Emmanuel Bertin

Emmanuel Bertin
Orange Labs · Innovation, Marketing and Technologies

PhD, engineer

About

164
Publications
103,806
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,555
Citations
Introduction
Emmanuel Bertin currently works at Orange Labs. He holds an engineering degree in Telecom, a PhD in Computer Science and an "Habilitation à Diriger les Recherches" from Sorbonne Université.
Additional affiliations
January 2007 - present
January 2009 - December 2010
Orange Labs
January 2004 - December 2007
France Télécom

Publications

Publications (164)
Conference Paper
The rise of internet and data usage highlights the importance of service provisioning for Mobile Network Operators (MNOs) in expanding their operations and meeting user demands. Implementing scalable and secure authentication and access control mechanisms is crucial for enabling service utilization among eligible users and ensuring the viability of...
Conference Paper
This paper demonstrates the feasibility of integrating Blockchain with existing cellular network architecture to handle the Subscription Management process. We deploy a LTE-based private cellular network testbed utilizing OpenAirInterface (OAI) and Magma core frameworks. Blockchain technology and the InterPlanetary File System (IPFS) are employed t...
Conference Paper
Service Level Agreements (SLAs) serve as the cornerstone of collaboration and service delivery between providers and customers, delineating the quality of services that the provider commits to deliver through various terms and conditions. However, the complexity, manual and centralized communication processes and the potential for action denial pos...
Preprint
Full-text available
Bitcoin's global success has led to the rise of blockchain, but many systems labeled as "blockchain" deviate from its core principles, adding complexity to the ecosystem. This survey addresses the need for a comprehensive review and taxonomy to clarify the differences between blockchain and blockchain-like systems. We propose a reference model with...
Chapter
Telecommunications represents a fertile field for blockchain and smart contracts to harvest innovative use cases. The development of 5G and the impending 6G have prompted the research and industry sectors to look into blockchain’s key benefits of decentralization, distribution, trust, immutability, security, and traceability to address some identif...
Chapter
Mobile network operators (MNOs) intend to integrate novel technologies into their current and future network solutions to deliver novel, economical, and high-performance services in next-generation networks. However, this will be challenging because these supporting technologies introduce new participants into the ecosystem, increasing network comp...
Article
Full-text available
Bitcoin’s success as a global cryptocurrency has paved the way for the emergence of blockchain, a revolutionary category of distributed systems. However, the growing popularity of blockchain has led to a significant divergence from its core principles in many systems labeled as “blockchain.” This divergence has introduced complexity into the blockc...
Conference Paper
Full-text available
Trust is an important factor in the success of P2P networks. It is needed to ensure that nodes in the network can be trusted to behave honestly and to deliver on their promises (e.g sharing resources). While traditional reputation trust management systems (RTMS) such as BTrust or EigenTrust have proven effective, there is room for further enhanceme...
Conference Paper
Full-text available
In blockchain space, access control is a crucial aspect of smart contract development, as it guarantees that only authorized users can execute specific functions within a contract. The growing interest in employing smart contracts for access control mechanisms stems from their ability to provide reliable, secure and efficient enforcement of access...
Conference Paper
Full-text available
As Mobile Network Operators (MNOs) prepare to interconnect diverse technologies to existing cellular networks, it is critical to assess the capabilities of the network architecture to handle such changes. One key area to consider is the subscription management process, which governs the user's profile management , authentication, and access control...
Conference Paper
Full-text available
The Open Radio Access Network (O-RAN) introduces openness and intelligence into the existing, tightly-coupled RAN ecosystem. Openness promotes collaboration among various vendors to provide diverse components (hardware, software, or both) for the RAN ecosystem, while intelligence handles complex network activities using Artificial Intelligence (AI)...
Article
Full-text available
Research has already shifted to identifying the requirements and use-cases for beyond-5G (B5G) and 6G networks. However, business models (BMs) should also be investigated to effectively address the opportunities promised by B5G/6G. Traditional telecom roles could either disappear or transform, while new ones will appear. In this article, we focus o...
Article
Full-text available
The attention on blockchain technology (BCT) to create new forms of relational reliance has seen an explosion of new applications and initiatives, to assure decentralized security and trust. Its potential as a game-changing technology relates to how data gets distributed and replicated over several organizations and countries. This paper provides a...
Conference Paper
Full-text available
Due to the tightly-coupled hardware and software architecture of existing RAN systems and their non-flexibility, disaggregation of software and hardware can bring many unprecedented opportunities regarding enabling the entrance of multiple small-scale infrastructure providers to enter the RAN market, which creates more competitive and innovative RA...
Conference Paper
Full-text available
We present the deployment procedure of a private 4G-LTE network with standard User Equipment in two different scenarios using OpenAirInterface and Magma core networks. Our lessons learned from deploying the segregated end-to-end cellular network testbed, comparison of connection performance in two scenarios, challenges of connecting smartphones to...
Conference Paper
Full-text available
Cellular networks have played a critical role in building today’s Internet. However, they are facing more and more challenges such as softwarization and programmability, decentralization, as well as opening to new business models, while keeping a very high level of trust and reliability. DLT (Distributed Ledger Technology) is a promising field to a...
Chapter
Blockchain has been proposed as a trusted execution system, ensuring business process execution integrity and transparency. Smart contracts can manage the task or workflow execution and the allocation of tasks in a decentralized and reliable fashion. Nonetheless, blockchain transactions are public and accessible to their participants, and the issue...
Article
Full-text available
The emergence of blockchain technology and cryptocurrencies opened the possibility for building novel peer-to-peer(P2P) resource allocation and sharing models. However, the trustless nature of these P2P models creates the need for reliable and effective trust and reputation mechanisms to minimize the risk of accessing or interacting with malicious...
Conference Paper
Full-text available
Although 5G is designed to provide a large range of new digital services such as immersive experiences, connected machines, and Internet of Things (IoT), 5G networks may not be able to completely meet the needs of emerging novel applications, as well as to address the future needs of the business and regulatory ecosystem. Beyond 5G (B5G) and Sixth...
Chapter
Full-text available
The proven ability of Bitcoin and other cryptocurrencies to operate autonomously on the trustless Internet has sparked a big interest in the underlying technology - Blockchain. However, the portage of Blockchain technology outside its initial use case led to the inception of new types of Blockchains adapted to different specifications and with diff...
Code
The emergence of blockchain technology and cryptocurrencies opened the possibility for building novel peer-to-peer(P2P) resource allocation and sharing models. However, the trustless nature of these P2P models creates the need for reliable and effective trust and reputation mechanisms to minimize the risk of accessing or interacting with malicious...
Book
EMV (Europay MasterCard Visa) is the protocol implement-ed to secure the communication between a client’s payment device and a Point-of-Sale machine during a contact or an NFC (Near Field Communication) purchase transaction. In several studies, researchers have analyzed the operation of this protocol in order to verify its safety: unfortunately, th...
Chapter
EMV (Europay MasterCard Visa) is the protocol implement-ed to secure the communication between a client’s payment device and a Point-of-Sale machine during a contact or an NFC (Near Field Communication) purchase transaction. In several studies, researchers have analyzed the operation of this protocol in order to verify its safety: unfortunately, th...
Conference Paper
Full-text available
EMV (Europay MasterCard Visa) is the protocol implemented to secure the communication between a client's payment device and a Point-of-Sale machine during a contact or an NFC (Near Field Communication) purchase transaction. In several studies, researchers have analyzed the operation of this protocol in order to verify its safety: unfortunately , th...
Chapter
The advent of telco cloud infrastructures, where network, storage, and computational resources may be disseminated all over the Internet and hosted in various cloud infrastructures, is a business catalyst that should facilitate the dynamic production of services at large scale. For future 6G networks, the scope of many services will extend beyond t...
Chapter
The telecoms industry in general, and designers of new generations of cellular networks in particular, are strongly committed to achieving the United Nations Intergovernmental Panel on Climate Change (UN IPCC) objectives to limit climate change and contribute to the well‐being of future generations. In order to do so, innovation to bolster sustaina...
Chapter
This introductive chapter draws a panorama from 5G to 6G, by gathering several research visions for this shift. We first discuss the opportunity to develop a 6th generation of mobile networks, the foreseen services, and the moves in the value chain for standardization and development processes. The chapter then introduces the key innovations and el...
Chapter
This chapter discusses in detail the use cases and relative performance requirements envisioned for 6th generation (6G) wireless networks, with a focus on the business‐to‐business (B2B) markets. Starting from the verticals identified for 5th generation communication systems, the chapter sheds light on the services that will (i) cater the new indust...
Chapter
6G Networks are expected to have important features promising seamless, smart, highly performant infrastructure; network functions; and services all with cybersecurity advances and assurance of privacy. It is also expected to be capable of handling massive volume of data and a high‐data‐rate connectivity per device. As previously mentioned, global...
Article
Full-text available
As the basic building block of any information security system, identity and access management (IAM) solutions play vital role in enterprise's security programmes. Providing centric solutions for IAM is inefficient in terms of having single point of failure, high cost, duplication and complexity to the users. Recently, emerging the distributed ledg...
Article
Full-text available
The dramatic rise in internet-based service provisioning has highlighted the importance of deploying scalable access control methods, facilitating service authorization for eligible users. Existing centralized methods suffer from single-point-of-failure, low scalability, and high computational overhead. In addition, in these methods, users pay for...
Article
Full-text available
Blockchain technology has gained increasing attention from research and industry over the recent years. It allows implementing in its environment the smart-contracts technology which is used to automate and execute agreements between users. The blockchain is proposed today as a new technical infrastructure for several types of IT applications. This...
Conference Paper
Full-text available
Blockchain technology has gained increasing attention from research and industry over the recent years. This interest is mainly due to its core property that allows users to perform transactions without a Trusted Third Party (TTP), while offering a transparent and fully protected tracking of these transactions. However, there is a lack of reference...
Article
Full-text available
Blockchain technology has gained an increasing attention from research and industry over the recent years. It allows to implement in its environment the smart-contracts technology which is used to automate and execute agreements between users. The blockchain is proposed today as a new technical infrastructure for several types of IT applications. T...
Article
EMV is the protocol implemented to secure the communication, between a client’s payment device and a merchant’s payment device, during a contact or an NFC purchase transaction. It represents a set of security messages and rules, exchanged between the different transaction actors, guaranteeing several important security properties, such as authentic...
Conference Paper
Full-text available
As the first step in preserving system security, Authentication and Access Control (AAC) plays a vital role in all businesses. Recently, emerging the blockchain and smart contract technology has attracted significant scientific interest in research areas like authentication and access control processes. In the context of authentication and access c...
Article
Full-text available
Alors qu’il était perçu comme un moyen de communication révolutionnaire dans les années 1990, l’email a progressivement montré ses limites… si bien qu’il est devenu une source de surcharge informationnelle. Afin d’adresser ce problème, de nombreuses organisations ont adopté des réseaux sociaux d’entreprise (RSE) comme moyens de communication altern...
Chapter
The fifth generation of mobile cellular networks, 5G, is designed to support a set of new use cases and requirements that affect every aspects of human life. Therefore, the security in 5G systems becomes more important than the security in any other pre‐5G networks. Authenticating users and controlling their access to network services is one of the...
Article
Full-text available
Cet article met en avant le rôle de communautés internes d’experts en matière de soutien à l’innovation. À partir du cas d’une entreprise technologique, il présente des communautés pilotées, composées d’experts de différents métiers (R&D et aval), créées par l’organisation pour couvrir des champs de compétences stratégiques en lien avec des enjeux...
Article
Full-text available
The fifth generation of mobile networks, 5G, is expected to support a set of many requirements and use cases such as handling connectivity for a massive number of IoT (Internet of Things) devices. Authenticating IoT devices and controlling their access to the network plays a vital role in the security of these devices and of the whole cellular syst...
Article
Full-text available
The next generation of mobile networks, 5G, is expected to support a set of multiple requirements and use cases that will create an improved user experience. 5G will also be able to provide a high level of security by considering a variety of security aspects, such as authentication and access control mechanisms. The current protocol in 4G designed...
Conference Paper
Full-text available
The IoT (Internet of Things) is expected to encounter new business trends like wholesale wireless connectivity, due to the emergence of new user demands. These new business trends and demands will have a major effect on the entire IoT system and on the associated security needs. In this paper, we study the necessity of providing a new AC (access co...
Article
Full-text available
The Internet of Things operates in a personal-data-rich sector, which makes security and privacy an increasing concern for consumers. Access control is thus a vital issue to ensure trust in the IoT. Several access control models are today available, each of them coming with various features, making them more or less suitable for the IoT. This artic...
Conference Paper
Full-text available
EMV is the international protocol implemented to secure the communication between a client's payment device and a PoS during a contact or an NFC purchase transaction. It guarantees several important security properties such as authentication, authorization and integrity. However, researchers, in various studies, have analyzed this protocol and have...
Article
Full-text available
Changes in the technological and societal environments that surround organisations have disrupted the classic governance frameworks that corporate and information technology (IT) managers have designed to align IT uses with organisational missions, strategy, and values. The formerly “sovereign territory” of IT departments has been invaded, jeopardi...
Conference Paper
Full-text available
EMV (Europay Mastercard Visa) is the international standard implemented to secure purchase and deposit/withdrawal transactions. It represents a set of security rules and messages exchanged between the transaction actors in order to guarantee important security properties (such as authentication, authorization, integrity, etc.). However, several rec...
Conference Paper
Full-text available
Nowadays, coins and banknotes are familiar to us and, on a daily basis, we make cash payments of small amounts of less than 10 Euros. However, concerning high amounts, we cannot pay for everything in cash: firstly because the conservation of cash is risky and, secondly, in the case of loss or fraud, there is no recourse. Therefore, according to sev...
Article
Full-text available
Enterprise Social Media (ESM) services have been largely considered in the literature as a new innovation; and thus a number of academic and industrial interests have been overlooked. This paper provides a new perspective of ESM literature, one that supports the claim that this research field should be considered as sustainable and no longer emerge...
Chapter
Full-text available
This chapter presents Network-as-a-Service (NaaS) architecture leveraged with flexibility and dynamicity. Convergence and stronger collaboration between network planes while keeping separation is the driving notion for this chapter. We first analyze the convergence of the needs and the convergence of conceptual and technological solutions in the ne...
Conference Paper
Full-text available
This paper investigates the main requirements for achieving Access Control (AC) in IoT as induced from literature. A novel AC architecture is then proposed as a candidate approach for AC in IoT taking into account the addressed requirements. That is, AC is proposed to be administered at the level of IoT communities sharing common attributes, i.e. m...
Conference Paper
Full-text available
With the evolution of Telco systems towards 5G, new requirements emerge for delivering services. Network services are expected to be designed to allow greater flexibility. In order to cope with the new users' requirements, Telcos should rethink their complex and monolithic network architectures into more agile architectures. Adoption of NFV as well...
Article
Full-text available
The paradigm of the Social Internet of Things (SIoT) boosts a new trend wherein the connectivity and user friendliness benefits of Social Network Services (SNS) are exhibited within the network of connected objects, i.e. the Internet of Things (IoT). The SIoT exceeds the more traditional paradigm of IoT with an enhanced intelligence and context-awa...
Article
Full-text available
The distributed Internet of Things is emerging in the literature as a new paradigm for IoT where remotely controlled smart objects can act on their own to sense/actuate, store, and interpret information either created by them or within the surrounding environment. This paradigm calls for novel security and access control mechanisms to enable smart...
Conference Paper
Full-text available
Internet of Things (IoT) applications are generally developed in a vertical manner, i.e., each IoT application is developed for a certain scenario which generally do not share data with IoT applications for recommendation services. This leads to an inefficient exploitation of other IoT service applications. In fact, such recommendation services can...
Conference Paper
Full-text available
Le monde des télécommunications connaît une transformation sans précédent avec l'introduction de modèles issus du monde informatique, largement adoptés aujourd'hui par les acteurs industriels majeurs. Deux concepts essentiels sous-tendent cette évolution sont introduits : la softwarisation des réseaux et la webification des services. Cet article se...
Conference Paper
Full-text available
In the ten years since the emergence of the Enterprise 2.0 phenomenon, many studies have been realized in this field. This paper surveys today’s Enterprise 2.0 literature. Based on the ITIL methodology, it outlines its main research areas and highlights the remaining issues. Also, starting from the lack of empirical evaluation of the real usage of...