- Mobile Ad Hoc Networks
- Cooperative Communication and Network Coding
- Wireless Networks and Protocols
- Opportunistic and Delay-Tolerant Networks
- IoT and Edge/Fog Computing
- Energy Efficient Wireless Sensor Networks
- IoT Networks and Protocols
- Caching and Content Delivery
- Energy Harvesting in Wireless Networks
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Wireless Network Optimization
- Wireless Communication Security Techniques
- Advanced MIMO Systems Optimization
- Distributed and Parallel Computing Systems
- Innovation Policy and R&D
- Network Traffic and Congestion Control
- IPv6, Mobility, Handover, Networks, Security
- Advanced Wireless Communication Technologies
- Underwater Vehicles and Communication Systems
- Indoor and Outdoor Localization Technologies
- Blockchain Technology Applications and Security
- Wireless Communication Networks Research
- Embedded Systems Design Techniques
- Privacy-Preserving Technologies in Data
- Security in Wireless Sensor Networks
Institut national de recherche en informatique et en automatique
2014-2024
Inria Saclay - Île de France
2015-2024
Conference Board
2021
École Polytechnique
2018-2020
Institut Superieur de l'Aeronautique et de l'Espace (ISAE-SUPAERO)
2018
Université Paris-Saclay
2017
This paper introduces the FIT IoT-LAB testbed, an open testbed composed of 2728 low-power wireless nodes and 117 mobile robots available for experimenting with large-scale IoT technologies, ranging from low-level protocols to advanced Internet services. is built accelerate development tomorrow's technology by offering accurate open-access open-source multi-user scientific tool. The deployed in 6 sites across France. Each site features different node hardware capabilities, but all are...
The use of Unmanned Aerial Vehicles (UAVs) is rapidly growing in popularity. Initially introduced for military purposes, over the past few years, UAVs and related technologies have successfully transitioned to a whole new range civilian applications such as delivery, logistics, surveillance, entertainment, so forth. They opened possibilities allowing operation otherwise difficult or hazardous areas, instance. For all applications, one foremost concern selection paths trajectories UAVs, at...
In this paper, we investigate the problem of supporting mobility over RPL (IPv6 Routing Protocol for Low power and Lossy Networks) when applied to route traffic in Wireless Sensor Networks (WSNs). is a routing protocol adapted information with low power, storage processing sensor devices, static topologies commonly found WSNs, but which not directly designed mobile scenarios. Specifically, actively decreases control traffic, at price lower reactivity topology changes. propose introduce some...
The following topics are dealt with: data privacy; security of data; cryptography; Internet Things; Internet; computer network security; contracts; authorisation; cryptocurrencies; cloud computing.
LoRaWAN is a media access control (MAC) protocol for wide area networks. It designed to allow low-powered devices communicate with Internet-connected applications over long-range wireless connections. The targeted dense deployment will inevitably cause shortage of radio resources. Hence, autonomous and lightweight resource management crucial offer ultra-long battery lifetime LoRa devices. One the most promising solutions such challenge use artificial intelligence. This enable innovative...
Energy efficiency is a major driving factor in the Internet of Things (IoT). In this context, an IoT approach based on Information-Centric Networking (ICN) offers prospects for low energy consumption. Indeed, ICN can provide local in-network content caching so that relevant remains available at any time while devices are deep-sleep mode most time. paper, we evaluate NDN enhanced with CoCa, simple side protocol designed to exploit names together smart interplay between cooperative and...
Despite their widespread adoption, cellular networks face growing vulnerabilities due to inherent complexity and the integration of advanced technologies. One major threats in this landscape is Voice over IP (VoIP) GSM gateways, known as SIMBox devices. These devices use multiple SIM cards route VoIP traffic through networks, enabling international bypass fraud with losses up $3.11 billion annually. Beyond financial impact, activity degrades network performance, threatens national security,...
In this paper we investigate security issues related to the Optimized Link State Routing Protocol -- one example of a proactive routing protocol for MANETs. We inventory possible attacks against integrity OLSR network infrastructure, and present technique securing network. particular, assuming that mechanism message authentication (digital signatures) has been deployed, concentrate on problem where otherwise "trusted" nodes have compromised by attackers, which could then inject false...
For a seamless deployment of the Internet Things (IoT), self- managing solutions are needed to overcome challenges IoT, including massively dense networks and careful management constrained resources in terms calculation, memory, battery. Leveraging on artificial intelligence will enable IoT devices operate autonomously by using inherently distributed learning techniques. Fully resource free from draining their limited energy constantly communicating with centralized controller. The present...
Scalability is one of the toughest challenges in ad hoc networking. Recent work outlines theoretical bounds on how well routing protocols could scale this environment. However, none popular solutions really scales to large networks, by coming close enough these bounds. In paper, we study case link state and OLSR, strongest candidates for standardization. We analyze are not reached case, much scalability enhanced with use Fish eye techniques addition framework. show that enhancement, reached.
In the IoT, trade-off between content availability and energy efficiency plays a crucial role. The standard approach to in IoT combines low-power radios, network protocols letting devices sleep most of time, centralized caching content, either at designated proxy or cloud via an uplink, which maintains while sleep. However, this is not possible number scenarios, where gateway/proxy unavailable time. paper, we propose leveraging distributed for based on information-centric networking...
Link state has been the dominating IGP routing technology in IP networks for more than a decade. With advent of wireless ad-hoc networking, need light, efficient and robust makes it good candidate to be also used this constrained environment. One key issue networking is lack bandwidth. Thus, paper we examine overhead due link an network. More precisely study classic link-state protocol OSPF OLSR, that was developed specifically networks. Further, how evolves when node density increases. The...
Time Synchronized Channel Hopping (TSCH) is a technique known to efficiently combat external interference and multi-path fading. TSCH at the heart of industrial low-power wireless standards such as WirelessHART IEEE802.15.4e, focus current standardization activities IETF 6TiSCH. In network, communicating nodes send successive link-layer frames different frequencies. The performance frequency-agile communication not well understood. this paper, we propose an empirical approach. We conduct...
Motivated by scenario requirements for 5G cellular networks, we study one of the candidate protocols massive random access: family access methods known as Coded Slotted ALOHA (CSA). A recent trend in research has explored aspects such various contexts, but aspect not been fully taken into account: impact path loss, which is a major design constraint long-range wireless networks. In this article, explore behavior CSA, focusing on loss component correlated to distance base station. Path...
Unmanned Aerial Vehicles (UAVs), also known as drones, are a class of aircraft without the presence pilots on board. UAVs have ability to reduce time and cost deliveries respond emergency situations. Currently, extensively used for data delivery and/or collection to/from dangerous or inaccessible sites. However, trajectory planning is one major UAV issues that needs be solved. To address this question, we focus in paper determining optimized routes followed by drones pickup with window an...
Wireless Sensor Networks (WSNs) become one of the most common technologies that can be deployed in various domains. However, networks suffer from many problems caused by limited sensor resources and harsh environments where these are deployed. Many algorithms have been proposed to manage data routing while respecting specificity such networks. One known protocols is RPL (IPv6 Routing Protocol for Low power Lossy networks). Nevertheless this protocol designed with consideration energy, it...
Wireless sensor networks (WSN) have specific features such as low transmission range, stringent energy consumption constraints, limited memory and processing power. For this reason, tailored protocols been proposed, optimizing network with respect to various assumptions: one commonly exploited property of WSN is the stability topology due permanent installation nodes. However, in some applications, wireless nodes might be mobile, for instance when they are associated users. In that case,...