Please use this identifier to cite or link to this item: http://univ-bejaia.dz/dspace/123456789/17691
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDjedjig, Nabil-
dc.contributor.authorTandjaoui, Djamel;promoteur-
dc.date.accessioned2022-01-04T13:34:22Z-
dc.date.available2022-01-04T13:34:22Z-
dc.date.issued2021-12-02-
dc.identifier.urihttp://hdl.handle.net/123456789/17691-
dc.descriptionOption : Cloud Computingen_US
dc.description.abstractThe Internet of Things (IoT) concept has attracted significant attention from both industrial and research communities. Nevertheless, the IoT is facing many security issues such as authentication, availability, privacy, and trust management. Indeed, establishing trust relationships between nodes in IoT represents a primary security milestone to have a reliable system that excludes malicious nodes. However, trust management in an IoT constrained, and ubiquitous environment represents a challenge. In this thesis, we study the issue of designing secure trust management protocols taking into account the specificities of IoT. In the IoT Low-Power and Lossy Networks (LLNs), the sensing or perception layer is based on the IEEE 802.15.4 protocol. On the other hand, the network layer is based on the Routing Protocol for LLNs (RPL) that have been standardised to fulfil the routing requirements in such networks. Both protocols suffer from security issues and lack strong security solutions, especially in the field of trust management. In response to the above security issues, a new trust management scheme has been introduced to address the MAC unfairness attacks against the IEEE 802.15.4 MAC layer. Furthermore, a Metric-based RPL Trustworthiness Scheme (MRTS) has been proposed to enhance RPL security by introducing a new trust metric and a new trust-based objective function, thus, rendering RPL more efficient in compromised networks. Along this dissertation, MRTS went through three refinement versions, which were the subject of a succession of three contributions. The efficiency of MRTS has been validated through extensive simulation experiments under different scenarios using the open-source Contiki-Cooja simulator. The results demonstrate significant performance enhancements in terms of routing security, power consumption, packet delivery ratio, and throughput. Besides, mathematical analyses prove that MRTS meets the requirements of consistency, optimality, and loop-freeness and that the proposed trust-based routing metric has the isotonicity and monotonicity properties required for a routing protocol. Furthermore, game theory mathematical analyses and evolutionary simulation results show that MRTS, as a strategy, is an efficient approach in promoting the stability and the evolution of IoT networks.en_US
dc.language.isoenen_US
dc.publisherUniversité A.mira-Béjaiaen_US
dc.subjectInternet of Things : IoT security : Trust Managementen_US
dc.titleNegotiation Protocols to Establish a Trust Relationship in the Internet of Thingsen_US
dc.typeThesisen_US
Appears in Collections:Thèses de Doctorat

Files in This Item:
File Description SizeFormat 
Negotiation Protocols to Establish a Trust Relationship in the Internet.pdf2.77 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.