LoT is a rapidly emerging paradigm that provides a way to the user to instrument and control a large variety of objects interacting between each other over the Internet. In IoT systems, the security risks are multiplied as they involve hetero- geneous devices that are connected to a shared network and that carry critical tasks, and hence, are targets for malicious users. In this thesis, we propose a security-based framework for modeling IoT systems where attack trees are defined alongside the model to detect and prevent security risks in the system. The language we implemented aims to model the IoT paradigm in a simple way. The IoT systems are composed of entities having some communication capabilities between each other. Two entities can c...
National audienceToday, the deployment of the Internet of Things (IoT) technologies is growing in al...
The Internet of Things (IoT) is nowadays ubiquitous in all spheres of life. Its applications can be ...
International audienceWe propose a security-based modeling language for IoT systems with two importa...
LoT is a rapidly emerging paradigm that provides a way to the user to instrument and control a large...
Attack trees are graphical representations of the different scenarios that can lead to a security fa...
International audienceThe control and protection of a user data is a very important aspect in the de...
The Internet of Things is evolving rapidly, with more and more protocols and objects being deployed,...
The heterogeneous nature of the Internet of Things (IoT) represents a big challenge in many differen...
In this paper, we show how to derive formal spec- ifications of secure IoT systems by a process that...
The term Internet of Things (IoT) refers to the increasing number of devices that are connected to c...
The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human ...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
IoT systems are revolutionizing our life by providing ubiquitous computing, inter-connectivity, and ...
peer reviewedPerforming a thorough security risk assessment of an organisation has always been chall...
National audienceToday, the deployment of the Internet of Things (IoT) technologies is growing in al...
The Internet of Things (IoT) is nowadays ubiquitous in all spheres of life. Its applications can be ...
International audienceWe propose a security-based modeling language for IoT systems with two importa...
LoT is a rapidly emerging paradigm that provides a way to the user to instrument and control a large...
Attack trees are graphical representations of the different scenarios that can lead to a security fa...
International audienceThe control and protection of a user data is a very important aspect in the de...
The Internet of Things is evolving rapidly, with more and more protocols and objects being deployed,...
The heterogeneous nature of the Internet of Things (IoT) represents a big challenge in many differen...
In this paper, we show how to derive formal spec- ifications of secure IoT systems by a process that...
The term Internet of Things (IoT) refers to the increasing number of devices that are connected to c...
The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human ...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
IoT systems are revolutionizing our life by providing ubiquitous computing, inter-connectivity, and ...
peer reviewedPerforming a thorough security risk assessment of an organisation has always been chall...
National audienceToday, the deployment of the Internet of Things (IoT) technologies is growing in al...
The Internet of Things (IoT) is nowadays ubiquitous in all spheres of life. Its applications can be ...
International audienceWe propose a security-based modeling language for IoT systems with two importa...