{"id":238,"date":"2011-10-25T10:37:01","date_gmt":"2011-10-25T08:37:01","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/2011\/10\/25\/soutenance-these-de-claire-sondes-larafa\/"},"modified":"2020-09-04T18:46:59","modified_gmt":"2020-09-04T16:46:59","slug":"soutenance-these-de-claire-sondes-larafa","status":"publish","type":"post","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/2011\/10\/25\/soutenance-these-de-claire-sondes-larafa\/","title":{"rendered":"SOUTENANCE : Th\u00e8se de Claire, Sond\u00e8s LARAFA"},"content":{"rendered":"<p><strong>21 octobre<\/strong> 2011 \u00e0 <strong>14h<\/strong> en salle <strong>A003<\/strong> \u00e0 TELECOM SudParis <\/p>\n<p><strong>\u00ab Services AAA dans les r\u00e9seaux ad hoc mobiles \u00bb<\/strong><\/p>\n<p><strong>Jury :<\/strong><br \/>\n&#8211; Mme Houda Labiod, ma\u00eetre de conf\u00e9rence HDR \u00e0 T\u00e9l\u00e9com ParisTech, rapporteur<br \/>\n&#8211; M. Christophe Bidan, ma\u00eetre de conf\u00e9rence HDR \u00e0 Sup\u00e9lec, rapporteur<br \/>\n&#8211; M. Michel Barbeau, Professeur \u00e0 Carleton University, examinateur<br \/>\n&#8211; M. Didier Begay, Risk Manager des offres chez Orange, examinateur<br \/>\n&#8211; M. Abdelmalek Benzekri, Professeur \u00e0 l\u2019IRIT, examinateur<br \/>\n&#8211; Mme Maryline Laurent, Professeur \u00e0 T\u00e9l\u00e9com SudParis, Directrice<\/p>\n<p><strong>R\u00e9sum\u00e9 :<\/strong><\/p>\n<p>La mobilit\u00e9 est une composante importante de la libert\u00e9 des personnes. L&rsquo;\u00e9volution des moyens technologiques y contribue au premier chef. Outre la question du transport, celle du maintien du lien entre les individus est en ce sens particuli\u00e8rement pr\u00e9gnante. Elle a mis \u00e0 rude \u00e9preuve la notion de r\u00e9seaux de t\u00e9l\u00e9communications puisqu&rsquo;il s&rsquo;agit de r\u00e9pondre, pour des individus \u00e9parpill\u00e9s ou concentr\u00e9s, mais mobiles, au besoin de rester reli\u00e9s. De l&rsquo;\u00e8re des r\u00e9seaux analogiques \u00e0 celle des r\u00e9seaux num\u00e9riques, de l&rsquo;\u00e8re des r\u00e9seaux filaires \u00e0 celle des r\u00e9seaux sans-fil et mobiles, la technologie n&rsquo;a cess\u00e9 d&rsquo;\u00e9voluer. Ces derni\u00e8res d\u00e9cennies ont vu appara\u00eetre des r\u00e9seaux num\u00e9riques sans-fil, o\u00f9 non seulement il y a mobilit\u00e9 des utilisateurs mais aussi mobilit\u00e9 de l&rsquo;infrastructure du r\u00e9seau \u00e0 laquelle ils contribuent. Ces r\u00e9seaux se constituent de fa\u00e7on spontan\u00e9e. Ils se maintiennent de mani\u00e8re autonome. On les d\u00e9signe par le terme r\u00e9seaux ad hoc mobiles (en anglais Mobile Ad hoc Networks ou MANET) qui s&rsquo;oppose naturellement \u00e0 celui de r\u00e9seaux \u00e0 infrastructure.  <\/p>\n<p>La s\u00e9curit\u00e9 est une pr\u00e9occupation g\u00e9n\u00e9rale des \u00eatres humains. Ils en ressentent aussi le besoin en mati\u00e8re de r\u00e9seaux. Ce besoin est particuli\u00e8rement criant lorsque sont \u00e9chang\u00e9es des donn\u00e9es critiques, financi\u00e8res ou strat\u00e9giques. La confidentialit\u00e9 des \u00e9changes, l&rsquo;authentification des sources, l&rsquo;assurance d&rsquo;int\u00e9grit\u00e9, la pr\u00e9vention de la r\u00e9cusation sont autant d&rsquo;objectifs qu&rsquo;il faut alors atteindre. Diverses solutions de s\u00e9curit\u00e9 ont \u00e9t\u00e9 con\u00e7ues dans cette optique pour les r\u00e9seaux filaires puis ont ensuite \u00e9t\u00e9 adapt\u00e9es aux r\u00e9seaux sans-fil et mobiles. Les architectures AAA (Authentication, Authorization, Accounting) en font partie. Elles sont en g\u00e9n\u00e9ral utilis\u00e9es dans un contexte commercial.<\/p>\n<p>Tant par leur facilit\u00e9 de d\u00e9ploiement que par la baisse des co\u00fbts de mise en \u0153uvre qu&rsquo;ils engendrent, les r\u00e9seaux ad hoc mobiles, apr\u00e8s avoir bien servi dans le domaine militaire, semblent avoir un avenir dans les applications commerciales. C&rsquo;est pourquoi, nous nous proposons dans cette th\u00e8se de concevoir une architecture AAA adapt\u00e9e aux sp\u00e9cificit\u00e9s de ces r\u00e9seaux. <\/p>\n<p>Nous \u00e9tudions d&rsquo;abord les r\u00e9seaux ad hoc mobiles et leurs caract\u00e9ristiques. Ensuite, nous pr\u00e9sentons les solutions de s\u00e9curit\u00e9 qui existent dans les r\u00e9seaux \u00e0 infrastructure. Nous examinons, en particulier, les solutions qui permettent le contr\u00f4le d&rsquo;acc\u00e8s et dont sont engendr\u00e9es les architectures AAA. Les solutions AAA propos\u00e9es pour les MANETs sont par la suite analys\u00e9es et classifi\u00e9es afin de d\u00e9terminer les manques et les vuln\u00e9rabilit\u00e9s. <\/p>\n<p>Cette \u00e9tude approfondie nous am\u00e8ne \u00e0 proposer une architecture AAA r\u00e9pondant aux attentes identifi\u00e9es. C&rsquo;est une architecture distribu\u00e9e qui r\u00e9pond, en particulier, au besoin d&rsquo;autonomie des op\u00e9rations dans les MANETs et o\u00f9 les protocoles ex\u00e9cut\u00e9s peuvent impliquer simultan\u00e9ment plus de deux parties. Un ensemble de protocoles et de m\u00e9canismes d&rsquo;authentification et d&rsquo;autorisation s&rsquo;int\u00e9grant avec la suite des protocoles IPv6 a \u00e9t\u00e9 propos\u00e9. Leur s\u00e9curit\u00e9 a \u00e9t\u00e9 discut\u00e9e. Celle, en particulier du protocole d&rsquo;authentification a fait l&rsquo;objet de validation formelle.<\/p>\n<p>Contrairement aux protocoles utilis\u00e9s dans la phase d&rsquo;autorisation des services AAA propos\u00e9s, le mode de communication multi-parties et multi-sauts du protocole d&rsquo;authentification nous a pousser \u00e0 mener une analyse approfondie de ses performances. Pour cela, nous avons eu recours, dans un premier temps, \u00e0 la mod\u00e9lisation au moyen de calculs math\u00e9matiques explicites ensuite \u00e0 la simulation. Les r\u00e9sultats obtenus montrent que ce protocole passe \u00e0 l&rsquo;\u00e9chelle d&rsquo;un MANET comprenant au moins cent n\u0153uds. Dans certaines conditions d&rsquo;impl\u00e9mentation que nous avons d\u00e9finies, ses performances, tant celles li\u00e9e \u00e0 sa probabilit\u00e9 de terminaison avec une issue favorable que celle portant sur son temps d&rsquo;ex\u00e9cution, atteignent des valeurs optimales.<\/p>\n<p><strong>Abstract:<\/strong><\/p>\n<p>Mobility is an important component of people&rsquo;s liberty. The evolution of technological means contributes to its enhancement. In addition to the transport issue, the question of keeping people connected is, in that context, particularly significant. Technological change strained the notion of telecommunications networks in the sense that scattered or clustered but mobile individuals had to remain in touch with others electronically. From the age of analogue networks to the digital networks era, from wired networks to wireless and mobile networks, technology has never stopped evolving. The last decades have witnessed the emergence of digital and wireless networks where not only the users, but also the network infrastructure to which they contribute, are mobile. These networks are spontaneously formed and autonomously maintained. They are termed Mobile Ad hoc Networks (MANETs), in contradistinction to infrastructure networks. <\/p>\n<p>Security is a general concern of human beings. They feel the need for it when using a network, too. This need is particularly glaring when it comes to exchanging critical, financial or strategic data. Confidentiality of communications, source authentication, integrity assurance, prevention of repudiation, are all objectives to be achieved. Various security solutions have been devised in this context as wired networks were then adapted to wireless and mobile networks. AAA (Authentication, Authorization and Accounting) frameworks are among these solutions. They are generally used for commercial purposes, which raises financial issues &#8212; and we all know how much important they are.<\/p>\n<p>Due to their ease of deployment and inexpensive implementation, MANETs, first used in the military field, seem to have a future in commercial applications. That is why the present thesis proposes to design an AAA service that is adapted to the characteristics of such networks.<\/p>\n<p>In this perspective, the thesis examines, to begin with, mobile ad hoc networks in order to understand their characteristics and potentials. It then probes the security solutions that exist in infrastructure networks, with special emphasis on those dealing with access control and AAA services. The AAA solutions for MANETs proposed up to now are subsequently analyzed and classified in order to determine their strengths and weaknesses. <\/p>\n<p>This in-depth study led to the design, in the second part of the thesis, of an AAA service that meets the expectations identified. It is a distributed service intended to answer the needs of autonomous operations in MANETs when a nearby operator is absent. It features several detailed authentication and authorization mechanisms and protocols with an authentication protocol simultaneously involving one or more parties. These protocols are designed such that they can be easily integrated to the IPv6 protocols suite. Moreover, their security is discussed &#8212; in particular, that of the authentication protocol thanks to a formal validation tool.<\/p>\n<p>Unlike the communication mode of the authorization protocols, that of the authentication protocol is one-to-many, which led us to study more deeply its performances thanks to modeling using explicit mathematical computations and to simulations techniques. The obtained results showed that the protocol scales for a MANET including a hundred nodes. Under certain conditions that we explained, its performances, in terms of the probability of authentication success and the length of the executing time, reach optimal values.<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>21 octobre 2011 \u00e0 14h en salle A003 \u00e0 TELECOM SudParis \u00ab Services AAA dans les r\u00e9seaux ad hoc mobiles \u00bb Jury : &#8211; Mme Houda Labiod, ma\u00eetre de conf\u00e9rence HDR \u00e0 T\u00e9l\u00e9com ParisTech, rapporteur &#8211; M. Christophe Bidan, ma\u00eetre de conf\u00e9rence HDR \u00e0 Sup\u00e9lec, rapporteur &#8211; M. Michel Barbeau, Professeur \u00e0 Carleton University, examinateur [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[428],"tags":[],"class_list":["post-238","post","type-post","status-publish","format-standard","hentry","category-theses-2011-fr","entry"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=238"}],"version-history":[{"count":1,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/238\/revisions"}],"predecessor-version":[{"id":1984,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/238\/revisions\/1984"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/categories?post=238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/tags?post=238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}