Privacy notion is frequently linked with cyber attack examples by media and scientific researches. In 2012, the hacking of 12 millions Apple user identifiers demonstrates that connected objects represent leaks exploited by hackers to access to user personal data. In this thesis, we will extend the privacy notion to the objects. To do this, we will show that in wireless sensor networks where communications are carried out from machine-to-machine, the knowledge of the static addresses of the devices within the network discloses information allowing deduction about elements of context and environment.Nowadays, the wireless communication standards provide security mechanisms whatever the communication protocols used including the low power ones...
This paper describes how mobile device apps can inadvertently broadcast personal information through...
In this document, we focus on ways of increasing the security of wireless ad-hoc networks. These net...
International audienceWe expose concretely the information leakage occurring in an IEEE 802.15.4-bas...
Privacy notion is frequently linked with cyber attack examples by media and scientific researches. I...
Les médias et de nombreuses études scientifiques évoquent fréquemment la notion de vie privée en lie...
A growing number of devices carried by users are equipped with wireless technologies such as Bluetoo...
We witnessed, in the last few years, the massive expansion of the Internet of Things (IoT) to multip...
The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devic...
The thesis focuses on security in Mobile Ad hoc Networks (MANETs) [RFC 2501]. The lack of any centra...
National audienceThe massive deployment of connected objects, forming the Internet of Things (IoT), ...
Le déploiement massif des objets connectés, formant l'Internet des Objets ou IoT, bouleverse aujourd...
Also known as the Internet of Things (IoT), the proliferation of connected objects offers unpreceden...
International audienceWi-Fi (IEEE 802.11) networks are an abundant data source that may serve differ...
International audienceThis work is about wireless communications technologies embedded in portable d...
International audienceThis work is about wireless communications technologies embedded in portable d...
This paper describes how mobile device apps can inadvertently broadcast personal information through...
In this document, we focus on ways of increasing the security of wireless ad-hoc networks. These net...
International audienceWe expose concretely the information leakage occurring in an IEEE 802.15.4-bas...
Privacy notion is frequently linked with cyber attack examples by media and scientific researches. I...
Les médias et de nombreuses études scientifiques évoquent fréquemment la notion de vie privée en lie...
A growing number of devices carried by users are equipped with wireless technologies such as Bluetoo...
We witnessed, in the last few years, the massive expansion of the Internet of Things (IoT) to multip...
The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devic...
The thesis focuses on security in Mobile Ad hoc Networks (MANETs) [RFC 2501]. The lack of any centra...
National audienceThe massive deployment of connected objects, forming the Internet of Things (IoT), ...
Le déploiement massif des objets connectés, formant l'Internet des Objets ou IoT, bouleverse aujourd...
Also known as the Internet of Things (IoT), the proliferation of connected objects offers unpreceden...
International audienceWi-Fi (IEEE 802.11) networks are an abundant data source that may serve differ...
International audienceThis work is about wireless communications technologies embedded in portable d...
International audienceThis work is about wireless communications technologies embedded in portable d...
This paper describes how mobile device apps can inadvertently broadcast personal information through...
In this document, we focus on ways of increasing the security of wireless ad-hoc networks. These net...
International audienceWe expose concretely the information leakage occurring in an IEEE 802.15.4-bas...