
Christian Bonnet- Professor at EURECOM
Christian Bonnet
- Professor at EURECOM
About
247
Publications
94,062
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,001
Citations
Introduction
Current institution
Additional affiliations
March 1992 - July 2017
Publications
Publications (247)
Application developers in the automotive domain have to
deal with thousands of different signals, represented in highly heterogeneous
formats, and coming from various car architectures. This situation
prevents the development and connectivity of modern applications.
We hypothesize that a formal model of car signals, in which the
definition of signa...
Any vehicle needs to be aware of its localization, destination and neighboring vehicles' state information for collision free navigation. A centralized controller computes controls for Cooperative Adaptive Cruise Control (CACC) vehicles based on the assumed behavior of manually driven vehicles (MDVs) in a mixed vehicle scenario. The assumed behavio...
We propose a car signal ontology named VSSo that provides a formal definition of the numerous sensors embedded in car regardless of the vehicle model and brand, re-using the work made by the GENIVI alliance with the Vehicle Signal Specification (VSS). We observe that recent progress in machine learning enables to predict a number of useful informat...
At early market penetration, automated vehicles will share the road with legacy vehicles. For a safe transportation system, automated vehicle controllers therefore need to estimate the behavior of the legacy vehicles. However, mismatches between the estimated and real human behaviors can lead to inefficient control inputs, and even collisions in th...
Car signal data is usually hard to access, understand and integrate for non automotive domain experts. In this paper, we use semantic technologies for enriching signal data in the automotive industry and access it through Web of Things interactions. This combination allows the access and integration of car data from the web. We built VSSo, a Vehicl...
In this paper, we use semantic technologies for enriching trajectory data in the automotive industry for offline analysis. We proposed to re-use a combination of existing ontologies and we designed a Vehicle Signal Specification ontology to provide an environment in which we developed an application that analyzes the variations of signal values and...
Delay/Disruption Tolerant Networks target environments suffering from the instability or lack of end-to-end paths. Store-carry-and forward principle aims to sustain data sessions, and data replication to increase the probability of on-time delivery. However, these techniques require efficient scheduling and buffer management, to comply with limited...
Coordinated vehicle control strategies aim at optimizing driving dynamics to increase traffic flow without impacting safety. These control strategies are based on the knowledge of the vehicles' state information like position and velocity obtained through Vehicle-to-everything (V2X) communications. Literature on control strategies yet assumes perfe...
In this paper, we present the design and implementation of DrIveSCOVER, a recommender system for places and events in case of an in-car use, where the driving conditions such as weather and local traffic are taken into account. We integrate multiple data sources using semantic technologies and we devise recommending functions that are presented in...
Future autonomous vehicles are expected to coordinate controls to improve traffic efficiency, fuel consumption and most importantly safety. A centralized vehicle control system is a system where a centralized entity computes control inputs considering variables like vehicles’ localization, velocity, etc. and transmits it to the vehicles to implemen...
With the introduction of smartphones, cloud and edge computing, and mobile Internet, the automotive ecosystem is shifting toward the Internet of Vehicles (IoV). This article looks at the evolution leading to the IoV and identifies related research and engineering challenges, including 1) coexistence of cloud, edge computing, and data caching strate...
During the early deployment phase of autonomous vehicles, autonomous vehicles will share roads with conventional
manually driven vehicles. They will be required to adjust their driving dynamically taking into
account not only preceding but also following conventional manually driven vehicles. This paper addresses
the challenges of adaptive braking...
Long Term Evolution (LTE), with its wide-scale commercial deployment and the ability to support a wide variety of services from high bandwidth data to real-time communication, has been selected as a technology for mission critical mobile broadband communications and public safety by numerous public safety organizations including the Association of...
Mobile network operators are now facing several challenges, such as a huge traffic demand for more sophisticated services (posing different connectivity requirements), the need for seamless delivery services across different technologies, and a rapid changing of business environment. Thus, operators are seeking innovative solutions to improve their...
Discovery of things as well as their resources, metadata, properties, and capabilities is a fundamental requirement in any Internet of Things (IoT) ecosystem. This paper analyzes the state of the art of communication technologies for the IoT with respect to discovery functionalities. Therefore, a comprehensive study of the technology landscape on I...
The Internet of Things (IoT) ecosystem can immensely benefit from the Named Data Networking (NDN) paradigm. But interworking between the two paradigms is often challenged due to their intrinsic features. This paper attempts to identify the challenges, proposes their solutions to highlight the interworking of NDN with previously developed DataTweet...
Semantic Web of Things is a new field combining Semantic Web and Internet of Things technologies to be surrounded by smart objects and applications connected to the Web. On one hand, one of the Linked Open Data applications, called DataHub aims at referencing datasets, on the other hand, the Linked Open Vocabularies (LOV) references more than 400 o...
Maximum-likelihood (ML) receivers are optimum receivers for MIMO systems, but their complexity grows exponentially with the modulation order of the codeword and the number of spatial layers. The Reduced Complexity ML (R-ML) receivers based on low complexity adaptation of the max-log MAP detector and reduction of searching space are a good compromis...
Handover procedure in LTE/LTE-A has been radically evolved when compared to the previous 3GPP standards. In particular, X2 handover is introduced to allow neighboring eNBs to handle the user mobility without the involvement of the core network. While most of the application could considerably benefit from the X2 handover performance improvement, de...
This work proposes a data driven IoT architecture to mitigate the fragmentation and data silos in consumer IoT ecosystem. IoT data cycle is explored to understand data transformation from generation to processing, storage and dissemination. We have developed a framework called DataTweet focusing on data cycle based IoT services. The DataTweet archi...
Software-Defined Networking (SDN) is transforming the networking ecosystem. SDN allows network operators to easily and quickly introduce new services and flexibly adapt to their requirements, while simplifying the network management to reduce the cost of operation, maintenance and deployment. On the other hand, mobility is a key aspect for the futu...
The mobile network operators are being challenged by the explosion of mobile data traffic in terms of network performance and generated revenue. On one hand, efficient mobility management plays a crucial role to support mobile users, however, the current mobility protocols have several major limitations from their centralized and hierarchical natur...
This paper proposes a search engine based resource discovery framework for Internet of Things (IoT) to discover resources, their capabilities, properties and URIs to access them regardless of communication technology. There is a central registry to store configurations of resources and they are indexed. Based on discovery request parameters, the se...
The paradigm of the Internet of Things (IoT) requires pervasive connectivity to billions of heterogeneous devices. In recent time, rapid growth of IoT devices in smart home environment envisioned a wide range of novel services and applications. However, due to the inherent heterogeneity, home environment is becoming complex making device management...
The paper advocates for applying Internet of Things (IoT) for personalized healthcare in smart homes. An IoT architecture is presented which enables such healthcare services. Continuous monitoring of physical parameters and processing of the medical data form the basis of smarter, connected and personalized healthcare. The core functionalities of t...
Commoditization and virtualization of wireless networks are changing the economics of mobile networks to help network providers (e.g., MNO, MVNO) move from proprietary and bespoke hardware and software platforms toward an open, cost-effective, and flexible cellular ecosystem. In addition, rich and innovative local services can be efficiently create...
This paper presents a user centric and cross-domain IoT application development framework for smart devices. The framework includes automatic discovery of M2M devices, provisioning of sensors and IoT domains, semantic reasoning on sensor data and actuation based on the suggestions. The framework integrates a lightweight version of the Machine-to-Ma...
In the mobile era, the demand for Internet connection for moving vehicles (such as cars, buses and subways) is growing fast. The Network Mobility (NEMO) basic support protocol (B-NEMO) was introduced to provide Internet access for a group of users in a moving vehicle in an effective manner. As an extension of Mobile IPv6 (MIPv6), B-NEMO inherits th...
Distributed Mobility Management (DMM) is a new trend to overcome the limitations of the current IP mobility management protocols raised by the rapid increasing mobile Internet usages. It is based on the idea of flattening the network architecture and providing mobility service when it is necessary. Although DMMoutperforms the well known protocol -...
Fog Computing is a recent computing paradigm that is extending cloud computing towards the edge of network. Due to its proximity to end-users, dense geographical distribution, open platform and support for high mobility, Fog Computing platforms can provide services with reduced latency and improved QoS. Thus it is becoming an important enabler for...
Recent years have witnessed an explosion in the number and types of physical devices connected to the Internet. This exponential growth in the volume of objects poses challenges in terms of managing the connected M2M devices. A unified approach for efficient management of the M2M devices while preserving scalability is necessary. This paper propose...
Domain-specific Internet of Things (IoT) applications are becoming more and more popular. Each of these applications uses their own technologies and terms to describe sensors and their measurements. This is a difficult task to help users build generic IoT applications to combine several domains. To explicitly describe sensor measurements in uniform...
Internet of Things (IoT) envisions connecting and managing billions of devices and endpoints. This paper describes a smart M2M gateway based architecture to manage the huge volume of M2M devices and endpoints. The architecture is compliant with both ETSI and one M2M standards recommendations. The resources and the attributes of the M2M devices and...
The current evolution of the global Internet data traffic shows an increasing demand of video transmissions, which potentially leads to the saturation of mobile networks. To cope with this issue, this paper describes techniques to handle the video traffic load in the last hop, of the communication network, i.e., the wireless access. The general ide...
Smart devices are increasingly becoming part and parcel of daily life and as well as becoming the center of attraction for security attacks. This paper introduces a novel malware which exploits the usage patterns of smart devices and launches malicious attacks. A useful Android application is developed which aims to provide user-specific power savi...
In this paper, we provide the specification of a cloud-initiated Point-of-Interest (PoI) application, and illustrate its requirements for a convergence between IPv6 mobility management and Dedicated Short Range Communications (DSRC) geographic services. We propose to extend a flat IPv6 mobility management architecture with a new functional block, n...
Driven by the need to cope with exponentially growing mobile data traffic and to support new traffic types from massive numbers of machine-type devices, academia and industry are thinking beyond the current generation of mobile cellular networks to chalk a path towards fifth generation (5G) mobile networks. Several new approaches and technologies a...
Overall high power consumption in the mobile applications forces the mobile users to recharge frequently. Most of the Android applications do not implement any self-Adaptive strategies that react to the battery level, status and context. Thus the applications continue to consume power even when battery is critically low. Intelligent control of hard...
LTE 4G cellular networks are gradually being adopted by all major operators in the world and are expected to rule the cellular landscape at least for the current decade. They will also form the starting point for further progress beyond the current generation of mobile cellular networks to chalk a path towards fifth generation mobile networks. The...
Securing the Internet of Things, more precisely, the ETSI Machine to Machine (M2M) architecture is a difficult task, since there is a need to secure heterogeneous wireless communications (cellular, wireless, wired), devices (sensor or mobile phone) and applications (programming language, framework, database). In this article, we present the state o...
The ever-increasing mobile Internet traffic has led to the development of a new IP mobility management concept in the IETF - distributed mobility management (DMM). Based on the fact that the mobile Internet traffic will be dominated by the mobile video, the scalability and bandwidth efficiency from multicast routing makes the IP multicast play more...
Despite much advancement in mobile computing technologies, the smart devices still suffer from battery limitations. The power consumption largely depends on how the end-users interact with their smart devices. Continuous usage of exotic hardware, inbuilt sensors, network and bright colorful display shorten battery life significantly. Thus the key t...
This paper presents a novel application that allows mobile clients to interact with M2M devices and endpoints in real time. The application "Connect and Control Things" (CCT) is designed to discover things, receive data from the sensors, control the actuators and generate alarms in real time. The novel capabilities of CCT are: (i) dynamic discovery...
The Internet of Things, more specifically, the Machine-to-Machine (M2M) standard enables machines and devices such as sensors to communicate with each other without human intervention. The M2M devices provide a great deal of M2M data, mainly used for specific M2M applications such as weather forecasting, healthcare or building automation. Existing...
This paper proposes an innovative Internet of Things (IoT) architecture that allows real time interaction between mobile clients and smart/legacy things (sensors and actuators) via a wireless gateway. The novel services provided are: (i) dynamic discovery of M2M device and endpoints by the clients, (ii) managing connection with non-smart things con...
In Proxy Mobile IPv6 (PMIPv6), the local mobility anchor (LMA) is responsible for maintaining the mobile node's (MN) reachability state and forwarding traffic from/to the current location of the MN. With the explosion of the mobile terminals as well as the traffic, it is easy to make the LMA a bottleneck and single point of failure. Load balancing...
Evolved Multimedia Broadcast Multicast Service (eMBMS) has recently attracted a great attention from the telecommunication industry. All big companies in the field have invested and intended to deploy eMBMS as the broadcast solution in response to the immense demand in multimedia traffic. The eMBMS, also known as LTE broadcast, can provide high qua...
Domain-specific Internet of Things (IoT) applications are becoming more and more popular. They process data coming from sensor measurements. Adding semantic annotations to the sensory observations and measurements can allow to reason on data via logical rules. Stemming from Linked Open Data and Linked Open Vocabularies, we have designed sensor-base...
Disaster can be defined as the onset of an extreme event causing profound damage or loss as perceived by the afflicted people. The networks built in order to detect and handle these events are called Public safety networks (PSNs). These networks have the fundamental role of providing communication and coordination for emergency operations. Many of...
Evolved Multimedia Broadcast Multicast Service (eMBMS) is a point-to-multipoint content delivery solution designed for LTE/LTE-A. It distributes efficiently the broadcast and multicast service to a massive number of mobile devices located in a given geographical area. eMBMS can be used to boost the network's capability for providing high-quality mu...