44 research outputs found

    Une architecture d'authentification dynamique et sécurisé, sensible au contexte et basé sur la confiance pour les environnements pervasifs

    No full text
    To provide personalized services to users in pervasive environments, we should consider both user's privacy, trust and security requirements. Traditional authentication and access control mechanisms are not able to adapt their security policies to a changing context while insuring privacy and trust issues. This thesis introduces a new global vision for the protection of pervasive environments, based on context-aware principle. The aim of this thesis is to get a flexible and scalable framework including user authentication, user privacy preserving and trust management in order to optimize the access control strategy to personalized services. The first contribution include the proposal of a mutual authentication protocol supported by both robust key establishment schemes based on elliptic curves (MaptoPoint/Curve algorithm, Weil Pairing) and a dynamic model based on attributes issued from contextual data. The second contribution include the design of a new architecture built on an attribute based model and organized over 3 layers: the privacy control layer which insure the protection of the user private life by controlling their personal data, the access layer which associate authentication and access control processes while providing mechanisms dedicated to trust parameters management , and finally the service layer for service access management according to the user profile and his environment. The third contribution the implementation and the deployment of a prototype within the service delivery platform in Handicom lab of Telecom & Management SudParis.La prise en considération des exigences en matière de sécurité, de vie privée et de confiance au sein des environnements pervasifs (ubiquitaires) est indispensable à la fourniture des services personnalisés aux utilisateurs. L’objectif de cette thèse est de disposer d’une architecture souple et évolutive intégrant l’authentification des utilisateurs, la préservation de leur vie privée et la gestion de la confiance en vue d’optimiser la stratégie de contrôles d’accès aux services personnalisés. La première contribution porte sur la proposition d’un protocole d’authentification mutuelle construit à partir de schémas cryptographiques robustes d’établissement de clés basés sur les courbes elliptiques (MaptoPoint/Curve algorithm, Weil Pairing) et d’un modèle dynamique basé sur les attributs issus des données contextuelles. La seconde contribution porte sur la conception d’une nouvelle architecture bâti sur un modèle basé sur les attributs et organisée autour de 3 couches : la couche de contrôle de le vie privée qui assure la protection de la vie privée des utilisateurs en contrôlant leurs données personnelles, la couche d’accès associant les processus d’authentification et de contrôles d’accès en intégrant des mécanismes dédiés à la gestion des paramètres de confiance et la couche de service pour la gestion des accès aux services selon le profil de l’utilisateur et de son environnement. La troisième contribution porte sur le développement et la mise en œuvre d’un prototype au sein de la plateforme dédiée à la fourniture de services du laboratoire Handicom de Telecom SudParis

    Membrane organisation of cardiac potassium channels Shaker Kv1.5 (role of membrane cholesterol and M)

    No full text
    PARIS7-Bibliothèque centrale (751132105) / SudocSudocFranceF

    Une architecture d'authentification dynamique et sécurisé, sensible au contexte et basé sur la confiance pour les environnements pervasifs

    No full text
    La prise en considération des exigences en matière de sécurité, de vie privée et de confiance au sein des environnements pervasifs (ubiquitaires) est indispensable à la fourniture des services personnalisés aux utilisateurs. L objectif de cette thèse est de disposer d une architecture souple et évolutive intégrant l authentification des utilisateurs, la préservation de leur vie privée et la gestion de la confiance en vue d optimiser la stratégie de contrôles d accès aux services personnalisés. La première contribution porte sur la proposition d un protocole d authentification mutuelle construit à partir de schémas cryptographiques robustes d établissement de clés basés sur les courbes elliptiques (MaptoPoint/Curve algorithm, Weil Pairing) et d un modèle dynamique basé sur les attributs issus des données contextuelles. La seconde contribution porte sur la conception d une nouvelle architecture bâti sur un modèle basé sur les attributs et organisée autour de 3 couches : la couche de contrôle de le vie privée qui assure la protection de la vie privée des utilisateurs en contrôlant leurs données personnelles, la couche d accès associant les processus d authentification et de contrôles d accès en intégrant des mécanismes dédiés à la gestion des paramètres de confiance et la couche de service pour la gestion des accès aux services selon le profil de l utilisateur et de son environnement. La troisième contribution porte sur le développement et la mise en œuvre d un prototype au sein de la plateforme dédiée à la fourniture de services du laboratoire Handicom de Telecom SudParis.To provide personalized services to users in pervasive environments, we should consider both user's privacy, trust and security requirements. Traditional authentication and access control mechanisms are not able to adapt their security policies to a changing context while insuring privacy and trust issues. This thesis introduces a new global vision for the protection of pervasive environments, based on context-aware principle. The aim of this thesis is to get a flexible and scalable framework including user authentication, user privacy preserving and trust management in order to optimize the access control strategy to personalized services. The first contribution include the proposal of a mutual authentication protocol supported by both robust key establishment schemes based on elliptic curves (MaptoPoint/Curve algorithm, Weil Pairing) and a dynamic model based on attributes issued from contextual data. The second contribution include the design of a new architecture built on an attribute based model and organized over 3 layers: the privacy control layer which insure the protection of the user private life by controlling their personal data, the access layer which associate authentication and access control processes while providing mechanisms dedicated to trust parameters management , and finally the service layer for service access management according to the user profile and his environment. The third contribution the implementation and the deployment of a prototype within the service delivery platform in Handicom lab of Telecom & Management SudParis.EVRY-INT (912282302) / SudocSudocFranceF

    RSSI -based Classification for Indoor Localization in Wireless Sensor Networks

    No full text
    International audienceIndoor localization is an important issue for a very large number of applications. Localization systems based on received signal strength indicators (RSSI) have become very popular in recent years due to their simple and low cost implementation. For most applications, contextual information related to the target's region is sufficient. Therefore, in this paper, instead of estimating the exact coordinates of the target, we propose an approach to determine its region by considering the localization as a multi-class classification problem. State-of-the-art multi-class classification techniques are investigated such as the K-nearest neighbor (KNN) algorithm, one-vs-all logistic regression and one-vs-all support vector machines (SVM). To compare the algorithms and evaluate their performance, we conduct our experiments on real RSSI datasets collected from a real environment implemented using a Zigbee network

    A Secure and Lightweight Authenticated Key Agreement Protocol for Distributed IoT Applications

    No full text
    International audienceInternet of Things (IoT) is growing too fast and it is being deployed in various domains such as Smart Homes, Smart City, Healthcare, etc. Security in IoT environments is critical, as information between IoT devices and end-users needs to be shared securely. Therefore, IoT systems require protecting two critical aspects, which are confidential data and identity management. However, IoT devices have many constraints, including limitations in computation, power, memory and energy. In this paper, we present a fast and secure authenticated key agreement protocol based on elliptic curve cryptography. The proposed protocol is used for distributed IoT applications. Therefore, a Trusted Third Party (TTP) is used to perform the registration phases for users and IoT devices. With respect to distributed networks, and after the registration phases are accomplished, the end-user can communicate and obtain information straightaway from the sensor nodes. The informal security of the proposed protocol is analyzed, and the analysis shows that our protocol can resist a variety of attacks. Our proposed protocol uses ECDigital Signature Algorithm (EC-DSA). It offers significantly improved performance, in terms of the required computational amount and energy usage, compared to many other authenticated protocols

    Olfactory Memory in Depression: State and Trait Differences between Bipolar and Unipolar Disorders

    No full text
    International audienceBackground: Changes in olfactory recognition memory may constitute sensory markers in depression. Significant differences may exist between unipolar and bipolar depression. Our study compares olfactory memory between control, unipolar, and bipolar patients in depressed and euthymic states in order to identify potential markers of depression. Methods: 176 participants were recruited in 5 groups: depressed bipolar (DB), euthymic bipolar (EB), depressed unipolar (DU), euthymic unipolar (EU), and controls (HC). The participants had a standardized clinical and olfactory assessment (olfactory memory, evaluation of pleasantness, intensity, familiarity, and emotional aspect of smells). Results: DU, DB, and EU patients had a deficit in olfactory memory compared to HC. DB patients had lower capacity to recognize new odors. DB and DU patients had more limited detection of unfamiliar odors than HC. DB patients rated odors as less pleasant compared to the other groups. All groups had lower hedonic ratings than HC. DB patients had lower emotional ratings than EU patients. Conclusions: Olfactory memory is impaired in depressive states, thus constituting a state marker of depression. Impairments in olfactory memory persist after remission of bipolar depression, thus constituting a possible trait marker of bipolarity. Hedonic rating differentiates unipolar from bipolar depression. This is the first study that identifies a sensory marker differentiating between unipolar and bipolar depression

    A Flexible Privacy and Trust Based Context-Aware Secure Framework

    No full text

    Reversible and irreversible differentiation of cardiac fibroblasts

    No full text
    AIMS: Differentiation of cardiac fibroblasts (Fbs) into myofibroblasts (MyoFbs) is responsible for connective tissue build-up in myocardial remodelling. We examined MyoFb differentiation and reversibility. METHODS AND RESULTS: Adult rat cardiac Fbs were cultured on a plastic substratum providing mechanical stress, with conditions to obtain different levels of Fb differentiation. Fb spontaneously differentiated to proliferating MyoFb (p-MyoFb) with stress fibre formation decorated with alpha-smooth muscle actin (α-SMA). Transforming growth factor-β1 (TGF-β1) promoted differentiation into α-SMA-positive MyoFb showing near the absence of proliferation, i.e. non-p-MyoFb. SD-208, a TGF-β-receptor-I (TGF-β-RI) kinase blocker, inhibited p-MyoFb differentiation as shown by stress fibre absence, low α-SMA expression, and high proliferation levels. Fb seeded in collagen matrices induced no contraction, whereas p-MyoFb and non-p-MyoFb induced 2.5- and four-fold contraction. Fb produced little collagen but high levels of interleukin-10. Non-p-MyoFb had high collagen production and high monocyte chemoattractant protein-1 and tissue inhibitor of metalloproteinases-1 levels. Transcriptome analysis indicated differential activation of gene networks related to differentiation of MyoFb (e.g. paxilin and PAK) and reduced proliferation of non-p-MyoFb (e.g. cyclins and cell cycle regulation). Dedifferentiation of p-MyoFb with stress fibre de-polymerization, but not of non-p-MyoFb, was induced by SD-208 despite maintained stress. Stress fibre de-polymerization could also be induced by mechanical strain release in p-MyoFb and non-p-MyoFb (2-day cultures in unrestrained 3-D collagen matrices). Only p-MyoFb showed true dedifferentiation after long-term 3-D cultures. CONCLUSIONS: Fb, p-MyoFb, and non-p-MyoFb have a distinct gene expression, ultrastructural, and functional profile. Both reduction in mechanical strain and TGF-β-RI kinase inhibition can reverse p-MyoFb differentiation but not non-p-MyoFb.status: publishe
    corecore