- Energy Efficient Wireless Sensor Networks
- Blockchain Technology Applications and Security
- Network Security and Intrusion Detection
- Advanced Wireless Network Optimization
- Privacy-Preserving Technologies in Data
- Cooperative Communication and Network Coding
- Complex Network Analysis Techniques
- IoT and Edge/Fog Computing
- Energy Harvesting in Wireless Networks
- Telecommunications and Broadcasting Technologies
- Indoor and Outdoor Localization Technologies
- Distributed systems and fault tolerance
- Cloud Computing and Resource Management
- BIM and Construction Integration
- Software-Defined Networks and 5G
- Building Energy and Comfort Optimization
- Advanced MIMO Systems Optimization
- Energy Load and Power Forecasting
- Human Mobility and Location-Based Analysis
- Smart Parking Systems Research
- Mobile Ad Hoc Networks
- Smart Grid Security and Resilience
- Smart Grid Energy Management
- Security in Wireless Sensor Networks
- Information and Cyber Security
Centre d'Etudes Superieures Industrielles
2020-2024
Institut de Sciences des Matériaux de Mulhouse
2024
Territoires
2022-2023
Nottingham Trent University
2022
Universitat Politècnica de València
2022
Brunel University of London
2022
Université de Haute-Alsace
2011-2012
Unité de Modélisation Mathématique et Informatique des Systèmes Complexes
2011
Centre de Recherche en Informatique
2011
Federated learning has emerged as a promising approach for distributed machine learning, particularly in the edge-cloud infrastructures, where clients (i.e., edge devices) collaboratively train models while maintaining data privacy. However, dynamic heterogeneity induced by FEderated Edge Learning (FEEL) environment poses many performance challenges. Indeed, real-world devices are considered heterogeneous, both system resources and distributions fluctuate significantly over time across...
Recent advances in hardware and communication technologies have accelerated the deployment of billions wireless sensors. This transformation has created a wide range applications adapted to evolving trends our daily life requirements. Wireless sensor networks (WSNs) could be deployed several target areas including buildings, forests, oceans, smart cities. Nevertheless, finding optimal location for each node is challenging task, typically when environment involves heterogeneous obstacles....
As the world's economy and urbanization develop rapidly, energy shortages pollution are becoming major challenges. In general, buildings responsible for approximately 40% of global consumption. To combat this challenge, adoption intelligent is strongly recommended. Therefore, through data collected by smart buildings, effective solutions should be incorporated to limit their impact on environment; Machine learning (ML) has proved great success in sensor-based Energy Trapping 10-cal optima...
The rapid growing of Internet things (IoT) is one the most important factors integrating WSN in smart buildings. Furthermore, presence these sensors and technologies allow improving accuracy measured data while reducing buildings energy consumption guaranteeing comfort required by indoor users. However, finding optimal sensor nodes positions an environment with heterogeneous obstacles keystone to ensure a full sensing coverage connectivity. To meet this challenge, various initiatives have...
As smart cities become more decentralized, the need for reliable and secure cyber-physical systems (CPS) that guarantee safe interactions data storage without loss of privacy is continuously increasing. Blockchain a rapidly emerging technology in this domain. It demonstrated effectiveness thanks to cryptographic mechanisms it utilizes its immutability. Private blockchains are most suited applications require confidentiality when very sensitive. In case, commonly used consensus protocol...
Finance, supply chain, healthcare, and energy have an increasing demand for secure transactions data exchange. Permissioned blockchains fulfilled this need thanks to the consensus protocol that ensures participants agree on a common value. One of most widely used protocols in private is Practical Byzantine Fault Tolerance (PBFT) which tolerates up one-third nodes, performs within partially synchronous systems has superior throughput compared other protocols. It has, however, important...
Wireless Sensors Network (WSN) are essential to ensure data collection and monitor in real time buildings their environments. In general, the collected of paramount importance especially optimize resource consumption improve indoor user's comfort. However, reliability smart depends on completeness relevance information, which needs an optimal sensor deployment inside efficient coverage area interest. this problem has been widely studied free space, but it became more complex when sensors...
SUMMARY In this paper, we discuss the issue of fairness in IEEE802.11e over wireless mesh networks. Fairness is an important factor that have to achieve before talking about QoS. Inspired by social networks approximations, and provide QoS regulating heterogeneous traffic, extended original protocol introducing a new algorithm based on ‘token bucket’ concept. We also treat problem exposed/hidden nodes. Simulation results show proposed approach offers better performance than one. Copyright ©...
SUMMARY A WiMAX technology is a very promising Broadband Wireless Access that able to transmit different service types. This latter can have constraints such as traffic rate, maximum latency, and tolerated jitter. The IEEE 802.16 Medium Control specifies five types of QoS classes: UGS, rtPS, ertPS, nrtPS, BE. However, the standard does not specify scheduling algorithm be used. Operators choice among many existing techniques. Also, they propose their own algorithms. In this paper, we strategy...
Federated Learning (FL) is an AI framework that enables collaborative and distributed training across multiple users to learn a global model while preserving the privacy of data held locally at different sites. However, aggregation process FL relies on centralized server update parameters exposes protocol several vulnerabilities. Thus, security concerns in systems need be further investigated fully leverage capabilities this protocol, especially industries involving highly sensitive data,...
This paper provides a comparison study of the quality services RPL protocols in low-power and lossy net- works (LLN). We evaluate compare our proposed protocol which is an extension based on Operator Calculus (OC), called RPL-OC, with standard other variants. OC approach applied to extract feasible end-to-end paths while assigning rank each one. The goal provide tuple that containing most efficient manner by considering more network metrics instead Further, address some significant issues...
The wireless sensor deployment problem is one of the major issues in networks (WSNs). It involves designing optimal network topology within area order to maximize coverage and lifetime minimize cost energy consumption under connectivity constraint. WSN a challenging NP-hard combinatorial optimization due number factors, including size type area, obstacles, objectives optimize. Consequently, metaheuristics are assumed be most efficient methods compute scheme reasonable amount time. In this...
In this paper, we propose a scheduling strategy for various IPTV services traffic (HD-TV, SD-TV, Web-TV and Mobile-TV) over 802.16j networks. Our scheme adapts dynamically the scheduler operation to according queue load QoS constraints. particular, proposed mechanism gives more priority HD-TV SD-TV traffics by using two schedulers. The algorithm has been simulated QualNet network simulator. Friedman test used address some significant issues of analysis compare with others scheme....
Internet protocol television (IPTV) service depends on the network quality of (QoS) and bandwidth broadband provider. IEEE 802.16j mobile multihop relay Worldwide Interoperability for Microwave Access networks have opportunity to offer high capacity by introducing stations. However, actually satisfy QoS requirements offering IPTV services (HDTV, SDTV, Web TV, TV) heterogeneous users’ requests, providers must use a video server each type, which increases load, especially consumption...