{"id":735,"date":"2016-06-07T11:25:00","date_gmt":"2016-06-07T09:25:00","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/2016\/06\/07\/protocoles-de-securite-serverless-legers-pour-linternet-des-objets\/"},"modified":"2020-09-04T18:46:12","modified_gmt":"2020-09-04T16:46:12","slug":"protocoles-de-securite-serverless-legers-pour-linternet-des-objets","status":"publish","type":"post","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/2016\/06\/07\/protocoles-de-securite-serverless-legers-pour-linternet-des-objets\/","title":{"rendered":"\u00ab\u00a0Protocoles de S\u00e9curit\u00e9 Serverless L\u00e9gers Pour l\u2019Internet des Objets \u00ab\u00a0"},"content":{"rendered":"<p>ANNONCE DE SOUTENANCE DE THESE DE DOCTORAT<\/p>\n<ul>\n<li> M. Collins MTITA<br \/>\nD\u00e9partement RST  &#8211; T\u00e9l\u00e9com SudParis &#8211; Laboratoire SAMOVAR &#8211; Ecole doctorale Informatique, T\u00e9l\u00e9communications et Electronique<\/li>\n<\/ul>\n<p>Cette th\u00e8se a \u00e9t\u00e9 r\u00e9alis\u00e9e sous la direction du Professeure Maryline LAURENT . <\/p>\n<p>Quand: <strong>lundi 13\/06\/2016 \u00e0 14:00 <\/strong><br \/>\nO\u00f9: <strong>Salle C06<\/strong>, \u00e0 T\u00e9l\u00e9com SudParis, 9 rue Charles Fourier, 91000 Evry. <\/p>\n<p>La soutenance sera suivie d\u2019un pot, en A01, auquel vous \u00eates chaleureusement invit\u00e9s.<\/p>\n<p>Le jury sera compos\u00e9 de :<\/p>\n<p><strong>Directrice de th\u00e8se<\/strong><br \/>\nMme Maryline LAURENT, Professeure &#8211; T\u00e9l\u00e9com SudParis<\/p>\n<p><strong>Rapporteurs<\/strong><\/p>\n<p>M. Abdelmadjid BOUABDALLAH &#8211; Professeur HDR &#8211; Universit\u00e9 de Technologie de Compi\u00e8gne<\/p>\n<p>M . Damien SAUVERON &#8211; Maitre de Conf\u00e9rence HDR &#8211; XLIM Universit\u00e9 de Limoges<\/p>\n<p><strong>Examinateurs<\/strong><\/p>\n<p>M. S\u00e9bastien TIXEUIL &#8211; Professeur HDR &#8211; Universit\u00e9 Pierre er Marie Curie<\/p>\n<p>M. Abdelmalek BENZEKRI &#8211; Professeur HDR &#8211; IRIT3 Universit\u00e9 Paul Sabatier<\/p>\n<p>M. Jacques DELORT &#8211; Ing\u00e9nieur &#8211; TRAXENS<\/p>\n<p><strong>R\u00e9sum\u00e9 :<\/strong><\/p>\n<p>Les avanc\u00e9es technologiques permettent d&rsquo;int\u00e9grer des capteurs et des modules de communication dans les objets du quotidien pour les rendre intelligents et faciliter leur int\u00e9gration sur l&rsquo;Internet. L&rsquo;Internet du futur sera sans nul doute celui des objets connect\u00e9s. Les objets connect\u00e9s g\u00e9n\u00e8rent, collectent, stockent et partagent des informations entre eux et aussi avec les serveurs d&rsquo;authentification centralis\u00e9s. La plupart des informations collect\u00e9es doivent \u00eatre prot\u00e9g\u00e9es pendant le stockage et le transfert. Par le pass\u00e9, divers protocoles assurant une s\u00e9curit\u00e9 robuste bas\u00e9s sur la cryptographie asym\u00e9trique et d\u2019autres sur la cryptographie sym\u00e9trique ont \u00e9t\u00e9 propos\u00e9s dans la litt\u00e9rature. Du fait que les objets connect\u00e9s poss\u00e8dent de faibles capacit\u00e9s de calcul, de m\u00e9moire et d&rsquo;\u00e9nergie, et que l&rsquo;acc\u00e8s au medium radio est tr\u00e8s consommateur en ressources, les protocoles cryptographiques traditionnels ne sont pas adapt\u00e9s aux objets connect\u00e9s. Il y a lieu donc d&rsquo;adapter ou de concevoir des protocoles propres et conformes \u00e0 leurs exigences.<\/p>\n<p>Dans cette th\u00e8se, nous abordons les d\u00e9fis de s\u00e9curit\u00e9 et de vie priv\u00e9e pertinents aux syst\u00e8mes pervasifs avec des contraintes de ressources strictes. Nous regardons les protocoles d&rsquo;authentification serverless, qui sont des m\u00e9canismes d&rsquo;authentification qui ne n\u00e9cessitent pas la pr\u00e9sence du serveur central au cours de la phase d&rsquo;authentification entre deux objets connect\u00e9s.<\/p>\n<p>Tout d&rsquo;abord, nous fournissons les caract\u00e9ristiques et les besoins pour les protocoles serverless. Gr\u00e2ce \u00e0 ces besoins et caract\u00e9ristiques, nous avons fait des recherches, des analyses compl\u00e8tes et des comparaisons des protocoles serverless existants en termes de s\u00e9curit\u00e9, de vie priv\u00e9e et de performances. Nous examinons leurs capacit\u00e9s \u00e0 r\u00e9sister \u00e0 diverses attaques et leurs aptitudes \u00e0 minimiser l\u2019usage des ressources. Apr\u00e8s quoi, notre objectif est de proposer des protocoles de s\u00e9curit\u00e9 serverless permettant aux objets de s\u2019authentifier tout en garantissant efficacit\u00e9, passage \u00e0 l\u2019\u00e9chelle et efficacit\u00e9 \u00e9nerg\u00e9tique, l&rsquo;\u00e9nergie \u00e9tant une ressource tr\u00e8s critique qui a une influence directe sur la dur\u00e9e de vie d\u2019un objet connect\u00e9.<\/p>\n<p>Trois nouvelles contributions sont propos\u00e9es dans cette th\u00e8se. Notre premi\u00e8re contribution est un protocole l\u00e9ger serverless d&rsquo;authentification mutuelle pour les objets connect\u00e9s h\u00e9t\u00e9rog\u00e8nes. La premi\u00e8re contribution fournit trois avantages par rapport aux protocoles existants. Cette contribution r\u00e9pond aux exigences des syst\u00e8mes pervasifs. La validation de notre proposition a \u00e9t\u00e9 faite en utilisant l&rsquo;outil AVISPA et la validation informelle en utilisant s\u00e9curit\u00e9 et de vie priv\u00e9e des jeux.<\/p>\n<p>Notre deuxi\u00e8me contribution comprend deux protocoles compl\u00e9mentaires dans le domaine des technologies RFID. Le premier protocole vise \u00e0 l&rsquo;authentification de masse entre un lecteur RFID et un groupe d&rsquo;\u00e9tiquettes tandis que le deuxi\u00e8me protocole effectue une recherche s\u00e9curis\u00e9e pour une \u00e9tiquette cible parmi un groupe d&rsquo;\u00e9tiquettes dans le voisinage du lecteur. Les deux protocoles propos\u00e9s tiennent compte des contraintes de ressources des \u00e9tiquettes RFID.<\/p>\n<p>Apr\u00e8s une \u00e9tude approfondie des protocoles serverless, nous avons propos\u00e9 une troisi\u00e8me contribution, un guide pour la conception des protocoles serverless s\u00e9curis\u00e9 et efficaces pour les syst\u00e8mes pervasifs. Le guide contient six principes et six meilleures pratiques en vue d&rsquo;\u00e9laborer des protocoles serverless. Le guide est destin\u00e9 \u00e0 aider \u00e0 la conception de protocoles serverless efficaces, s\u00e9curis\u00e9s et simples en \u00e9vitant des erreurs couramment faites dans les protocoles existants.<\/p>\n<p><strong>Abstract:<\/strong><\/p>\n<p>This thesis addresses the security and privacy challenges relevant to the resource constrained devices in the era of pervasive computing. Pervasive computing, a term coined by Schechter [91] to describe the idea of computing services available anytime, anywhere and on demand, is characterized by seamless interactions between heterogeneous players in the Internet. This phenomenon allows intelligent chips, sensors or microcontrollers to be embedded into everyday objects to enable them generate, communicate and share information. Pervasive computing accelerates technological evolution by integrating small and resource constrained devices to the Internet arena, eventually opening doors to new services requiring seamless interactions and integrations with the existing technologies, infrastructures and services.<\/p>\n<p>The information collected, stored and communicated by specialized pervasive devices is targeted for various uses such as monitoring, auditing, control or research. The nature of the information generated, stored and shared may require proper security and privacy guarantees. Towards that end, the classical security solutions are not ideal candidates to solve the security and privacy challenges in pervasive systems for two reasons. First, classical security protocols require a lot of resources from the host devices while most of the pervasive devices have very strict resource constraints. Second, most classical security solutions work in a connected mode, which requires constant communication between devices and centralized servers for authentication and authorization purposes. However, pervasive devices may be working in isolated areas with intermittent network coverage and connectivity. Thus, it is ideal to come up with alternative solutions suitable for heterogeneous pervasive devices to smoothly interact, authenticate and securely share information. One of the suitable alternative solutions is the serverless protocols.<\/p>\n<p>The term \u201cserverless protocol\u201d refers to a mechanism of allowing centrally controlled devices to autonomously authenticate one another, or other heterogeneous devices, without an active participation of the centralized authentication or authorization servers. Serverless protocols prioritize on securing proximity communication between heterogeneous devices while optimizing on the little resources available.<\/p>\n<p>In this thesis, we tackle the challenges of pervasive systems by proposing lightweight and efficient serverless protocols for authenticating heterogeneous pervasive devices during proximity communication. Our proposed protocols derive their originality from the fact that they do not require the communicating parties to have prior relationships with each other, nor to have any previously shared authentication information with each other.<\/p>\n<p>Instead, all parties must establish prior relationships with the trusted entity, such as a centralized authentication server, and rely upon it to verify credentials and authorize sessions. Moreover, our proposed solutions incorporate context information to enforce automatic parameter expiry. This property is not supported by most of the earlier versions of the serverless protocol schemes, hence making them vulnerable to different attacks.<\/p>\n<p>Three novel contributions are proposed in this thesis. First, we propose a serverless lightweight mutual authentication protocol for heterogeneous devices. The first contribution includes a formal validation using the AVISPA tool. Second, we propose two complementing protocols using RFID (Radio-Frequency Identification) as a core technology. The first protocol performs mass authentication between an RFID reader and a group of tags and the second protocol performs a secure search for a target tag among a group of tags. The second contribution includes two formal validations; one is done using the AVISPA tool and the other is done using the CryptoVerif tool. After a thorough study of serverless protocols, we propose our third contribution, a concise guide on how to develop secure and efficient serverless protocols relevant to the pervasive systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ANNONCE DE SOUTENANCE DE THESE DE DOCTORAT M. Collins MTITA D\u00e9partement RST &#8211; T\u00e9l\u00e9com SudParis &#8211; Laboratoire SAMOVAR &#8211; Ecole doctorale Informatique, T\u00e9l\u00e9communications et Electronique Cette th\u00e8se a \u00e9t\u00e9 r\u00e9alis\u00e9e sous la direction du Professeure Maryline LAURENT . Quand: lundi 13\/06\/2016 \u00e0 14:00 O\u00f9: Salle C06, \u00e0 T\u00e9l\u00e9com SudParis, 9 rue Charles Fourier, 91000 Evry. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[350],"tags":[],"class_list":["post-735","post","type-post","status-publish","format-standard","hentry","category-theses-2016-fr","entry"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=735"}],"version-history":[{"count":1,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/735\/revisions"}],"predecessor-version":[{"id":1678,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/735\/revisions\/1678"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/categories?post=735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/tags?post=735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}