Please use this identifier to cite or link to this item: http://univ-bejaia.dz/dspace/123456789/27184
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLalouci, Ali-
dc.contributor.authorFarah, Zoubeyr;Rapporteur-
dc.contributor.author.-
dc.date.accessioned2026-04-29T12:14:59Z-
dc.date.available2026-04-29T12:14:59Z-
dc.date.issued2025-06-28-
dc.identifier.other004D/168-
dc.identifier.urihttp://univ-bejaia.dz/dspace/123456789/27184-
dc.descriptionOption : Réseaux et Systèmes Distribuésen_US
dc.description.abstractThe increasing complexity of modern networks, particularly in the context of the Internet of Things (IoT), has necessitated the development of advanced methods to protect these systems against various security problems. Graph theory has emerged as a powerful tool for modeling and solving network security problems due to its direct relevance to network structures. A network can be represented as a set of nodes connected by physical or logical links, and graph parameters such as the dominating set, secure dominating set, and critical node set are critical for optimizing network protection. The Dominating Set helps in selecting nodes to ensure information transmission within the network, while the secure dominating set identifies the set of guards that protect the entire network, playing a crucial role in network security. The Critical node set allows for identifying key nodes whose removal maximally disconnects the network, enabling targeted defense strategies. Despite their importance, obtaining optimal values for these graph parameters is a challenging task, as they often involve NP-complete problems that require approximate solutions. This thesis aims to address this challenge by proposing distributed algorithms that efficiently approximate these graph parameters, making them suitable for the resource-constrained, and decentralized nature of IoT networks. By leveraging distributed computing techniques, the research develops heuristic-based solutions for the secure dominating set, maximal independent set, and critical node set problems, focusing on IoT networks where traditional sequential methods are inadequate due to their computational complexity. The proposed algorithms are evaluated through simulations using the CupCarbon IoT simulator, demonstrating significant improvements in efficiency, scalability, and security. This work contributes both theoretical insights and practical solutions, enhancing the resilience of IoT networks while addressing the unique challenges posed by their distributed and dynamic nature.en_US
dc.language.isoenen_US
dc.publisherUniversité Aberahmane Mira Bejaiaen_US
dc.subjectIoT networks protection: Graph parameters: Critical node sets: Secure dominatingen_US
dc.titleToward a distributed approach for IoT network protection.en_US
dc.typeThesisen_US
Appears in Collections:Thèses de Doctorat

Files in This Item:
File Description SizeFormat 
AliLALOUCI_Version_Corrigée.pdf2.32 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.