Cédric Adjih

ORCID: 0000-0003-3924-5374
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Cooperative Communication and Network Coding
  • Wireless Networks and Protocols
  • Opportunistic and Delay-Tolerant Networks
  • IoT and Edge/Fog Computing
  • Energy Efficient Wireless Sensor Networks
  • IoT Networks and Protocols
  • Caching and Content Delivery
  • Energy Harvesting in Wireless Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Wireless Network Optimization
  • Wireless Communication Security Techniques
  • Advanced MIMO Systems Optimization
  • Distributed and Parallel Computing Systems
  • Innovation Policy and R&D
  • Network Traffic and Congestion Control
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Wireless Communication Technologies
  • Underwater Vehicles and Communication Systems
  • Indoor and Outdoor Localization Technologies
  • Blockchain Technology Applications and Security
  • Wireless Communication Networks Research
  • Embedded Systems Design Techniques
  • Privacy-Preserving Technologies in Data
  • Security in Wireless Sensor Networks

Institut national de recherche en informatique et en automatique
2014-2024

Inria Saclay - Île de France
2015-2024

Conference Board
2021

École Polytechnique
2018-2020

Institut Superieur de l'Aeronautique et de l'Espace (ISAE-SUPAERO)
2018

Université Paris-Saclay
2017

This paper introduces the FIT IoT-LAB testbed, an open testbed composed of 2728 low-power wireless nodes and 117 mobile robots available for experimenting with large-scale IoT technologies, ranging from low-level protocols to advanced Internet services. is built accelerate development tomorrow's technology by offering accurate open-access open-source multi-user scientific tool. The deployed in 6 sites across France. Each site features different node hardware capabilities, but all are...

10.1109/wf-iot.2015.7389098 preprint EN 2015-12-01

The use of Unmanned Aerial Vehicles (UAVs) is rapidly growing in popularity. Initially introduced for military purposes, over the past few years, UAVs and related technologies have successfully transitioned to a whole new range civilian applications such as delivery, logistics, surveillance, entertainment, so forth. They opened possibilities allowing operation otherwise difficult or hazardous areas, instance. For all applications, one foremost concern selection paths trajectories UAVs, at...

10.3390/drones3030066 article EN cc-by Drones 2019-08-24

In this paper, we investigate the problem of supporting mobility over RPL (IPv6 Routing Protocol for Low power and Lossy Networks) when applied to route traffic in Wireless Sensor Networks (WSNs). is a routing protocol adapted information with low power, storage processing sensor devices, static topologies commonly found WSNs, but which not directly designed mobile scenarios. Specifically, actively decreases control traffic, at price lower reactivity topology changes. propose introduce some...

10.1109/nof.2012.6463993 article EN 2012-11-01

The following topics are dealt with: data privacy; security of data; cryptography; Internet Things; Internet; computer network security; contracts; authorisation; cryptocurrencies; cloud computing.

10.1109/ntms.2019.8763849 preprint EN 2019-06-01

LoRaWAN is a media access control (MAC) protocol for wide area networks. It designed to allow low-powered devices communicate with Internet-connected applications over long-range wireless connections. The targeted dense deployment will inevitably cause shortage of radio resources. Hence, autonomous and lightweight resource management crucial offer ultra-long battery lifetime LoRa devices. One the most promising solutions such challenge use artificial intelligence. This enable innovative...

10.23919/wmnc.2019.8881393 preprint EN 2019-09-01

Energy efficiency is a major driving factor in the Internet of Things (IoT). In this context, an IoT approach based on Information-Centric Networking (ICN) offers prospects for low energy consumption. Indeed, ICN can provide local in-network content caching so that relevant remains available at any time while devices are deep-sleep mode most time. paper, we evaluate NDN enhanced with CoCa, simple side protocol designed to exploit names together smart interplay between cooperative and...

10.1145/3125719.3125732 preprint EN 2017-09-19

Despite their widespread adoption, cellular networks face growing vulnerabilities due to inherent complexity and the integration of advanced technologies. One major threats in this landscape is Voice over IP (VoIP) GSM gateways, known as SIMBox devices. These devices use multiple SIM cards route VoIP traffic through networks, enabling international bypass fraud with losses up $3.11 billion annually. Beyond financial impact, activity degrades network performance, threatens national security,...

10.48550/arxiv.2502.01193 preprint EN arXiv (Cornell University) 2025-02-03

In this paper we investigate security issues related to the Optimized Link State Routing Protocol -- one example of a proactive routing protocol for MANETs. We inventory possible attacks against integrity OLSR network infrastructure, and present technique securing network. particular, assuming that mechanism message authentication (digital signatures) has been deployed, concentrate on problem where otherwise "trusted" nodes have compromised by attackers, which could then inject false...

10.1145/1029102.1029106 article EN 2004-10-25

For a seamless deployment of the Internet Things (IoT), self- managing solutions are needed to overcome challenges IoT, including massively dense networks and careful management constrained resources in terms calculation, memory, battery. Leveraging on artificial intelligence will enable IoT devices operate autonomously by using inherently distributed learning techniques. Fully resource free from draining their limited energy constantly communicating with centralized controller. The present...

10.1109/globecom38437.2019.9013345 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2019-12-01

Scalability is one of the toughest challenges in ad hoc networking. Recent work outlines theoretical bounds on how well routing protocols could scale this environment. However, none popular solutions really scales to large networks, by coming close enough these bounds. In paper, we study case link state and OLSR, strongest candidates for standardization. We analyze are not reached case, much scalability enhanced with use Fish eye techniques addition framework. show that enhancement, reached.

10.1109/jcn.2004.6596835 article EN Journal of Communications and Networks 2004-12-01

In the IoT, trade-off between content availability and energy efficiency plays a crucial role. The standard approach to in IoT combines low-power radios, network protocols letting devices sleep most of time, centralized caching content, either at designated proxy or cloud via an uplink, which maintains while sleep. However, this is not possible number scenarios, where gateway/proxy unavailable time. paper, we propose leveraging distributed for based on information-centric networking...

10.1109/glocomw.2016.7848819 article EN 2022 IEEE Globecom Workshops (GC Wkshps) 2016-12-01

Link state has been the dominating IGP routing technology in IP networks for more than a decade. With advent of wireless ad-hoc networking, need light, efficient and robust makes it good candidate to be also used this constrained environment. One key issue networking is lack bandwidth. Thus, paper we examine overhead due link an network. More precisely study classic link-state protocol OSPF OLSR, that was developed specifically networks. Further, how evolves when node density increases. The...

10.1109/milcom.2003.1290410 preprint EN 2004-07-08

Time Synchronized Channel Hopping (TSCH) is a technique known to efficiently combat external interference and multi-path fading. TSCH at the heart of industrial low-power wireless standards such as WirelessHART IEEE802.15.4e, focus current standardization activities IETF 6TiSCH. In network, communicating nodes send successive link-layer frames different frequencies. The performance frequency-agile communication not well understood. this paper, we propose an empirical approach. We conduct...

10.1109/coase.2015.7294053 article EN IEEE International Conference on Automation Science and Engineering (CASE) 2015-08-01

Motivated by scenario requirements for 5G cellular networks, we study one of the candidate protocols massive random access: family access methods known as Coded Slotted ALOHA (CSA). A recent trend in research has explored aspects such various contexts, but aspect not been fully taken into account: impact path loss, which is a major design constraint long-range wireless networks. In this article, explore behavior CSA, focusing on loss component correlated to distance base station. Path...

10.1109/pimrc.2017.8292692 preprint EN 2017-10-01

Unmanned Aerial Vehicles (UAVs), also known as drones, are a class of aircraft without the presence pilots on board. UAVs have ability to reduce time and cost deliveries respond emergency situations. Currently, extensively used for data delivery and/or collection to/from dangerous or inaccessible sites. However, trajectory planning is one major UAV issues that needs be solved. To address this question, we focus in paper determining optimized routes followed by drones pickup with window an...

10.3390/drones5020027 article EN cc-by Drones 2021-04-16

Wireless Sensor Networks (WSNs) become one of the most common technologies that can be deployed in various domains. However, networks suffer from many problems caused by limited sensor resources and harsh environments where these are deployed. Many algorithms have been proposed to manage data routing while respecting specificity such networks. One known protocols is RPL (IPv6 Routing Protocol for Low power Lossy networks). Nevertheless this protocol designed with consideration energy, it...

10.1109/iwcmc.2016.7577140 article EN 2016-09-01

Wireless sensor networks (WSN) have specific features such as low transmission range, stringent energy consumption constraints, limited memory and processing power. For this reason, tailored protocols been proposed, optimizing network with respect to various assumptions: one commonly exploited property of WSN is the stability topology due permanent installation nodes. However, in some applications, wireless nodes might be mobile, for instance when they are associated users. In that case,...

10.1109/pemwn.2016.7842898 preprint EN 2016-11-01
Coming Soon ...