The demand for internet of Things (IoT) services is increasing exponentially, and a large number of devices are being deployed. However, these devices can represent a serious threat to the security of the deployment network and a potential entry-point when exploited by the adversaries. Thus, there is an imminent need to perform a secure association approach of the IoT objects before being rendered operational on the network of the user. This procedure is referred to as secure bootstrapping, and it primarily guarantees the confidentiality and the integrity of the data exchanges between the user and the devices. Secondly, this process provides an assurance on the identity and the origin of these objects.Due to scalability limitations, the fir...
The new decentralized computing paradigm introduced by Machine-to-Machine (M2M) communications and t...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
La société de l’information dans laquelle nous vivons repose notamment sur notre capacité à échanger...
La demande de services qui se basent sur l'Internet des objets (IoT) augmente de manière exponentiel...
The rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Form...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
Today mobile devices are an integral part of our lives with the development of applications. In addi...
The 5th Generation Cellular Network Technology (5G) will be the network supporting the Internet of T...
The origin of the idea of adding intelligence to basic objects and making them communicate has been ...
The research work practiced in this PhD program is dedicated to investigating the use of machine lea...
National audienceThe most difficult problem in the domain of privacy is the one of extended data pro...
The work in this thesis focused on creating a cyber security solution with the ability to protect, i...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
Nowadays, the use of Internet of Things (IoT) devices in our personal and work space makes our every...
Security is a crucial requirement in the applications based on information and communication technol...
The new decentralized computing paradigm introduced by Machine-to-Machine (M2M) communications and t...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
La société de l’information dans laquelle nous vivons repose notamment sur notre capacité à échanger...
La demande de services qui se basent sur l'Internet des objets (IoT) augmente de manière exponentiel...
The rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Form...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
Today mobile devices are an integral part of our lives with the development of applications. In addi...
The 5th Generation Cellular Network Technology (5G) will be the network supporting the Internet of T...
The origin of the idea of adding intelligence to basic objects and making them communicate has been ...
The research work practiced in this PhD program is dedicated to investigating the use of machine lea...
National audienceThe most difficult problem in the domain of privacy is the one of extended data pro...
The work in this thesis focused on creating a cyber security solution with the ability to protect, i...
Aujourd'hui les équipements mobiles font partie intégrante de nos vies avec le développement des app...
Nowadays, the use of Internet of Things (IoT) devices in our personal and work space makes our every...
Security is a crucial requirement in the applications based on information and communication technol...
The new decentralized computing paradigm introduced by Machine-to-Machine (M2M) communications and t...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
La société de l’information dans laquelle nous vivons repose notamment sur notre capacité à échanger...