Bruno Quoitin

Bruno Quoitin
  • PhD
  • Professor at University of Mons

About

71
Publications
14,843
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,869
Citations
Current institution
University of Mons
Current position
  • Professor

Publications

Publications (71)
Article
Full-text available
Estimating the optical power distribution in a room in order to assess the performance of a visible light communication (VLC) system is nothing new. It can be estimated using a Monte Carlo optical ray tracing algorithm that sums the contribution of each ray on the reception plane. For now, research has focused on rectangular parallelepipedic rooms...
Article
Full-text available
LoRa enables long-range communication for Internet of Things (IoT) devices, especially those with limited resources and low power requirements. Consequently, LoRa has emerged as a popular choice for numerous IoT applications. However, the security of LoRa devices is one of the major concerns that requires attention. Existing device identification m...
Conference Paper
LoRaWAN devices are secured using traditional cryptographic methods. However, the end devices are still vulnerable to security attacks such as impersonation. To counter these attacks, LoRa requires an additional layer of security at the physical level. Deep Learning-based LoRa device identification using Radio Frequency Fingerprinting is currently...
Article
Full-text available
Internet of Things (IoT) devices increasingly contribute to critical infrastructures, necessitating robust security measures. LoRaWAN, a low-power IoT network, employs the Advanced Encryption Standard (AES) with a 128-bit key for encryption and integrity, balancing efficiency and security. As computational capabilities of devices advance and recomm...
Article
Full-text available
In this paper, we present and evaluate an ultra-wideband (UWB) indoor processing architecture that allows the performing of simultaneous localizations of mobile tags. This architecture relies on a network of low-power fixed anchors that provide forward-ranging measurements to a localization engine responsible for performing trilateration. The commu...
Article
Full-text available
IEEE Std 802.15.4-2015 Time Slotted Channel Hopping (TSCH) is the de facto Medium Access Control (MAC) mechanism for industrial applications. It renders communications more resilient to interference by spreading them over the time (time-slotted) and the frequency (channel-hopping) domains. The 6TiSCH architecture bases itself on this new MAC layer...
Article
The protocols used in Wireless Sensor Networks are subject to very strict temporal synchronization constraints. Radio Duty Cycle (RDC) protocols in particular are characterized by their very high synchronization accuracy requirements. In these protocols, synchronization errors are primarily caused by the natural clock drift observed in real nodes....
Conference Paper
The protocols used in Wireless Sensor Networks are subject to very strict temporal synchronization constraints. Radio Duty Cycle (RDC) protocols in particular are characterized by their very high synchronization accuracy requirements. In these protocols, synchronization errors are primarily caused by the natural clock drift observed in real nodes....
Preprint
Full-text available
We consider multi-player games played on graphs, in which the players aim at fulfilling their own (not necessarily antagonistic) objectives. In the spirit of evolutionary game theory, we suppose that the players have the right to repeatedly update their respective strategies (for instance, to improve the outcome w.r.t. the current strategy profile)...
Conference Paper
Full-text available
The 2007 amendment of the IEEE 802.15.4 standard [1] includes an Ultrawide Band (UWB) physical layer. It relies on spreading the RF energy over more than 500 MHz with the advantage of high resilience to multi-path propagation and precise time of arrival estimation. A major drawback of UWB is the lack of standard MAC layer. In this paper, we present...
Article
Full-text available
The Smart Grid (SG) aims to transform the current electric grid into a “smarter” network where the integration of renewable energy resources, energy efficiency and fault tolerance are the main benefits. This is done by interconnecting every energy source, storage point or central control point with connected devices, where heterogeneous SG applicat...
Article
The Border Gateway Protocol propagates routing information accross the Internet in an incremental manner. It only advertises to its peers changes in routing. However, as early as 1998, observations have been made of BGP announcing the same route multiple times, causing router CPU load, memory usage and convergence time higher than expected. In this...
Conference Paper
The use of UWB for Industrial Internet of Things (IIoT) applications benefits from the following four main properties; 1) scalability due to the inherent short transmissions times of the UWB radio, 2) bandwidth-consuming applications such as condition monitoring with vibration sensing, 3) applications with real-time positioning (RTLS) requirements,...
Conference Paper
Full-text available
Wireless Sensor Networks performing low-power data collection often suffer from uneven load distribution among nodes. Nodes close to the network root typically face a higher load, see their battery deplete first, and become prematurely unable to operate (both sensing and relaying other nodes’ data). We argue that opportunistic routing, by making fo...
Article
The Border Gateway Protocol (BGP) is the protocol used to distribute Internet routes between different organizations. BGP routing policies are very important because they enable organizations to enforce their business relationships by controlling route redistribution and route selection. In this paper, we investigate the semantic of BGP policies. W...
Article
Full-text available
This paper try to better understand the performance of ContikiMAC compared to X-MAC. ContikiMAC achieves a transmission by repeatedly transmitting a data packet until the reception of an ACK from the destination. While X-MAC uses a stream of small size strobes to advertise the destination of the incoming transmission. A priori, X-MAC is then less b...
Chapter
Sensor networks are gradually moving towards full-IPv6 architectures and play an important role in the upcoming Internet of Things. Some mission-critical applications of sensor networks will require a level of reliability that excludes the presence of single points of failure, as it is often the case today for the gateways connecting sensor network...
Conference Paper
As part of a search for a better understanding of MAC/routing interactions in Wireless Sensor Networks, this paper presents an analysis of the behaviour of the AODV routing protocol when combined with a duty-cycle MAC protocol. In particular, the paper focuses on the time it takes for a route request to be answered in presence of increased latency...
Article
The role of BGP inside an AS is to disseminate the routes learned from external peers to all routers of the AS. A straightforward, but not scalable, solution, is to resort to a full-mesh of iBGP sessions between the routers of the domain. Achieving scalability in the number of iBGP sessions is possible by using Route Reflectors (RR). Relying on a s...
Article
Years after the initial development of the current routing protocols we still lack an understanding of the impact of various parameters on the routes chosen in today’s Internet. Network operators are struggling to optimize their routing, but the effectiveness of those efforts is limited.In this article, we study sensitivity of routing stretch and d...
Article
In this paper we investigate the evolution of the IPv4 and IPv6 Internet topologies at the autonomous system (AS) level over a long period of time.We provide abundant empirical evidence that there is a phase transition in the growth trend of the two networks. For the IPv4 network, the phase change occurred in 2001. Before then the network's size gr...
Conference Paper
Full-text available
Network researchers often need to evaluate newly proposed algorithms and protocols over realistic topologies. Many researchers use random networks for such evaluations. Unfortunately, random networks do not accurately model real networks and important parameters such as link metrics or iBGP configurations are often ignored. We propose IGen, a freel...
Conference Paper
BGP routing policies are mainly used by network operators to en- force business relationships between Autonomous Systems (AS), and to prefer some routes over others. In this paper, we propose a hierarchical policy model to express each policy at the most appro- priate level of abstraction. The model is structured around chains of filters that apply...
Conference Paper
In this paper we present DeSiNe, a modular flow-level network simulator. DeSiNe is aimed at performance analysis and bench- marking of Quality of Service routing algorithms and traffic engi- neering extensions. Several well-known QoS routing algorithms and traffic engineering extensions have been implemented in De- SiNe. The flow-level nature provi...
Article
This article presents a technology-agnostic and a multi-dimensional (i.e., routing, forwarding, and traffic management dimensions) approach for the management of IP network resources to ensure service differentiation with both intra- and inter-domain scope. This article introduces the network plane (NP) and parallel Internets (PI) concepts for achi...
Article
Full-text available
Since recent years, it has been recognized that the existing routing architecture of today's Internet is facing scalability problems. Single numbering space, multi-homing, and traffic engineering, are making routing tables of the default free zone to grow very rapidly. Recently, in order to solve this issue, it has been proposed to review the Inter...
Article
Full-text available
Link weight optimization is shown to be a key issue in engineering of IGPs using shortest path first routing. The IGP weight optimization problem seeks a weight array resulting an optimal load distribution in the network based on the topology information and a traffic demand matrix. Several solution methods for various kinds of this problem have be...
Article
Full-text available
The interactions between the IGP and BGP routing protocols which are running inside an ISPs network are sometimes hard to understand. The problem becomes particularly complex when there are dozens of routers/links and several thousands of destination prefixes. In this paper, we present a publicly available routing solver to evaluate routing what-if...
Article
Multihoming, the practice of connecting to multiple providers, is becoming highly popular. Due to the growth of the BGP routing tables in the Internet, IPv6 multihoming is required to preserve the scalability of the interdomain routing system. A proposed method is to assign multiple provider-dependent aggregatable (PA) IPv6 prefixes to each site, i...
Article
We present the TOTEM open source Traffic Engineering (TE) toolbox and a set of TE methods that we have designed and/or integrated. These methods cover intra-domain and inter-domain TE, IP-based and MPLS-based TE. They are suitable for network optimisation, better routing of traffic for providing QoS, load balancing, protection and restoration in ca...
Article
Full-text available
This paper presents a new publicly available dataset provided by GÉANT, the European Research and Educational Network. This dataset consists of trafficmatrices builtusing full IGProuting infor- mation, sampled Netflow data and BGP routing information of the GÉANT network, one per 15 minutes interval for several months. Potential benefits of publicl...
Article
Today, the complexity of ISPs' networks make it difficult to investigate the implications of internal or external changes on the distribution of traffic across their network. In this article we explain the complexity of building models of large ISPs' networks. We describe the various aspects important to understanding the routing inside an AS. We p...
Conference Paper
Full-text available
Today, engineering interdomain traffic in large transit ASs is a difficult task due the opacity of BGP and the interactions between the BGP decision process and IGP routing. In this paper we propose Tweak-it, a tool that, based on the steady-state view of BGP routing inside the AS and the traffic demands of the AS, computes the BGP updates to be se...
Conference Paper
For performance or cost reasons, autonomous systems (AS) often need to control the flow of their incoming interdomain traffic. Controlling its incoming traffic is a difficult task since it often implies influencing ASes on the path. The current BGP-based techniques that an AS can use for this purpose are primitive. Moreover, their effect is often d...
Article
Many Internet Service Providers tune the configuration of th e Border Gateway Protocol on their routers to control their traffic. Content p roviders often need to control their outgoing traffic while access providers need t o control their incoming traffic. We show, by means of measurements and simulations, t hat controlling the flow of the incomin...
Conference Paper
Full-text available
Multihoming, the practice of connecting to multiple providers, is becoming highly popular. Due to the growth of the BGP routing tables in the Internet, the way to multihome in IPv6 is required to preserve the scalability of the interdomain routing system. A proposed method is to assign multiple provider-dependent aggregatable (PA) IPv6 prexes to ea...
Conference Paper
INTRODUCTIONBuilding increasingly precise and realistic network topologies isan important issue for the purpose of evaluating networking applications.Still, the generation of router-level topologies has notbeen widely covered. Though, the properties of the router-leveltopologies have a significant impact on simulation results. For instance,the eval...
Article
The Border Gateway Protocol (BGP) is the standard interdomain routing protocol in the Internet. Inside an Autonomous System (AS), the interdomain routes are often distributed by using BGP Route Reflectors (RR). Today, most RR are simple BGP routers. We show that by adding intelligence to the RR, it is possible to improve both the routing and the pa...
Article
Various traffic engineering techniques are used to control the flow of IP packets inside large ISP networks. However, few techniques have been proposed to control the flow of packets between domains. In this paper, we focus on the needs of stub ISPs that compose 80% of the global Internet. We first describe the typical traffic pattern of such a stu...
Article
this paper are stub ASes that constitute the majority of the ASes in the Internet [8] (at the date of July 29 th 2002 more than 80 % of the ASes could be considered as stub-ASes). A stub-AS is an AS that does not provide transit service for other ASes. It can host content or provide access to dialup or broadband users. More specifically, our focus...
Article
Various traffic engineering techniques have been proposed and are used to control the flow of IP packets inside large ISP networks. However, few techniques have been proposed to control the flow of packets between domains. In this paper, we focus on the needs of stub ISPs that compose 80% of the global Internet. We first describe the typical traffi...
Article
Full-text available
Traffic engineering encompasses a set of techniques that can be used to control the flow of traffic in data networks. We discuss several of those techniques that have been developed during the last few years. Some techniques are focused on pure IP networks while others have been designed with emerging technologies for scalable Quality of Service (Q...
Article
Full-text available
Traffic engineering is performed by means of a set of techniques that can be used to better control the flow of packets inside an IP network. We discuss the utilization of these techniques across interdomain boundaries in the global Internet. We first analyze the characteristics of interdomain traffic on the basis of measurements from three differe...
Conference Paper
Full-text available
Traffic engineering encompasses a set of techniques that can be used to control the flow of traffic in data networks. We discuss several of those techniques that have been developed during the last few years. Some techniques are focused on pure IP networks while others have been designed with emerging technologies for scalable Quality of Service (Q...
Article
In this document, we briefly describe an implementation of the BGP Redistribution Communities in the GNU routing software. Acknowledgments This work was partially funded by the European Commission within the IST ATRIUM project.
Article
In this document, we describe the two most common utilizations of the BGP community attribute, namely to tag routes and indicate how a route should be redistributed by external peers. We then discuss how often these two types of community attribute are used on the basis of the RIPE whois database and of BGP table dumps.
Conference Paper
Full-text available
In this paper, we present a traffic engineering technique that can be used by regional ISPs and customer networks. On the basis of various characterizations of ASes in today's Internet we show the requirements of the small ASes. Then we detail the methods that such ASes currently use to engineer interdomain traffic. We present an analysis of real r...
Article
In this paper, we present a traffic engineering technique that can be used by regional ISPs and customer networks. On the basis of various characterizations of ASes in today’s Internet we show the requirements of the small ASes. Then we detail the methods that such ASes currently use to engineer interdomain traffic. We present an analysis of real r...
Article
Full-text available
We propose an incrementally deployable extension to the current Internet architecture that provides a more accurate selection of the interdomain paths without requiring any change to the BGP messages. Our architecture relies on a few basic principles. First, each border router computes its coordinates by using a network coordinate system. Second, w...
Article
Full-text available
RÉSUMÉ. BGP est le protocole de routage interdomaine actuellement utilisé dans l'Internet. Au sein d'un système autonome, les routes interdomaines sont souvent distribuées par le biais de réflecteurs de routes BGP. Dans cet article, nous montrons qu'en ajoutant de l'intelligence dans les réflecteurs de routes, il est possible de fournir des service...
Article
Full-text available
We analyze several types of interdomain traffic engineering techniques. First, we briefly describe interdo-main routing and the BGP protocol. Then, we summarize the characteristics of interdomain traffic based on measure-ments with two different ISPs. We evaluate how a typical ISP can select its upstream providers and show that with the BGP decisio...

Network

Cited By