Franck Rousseau

Franck Rousseau
Université Grenoble Alpes · Grenoble INP - LIG lab

PhD in Computer Science

About

98
Publications
61,129
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,726
Citations
Citations since 2017
15 Research Items
1286 Citations
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
Introduction
Interested in networking mainly, working mostly on wireless LANs, wireless sensor networks, mobility and security lately.
Additional affiliations
September 1999 - present
Université Grenoble Alpes
Position
  • Professor (Associate)
November 1995 - December 1998
OSF Research Institute
Position
  • PhD and engineering
Education
November 1995 - January 1999
Grenoble Institute of Technology
Field of study
  • Computer Sciences
September 1992 - June 1995
Grenoble Institute of Technology
Field of study
  • Computer Sciences and Applied Mathematics

Publications

Publications (98)
Article
Full-text available
This paper presents a thorough comparison of the Transport Layer Security (TLS) v1.2 and Datagram TLS (DTLS) v1.2 handshake in 6TiSCH networks. TLS and DTLS play a crucial role in protecting daily Internet traffic, while 6TiSCH is a major low-power link layer technology for the IoT. In recent years, DTLS has been the de-facto security protocol to p...
Conference Paper
With the growth of the Internet of Things (IoT) and Smart Homes, there is an ever-growing amount of data coming from within people’s houses. These data are intrinsically private and should be treated carefully, despite their high value for analysis. In this work, we propose a differentially private strategy to estimate frequencies of values in the...
Conference Paper
This paper investigates thermal covert channels in the context of the Internet-of-Things. More, precisely we demonstrate such a channel on BLE-enabled devices. We explain how the core design principles of BLE link-layer protocol, combined with well-timed intensive CPU calculations can be leveraged to mount a thermal covert channel between two devic...
Conference Paper
Full-text available
Les réseaux multi-sauts 802.15.4e TSCH s’appuient sur des échéanciers de communication efficaces. Notre solution complète les algorithmes de construction de tels échéanciers en limitant la réutilisation de cellules temps-fréquence déjà utilisées par des nœuds voisins. Nos simulations montrent un gain significatif par rapport à l'existant.
Conference Paper
Full-text available
The IEEE802.15.4e standard for low power wireless sensor networks defines a new mode called Time Slotted Channel Hopping (TSCH) as Medium Access Control (MAC). TSCH allows highly efficient deterministic time-frequency schedules that are built and maintained by the 6TiSCH operation sublayer (6top). In this paper, we propose a solution to limit the a...
Article
Full-text available
The Internet of Things (IoT) requires a compact naming scheme, which can also bring significant advantages to service registration and discovery. We propose a novel approach, denoted as DIstributed NAming Service (DINAS), which provides a new naming scheme as well as an efficient service discovery protocol for Wireless Sensor Networks (WSNs). It is...
Conference Paper
This paper concerns the problem of testing wireless networks in a way that guarantees repeatability and reproducibility of experiments. To contribute to this research objective, we have developed WalT, a reproducible platform for running reproducible experiments~\cite{walt2016}. WalT nodes are single-board computers on which users can deploy their...
Conference Paper
In this paper, we explore the idea of DataTweet, a ubiquitous data service for transmitting short messages to support data collection from IoT devices and information dissemination to interested users at specific geographic locations. In particular, we present the design of the IP Geocast, a hierarchical scalable geographical multicast that enables...
Conference Paper
MAC address randomization is a common privacy protection measure deployed in major operating systems today. It is used to prevent user-tracking with probe requests that are transmitted during IEEE 802.11 network scans. We present an attack to defeat MAC address randomization through observation of the timings of the network scans with an off-the-sh...
Conference Paper
Full-text available
Nous proposons WEAVE, un protocole de routage géographique 2D/3D reposant sur l'utilisation de points d'étapes, waypoints, et de points de passage, checkpoints, pour acheminer le trafic à destination. Les noeuds obtiennent leur information de routage à partir de traces partielles collectées dans les paquets relayés et utilisent un système de points...
Conference Paper
Full-text available
We propose WEAVE, a geographical 2D/3D routing protocol that maintains information on a small number of waypoints and checkpoints for forwarding packets to any destination. Nodes obtain the routing information from partial traces gathered in incoming packets and use a system of checkpoints along with the segments of routes to weave end-to-end paths...
Article
Full-text available
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic. There has been much debate in both the standardization and research communities on the applicabi...
Article
This paper presents GreenNet, an energy efficient and fully operational protocol stack for IP-enabled wireless sensor networks based on the IEEE 802.15.4 beacon-enabled mode. The stack runs on a hardware platform with photovoltaic cell energy harvesting developed by STMicroelectronics (STM) that can operate autonomously for long periods of time. Gr...
Conference Paper
Full-text available
We introduce the concept of Featurecast with addressing and routing based on node features defined as predicates. For instance, we can send a packet to the address composed of features {temperature and Room D} to reach all nodes with a temperature sensor located in Room D. Each node constructs its address from the set of its features and disseminat...
Article
Internet-Draft, Work in Progress document, IETF (Internet Engineering Task Force)
Conference Paper
The huge increase of mobile traffic in the latest years has put cellular networks under pressure. To face this situation, operators propose to adopt data offloading techniques based on device-to-device communications to alleviate their infrastructure. In this paper, we consider a specific scenario in which the cellular channel has severe capacity l...
Article
Full-text available
Nous nous intéressons à la représentation compacte des adresses afin de pouvoir router des paquets vers des destinations identifiées par leurs caractéristiques. Ce type de routage nécessite le stockage des caractéristiques de manière compacte dans l'adresse destination des paquets et dans les tables de routage. Nous étudions plusieurs solutions dan...
Conference Paper
Wireless Sensor Networks (WSN) powered by energy harvesting from the environment represent a sustainable direction towards the future Internet of Things. In this paper, we evaluate the effect security features have on power consumption of such WSNs and revisit the previous conclusions regarding the energetic cost of security. We approach the proble...
Conference Paper
In this work, we propose a key certification protocol for wireless sensor networks that allows nodes to autonomously exchange their public keys and verify their authenticity using one-way accumulators. We examine and compare different accumulator implementations for our protocol on the Sun SPOT platform. We observe that our protocol performs best w...
Article
Billions of smart, but constrained objects wirelessly connected to the global network require novel paradigms in network design. New protocol standards, tailored to constrained devices, have been designed taking into account requirements such as asynchronous application traffic, need for caching, and group communication. The existing connection ori...
Article
Full-text available
In this paper, we propose a new scheme that allows coupling beacon-enabled IEEE 802.15.4 with the RPL routing protocol while keeping full compliance with both standards. We provide a means for RPL to pass the routing information to Layer 2 before the 802.15.4 topology is created by encapsulating RPL DIO messages in beacon frames. The scheme takes a...
Conference Paper
Full-text available
The Internet of Things requires a naming service that can also be beneficial for searching for services and ap-plications. To avoid the traditional DNS approach in which a DNS server provides mapping of names to IP addresses in its domain, we propose a novel network service called DINAS (DIstributed NAming Service). It is based on three pillars: 1)...
Chapter
Full-text available
The chapter describes the Calipso communication architecture for IP connectivity in wireless sensor networks and the Smart Parking application scenario developed within the Project. The use case is a real life demonstrator for traffic flow and parking monitoring deployed in the city of Barcelona, Spain. It is based on a communication infrastructure...
Conference Paper
We report results of measurements on SensLAB, an indoor wireless sensor network testbed with a large number of nodes equipped with a CC1101 radio chip. We analyze RSSI and LQI to find the best way to discriminate good links from weak ones and in particular, to derive a metric that estimates the Packet Reception Ratio (PRR) the best. To obtain an es...
Conference Paper
The main idea of this paper is to rely only on analog channel sensing to provide integrated neighborhood maintenance and medium access control in a single mechanism for energy constrained low-power wireless sensor nodes. We propose Wake on Idle, a solution that can be implemented in the radio chip and provides these services without relying on the...
Conference Paper
We investigate if it is feasible to use the WiFi coverage in urban areas for mobile Internet access and which type of applications can benefit from the Internet access provided by the already deployed WiFi Access Points (APs). Nowadays, most smartphones and other mobile handsets are WiFi-enabled. Moreover, mobile Internet data traffic is expected t...
Conference Paper
Full-text available
We propose MCCT (Multi-Channel Cluster Tree), a cluster-tree construction protocol for nodes in IEEE 802.15.4 beacon-enabled mode. By multiplexing transmissions across orthogonal channels, we reduce collisions between control and data frames, which leads to better packet delivery rate and fairness. We propose a method for constructing a cluster-tre...
Conference Paper
Full-text available
The ultimate test for many network layer protocols designed for wireless sensor networks would be to run on a large scale testbed. However, setting up a real-world large scale wireless sensor network (WSN) testbed requires access to a huge surface as well as extensive financial and human resources. Due to limited access to such infrastruc-tures, th...
Article
Full-text available
Setting up large experimental testbeds for wireless sensor networks (WSN) requires access to a huge surface as well as extensive financial and human resources. Due to limited access to such infrastructures, the vast majority of existing theoretical and simulation studies on georouting are not evaluated in real environments. A more affordable approa...
Conference Paper
Full-text available
Within IEEE 802.11 Wireless Local Area Networks (WLANs), client stations can move freely, but because of the short range of their Access Points (APs), they usually need to reassociate with different APs to continue to communicate. When changing APs, a client station starts a process known as a handoff that can take up to 2 seconds, which is too lon...
Conference Paper
Mobility management in WiFi networks is still an open issue today: there is no standard method defined, and client station mobility is handled either via proprietary protocols, or simply by re- association. However, managing mobility in an infrastructure network is utterly important for several reasons: controlling delay and jitter in communication...
Chapter
Full-text available
In this position paper, we propose a new view on the integration of wireless Sensor and Actuator Networks (SANET) in the Internet. We believe that SANETs may benefit from the data dissemination paradigm in which the network conveys typed data chunks while nodes organize communication according to the Publish/Subscribe model: data consumers subscrib...
Article
Full-text available
La gestion efficace de la mobilité dans les réseaux WiFi est toujours un problème ouvert aujourd'hui : aucune méthode n'a été standardisée, et le déplacement d'un mobile entre les points d'accès d'un réseau local sans fil est soit traité par des protocoles propriétaires, soit par ré-association. Hors, la gestion de cette mobilité dans une infrastruct...
Conference Paper
Full-text available
Full-fledged software radio platforms are complex and expensive systems, focused on signal processing, and not very suitable for easy development and large scale experimentation. We propose a Multi-Processor System-on-Chip (MPSoC) prototyping platform targeting the support for flexible radio. This platform is fully customizable at every layer of th...
Conference Paper
Full-text available
In this paper, we propose Hashing Backoff, an access method in which stations select backoff values by means of asymptotically or- thogonal hashing functions, so that contending stations converge to a collision-free state. This solution is a half-way between TDMA, CDMA, and random access. Our simulations show that it presents significant improvemen...
Article
Full-text available
In a typical deployment of IEEE 802.11 wireless LANs in the infrastructure mode, an access point acts as a bridge between the wireless and the wired part of the network. Under the current IEEE 802.11 DCF access method, which provides equal channel access probability to all devices in a cell, the access point cannot relay all the frames it receives...
Conference Paper
Full-text available
We propose Binary Waypoint Routing, a novel geographical routing protocol for wireless mesh networks. Its idea is to learn and maintain source routes to a small number of nodes called binary waypoints that are placed in subspaces con- structed as a result of binary space partitioning. A source node sends a packet to a waypoint for a given destinati...
Conference Paper
We propose a packet scheduling discipline called virtual flow queueing (VFQ) to improve the end-to-end performance of TCP connections over IEEE 802.11 WLANs. VFQ is based on an inter-layer approach: the IP layer schedules packets over the wireless link according to the information coming from both the transport and MAC layers. The scheduler compute...
Article
Full-text available
In this paper, we propose a mobility management scheme and a location service for spontaneous wireless mesh networks. Our mobility scheme builds upon separation between a persistent node identifier and its current address. We propose to use addresses coupled with geographical locations of nodes and maintain the mapping between identifiers and addre...
Conference Paper
Full-text available
In this paper, we consider spontaneous wireless mesh networks that can provide wide coverage connectivity to mobile nodes. Our mobility scheme builds upon separation between a persistent node identifier and its current address. When joining the mesh, a mobile node associates with a mesh router that updates a location service managed in the mesh as...
Conference Paper
Full-text available
Wireless mesh networks can increase wireless connectivity by routing packets through multiple wireless hops. However, a very efficient wireless interconnection is necessary to make these networks operative in practice. In this paper we describe a technique to increase the throughput of wireless mesh networks, based on cooperative communications. In...
Conference Paper
Full-text available
In this paper, we present an evaluation of chosen wireless LAN access methods involving stations with different bit error rates: n-1 stations in ideal transmission conditions (BER = 0) and 1 station with a given bit error rate (BER ne 0). The simulation results show that the IEEE 802.11 DCF and its modifications (Slow Decrease, AOB) are very sensit...
Conference Paper
Full-text available
An overwhelming part of research work on wireless net- works validates new concepts or protocols with simulation or analytical modeling. Unlike this approach, we present our experience with implementing theIdle Senseaccess method on programmable off-the-shelf hardware—the Intel IPW2915/abg chipset. We also present measurements and performance compa...
Article
Full-text available
Traditional measurement tools are not suitable for fine-grain performance evaluation of 802.11 wireless networks. To improve this situation, we have developed Interar-rival Histograms, a method for measuring transmission delays based on gathering statistics of interarrival inter-vals at a receiving station. By measuring a sufficient number of inter...
Article
Full-text available
In this paper, we present an evaluation of chosen wireless LAN access methods involving stations with different bit error rates: n - 1 stations in ideal transmission conditions (BER = 0) and 1 station with a given bit error rate (BER ¿ 0). The simulation results show that the IEEE 802.11 DCF and its modifications (Slow Decrease, AOB) are very sens...
Article
Full-text available
In this paper, we address the issue of evaluating performance of wireless LANs in multicell scenarios. We try to understand the complex behavior of the DCF (Distributed Coordination Function) access method defined in the IEEE 802.11 standard [1] and its modifications proposed for improving performance: Slow Decrease [2], Asymptotically Optimal Back...
Conference Paper
Full-text available
We have defined an execution architecture for playing back synchronized multimedia documents. We suppose that such documents are specified by means of several abstractions including hypertime links, time bases, and dynamic layout. Our architecture is based on three concepts: synchronization events, synchronization managers, and synchronizable media...
Article
Full-text available
Several modifications of the IEEE 802.11 DCF access method have been proposed recently to improve the performance of wireless LANs. Up to now, such proposals have only been compared under ideal channel conditions. In this paper, we evaluate the impact of transmission errors on their performance in terms of aggregate throughput and fairness Peer rev...
Conference Paper
Full-text available
In this paper, we introduce a framework for the automatic configuration of applications running in dynamic environments where changes are frequent. We propose a way to describe, for each application, its configuration policy, and the execution environment’s factors that affect its behavior. On this basis, we can generate application-specific config...