
Damien SauveronXLIM Research Institute · Mathematics and Computer Science
Damien Sauveron
PhD with Habilitation
Dean of the Faculty of Science and Technology at University of Limoges
About
112
Publications
25,817
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
661
Citations
Citations since 2017
Introduction
My projects are available on http://damien.sauveron.fr/
Additional affiliations
September 2006 - present
February 2006 - August 2006
September 2001 - September 2004
Education
December 2014 - December 2014
September 2001 - December 2004
Publications
Publications (112)
Wireless sensor networks (WSNs) are ad hoc networks composed mainly of tiny and resource- constrained sensor nodes, and are rapidly growing as a technology for low-cost, large-scale and automated
systems to sense and monitor a different range of potential environments. Network Coding (NC) technique has been proposed for these networks for various r...
Wireless sensor networks (WSNs) face some security issues when transmitting data to the base station as these networks involve resources scarcity that needs to be tackled in the routing protocols. More specifically, collected and distributed data are only profitable if their confidentiality is guaranteed. Lately, some approaches have used network c...
In the growing Internet of Things context, thousands of computing devices with various functionalities are producing data (from environmental sensors or other sources). However, they are also collecting, storing, processing and transmitting data to eventually communicate them securely to third parties (e.g., owners of devices or cloud data storage)...
The future of the Internet of Things (IoT) is the Collaborative Internet of Things (C-IoT) in which different IoT deployments collaborate to provide better services. For instance, in smart city scenarios, C-IoT will have the potential to provide immersive multimedia user-experiences based on content and context fusion, immersive multi-sensory envir...
Abstract Emerging technological advances in wireless communication and networking have led to the design of large scale networks and small sensor units with minimal power requirements and multifunctional processing. Though energy harvesting technologies are improving, the energy of sensors remains a scarce resource when designing routing protocols...
Fleets of UAVs will be deployed in near future in reliability and safety critical applications (e.g. for smart cities). To satisfy the stringent level of criticality, each UAV in the fleet must trust the other UAVs with which it communicates to get assurance of the trustworthiness in information received and to be sure not to disclose information t...
With the development of pervasive and ubiquitous computing, of IoT and personal devices, user-centric solutions will be the paradigm for most of the future applications. In this context, user-centric solutions must be proposed from deployment models to the content management. Obviously suitable Security, Privacy and Trust (SPT) solutions have to be...
The first book to focus on the communications and networking aspects of UAVs, this unique resource provides the fundamental knowledge needed to pursue research in the field. The team of authors covers the foundational concepts of the topic, as well as offering a detailed insight into the state of the art in UAVs and UAV networks, discussing the reg...
Inter-connected objects, either via public or private networks are the near future of modern societies. Such inter-connected objects are referred to as Internet-of-Things (IoT) and/or Cyber-Physical Systems (CPS). One example of such a system is based on Unmanned Aerial Vehicles (UAVs). The fleet of such vehicles are prophesied to take on multiple...
It is widely acknowledged that the proliferation of Unmanned Aerial Vehicles (UAVs) may lead to serious concerns regarding avionics safety, particularly when end-users are not adhering to air safety regulations. There are, however, domains in which UAVs may help to increase the safety of airplanes and the management of flights and airport resources...
The aim of this chapter is to describe the main middlewares and APIs used to manage and access smart card readers
and smart cards, along with the mobile phone APIs
to access smart cards, SIM card and Secure Elements. It is illustrated by samples of code that the reader
of this book will be able to reuse to quickly develop his/her first applications...
The notion of Integrated Modular Avionics (IMA) refers to inter-connected pieces of avionics equipment supported by a wired technology, with stringent reliability and safety requirements. If the inter-connecting wires are physically secured so that a malicious user cannot access them directly, then this enforces (at least partially) the security of...
Avionics networks rely on a set of stringent reliability and safety requirements. In existing deployments, these networks are based on a wired technology, which supports these requirements. Furthermore, this technology simplifies the security management of the network since certain assumptions can be safely made, including the inability of an attac...
Unmanned Aerial Vehicles (UAVs) fleets are becoming more apparent in both military and civilian applications. However security of these systems still remains unsatisfactory if a strong adversary model with a high attack potential (i.e. the adversary has capabilities and knowledge to capture a UAV, to perform side-channel or fault injection or other...
Trust has various instantiations: some rely on real-world relationships between entities, while others depend on robust hardware and software technologies to establish it post-deployment. In this paper, we focus on the latter, analyse their evolution in previous years, and their scope in the near future. The evolution of such technologies has invol...
Smart sensor nodes are tiny autonomous devices that combine sensing, computing, and wireless communication capabilities. Current developments show that in the near future the wide availability of low-cost, short-range radio technology, along with advances in wireless networking, will enable wireless ad hoc sensor networks to become commonly deploye...
Multi-application smart cards enable a user to potentially have a diverse set of applications on her smart card. The growing trend of services convergence fuelled by Near Field Communication and smart phones has made multi-application smart cards a tangible reality. In such an environment, cardholders might have a number of applications on their sm...
Smart cards, in their traditional deployment architecture referred to as the Issuer Centric Smart Card Ownership Model (ICOM), have a restricted application lifecycle. In this model, an application is installed onto a smart card by the relevant card issuer. In most cases, the card issuer is also the centralised controlling authority for different l...
Multi-application smart card technology has gained momentum due to the Near Field Communication (NFC) and smart phone revolution. Enabling multiple applications from different application providers on a single smart card is not a new concept. Multi-application smart cards have been around since the late 1990s; however, uptake was severely limited....
Near Field Communication (NFC) enables a mobile phone to emulate a contactless smart card. This has rein-vigorated the multiapplication smart card initiative. Trusted Service Manager (TSM) is an entity that is trusted by all stakeholders in the proposed and trialled NFC-based smart card ecosystem. However, TSM-based models have the potential to cre...
Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices. In this context, it is widely argued that security has become a primary concern, in order to ensure dependable, secure communications and services to the end user. Ther...
This chapter focuses on three major wireless sensor node technologies (Sun SPOTS, Arduino and TinyOS) to help the reader choose what would best fit his/her applications. Our goal is to provide the basic useful information required to quickly start working (or just playing) with them in less than a few hours.
This chapter addresses the key points of wireless sensor nodes: applications, constraints, architecture, operating systems, and security concerns. It does not pretend to be exhaustive but to provide the major references on these topics.
This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions....
The objectives of this special issue are advanced security technologies and services for future computing environments, including,
but not limited to, security primitives, protocols and security applications and services. Recent advances in security technologies
and services for future computing environments have created a new class of the followin...
Si dans la vie courante, il est fréquent d?introduire sa carte dans des lecteurs (distributeur
automatique de billets, terminal de paiement d?un commerçant, carte SIM dans
votre téléphone mobile, etc.) et que les applications fonctionnent sans que l?utilisateur
ne se pose la moindre question, il est plus rare d?insérer une carte dans un lecteur
bra...
The article focuses on advanced semantic and social multimedia technologies for future computing environment. Semantic Web and multimedia community researchers are encouraged to join the workshop to benefit from the presentation of results from multimedia based research, which demonstrate important multimedia applications which could be enhanced by...
IntroductionCommunication ProtocolsInterfacing with Smart Card ApplicationsManaging Multiple ApplicationsApplication SecurityConclusion
GlossaryCross References
Intelligent Internet Computing (IIC) is emerging rapidly as an exciting new paradigm including pervasive, grid, and peer-to-peer computing to provide computing and communication services any time and anywhere. IIC paradigm foresees seamless integration of communicating and computational devices and applications embedded in all parts of our environm...
Welcome Message From the Program Chairs: FutureTech 2010
Welcome message from workshop organizers: FutureTech 2010
Computing power is largely becoming a basic supply which you can envisage to buy from a provider like you buy power or water. This is the result of a now long running trend that consists in connecting computing resources together so as to set up what can globally be referred to as a remote computing platform, the most up-to-date incarnation of whic...
Smart cards were invented four decades ago so as to keep data secrets and to process them secretly. Even though their main goal are still the same today, the smart cards have been subject to many evolutions at both their hardware and software levels. Indeed they have been the target of numerous attacks and new demands from the market. These demands...
The advantages of utilising smart card technology, more importantly contactless smart cards, in the transport industry have long been realised. In this paper we provide an overview of the generic security issues and threats encountered whenever smart cards are utilised within the transport industry. To help highlight the issues, we analyse the diff...
The Common Criteria evaluation and certification is one of the most commonly used process to improve the trust in the security of evaluated products. Nevertheless this methodology has a lot of problems and side-effects that lead to limitations of which the end-user should be aware. The aim of this paper is to develop some of these limits.
1 Though the MANET concept exists for decades and that many researches were carried out, such networks suffer from extremely low adoption. The main reason is the security or more precisely, the lack of. This paper defines what a MANET should be for a real use, it explains what are the security challenges and analyzes the problems of the existing pr...
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. Security is one of the main issues for mobile ad hoc networks (MANETs) deployment. We introduce a weak to strong authentication mechanism associated with a multiparty contr...
For the end-user of IT (information technologies) products, several questions exist about their real security. For instance, in the case of a smart card which is the more secure device in the collective mind, how to have confidence in a card bought anywhere ? How to be sure that the held cards have been subjected to security evaluation/certificatio...
The aim of this chapter is to describe the main middlewares used to manage and access smart card readers. It is illustrated
by samples1 of code that the reader of this book will be able to reuse to quickly develop his/her first host applications to communicate
with smart cards.
In recent years smart cards have become one of the most common secure computing devices. Their uses include such diverse applications such as: providing secure wireless communication framework, banking and identification. Direct threats to smart card security can be invasive (attacks that alter the chip inside the card), analysis of a side channel,...
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferenc...
The Java Card TM1 Grid 2 platform is a project carried out at LaBRI, Lab-oratoire Bordelais de Recherche en Informatique. It consists in setting up a platform composed of a large number of smart cards connected together by USB hubs and driven by PCs. The Java Card readers are assembled in a wall mount rack and are organized in a cluster-like archit...
Nowadays, the adoption of ad hoc networks is growing very quickly, but their approval in a working context requires improved security. Indeed wireless connectivity and mobility are the source of the main security issues. The aim of our work is to design a secure collaborative architecture for ad hoc networks using smart cards in order to support ne...
Ensuring the security of services in a distributed system requires the collaboration of all the elements involved in providing this service. In this paper we present how the security of collaborative distributed services is ensured in the Java CardTM1 Grid project carried out at LaBRI, Laboratoire Bordelais de Recherche en Informatique. The aim of...
The work presented in this paper is part of the Java CardTM1 Grid project2 carried out at LaBRI, Laboratoire Bordelais de Recherche en Informatique. The aim of this project is to build a hardware platform and the associated software components to experiment on the security features of distributed applications. To achieve this goal we use the hardwa...