{"id":76132,"date":"2025-12-08T11:32:56","date_gmt":"2025-12-08T09:32:56","guid":{"rendered":"https:\/\/www.iemn.fr\/?p=76132"},"modified":"2025-12-18T10:05:57","modified_gmt":"2025-12-18T08:05:57","slug":"des-agents-de-cybersecurite-fondes-sur-lintelligence-artificielle-collaborative-pour-mieux-proteger-les-reseaux-de-vehicules-connectes-compatible6g","status":"publish","type":"post","link":"https:\/\/www.iemn.fr\/en\/newsletter\/des-agents-de-cybersecurite-fondes-sur-lintelligence-artificielle-collaborative-pour-mieux-proteger-les-reseaux-de-vehicules-connectes-compatible6g.html","title":{"rendered":"Des agents de cybers\u00e9curit\u00e9 fond\u00e9s sur l\u2019intelligence artificielle collaborative pour mieux prot\u00e9ger les r\u00e9seaux de v\u00e9hicules connect\u00e9s compatibles 6G."},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mb4ug5k8-42eac4bc553fbb117614a852c27f4a00\">\n#top .av-special-heading.av-mb4ug5k8-42eac4bc553fbb117614a852c27f4a00{\npadding-bottom:10px;\ncolor:#000000;\n}\nbody .av-special-heading.av-mb4ug5k8-42eac4bc553fbb117614a852c27f4a00 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-mb4ug5k8-42eac4bc553fbb117614a852c27f4a00 .special-heading-inner-border{\nborder-color:#000000;\n}\n.av-special-heading.av-mb4ug5k8-42eac4bc553fbb117614a852c27f4a00 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-mb4ug5k8-42eac4bc553fbb117614a852c27f4a00 av-special-heading-h2 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-0  el_before_av_hr  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Des agents de cybers\u00e9curit\u00e9 fond\u00e9s sur l\u2019intelligence artificielle collaborative pour mieux prot\u00e9ger les r\u00e9seaux de v\u00e9hicules connect\u00e9s compatibles 6G.<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1d5qfdu-03b070c3e1e0b86ca1bd5dfdb5c4d277\">\n#top .hr.av-1d5qfdu-03b070c3e1e0b86ca1bd5dfdb5c4d277{\nmargin-top:40px;\nmargin-bottom:30px;\n}\n.hr.av-1d5qfdu-03b070c3e1e0b86ca1bd5dfdb5c4d277 .hr-inner{\nwidth:550px;\nborder-color:#c9c9c9;\nmax-width:45%;\n}\n.hr.av-1d5qfdu-03b070c3e1e0b86ca1bd5dfdb5c4d277 .av-seperator-icon{\ncolor:#4871ea;\n}\n<\/style>\n<div  class='hr av-1d5qfdu-03b070c3e1e0b86ca1bd5dfdb5c4d277 hr-custom  avia-builder-el-1  el_after_av_heading  el_before_av_hr  hr-center hr-icon-yes'><span class='hr-inner inner-border-av-border-fat'><span class=\"hr-inner-style\"><\/span><\/span><span class='av-seperator-icon' aria-hidden='true' data-av_icon='\ue809' data-av_iconfont='entypo-fontello'><\/span><span class='hr-inner inner-border-av-border-fat'><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mb51yfp7-a9f12c8a5dda8aa8594802888a702533\">\n#top .hr.hr-invisible.av-mb51yfp7-a9f12c8a5dda8aa8594802888a702533{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-mb51yfp7-a9f12c8a5dda8aa8594802888a702533 hr-invisible  avia-builder-el-2  el_after_av_hr  el_before_av_hr'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kjdpr8-116a6ea5dd3ea0e6ec50da0ea1173a29\">\n#top .hr.hr-invisible.av-kjdpr8-116a6ea5dd3ea0e6ec50da0ea1173a29{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kjdpr8-116a6ea5dd3ea0e6ec50da0ea1173a29 hr-invisible  avia-builder-el-3  el_after_av_hr  el_before_av_hr'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-wb87b8-5debdaa3188bf2965911bcc3079db3f8\">\n#top .hr.hr-invisible.av-wb87b8-5debdaa3188bf2965911bcc3079db3f8{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-wb87b8-5debdaa3188bf2965911bcc3079db3f8 hr-invisible  avia-builder-el-4  el_after_av_hr  el_before_av_one_full'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-15p1i2q-8512f3bc40b8511dbac15d19d0c13857\">\n@keyframes av_boxShadowEffect_av-15p1i2q-8512f3bc40b8511dbac15d19d0c13857-column {\n0%   { box-shadow:  0 0 0 0 #d1d1d1; opacity: 1; }\n100% { box-shadow:  0 0 10px 0 #d1d1d1; opacity: 1; }\n}\n.flex_column.av-15p1i2q-8512f3bc40b8511dbac15d19d0c13857{\ntransform:scale(1.1);\nz-index:5;\nbox-shadow: 0 0 10px 0 #d1d1d1;\nborder-width:1px;\nborder-color:#d6d6d6;\nborder-style:solid;\nborder-radius:15px 15px 15px 15px;\npadding:30px 30px 30px 30px;\nbackground-color:#e5e5e5;\n}\n.flex_column.av-15p1i2q-8512f3bc40b8511dbac15d19d0c13857 .avia-divider-svg-top{\nleft:-1px;\nright:-1px;\nwidth:auto;\ntop:-1px;\nborder-radius:15px 15px 0 0;\n}\n.flex_column.av-15p1i2q-8512f3bc40b8511dbac15d19d0c13857 .avia-divider-svg-top svg{\nheight:23px;\nwidth:calc(100% + 1.3px);\nfill:#7bb0e7;\n}\n<\/style>\n<div  class='flex_column av-15p1i2q-8512f3bc40b8511dbac15d19d0c13857 av_one_full  avia-builder-el-5  el_after_av_hr  avia-builder-el-last  first flex_column_div shadow-not-animated'     ><div class='avia-divider-svg avia-divider-svg-triangle avia-divider-svg-top avia-svg-original'><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg><\/div><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mgz8hu-de38f26b9b6bd0b967d904f51de355a2\">\n#top .av_textblock_section.av-mgz8hu-de38f26b9b6bd0b967d904f51de355a2 .avia_textblock{\nfont-size:13px;\ntext-align:justify;\ncolumn-count:2;\ncolumn-gap:7%;\n}\n\n@media only screen and (max-width: 767px){ \n#top .av_textblock_section.av-mgz8hu-de38f26b9b6bd0b967d904f51de355a2 .avia_textblock{\ncolumn-count:1;\n}\n.av_textblock_section.av-mgz8hu-de38f26b9b6bd0b967d904f51de355a2 .avia_textblock.av_multi_colums > p:first-child{\nmargin-top:0.85em;\n}\n}\n<\/style>\n<section  class='av_textblock_section av-mgz8hu-de38f26b9b6bd0b967d904f51de355a2'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_multi_colums'  itemprop=\"text\" ><p class=\"p1\">Cet article est le fruit d&rsquo;une collaboration entre un chercheur de l&rsquo;IEMN et un chercheur industriel d&rsquo;Ericsson.<br \/>\n<strong>L&rsquo;objectif principal \u00e9tait de proposer de nouveaux agents z\u00e9ro confiance robustes bas\u00e9s sur des algorithmes d&rsquo;intelligence artificielle (IA) collaborative afin de prot\u00e9ger les VANET (r\u00e9seaux de v\u00e9hicules connect\u00e9s )compatibles 6G contre les attaques visant simultan\u00e9ment les VANET et les infrastructures 6G.<\/strong><\/p>\n<p>L&rsquo;IA collaborative est bas\u00e9e sur des algorithmes d&rsquo;IA g\u00e9n\u00e9rative et d&rsquo;apprentissage par transfert (TL).<br \/>\nDeux types d&rsquo;agents z\u00e9ro confiance ont \u00e9t\u00e9 propos\u00e9s : les syst\u00e8mes z\u00e9ro confiance locaux (LZTS) et les syst\u00e8mes z\u00e9ro confiance globaux (GZTS) qui surveillent le r\u00e9seau et l&rsquo;infrastructure dans le but de d\u00e9tecter rapidement les comportements malveillants.<\/p>\n<p class=\"p1\">La sixi\u00e8me g\u00e9n\u00e9ration (6G) repr\u00e9sente l&rsquo;\u00e9volution attendue de la technologie de communication sans fil au-del\u00e0 de la 5G. Alors que la 5G devait offrir des d\u00e9bits de donn\u00e9es plus rapides et une latence plus faible que les g\u00e9n\u00e9rations pr\u00e9c\u00e9dentes, la 6G devait repousser encore plus loin les limites.<\/p>\n<p>La 6G devrait offrir une couverture mondiale sans faille, \u00e9tendant la connectivit\u00e9 aux zones recul\u00e9es et mal desservies.<br \/>\nLes communications par satellite, les plateformes \u00e0 haute altitude et d&rsquo;autres solutions innovantes pourraient faire partie de l&rsquo;\u00e9cosyst\u00e8me 6G. \u00c0 l&rsquo;instar de l&rsquo;infrastructure 5G, le r\u00e9seau 6G repose sur quatre segments : le r\u00e9seau d&rsquo;acc\u00e8s radio (RAN), le c\u0153ur de r\u00e9seau, l&rsquo;informatique en p\u00e9riph\u00e9rie et l&rsquo;informatique en nuage. Cependant, le nombre d&rsquo;\u00e9quipements utilisateurs et d&rsquo;appareils connect\u00e9s \u00e0 l&rsquo;Internet des objets qui se connectent \u00e0 l&rsquo;infrastructure 6G pourrait atteindre un milliard d&rsquo;appareils connect\u00e9s \u00e0 Internet. Les r\u00e9seaux ad hoc v\u00e9hiculaires ou VANET d\u00e9signent g\u00e9n\u00e9ralement des r\u00e9seaux de v\u00e9hicules \u00e9quip\u00e9s de capacit\u00e9s de communication sans fil, telles que le Wi-Fi ou les r\u00e9seaux cellulaires, qui permettent la communication de v\u00e9hicule \u00e0 v\u00e9hicule (V2V) et de v\u00e9hicule \u00e0 infrastructure (V2I).<\/p>\n<p>Ces r\u00e9seaux sont principalement associ\u00e9s \u00e0 l&rsquo;am\u00e9lioration de la s\u00e9curit\u00e9 routi\u00e8re, \u00e0 la gestion du trafic et \u00e0 la fourniture de divers services aux conducteurs et aux passagers. Le paradigme des VANET compatibles 6G est en quelque sorte nouveau. Il fait r\u00e9f\u00e9rence \u00e0 l&rsquo;application de la 6G dans le contexte des VANET.<\/p>\n<p>Ce paradigme pose des d\u00e9fis sp\u00e9cifiques \u00e0 la 6G, tels que la n\u00e9cessit\u00e9 de d\u00e9bits de donn\u00e9es ultra-\u00e9lev\u00e9s, d&rsquo;une latence ultra-faible, d&rsquo;une connectivit\u00e9 mondiale massive des appareils et d&rsquo;une s\u00e9curit\u00e9 renforc\u00e9e.<\/p>\n<p><a href=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-76141\" src=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture.png\" alt=\"\" width=\"400\" height=\"322\" srcset=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture.png 425w, https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-300x241.png 300w, https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-15x12.png 15w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p>Un ensemble de syst\u00e8mes Zero Trust (ZTS) est activ\u00e9 dans l&rsquo;architecture de s\u00e9curit\u00e9 propos\u00e9e au niveau des v\u00e9hicules et des p\u00e9riph\u00e9riques et collabore pour d\u00e9tecter les v\u00e9hicules malveillants et les attaques externes visant les VANET compatibles 6G. Deux types de ZTS sont propos\u00e9s, le ZTS local (LZTS) et le ZTS global (GZTS), qui sont respectivement activ\u00e9s sur les v\u00e9hicules fiables et les serveurs p\u00e9riph\u00e9riques 6G. (i) LZTS : les v\u00e9hicules voisins (c&rsquo;est-\u00e0-dire situ\u00e9s dans la m\u00eame zone de couverture radio) ex\u00e9cutent un processus de surveillance et de d\u00e9tection mutuelles dans le but d&rsquo;\u00e9lire le v\u00e9hicule le plus fiable, qui jouera alors le r\u00f4le de LZTS. (<i>ii<\/i>)\u00a0 GZTS :<br \/>\ndans l&rsquo;architecture 6G, les serveurs p\u00e9riph\u00e9riques g\u00e8rent les v\u00e9hicules situ\u00e9s dans leur zone de couverture radio en ex\u00e9cutant un ensemble de t\u00e2ches de calcul demand\u00e9es par les v\u00e9hicules.<\/p>\n<div id=\"attachment_76142\" style=\"width: 580px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-copie.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-76142\" class=\"wp-image-76142 size-full\" src=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-copie.png\" alt=\"\" width=\"570\" height=\"380\" srcset=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-copie.png 570w, https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-copie-300x200.png 300w, https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-copie-18x12.png 18w\" sizes=\"auto, (max-width: 570px) 100vw, 570px\" \/><\/a><p id=\"caption-attachment-76142\" class=\"wp-caption-text\">Deux versions des algorithmes, l&rsquo;une l\u00e9g\u00e8re et l&rsquo;autre robuste, ont \u00e9t\u00e9 \u00e9valu\u00e9es \u00e0 l&rsquo;aide du \u00ab temps de d\u00e9tection efficace \u00bb (EDT) et du \u00ab taux de d\u00e9tection fiable \u00bb (RDR).<\/p><\/div>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-copie-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-76144 aligncenter\" src=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-copie-2.png\" alt=\"\" width=\"266\" height=\"166\" srcset=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-copie-2.png 266w, https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-copie-2-18x12.png 18w\" sizes=\"auto, (max-width: 266px) 100vw, 266px\" \/><\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-76143 aligncenter\" src=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-2.png\" alt=\"\" width=\"248\" height=\"155\" srcset=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-2.png 248w, https:\/\/www.iemn.fr\/wp-content\/uploads\/2025\/12\/Picture-2-18x12.png 18w\" sizes=\"auto, (max-width: 248px) 100vw, 248px\" \/><\/a><\/strong><\/p>\n<hr \/>\n<p><strong>Cette technique d&rsquo;IA propos\u00e9e pourrait d\u00e9tecter avec pr\u00e9cision les cyberattaques connues et inconnues,<\/strong> permettant ainsi aux GZTS et LZTS de d\u00e9tecter rapidement tout comportement malveillant ex\u00e9cut\u00e9 par les attaquants. Cette \u00e9valuation montre qu&rsquo;en activant les techniques d&rsquo;IA collaborative, les syst\u00e8mes zero trust emp\u00eachent la survenue d&rsquo;un nombre \u00e9lev\u00e9 de cyberattaques, en particulier lorsque le nombre d&rsquo;it\u00e9rations augmente.<\/p>\n<p>En combinant l&rsquo;IA g\u00e9n\u00e9rative et la TL, les LZTS et les GZTS affinent leurs d\u00e9tections au fil du temps, ce qui permet \u00e0 la technique propos\u00e9e de d\u00e9tecter les attaques complexes et intelligentes, telles que les attaques zero-day et collaboratives qui pourraient cibler l&rsquo;infrastructure 6G.<br \/>\nIl s&rsquo;agit donc d&rsquo;un cadre de d\u00e9fense appropri\u00e9 pour s\u00e9curiser le r\u00e9seau 6G contre les cybermenaces internes et externes.<\/p>\n<p><strong>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-qawvnx-00d8002daa6454481827b5b62f522218\">\n.av_font_icon.av-qawvnx-00d8002daa6454481827b5b62f522218{\ncolor:##FFA500e;\nborder-color:##FFA500e;\n}\n.av_font_icon.av-qawvnx-00d8002daa6454481827b5b62f522218 .av-icon-char{\nfont-size:30px;\nline-height:30px;\n}\n<\/style>\n<span  class='av_font_icon av-qawvnx-00d8002daa6454481827b5b62f522218 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-icon-animate'><span class='av-icon-char' aria-hidden='true' data-av_icon='\ue80b' data-av_iconfont='entypo-fontello' ><\/span><\/span><\/strong><\/p>\n<p>Contact:<\/p>\n<div  class='avia-button-wrap av-1yorzw-1-e14b11e7f79317de076074e6ffde494b-wrap avia-button-left  avia-builder-el-8  el_after_av_font_icon  avia-builder-el-last'><a href='mailto:marwane.ayaida@uphf.fr'  class='avia-button av-1yorzw-1-e14b11e7f79317de076074e6ffde494b av-link-btn avia-icon_select-yes-left-icon avia-size-small avia-position-left avia-color-silver'   aria-label=\"marwane.ayaida@uphf.fr\"><span class='avia_button_icon avia_button_icon_left' aria-hidden='true' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'><\/span><span class='avia_iconbox_title' >marwane.ayaida@uphf.fr<\/span><\/a><\/div>\n<\/div><\/section><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":20,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[297],"tags":[],"class_list":["post-76132","post","type-post","status-publish","format-standard","hentry","category-newsletter"],"_links":{"self":[{"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/posts\/76132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/comments?post=76132"}],"version-history":[{"count":24,"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/posts\/76132\/revisions"}],"predecessor-version":[{"id":76622,"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/posts\/76132\/revisions\/76622"}],"wp:attachment":[{"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/media?parent=76132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/categories?post=76132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/tags?post=76132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}