About
119
Publications
19,758
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,063
Citations
Publications
Publications (119)
The increasing volume of data in various environments such as IoT and the need to maintain data privacy and security have led to the development of usage control models. Usage control policies are models that enable fine-grained access control over data by enforcing restrictions on how users can use the data. Semantic mechanisms, on the other hand,...
The main purpose of IoT is to deliver reliable, high quality services and innovative solutions by transforming the captured data into meaningful information, and thus improving user’s daily life. In this regard, it is in the interest of the community to encourage entities within IoT environments to share their data, and therefore serve public inter...
International Conference on Intelligent Environments, Biarritz, FRA, 20-/06/2022 - 23/06/2022
About 35% of the world’s food are produced in small-scale farms while only occupying about 12% of all agricultural land. However, smallholder farmers usually face a number of constraints and the water resource is one of the major constraints. The usage of smart technologies and especially sensor systems in so-called Smart Farming Technologies can b...
La nature distribuée des réseaux IoT et la diversité de ses acteurs conduisent à reconnaître la sécurité et l’encadrement du partage des données comme l’un des principaux défis du domaine IoT. Ainsi, en raison de l’absence de gouvernance des informations partagées, le fournisseur des données ne conserve que peu de contrôle sur ses données une fois...
Internet of Things (IoT) is one of the key technologies in the industry 4.0 era and promotes the interconnection of numerous data sources in several sectors such as ecology, agriculture, or healthcare. Meanwhile, each entity within these connected environments carries its unique requirements and individual goals. For connected environments to gain...
IoT main goal is to provide trusted high-quality services and innovative solutions to its users by transforming the captured data into meaningful information. In this context, it is in the best interest of the community to encourage entities within the IoT environment to share their data, and therefore help contribute to the overall public interest...
With worldwide deployment of LoRa/LoRaWAN LPWAN networks in a large variety of applications, it is crucial to improve the robustness of LoRa channel access which is largely ALOHA-like to support environments with higher node density. This article presents extensive experiments on LoRa Channel Activity Detection and Capture Effect property in order...
Self‐organising is an important characteristics of wireless mesh networks, which provides high flexibility and adaptive connectivity for end users. In this study, we specifically study multicast features in wireless mesh networks to improve network capacity by taking advantage of shared links to reach simultaneously multiple users. Self‐organising...
Wireless mesh networks are designed as an economical solution to provide high quality service for lastmile
broadband Internet access. The paramount priority of these networks is the throughput maximization
which is in conflict with a scarce bandwidth. Multicast is a technology that provides a good trade-off
between maximizing the throughput and min...
LoRa is designed for long-range communication where devices are directly connected to the gateway, which removes typically the need of constructing and maintaining a complex multi-hop network. Nonetheless, even with the advantage of penetration of walls, the range may not sometimes be sufficient. This article describes a 2-hop LoRa approach to redu...
Long-range radio are promising technologies to deploy low-cost Low Power WAN for a large variety of IoT applications. There are however many issues that must be considered before deploying IoT solutions for low-income developing countries. This article will present these issues and show how they can be addressed in the context of African rural appl...
The digital revolution led by the Internet of Things (IoT) is already reshaping several traditional business sectors. Moreover, because of its very nature, the promise of the IoT is also to reduce energy consumption and pollutant emissions in several environmental scenarios. At the same time, it is desirable to keep the development of IoT as sustai...
While benefits of IoT are clearly stated the deployment of such devices in a large scale is still held back by technical challenges such as short communication distances. Recent long-range radio technologies such as Semtech’s LoRa are promising to deploy Low Power WAN at a very low-cost for a large variety of applications. The paper describes our p...
Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30% from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new things will get connected every day. Furthermore, the current research and marker trends shows the convergence between IoT and Big Data. On the other hand, developing countries are sti...
Cattle Rustling is a recurrent phenomenon observed in many in African countries today. This scourge cause significant losses to farmers and governments. Confronted with this problem farmers have generally no solutions. Internet of Things can be a real solution to defeat this nuisance by first allowing theft detection and further prevent it with an...
There is a growing interest in the use of video sensor networks in surveillance applications in order to detect intruders with low cost. The essential concern of such networks is whether or not a specified target can pass or intrude the monitored region without being detected. This concern forms a serious challenge to wireless video sensor networks...
This book constitutes the refereed proceedings of the 14th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2017, held in Biarritz, France, in September 2017.
The 10 full papers and 10 short papers presented together with 3 invited talks were carefully reviewed and selected from 38 submissions.
This volume of the...
It is widely accepted that the Era of IoT can potentially connect billions of sensors, devices, equipment, systems, etc. In turn, the challenge is about driving business outcomes, consumer benefits, and the creation of new value. While benefits of IoT are clearly stated for increased process efficiency through automation & optimization, the deploym...
We present a low-cost, low-power, long-range image sensor built from off-the-shelves components and enabling fully autonomous and out-of-the-box remote visual surveillance applications. The image sensor implements a packet loss-tolerant image compression technique that can run on very limited memory platforms. Long-range support is provided with Se...
Energy preservation constitutes a very critical challenge in wireless sensor network surveillance applications. On one hand, transmitting data by using additional transmission power is among the biggest sources of energy consumption. On the other hand, using a small transmission power degrades the connectivity between nodes. In this paper, a Distri...
Wireless Image Sensor Networks (WISN) where sensor nodes are equipped with miniaturized visual CMOS cameras to provide visual information is a promising technology for situation awareness, search&rescue or intrusion detection applications. In this paper, we present an off-the-shelf image sensor based on Arduino boards with a CMOS uCamII camera. The...
The number of applications that need to process data continuously over long periods of time has increased significantly over recent years. The emerging Internet of Things and Smart Cities scenarios also confirm the requirement for real time, large scale data processing. When data from multiple sources are processed over a shared distributed computi...
In this paper, we are investigating the communication performances of low-resources sensor motes that are commonly found in recent smart cities test-beds or used by the research community. We focus here on 802.15.4 radio and we will present a performance study of sending and receiving capabilities of Libelium WaspMote, Arduino-based motes, Telosb-b...
The european EAR-IT project addresses ”real-life”
experimentations of intelligent acoustic for supporting high
societal value applications in a large-scale smart environment.
For instance a city emergency center can request on-demand
acoustic data samples for surveillance purposes and management
of emergencies. In this paper, we will present experi...
Abstract — In this paper, the multi-agent technology is applied in wireless sensor networks domain in order to adapt software architecture, and to optimize its performance in monitoring. We explore in particular the issues of topology control, especially some related work using multi-agent systems. In the third part, we will propose an agent-based...
Mission-critical surveillance applications such as intrusion detection or disaster response have strong requirements in communication delays. We consider a Wireless Image Sensor Network (WISN) with a scheduling of image sensor node’s activity based on the application criticality level. Sentry nodes capable of detecting intrusions with a higher prob...
The EAR-IT project relies on 2 test-beds to demonstrate the use of acoustic data in smart environments: the smart city SmartSantander test-bed and the smart building HobNet test-beds. In this paper, we take a benchmarking approach to qualify the various EAR-IT test-bed based on WSN and IoT nodes with IEEE 802.15.4 radio technology. We will highligh...
With an increase in the number of monitoring sensors deployed on physical infrastructures, there is a corresponding increase in data volumes that need to be processed. Data measured or collected by sensors is typically processed at destination or "in-transit" (i.e. from data capture to delivery to a user). When such data are processed in-transit ov...
This is the proceedings of the third workshop on Robots and Sensors
integration in future rescue INformation system (ROSIN 2013)
Router-assisted concepts have been proposed in many research areas including reliable multicast protocols. These concepts can limit the implosion and repair locality problems in an effective way by attributing the role of repair locality to the specific router close to the point of packet loss. Several router-assisted reliable multicast protocols h...
We consider Robot-assisted Search $\&$ Rescue operations enhanced with some
fixed image sensor nodes capable of capturing and sending visual information to
a robot sink. In order to increase the performance of image transfer from image
sensor nodes to the robot sinks we propose a 2-hop neighborhood
information-based cover set selection to determine...
Mission-critical surveillance applications such as intrusion detection or disaster response have vital requirement in QoS. We consider a Wireless Image Sensor Network (WISN) with a scheduling of image sensor node's activity based on the application criticality level. Sentry nodes capable of detecting intrusions with a higher probability than others...
Surveillance applications with Wireless Sensor Networks can be strengthened by introducing imaging capability: intrusion detection, situation awareness, search&rescue... As images are usually bigger than scalar data, and a single image needs to be split in many small packets, image transmission is a real challenge for these applications, especially...
The past ten years have witnessed great developments of wireless sensor networks in both theory and application. The long been expected and advocated ubiquitous sensing is becoming increasingly popular and widely admitted with the great success of many applications of wireless sensor networks in environmental monitoring, precision agriculture, huma...
With the increasing availability of streaming applications from mobile devices to dedicated sensors, understanding how such streaming content can be processed within some time threshold remains an important requirement. We investigate how a computational infrastructure responds to such streaming content based on the revenue per stream – taking acco...
Smart Cities have emerged as an efficient infrastructure to contribute to so-called global sensing or situation-awareness applications. One example of large scale deployment of sensors in the city is the SmartSantander test-bed. Most of the deployment so far propose traditional scalar physical measures such as temperature or luminosity for a number...
With an increasing interest in Electric Vehicles (EVs), it is essential to understand how EV charging could impact demand on the Electricity Grid. Existing approaches used to achieve this make use of a centralised data collection mechanism - which often is agnostic of demand variation in a given geographical area. We present an in-transit data proc...
Providing an efficient and reliable multicast for data dissemination applications on a large scale is a challenge, especially when the applications require a very short delivery delay and high throughput. The combination of a local recovery approach based on active services with those using FEC/ARQ gives rise to a new class of reliable multicast pr...
When data from multiple sources (sensors) are processed over a shared distributed computing infrastructure, it is necessary to often provide some Quality of Service (QoS) guarantees to each data stream. Service Level Agreements (SLAs) identify the cost that a user must pay to achieve the required QoS, and a penalty that must be paid to the user in...
Mission-critical surveillance applications such as intrusion detection or disaster response have vital requirement in QoS. We consider a Wireless Image Sensor Network (WISN) with a scheduling of image sensor node's activity based on the application criticality level. This approach allows sentry nodes capable of detecting intrusions with a higher pr...
The ability to support Quality of Service (QoS) constraints is an important requirement in some scientific applications. With the increasing use of Cloud computing infrastructures, where access to resources is shared, dynamic and provisioned on-demand, identifying how QoS constraints can be supported becomes an important challenge. However, access...
When multiple users execute their streaming applications over a shared Cloud infrastructure, the provider typically captures the Quality of Service (QoS) for each application at a Service Level Agreement (SLA). Such an SLA identifies the cost that a user must pay to achieve the required QoS, and a penalty that must be paid to the user in case the Q...
There is a growing interest in the use of video sensor networks in surveillance applications in order to detect intruders with low cost. The essential concern of such networks is whether or not a specified target can pass or intrude the monitored region without being detected. This concern forms a serious challenge to wireless video sensor networks...
The increasing deployment of sensor network infrastructures has led to large volumes of data becoming available, leading to new challenges in storing, processing and transmitting such data. This is especially true when data from multiple sensors is pre-processed prior to delivery to users. Where such data is processed in-transit (i.e. from data cap...
Wireless Video Sensor Networks consist in nodes with miniaturised cameras. Unlike omni-directional sensors, the sensing region of a video node is limited to the field of view of its camera. This paper addresses the issues of building an intrusion detection system based on these video sensors and presents two contributions. The first contribution pr...
There is a growing interest in the use of video sensor networks in surveillance applications in order to detect intruders with low cost. The essential concern of such networks is whether or not a specified target can pass or intrude the monitored region without being detected. This concern forms a serious challenge to wireless video sensor networks...
Current generation networks have been designed only for network connectivity; they have been stretched to the limit with many afterthought add-on features including quality of service, mobility, programmability, and security so that they can be deployed for business applications and processes. As such, service deployment on current networks are dif...
Specific-purpose hardware or software modules are often designed to provide timely response to conditions or events that required attention. However, these application-specific mechanisms are not flexible and often can not be reused or adapted to different situations and applications. This paper proposes an approach whereby an active database with...
In video surveillance with resource-constrained devices such as wireless video sensor nodes, power conservation, intrusion detection, and security are important features to guarantee. In this paper, we intend to preserve the network lifetime while fulfilling the surveillance application needs. We take into account security by considering that a mal...
In randomly deployed visual wireless sensor networks for surveillance applications, the scheduling of sensor nodes can be seen from the risk perspective: different parts of the area of interest may have different risk levels according to the pattern of observed events such as the number of detected intrusions. In this paper, we propose a multiple-l...
Intrusion detection surveillance applications with wireless video sensor networks are those applications which require low energy consumption to increase network lifetime while at the time require a high level of quality of service. This paper show by simulation how a dynamic risk management scheme based on Bezier curves that takes into account the...
Wireless Video Sensor Network (WVSN) can be used for efficient event detection such as intrusion detection or disaster relief systems. These applications have a high level of criticality and can not be deployed with the current state of technology. In this paper, we show how a dynamic criticality management scheme can provide fast event detection f...
This paper quantifies the reliability gain of combining classes for reliable multicasting in lossy networks in which the active network approach is the most promising. We define the delay latency of recovery as performance metric for reliability. We then study the impact of multicast group size and loss probability on the performance of compared ap...
A Wireless Video Sensor Network (WVSN) consists of a set of sensor nodes equipped with miniaturized video cameras. Unlike omni-directional sensors, the sensing region of a video node is limited to the field of view of its camera. In this paper, we study the problem of coverage by video sensors in randomly deployed WVSN. We focus on the performance...
Energy is an important issue in designing wireless sensor networks. Coverage and connectivity are not of less important since they are necessary for the network to be operational. In this work, we consider the case of wireless video sensor networks where some sensors have visual capabilities. We study the benefit of having some mobile nodes able to...
Intrusion detection surveillance applications with wireless video sensor networks are those applications which require low energy consumption to increase network lifetime while at the time require a high level of quality of service. This paper show by simulation how a dynamic risk management scheme based on Bezier curves that takes into account the...
A Wireless Video Sensor Network (WVSN) consists of a set of sensor nodes equipped with miniaturized video cameras. Unlike omni-directional sensors, the sensing region of a video node is limited to the field of view of its camera. Power conservation and coverage is an important issue in such wireless video networks, especially in the context of surv...
Introduction Congestion control The congestion control in group communications Single-rate approaches Multi-rate approaches Approaches with router assistance Conclusion Bibliography Appendix 1: Summary table of the approaches quoted in this chapter Appendix 2: Acronyms of the protocols presented
In randomly deployed wireless video sensor networks for surveillance applications, the scheduling of sensor nodes can be seen from the risk perspective: different parts of the area of interest may have different risk levels according to the pattern of observed events such as the number of detected intrusions. In this paper, we propose a multiple-le...
In WSN-based surveillance systems power conservation is an important issue but one must also ensure that the application's objectives are met. In this paper, we jointly address the problem of coverage, disambigation and adaptive scheduling of sensor node's activity to extend the network lifetime while fulfilling a critical surveillance application...
Traditional vision systems for surveillance applications are built es-sentially from distributed high resolution video cameras and pow-erful processing units which communicate in general with central servers via a high bandwidth network. Using autonomous and small wireless video sensor nodes can add a much higher level of flexibility, therefore ext...
Faire de la vidéo surveillance avec des capteurs vidéo sans-fil possédant des ressources très limitées nécessite d' économiser l' énergie de manière efficace mais il est aussi très important de s'assurer que les objectifs de l'application soient atteints. Dans cet article, nous proposons un ordonnancement adaptatif de l'activité des nœuds vidéo pour...