although this kind of attacks require a physical access to the target, this can be a realistic scenario as connected objets might be deployed everywhere and thus, potentially accessible by malicious people. Our works focus on the study of three lightweight cryptographic algorithms, each having a potential for industrial applications. Especially, we highlight the need of secure implementations by introducing two new side-channel attacks : one against ChaCha20, standardized by the IETF and now used in TLS 1.3, and another one against ACORN, an algorithm being part of the CAESAR portfolio
Kamgueu, Patrick Olivier. "Configuration dynamique et routage pour l'internet des objets." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0241/document.
In recent years, the growing interest of scientific and industrial community has led to the standardization of new protocols that consider the unique requirements of Wireless Sensor Networks (WSN) nodes. At network layer, RPL (IPv6 Routing Protocol for Low-power and Lossy Network) has been proposed by IETF as the routing standard for network that uses LLN nodes, namely, those where both nodes and their interconnects are constrained. They operate on low-power embedded batteries and use lossy links, making communications unreliable and lead to a significant data loss rates. This thesis aims to optimize the routing in WSNs (especially those using TCP/IP protocol stack), as well as their efficient and cost-effective connection to the Internet. First, we have proposed two new RPL objective functions. The first uses as unique routing criterion, the node remaining energy with the goal of maximizing the network lifetime. An energy model that allows the nodes to dynamically estimate their remaining energy at runtime has been implemented and integrate to the protocol. The second objective function uses fuzzy logic reasoning to combine several criteria to take Quality of Service into account. Indeed, this scheme provides a good trade-off on several inputs and requires a low memory footprint. In the last part of this thesis, we designed and implemented an architecture that enable an efficient integration of several RPL based WSNs to the Internet to achieve the Internet of Things vision
Aubry, Nicolas. "Segmentation et mesures géométriques : application aux objets tubulaires métalliques." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0110/document.
The presence of specularity on an object is a recurring problem that limits the application of many segmentation methods. Indeed, specularities are areas with a very high intensity and greatly disturb the detection when the notion of gradient of the image is used. The work carried out in this thesis makes it possible to propose a new detection method for a metallic tubular object in an image. The method avoids the notion of gradient by using the notion of intensity profile. We propose in this manuscript a process which traverses predefined rectangular areas of the image by scanning a discrete segment in search of a reference intensity profile. This work is part of a collaboration with Numalliance, a company that manufactures machine tools. This collaboration enables this method to be put into a real industrial application as part of an automatic and real-time quality control system for parts manufactured by machine tools. To this end, the method presented must be fast, robust to the specularities and to the industrial environment while being sufficiently precise to make it possible to conclude on the conformity or not of the part
Bui, Duy-Hieu. "Système avancé de cryptographie pour l'internet des objets ultra-basse consommation." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAT001/document.
The Internet of Things (IoT) has been fostered by accelerated advancements in communication technologies, computation technologies,sensor technologies, artificial intelligence, cloud computing, and semiconductor technologies. In general, IoT contains cloud computing to do data processing, communication infrastructure including the Internet, and sensor nodes which can collect data, send them through the network infrastructure to the Internet, and receive controls to react to the environment. During its operations, IoT may collect, transmit and process secret data, which raise security problems. Implementing security mechanisms for IoT is challenging because IoT organizations include millions of devices integrated at multiple layers, whereas each layer has different computation capabilities and security requirements. Furthermore, sensor nodes in IoT are intended to be battery-based constrained devices with limited power budget, limited computation, and limited memory footprint to reduce costs. Implementing security mechanisms on these devices even encounters more challenges. This work is therefore motivated to focus on implementing data encryption to protect IoT sensor nodes and systems with the consideration of hardware cost, throughput and power/energy consumption. To begin with, a ultra-low-power block cipher crypto-accelerator with configurable parameters is proposed and implemented in ST 28nm FDSOI technology in SNACk test chip with two cryptography modules: AES and PRESENT. AES is a widely used data encryption algorithm for the Internet and currently used for new IoT proposals, while PRESENT is a lightweight algorithm which comes up with reduced security level but requires with much smaller hardware area and lower consumption. The AES module is a 32-bit datapath architecture containing multiple optimization strategies supporting multiple security levels from 128-bit keys up to 256-bit keys. The PRESENT module contains a 64-bit round-based architecture to maximize its throughput. The measured results indicate that this crypto-accelerator can provide medium throughput (around 20Mbps at 10MHz) while consumes less than 20uW at normal condition and sub-pJ of energy per bit. However, the limitation of crypto-accelerator is that the data has to be read into the crypto-accelerator and write back to memory which increases the power consumption. After that, to provide a high level of security with flexibility and configurability to adapt to new standards and to mitigate to new attacks, this work looks into an innovative approach to implement the cryptography algorithm which uses the new proposed In-Memory-Computing SRAM. In-Memory Computing SRAM can provide reconfigurable solutions to implement various security primitives by programming the memory's operations. The proposed scheme is to carry out the encryption in the memory using the In-Memory-Computing technology. This work demonstrates two possible mapping of AES and PRESENT using In-Memory Computing
Bernasconi, Gianenrico. "L' objet portatif : production, consommation, représentations à l'âge pré-industriel : un document matériel entre cultures techniques et usages." Paris 1, 2009. http://www.theses.fr/2009PA010656.
Lemke, Laurent. "Modèles partagés et infrastructures ouverte pour l'internet des objets de la ville Intelligente." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM022/document.
Nowadays cities face several challenges and are concerned by ecological, energetic, economical, and demographical aspects. Smart cities, equipped with sensors, actuators, and digital infrastructures, are meant to tackle these issues.Current smart cities are operated by several actors without sharing sensor data or accesses to the actuators. This is a vertical organization, in which each actor deploys its own sensors and actuators, and manages its own digital infrastructure. Each actor may be interested in a different aspect of city management, for instance traffic management, air control, etc. The current trend is a transition towards a more horizontal organization, based on an open and shared mediation platform. In such a platform, sensor data and accesses to actuators can be shared among several actors. The costs related to nfrastructure deployment and management are therefore reduced for each individual actor. This PhD is a contribution to this volution towards horizontal organizations, with open and shared platforms. We propose: (1) an abstraction layer for the ontrol and supervision of the city; (2) a concurrency management mechanism; (3) a coordination mechanism that helps haring actuators; (4) a proof-of-concept implementation of these contributions. The abstraction layer we propose helps users control and supervise a city. It is based upon formal models inspired by the ones used in the programming of reactive systems. They represent the physical elements present in each smart city, with genericity principles. In order to ease application development, the interface of those models is made uniform. Since applications, especially control ones, may ave real-time constraints, we also list the constraints this poses on distributed infrastructures. As soon as actuators are shared, conflicts may occur between users. Our proposals include a concurrency management mechanism, based on eservation principles. We also provide a coordination mechanism for the users to be able to perform several actions in an tomic way.All these principles have been implemented as a proof of concept. We review several use cases, to demonstrate he potential benefits of our proposals
Naas, Mohammed Islam. "Placement des données de l'internet des objets dans une infrastructure de fog." Thesis, Brest, 2019. http://www.theses.fr/2019BRES0014/document.
In the coming years, Internet of Things (IoT) will be one of the applications generating the most data. Nowadays, IoT data is stored in the Cloud. As the number of connected objects increases, transmitting the large amount of produced data to the Cloud will create bottlenecks. As a result, latencies will be high and unpredictable. In order to reduce these latencies, Fog computing has been proposed as a paradigm extending Cloud services to the edge of the network. It consists of using any equipment located in the network (e.g. router) to store and process data. Therefore, the Fog presents a heterogeneous infrastructure. Indeed, its components have differences in computing performance, storage capacity and network interconnections. This heterogeneity can further increase the latency of the service. This raises a problem: the wrong choice of data storage locations can increase the latency of the service. In this thesis, we propose a solution to this problem in the form of four contributions: 1. A formulation of the IoT data placement problem in the Fog as a linear program. 2. An exact solution to solve the data placement problem using the CPLEX, a mixed linear problem solver. 3. Two heuristics based on the principle of “divide and conquer” to reduce the time of placement computation. 4. An experimental platform for testing and evaluating solutions for IoT data placement in the Fog, integrating data placement management with iFogSim, a Fog and IoT environment simulator
Hachem, Sara. "Middleware pour l'Internet des Objets Intelligents." Phd thesis, Université de Versailles-Saint Quentin en Yvelines, 2014. http://tel.archives-ouvertes.fr/tel-00960026.
Billet, Benjamin. "Système de gestion de flux pour l'Internet des objets intelligents." Thesis, Versailles-St Quentin en Yvelines, 2015. http://www.theses.fr/2015VERS012V/document.
The Internet of Things (IoT) is currently characterized by an ever-growing number of networked Things, i.e., devices which have their own identity together with advanced computation and networking capabilities: smartphones, smart watches, smart home appliances, etc. In addition, these Things are being equipped with more and more sensors and actuators that enable them to sense and act on their environment, enabling the physical world to be linked with the virtual world. Specifically, the IoT raises many challenges related to its very large scale and high dynamicity, as well as the great heterogeneity of the data and systems involved (e.g., powerful versus resource-constrained devices, mobile versus fixed devices, continuously-powered versus battery-powered devices, etc.). These challenges require new systems and techniques for developing applications that are able to (i) collect data from the numerous data sources of the IoT and (ii) interact both with the environment using the actuators, and with the users using dedicated GUIs. To this end, we defend the following thesis: given the huge volume of data continuously being produced by sensors (measurements and events), we must consider (i) data streams as the reference data model for the IoT and (ii) continuous processing as the reference computation model for processing these data streams. Moreover, knowing that privacy preservation and energy consumption are increasingly critical concerns, we claim that all the Things should be autonomous and work together in restricted areas as close as possible to the users rather than systematically shifting the computation logic into powerful servers or into the cloud. For this purpose, our main contribution can be summarized as designing and developing a distributed data stream management system for the IoT. In this context, we revisit two fundamental aspects of software engineering and distributed systems: service-oriented architecture and task deployment. We address the problems of (i) accessing data streams through services and (ii) deploying continuous processing tasks automatically, according to the characteristics of both tasks and devices. This research work lead to the development of a middleware layer called Dioptase, designed to run on the Things and abstract them as generic devices that can be dynamically assigned communication, storage and computation tasks according to their available resources. In order to validate the feasability and the relevance of our work, we implemented a prototype of Dioptase and evaluated its performance. In addition, we show that Dioptase is a realistic solution which can work in cooperation with legacy sensor and actuator networks currently deployed in the environment
Connier, Jean. "Conception et réalisation d'un système multi-fonctionnel d'aide à la mobilité pour personnes mavoyantes et aveugles." Thesis, Université Clermont Auvergne (2017-2020), 2019. http://www.theses.fr/2019CLFAC097.
Visual impairment and blindness are sources of mobility difficulties for the affected people. In orderto lighten the burden of these difficulties, many mobility aids have been imagined, designed, tested, and more or less adopted. Designers of such assistive systems soon run into the complexity of the issue, which stands at the intersection of three domains that are, by themselves, complex: visual impairment, mobility, and perception.Having decided to design an electronic assistive system from the beginning, we tried to step back and analyzed a wide range of blind aids: white canes, mobile electronic devices serving different mobility purposes, urban systems, and systems not primarily designed for mobility. Their diversity helped us analyze assistive systems through several prisms: according to their technical characteristics, their functions, their shape, and their dependence to an infrastructure. Taken individually, each of these approaches quickly shows its limits, but, together, they draw an interesting portrait of the existing devices. Besides these rather classical approaches, we propose a new model for analyzing assistive systems, which relies on the way these systems take place in a person's perception / mobility process. This model has the advantages of being, a priori, relevant forall assistive systems – in spite of their dissimilarity – and meaningful for both evaluation and classification.We have designed and built an electronic mobility aid, called the 2SEES system. Like its predecessor, the SEES system, the 2SEES relies on three platforms: a smart cane, a smartphone, anda cloud computing back-end. The issues of energy consumption and geographical universality, essential for any mobile device, are made explicit and studied. A novelty of the 2SEES resides in its account of reliability issues ; it is thus designed around the complex equilibrium between energy consumption, universality, and reliability. Despite their importance in a system destined to be adopted by end users, these three notions are scarcely visible in the relevant literature.To concurrently enhance robustness and autonomy, we have integrated several sensors and processors in the smart cane, both by introducing redundancy, for fault tolerance, and by integratingheterogeneous sensors, for robustness against the diversity of environments.Two aspects of this equilibrium have been further studied. First, the need for robustness has been highlighted by a study of affinities between obstacle sensors and several types of potential obstacle materials. Secondly, we have tried to develop an energy-efficient indoor localization function that islittle dependent on infrastructures, and therefore easily scalable. This function works with embedded sensors (wheel encoder, inertial measurement unit) and a simplified particle filter, which estimates the position by checking the coherence of trajectories derived from sensor data against themap of the location.In addition to this work on the balance between robustness, energy consumption, and universality, we have developed a novel function, named SO2SEES, which allows communication between usersof the 2SEES and smart objects. This function enables users to ask, in natural language, questions tothe 2SEES, which are answered using information coming from surrounding smart objects. In orderto keep the system simple, users do not formulate their own questions, but are instead invited to pick them in a set of predefined questions, which are proposed by the system according to the nearby objects and the information they offer. This mode of operation shifts the system from a natural language processing artificial intelligence to an expert system working on dynamic and distributed knowledge bases. In this latter configuration, the main issue is the interoperability between the 2SEES and the smart objects and their back-ends that take part in the functionality
Ben, Fredj Sameh. "Intergiciel sémantique pour la recherche des services de l'internet des objets." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0063/document.
With the advent of the Internet of Things (IoT), we are facing a proliferation of connected devices distributed over physical locations, so called smart spaces and offering IoT services. Enabling an easy and seamless discovery of these IoT services is crucial for the success of the Internet of Things. The characteristics of IoT services, such as their sheer number, their heterogeneity and their dynamicity induced by the mobility of the related devices, make discovering them a challenge. In this thesis, we propose a system architecture and the associated mechanisms to enable efficient and scalable semantic-based IoT service discovery supporting dynamic contexts. Our approach relies on distributed semantic gateways that embed clustering, information aggregation and semantic routing mechanisms
Pittoli, Philippe. "Influence d'une architecture de type maître-esclave dans les problématiques de sécurité de l'Internet des objets." Thesis, Strasbourg, 2019. http://www.theses.fr/2019STRAD006/document.
The Internet of things is a network design where "things" are connected to the Internet, such as thermometers or lights. These objects are constrained in memory, computational capacity and communication (packet size, shared medium). The thesis is focused on issues around those constraints. A client willing to send a request to an object may either establish a direct connection to the object (end-to-end architecture) or establish a connection to the network gateway, which is not constrained in memory or computation capabilities, and will be used as a broker between clients and objects (master-slave architecture). This purpose of the thesis is to understand and to spotlight the differences between those two kinds of architectures and to determine their viability in an IoT context
Pierrette, Marjorie Moch Annie. "L'environnement olfactif de la perception à la gêne. Le cas d'un site industriel /." S. l. : S. n, 2009. http://bdr.u-paris10.fr/theses/internet/2009PA100068.pdf.
Xia, Ye. "Combining Heuristics for Optimizing and Scaling the Placement of IoT Applications in the Fog." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAM084/document.
As fog computing brings processing and storage resources to the edge of the network, there is an increasing need of automated placement (i.e., host selection) to deploy distributed applications. Such a placement must conform to applications' resource requirements in a heterogeneous fog infrastructure, and deal with the complexity brought by Internet of Things (IoT) applications tied to sensors and actuators. This paper presents four heuristics to address the problem of placing distributed IoT applications in the fog. By combining proposed heuristics, our approach is able to deal with large scale problems, and to efficiently make placement decisions fitting the objective: minimizing placed applications' average response time. The proposed approach is validated through comparative simulation of different heuristic combinations with varying sizes of infrastructures and applications
Abdelghani, Wafa. "A multi-dimensional trust-model for dynamic, scalable and resources-efficient trust-management in social internet of things." Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30231.
The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by giving them the ability to connect to the Internet, communicate and interact. The integration of the social component in the IoT has given rise to the Social Internet of Things (SIoT), which has overcome various issues such as interoperability, navigability and resource/service discovery. In this type of environment, participants compete to offer a variety of attractive services. Some of them resort to malicious behavior to propagate poor quality services. They launch so-called Trust-Attacks (TA) and break the basic functionality of the system. Several works in the literature have addressed this problem and have proposed different trust-models. Most of them have attempted to adapt and reapply trust models designed for traditional social networks or peer-to-peer networks. Despite the similarities between these types of networks, SIoT ones have specific particularities. In SIoT, there are different types of entities that collaborate: humans, devices, and services. Devices can have very limited computing and storage capacities, and their number can be as high as a few million. The resulting network is complex and highly dynamic, and the impact of Trust-Attacks can be more compromising. In this work, we propose a Multidimensional, Dynamic, Resources-efficient and Scalable trust-model that is specifically designed for SIoT environments. We, first, propose features to describe the behavior of the three types of nodes involved in SIoT networks and to quantify the degree of trust according to the three resulting Trust-Dimensions. We propose, secondly, an aggregation method based on Supervised Machine-Learning and Deep Learning that allows, on the one hand, to aggregate the proposed features to obtain a trust score allowing to rank the nodes, but also to detect the different types of Trust-Attacks and to counter them. We then propose a hybrid propagation method that allows spreading trust values in the network, while overcoming the drawbacks of centralized and distributed methods. The proposed method ensures scalability and dynamism on the one hand, and minimizes resource consumption (computing and storage), on the other. Experiments applied to synthetic data have enabled us to validate the resilience and performance of the proposed model
Patel, Pankesh. "Environnement de développement d'applications pour l'Internet des objets." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2013. http://tel.archives-ouvertes.fr/tel-00927150.
Le, Kim-Hung. "Mécanismes d’interopérabilité pour les applications industrielles de l’Internet des Objets et la Ville Intelligente." Thesis, Sorbonne université, 2019. http://www.theses.fr/2019SORUS225.
With the rapid growth of Internet technologies as well as the explosion of connected objects, Internet of Things (IoT) is considered an Internet revolution that positively affects several life aspects. The integration of IoT solutions and cloud computing, namely cloud-based IoT, is a crucial concept to meet these demands. However, two major challenges of the cloud-based IoT are interoperability and reliability. In this thesis, our main objective is to deal with the interoperability and reliability issues that arise from large-scale deployment. The proposed solutions spread over architectures, models, and algorithms, ultimately covering most of the layers of the IoT architecture. At the communication layer, we introduce a method to interoperate heterogeneous IoT connections by using a connector concept. We then propose an error and change point detection algorithm powered by active learning to enhance IoT data reliability. To maximize usable knowledge and business value from this cleaned data and make it more interoperable, we introduce a virtual sensor framework that simplifies creating and configuring virtual sensors with programmable operators. Furthermore, we provide a novel descriptive language, which semantically describes groups of Things. To ensure the device reliability, we propose an algorithm that minimizes energy consumption by real-time estimating the optimal data collection frequency. The efficiency of our proposals has been practically demonstrated in a cloud-based IoT platform of a start-up company
Han, Ngoc Son. "Semantic service provisioning for 6LoWPAN : powering internet of things applications on Web." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0018/document.
This dissertation proposes a complete solution to provision 6LoWPAN services with semantic annotation that enables the development of IoT applications on Web. We aim to bring smart object services to the Web and make them accessible by plenty of existing Web APIs in consideration of 6LoWPAN constraints such as limited resources (ROM, RAM, and CPU), low-power, and low-bitrate communication links. There are four contributions: (i) The first contribution is about the overall architecture of the semantic service provisioning for IoT application on Web consisting of three subsystems: service communication, service provisioning, and service integration. (ii) The second contribution studies the internetworking model between 6LoWPAN and regular IPv6 networks by a design, implementation, and performance evaluation of a 6LoWPAN consisting of MTM-CM5000-MSP TelosB motes with TI MSP430F1611 microprocessors and CC2420 IEEE 802.15.4 radio transceivers for smart objects, and Raspberry Pi for an edge router; (iii) The third contribution presents the detailed architecture, algorithms, and mechanisms for provisioning reliable, scalable, and secure smart object services with respect to its resource-constrained requirements; (iv) The fourth contribution is in application domain for service integration in which we apply the proposed architecture on two innovative IoT applications on Web: a building automation system (SamBAS) and a Social IoT platform (ThingsChat)
Gatouillat, Arthur. "Towards smart services with reusable and adaptable connected objects : An application to wearable non-invasive biomedical sensors." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEI123/document.
The rapid growth of fixed and mobile smart objects raises the issue of their integration in everyday environment, e.g. in e-health or home-automation contexts. The main challenges of these objects are the interoperability, the handling of the massive amount of data that they generate, and their limited resources. Our goal is to take a bottom-up approach in order to improve the integration of smart devices to smart services. To ensure the efficient development of our approach, we start with the study of the design process of such devices regardless of specific hardware or software through the consideration of their cyber-physical properties. We thus develop two research directions: the specification of a service-oriented design method for smart devices with formal considerations in order to validate their behavior, and the proposal of a self-adaptation framework in order to handle changing operating context through self-reasoning and the definition of a declarative self-adaptation objectives specification language. The testing of these contributions will be realized through the development of a large-scale experimental framework based on a remote diagnostics case-study relying on non-invasive wearable biomedical sensors
Challal, Yacine. "Sécurité de l'Internet des Objets : vers une approche cognitive et systémique." Habilitation à diriger des recherches, Université de Technologie de Compiègne, 2012. http://tel.archives-ouvertes.fr/tel-00866052.
Bouchaud, François. "Analyse forensique des écosystèmes intelligents communicants de l'internet des objets." Thesis, Lille, 2021. http://www.theses.fr/2021LILUI014.
With the development of the Internet of Things, searching for data in a digital environment is an increasingly difficult task for the forensic investigator. It is a real challenge, especially given the heterogeneity of the connected objects. There is a lack of standardization in communication architectures and data management policies. It is accompanied by dependencies between connected ecosystems, especially through hidden links and fragmented information. In this thesis, we suggest adjusting the traditional approach of digital investigation to the constraints of the Internet of Things. We develop methodologies and tools to understand and analyze the connected environment. We assume that the crime scene is a connected whole and not an aggregate of independent digital objects. It contains key data for understanding and contextualizing a past event or phenomenon as evidence for the criminal trial. Digital forensics is considered to be the og extit{application of science to the identification, collection, examination, and analysis, of data while preserving the integrity of the information and maintaining a strict chain of custody for the data fg~ (National Institute of Standards and Technology). Faced with a crime scene, the investigator seeks to understand the criminal event. He examines the data stored in the physical medium and/or in a remote part of the cloud. Our work develops a process of rapid identification of the phenomenon according to four phases: detection, localization, object recognition and information crosschecking. It is enriched with radio signature search tools~: single-sensor and multi-sensor mesh network. This approach is built around the problem of apprehending a multiform connected environment, containing devices that are not always visible or identifiable during a field approach. We integrate in our study the strategy of equipment collection. The challenge lies in the ability to extract one or more connected objects, without compromising the stored data, to place them in a controlled and secure environment. The object is maintained in a state that guarantees the non-alteration or loss of data. The study includes a first phase of understanding the physical environment and dependencies. It seeks to determine the mechanisms of information migration to online platforms and to isolate groups of objects by intelligently breaking the connections. Devices are extracted, then packaged and sealed according to their technical characteristics and the connected infrastructure. We then deepen the exploitation of the information collected using forensic methods. The data is then analyzed according to temporal, spatial and contextual axes. We also propose a classification and a prioritization of the connected structure according to the characteristics of the desired data. The work gives a reading of the life cycle of the data within the Internet of Things infrastructure. In a prospective approach, we deepen the questions of the fine identification of the connected object according to these hardware and software characteristics. The acoustic signature of electronics appears as a relevant physical property in the study of equipment. This feature completes our range of tools in the identification of connected objects
Asgharzadeh, Mohammadmahdi. "Étude et développement d'un système de communication radio à haute sensibilité destiné à l'internet des objets." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAT096.
The Internet of Things (IoT) is a new approach in which the Internet connection extends into real-world objects to make them communicate with each other. The communication for IoT can be established using cellular networks or the licence-free frequencies in the Industrial, Scientific and Medical (ISM) bands. There are many communication standards for IoT applications. There are also many modulation techniques. Nevertheless, there is no perfect solution for all the needs and requirements in all domains. The choice of the right communication standard and modulation technique is unique for each use-case and depends on each specific application.In this research, instead of developing a new communication standard or a new modulation technique, we improved the receiver sensitivity while using the existing modulation technique and communication standards. Improving the receiver sensitivity increases the link budget. A better link budget, under certain propagation conditions, increases the communication distance. Different radio communication standards and conventional techniques based on Low Power Wide Area Networks (LPWAN) are presented in the first chapter.The theoretical basis of the time-synchronous averaging (TSA) method as a powerful signal processing method to improve the sensitivity of the RF receiver and the simulation methodologies are presented in chapter two. We also study the impact of phase noise on the MSK modulator in this chapter.The synchronisation problem, as well as the different solutions to improve it, are presented in chapter three. Synchronisation in phase and frequency are studied separately, and an innovative method has been developed to combine the synchronisation process with averaging.The performance of the synchronised averaging method with and without new synchronisation techniques was measured, and the results are presented in chapter four. The processing gain from the theoretical calculation is compared with the measurement results too
Baqa, Hamza. "Realization of trust by a semantic self-adaptation in the Internet of Things." Thesis, Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS004.
In the blooming era of the Internet of Things (IoT), trust has become a vital factor for provisioning reliable smart services without human intervention by reducing risk in autonomous decision making. However, the merging of physical objects, cyber components and humans in the IoT infrastructure has introduced new concerns for the evaluation of trust. Consequently, a large number of trust-related challenges have been unsolved yet due to the ambiguity of the concept of trust and the variety of divergent trust indicators, models and management mechanisms in different IoT scenarios. In this PhD thesis, my ultimate goal is to propose an efficient and practical trust evaluation for any IoT ecosystems. To achieve this goal, the first important objective is to augment the generic trust concept and conceptual model of trust in order to come up with a comprehensive understanding of trust, influencing factor and relevant Trust Indicators (TI) in the context of IoT. Following the catalyst, as the second objective, a trust model called REK comprised of the triad Reputation, Experience and Knowledge TIs is proposed which covers multi-dimensional aspects of trust by incorporating heterogeneous information from direct observation, personal experiences to global opinions. Knowledge TI is as “direct trust” rendering a trustor’s understanding of a trustee in respective scenarios that can be obtained based on limited available information about characteristics of the trustee, environment and the trustor’s perspective using a variety of techniques. Experience and Reputation TIs are originated from social features and extracted based on previous interactions among entities in IoT. The mathematical models and calculation mechanisms for the Experience and Reputation TIs also proposed leveraging sociological behaviours of humans in the real-world; and being inspired by the Google PageRank in the web-ranking area, respectively. Things are expected to live in different “domains” and “contexts” during their lifetime. Information generated/associated with Things should be manageable by multiple, diverse stakeholders with different roles, information and functionalities with many access levels, ecosystems with different trust level and security primitives. In that sense, as third objective of this thesis, a novel blockchain-enhanced IoT data-sharing framework named Semantic Smart Contract (SSC) is proposed taking full advantage of the provisions offered by the blockchain and semantics.The feasibility and effectiveness of the REK model, based on the proposed trust indicator, and associated Trust sharing mechanisms are proved not only by the theoretical analysis but also by real-world applications deployed in our Wise-IoT and SMESEC EU projects
Lahbib, Asma. "Distributed management framework based on the blockchain technology for industry 4.0 environments." Thesis, Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS017.
The evolution of the Internet of Things (IoT) started decades ago as part of the first face of the digital transformation, its vision has further evolved due to a convergence of multiple technologies, ranging from wireless communication to the Internet and from embedded systems to micro-electromechanical systems. As a consequence thereof, IoT platforms are being heavily developed, smart factories are being planned to revolutionize the industry organization and both security and trust requirements are becoming more and more critical. The integration of such technologies within the manufacturing environment and processes in combination with other technologies has introduced the fourth industrial revolution referred to also as Industry 4.0. In this future world machines will talk to machines (M2M) to organize the production and coordinate their actions. However opening connectivity to the external world raises several questions about data and IT infrastructure security that were not an issue when devices and machines were controlled locally and just few of them were connected to some other remote systems. That’s why ensuring a secure communication between heterogeneous and reliable devices is essential to protect exchanged information from being stolen or tampered by malicious cyber attackers that may harm the production processes and put the different devices out of order. Without appropriate security solutions, these systems will never be deployed globally due to all kinds of security concerns. That’s why ensuring a secure and trusted communication between heterogeneous devices and within dynamic and decentralized environments is essential to achieve users acceptance and to protect exchanged information from being stolen or tampered by malicious cyber attackers that may harm the production processes and put the different devices out of order. However, building a secure system does not only mean protecting the data exchange but it requires also building a system where the source of data and the data itself is being trusted by all participating devices and stakeholders. In this thesis our research focused on four complementary issues, mainly (I) the dynamic and trust based management of access over shared resources within an Industry 4.0 based distributed and collaborative system, (ii) the establishment of a privacy preserving solution for related data in a decentralized architecture while eliminating the need to rely on additional third parties, (iii) the verification of the safety, the correctness and the functional accuracy of the designed framework and (iv) the evaluation of the trustworthiness degree of interacting parties in addition to the secure storage and sharing of computed trust scores among them in order to guarantee their confidentiality, integrity and privacy. By focusing on such issues and taking into account the conventional characteristics of both IoT and IoT enabled industries environments, we proposed in this thesis a secure and distributed framework for resource management in Industry 4.0 environments. The proposed framework, enabled by the blockchain technology and driven by peer to peer networks, allows not only the dynamic access management over shared resources but also the distribute governance of the system without the need for third parties that could be their-selves vulnerable to attacks. Besides and in order to ensure strong privacy guarantees over the access control related procedures, a privacy preserving scheme is proposed and integrated within the distributed management framework. Furthermore and in order to guarantee the safety and the functional accuracy of our framework software components, we focused on their formal modeling in order to validate their safety and compliance with their specification. Finally, we designed and implemented the proposal in order to prove its feasibility and analyze its performances
El, Rachkidi Elie. "Modelling and placement optimization of compound services in a converged infrastructure of cloud computing and internet of things." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLE030/document.
The convergence of the Internet of Things (IoT) and Cloud Computing technologies is a promising approach. On the one hand, Cloud Computing provides virtually unlimited computing, networking, and storage resources for constrained IoT devices. On the other hand, the IoT enables the interaction of cloud services with real world things. Such integration stimulates innovation in both areas and provides novel service delivery models such as the Sensingas a Service in different application domains (i.e. healthcare, transportation, smart-city, smartbuilding).In such convergence, things are abstracted and offered as cloud services accessible over the Internet from any place and at any time. Such abstractions are known as Virtual Objects (VOs) and connect things to traditional cloud services (e.g. data analytics, storageservices) to deliver IoT applications. In this thesis, we consider first a partial integration of the IoT and Cloud Computing. Such integration focuses on delivering the IoT within a single service level of Cloud Computing,namely: the application, the platform, or the infrastructure level. In this context, IoT and CloudComputing resources are provisioned separately. We focus in this work on the orchestration of VOs in a cloud infrastructure. For this purpose, we define a provisioning algorithm based on a sharing strategy where each connected object is associated with a single VO and can be consumed by multiple applications. We propose two linear programs to perform the provisioning of VOs. The first considers no previously deployed VOs in the infrastructure, while the other takes into consideration pre-deployed VOs. Our approach minimizes VOs operational cost and communication latency in both cases compared to those with a non-sharing strategy. The second part of this thesis considers a full integration of the IoT and Cloud Computing. We refer to such integration as the Cloud of Things (CoT). In this context, a customer should be able to request end-to-end IoT application provisioning, deployment, auto-scaling, and release on the fly with minimal management efforts. In this thesis, we address the provisioning aspect. We define a resource-oriented model able to describe an IoT application request and a CoT infrastructure on different service levels. We base our model on the OCCI specifications defined by the OGF. Furthermore, we define a single stage provisioning algorithm to orchestrate a described IoT application into a CoT infrastructure. The algorithm considers cloud and IoT resources simultaneously. Simulations show that a one-stage provisioning process is 10%−20%more efficient than two separate orchestration processes for cloud and IoT resources