- UAV Applications and Optimization
- Distributed Control Multi-Agent Systems
- Opportunistic and Delay-Tolerant Networks
- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- IoT and Edge/Fog Computing
- Robotic Path Planning Algorithms
- Advanced MIMO Systems Optimization
- Robotics and Sensor-Based Localization
- Wireless Networks and Protocols
- Energy Harvesting in Wireless Networks
- Wireless Communication Networks Research
- Vehicular Ad Hoc Networks (VANETs)
- Underwater Vehicles and Communication Systems
- Advanced Wireless Communication Technologies
- Modular Robots and Swarm Intelligence
- Cooperative Communication and Network Coding
- Advanced Wireless Network Optimization
- Satellite Communication Systems
- Indoor and Outdoor Localization Technologies
- Air Traffic Management and Optimization
- IPv6, Mobility, Handover, Networks, Security
- Optical Wireless Communication Technologies
- IoT Networks and Protocols
- Network Security and Intrusion Detection
Technology Innovation Institute
2020-2025
Université de Lorraine
2018-2024
Laboratoire Lorrain de Recherche en Informatique et ses Applications
2019-2024
Centre National de la Recherche Scientifique
2013-2024
Robotics Research (United States)
2021-2024
Teer Coatings (United Kingdom)
2019-2022
University of Kentucky
2022
Zhejiang University
2021
University at Buffalo, State University of New York
2021
Heuristics and Diagnostics for Complex Systems
2012-2018
This article presents a vision for future unmanned aerial vehicles (UAV)-assisted disaster management, considering the holistic functions of prediction, assessment, and response. Here, UAVs not only survey affected area but also assist in establishing vital wireless communication links between survivors nearest available cellular infrastructure. A perspective different classes geophysical, climate-induced, meteorological disasters based on extent interaction UAV terrestrially deployed...
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role human activities, systems and processes. The high connectivity intelligent objects their severe constraints lead to many security challenges, which not included classical formulation problems solutions. Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency) as one four projects with a potential impact broader than itself. To...
The fast-paced development of Unmanned Aerial Vehicles (UAVs) and their use in different domains, opens a new paradigm on natural disaster management. In UAV-assisted management applications, UAVs not only survey the affected area but also assist establishing communication network between survivors, rescue teams nearest available cellular infrastructure. This paper identifies main applications UAV networks discusses open research issues related to
In this paper we want to explore a new approach for security mechanisms design and deployment in the context of Internet Things (IoT). We claim that usual issues, typical more classical systems networks, does not grab all aspects related paradigm communication, sharing actuation. fact, IoT involves features, dangers cannot be completely taken into consideration through formulation problems. The calls security, which will have consider problem from holistic perspective including actors their...
Air pollution monitoring has recently become an issue of utmost importance in our society. Despite the fact that crowdsensing approaches could be adequate solution for urban areas, they cannot implemented rural environments. Instead, deploying a fleet UAVs considered acceptable alternative. Embracing this approach, paper proposes use equipped with off-the-shelf sensors to perform air tasks. These are guided by proposed Pollution-driven UAV Control (PdUC) algorithm, which is based on...
This paper proposes a network architecture and supporting optimization framework that allows Unmanned Aerial Vehicles (UAVs) to perform city-scale video monitoring of set Points Interest (PoI). Our approach is systems-driven, relying on experimental studies identify the permissible number hops for multi-UAV relaying in noisy 3-D environment. itself innovative sense it defines mathematical selecting UAVs periodic re-charging by landing public transportation buses, then `riding' bus successive...
Internet of Things applications using sensors and actuators raise new privacy related threats, such as drivers vehicles tracking profiling. These threats can be addressed by developing adaptive context-aware protection solutions to face the environmental constraints (memory, energy, communication channel, so on), which cause a number limitations for applying cryptographic schemes. This paper proposes preserving solution in ITS context relying on game theory model between two actors (data...
Sixth generation (6G) wireless communication networks are envisioned to be empowered with novel enabling technologies guarantee ubiquitous coverage requirements, heterogeneous scenarios, and improved network intelligence, spectral rates, security. The 6G vision is not only limited terrestrial networks, but also extends non-terrestrial encompassing satellites aerial thus exploring a full spectrum of links. In the role unmanned vehicles paramount importance, as flying devices expected densely...
The Federal Aviation Administration (FAA) recently introduced a new standard, namely, remote identification, to improve accountability for unmanned aerial vehicles (UAVs) operations. This rule requires UAV operators broadcast messages revealing sensitive data, such as identity and location on the wireless channel. However, this leads security privacy concerns among operators. Unauthorized parties may easily discover of flying in specific area launch attacks it using jamming or tracking its...
This paper addresses the Internet of Things (IoT) paradigm, which is gaining substantial ground in modern wireless telecommunications. The IoT describes a vision where heterogeneous objects like computers, sensors, Radio-Frequency IDentification (RFID) tags or mobile phones are able to communicate and cooperate efficiently achieve common goals thanks IP addressing scheme. focuses on reliability emergency applications under technology. These applications' success contingent upon delivery...
The Internet of Things (IoT) will enable objects to become active participants everyday activities. Introducing into the control processes complex systems makes IoT security very difficult address. Indeed, is a paradigm in which people interact with technological ecosystem based on smart through processes. interactions these four components, person, intelligent object, ecosystem, and process, highlight systemic cognitive dimension within IoT. interaction requires protection their privacy....
Traditional methodologies for precise inspection of bridges (pavement, beams, column cap, column, joints and inside box girder, etc.) with By-bridge equipment, Aerial Work Platform (AWP) or via ropes have several limits that can be overcome by using Unmanned Vehicles (UAVs). The constant development in this field allows us to go beyond the manual control use a single UAV. In context rules, research provides new inputs multilevel approach used today methods structural drones. Today, UAV-based...
Area monitoring and surveillance are some of the main applications for Unmanned Aerial Vehicle (UAV) networks. The scientific problem that arises from this application concerns way area must be covered to fulfill mission requirements. One challenges is determine paths UAVs optimize usage resources while minimizing time. Different approaches rely on partitioning strategies. Depending size complexity monitor, it possible decompose exactly or approximately. This paper proposes a method called...