
Franck RousseauUniversité Grenoble Alpes · Grenoble INP - LIG lab
Franck Rousseau
PhD in Computer Science
About
98
Publications
61,129
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,726
Citations
Citations since 2017
Introduction
Interested in networking mainly, working mostly on wireless LANs, wireless sensor networks, mobility and security lately.
Additional affiliations
September 1999 - present
November 1995 - December 1998
OSF Research Institute
Position
- PhD and engineering
Education
November 1995 - January 1999
September 1992 - June 1995
Publications
Publications (98)
This paper presents a thorough comparison of the Transport Layer Security (TLS) v1.2 and Datagram TLS (DTLS) v1.2 handshake in 6TiSCH networks. TLS and DTLS play a crucial role in protecting daily Internet traffic, while 6TiSCH is a major low-power link layer technology for the IoT. In recent years, DTLS has been the de-facto security protocol to p...
With the growth of the Internet of Things (IoT) and Smart Homes, there is an ever-growing amount of data coming from within people’s houses. These data are intrinsically private and should be treated carefully, despite their high value for analysis. In this work, we propose a differentially private strategy to estimate frequencies of values in the...
This paper investigates thermal covert channels in the context of the Internet-of-Things. More, precisely we demonstrate such a channel on BLE-enabled devices. We explain how the core design principles of BLE link-layer protocol, combined with well-timed intensive CPU calculations can be leveraged to mount a thermal covert channel between two devic...
Les réseaux multi-sauts 802.15.4e TSCH s’appuient sur des échéanciers de communication efficaces. Notre solution complète les algorithmes de construction de tels échéanciers en limitant la réutilisation de cellules temps-fréquence déjà utilisées par des nœuds voisins. Nos simulations montrent un gain significatif par rapport à l'existant.
The IEEE802.15.4e standard for low power wireless
sensor networks defines a new mode called Time Slotted Channel
Hopping (TSCH) as Medium Access Control (MAC). TSCH
allows highly efficient deterministic time-frequency schedules that
are built and maintained by the 6TiSCH operation sublayer
(6top). In this paper, we propose a solution to limit the a...
The Internet of Things (IoT) requires a compact naming scheme, which can also bring significant advantages to service registration and discovery. We propose a novel approach, denoted as DIstributed NAming Service (DINAS), which provides a new naming scheme as well as an efficient service discovery protocol for Wireless Sensor Networks (WSNs). It is...
This paper concerns the problem of testing wireless networks in a way that guarantees repeatability and reproducibility of experiments. To contribute to this research objective, we have developed WalT, a reproducible platform for running reproducible experiments~\cite{walt2016}. WalT nodes are single-board computers on which users can deploy their...
In this paper, we explore the idea of DataTweet, a ubiquitous data service for transmitting short messages to support data collection from IoT devices and information dissemination to interested users at specific geographic locations. In particular, we present the design of the IP Geocast, a hierarchical scalable geographical multicast that enables...
MAC address randomization is a common privacy protection measure deployed in major operating systems today. It is used to prevent user-tracking with probe requests that are transmitted during IEEE 802.11 network scans. We present an attack to defeat MAC address randomization through observation of the timings of the network scans with an off-the-sh...
Nous proposons WEAVE, un protocole de routage géographique 2D/3D reposant sur l'utilisation de points d'étapes, waypoints, et de points de passage, checkpoints, pour acheminer le trafic à destination. Les noeuds obtiennent leur information de routage à partir de traces partielles collectées dans les paquets relayés et utilisent un système de points...
We propose WEAVE, a geographical 2D/3D routing protocol that maintains information on a small number of waypoints and checkpoints for forwarding packets to any destination. Nodes obtain the routing information from partial traces gathered in incoming packets and use a system of checkpoints along with the segments of routes to weave end-to-end paths...
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard
for securing the Internet of Things. The Constrained Application Protocol,
ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for
securing application traffic. There has been much debate in both the
standardization and research communities on the applicabi...
This paper presents GreenNet, an energy efficient and fully operational protocol stack for IP-enabled wireless sensor networks based on the IEEE 802.15.4 beacon-enabled mode. The stack runs on a hardware platform with photovoltaic cell energy harvesting developed by STMicroelectronics (STM) that can operate autonomously for long periods of time. Gr...
We introduce the concept of Featurecast with addressing and routing based on node features defined as predicates. For instance, we can send a packet to the address composed of features {temperature and Room D} to reach all nodes with a temperature sensor located in Room D. Each node constructs its address from the set of its features and disseminat...
Internet-Draft, Work in Progress document, IETF (Internet Engineering Task Force)
The huge increase of mobile traffic in the latest years has put cellular networks under pressure. To face this situation, operators propose to adopt data offloading techniques based on device-to-device communications to alleviate their infrastructure. In this paper, we consider a specific scenario in which the cellular channel has severe capacity l...
Nous nous intéressons à la représentation compacte des adresses afin de pouvoir router des paquets vers des destinations identifiées par leurs caractéristiques. Ce type de routage nécessite le stockage des caractéristiques de manière compacte dans l'adresse destination des paquets et dans les tables de routage. Nous étudions plusieurs solutions dan...
Wireless Sensor Networks (WSN) powered by energy harvesting from the environment represent a sustainable direction towards the future Internet of Things. In this paper, we evaluate the effect security features have on power consumption of such WSNs and revisit the previous conclusions regarding the energetic cost of security. We approach the proble...
In this work, we propose a key certification protocol for wireless sensor networks that allows nodes to autonomously exchange their public keys and verify their authenticity using one-way accumulators. We examine and compare different accumulator implementations for our protocol on the Sun SPOT platform. We observe that our protocol performs best w...
Billions of smart, but constrained objects wirelessly connected to the global
network require novel paradigms in network design. New protocol standards,
tailored to constrained devices, have been designed taking into account
requirements such as asynchronous application traffic, need for caching, and
group communication. The existing connection ori...
In this paper, we propose a new scheme that allows coupling beacon-enabled
IEEE 802.15.4 with the RPL routing protocol while keeping full compliance with
both standards. We provide a means for RPL to pass the routing information to
Layer 2 before the 802.15.4 topology is created by encapsulating RPL DIO
messages in beacon frames. The scheme takes a...
The Internet of Things requires a naming service that can also be beneficial for searching for services and ap-plications. To avoid the traditional DNS approach in which a DNS server provides mapping of names to IP addresses in its domain, we propose a novel network service called DINAS (DIstributed NAming Service). It is based on three pillars: 1)...
The chapter describes the Calipso communication architecture for IP connectivity in wireless sensor networks and the Smart Parking application scenario developed within the Project. The use case is a real life demonstrator for traffic flow and parking monitoring deployed in the city of Barcelona, Spain. It is based on a communication infrastructure...
We report results of measurements on SensLAB, an indoor wireless sensor network testbed with a large number of nodes equipped with a CC1101 radio chip. We analyze RSSI and LQI to find the best way to discriminate good links from weak ones and in particular, to derive a metric that estimates the Packet Reception Ratio (PRR) the best. To obtain an es...
The main idea of this paper is to rely only on analog channel sensing to provide integrated neighborhood maintenance and medium access control in a single mechanism for energy constrained low-power wireless sensor nodes. We propose Wake on Idle, a solution that can be implemented in the radio chip and provides these services without relying on the...
We investigate if it is feasible to use the WiFi coverage in urban areas for mobile Internet access and which type of applications can benefit from the Internet access provided by the already deployed WiFi Access Points (APs). Nowadays, most smartphones and other mobile handsets are WiFi-enabled. Moreover, mobile Internet data traffic is expected t...
We propose MCCT (Multi-Channel Cluster Tree), a cluster-tree construction protocol for nodes in IEEE 802.15.4 beacon-enabled mode. By multiplexing transmissions across orthogonal channels, we reduce collisions between control and data frames, which leads to better packet delivery rate and fairness. We propose a method for constructing a cluster-tre...
The ultimate test for many network layer protocols designed for wireless sensor networks would be to run on a large scale testbed. However, setting up a real-world large scale wireless sensor network (WSN) testbed requires access to a huge surface as well as extensive financial and human resources. Due to limited access to such infrastruc-tures, th...
Setting up large experimental testbeds for wireless sensor networks (WSN) requires access to a huge surface as well as extensive financial and human resources. Due to limited access to such infrastructures, the vast majority of existing theoretical and simulation studies on georouting are not evaluated in real environments. A more affordable approa...
Within IEEE 802.11 Wireless Local Area Networks (WLANs), client stations can move freely, but because of the short range of their Access Points (APs), they usually need to reassociate with different APs to continue to communicate. When changing APs, a client station starts a process known as a handoff that can take up to 2 seconds, which is too lon...
Mobility management in WiFi networks is still an open issue today: there is no standard method defined, and client station mobility is handled either via proprietary protocols, or simply by re- association. However, managing mobility in an infrastructure network is utterly important for several reasons: controlling delay and jitter in communication...
In this position paper, we propose a new view on the integration of wireless Sensor and Actuator Networks (SANET) in the Internet. We believe that SANETs may benefit from the data dissemination paradigm in which the network conveys typed data chunks while nodes organize communication according to the Publish/Subscribe
model: data consumers subscrib...
La gestion efficace de la mobilité dans les réseaux WiFi est toujours un problème ouvert aujourd'hui : aucune méthode n'a été standardisée, et le déplacement d'un mobile entre les points d'accès d'un réseau local sans fil est soit traité par des protocoles propriétaires, soit par ré-association. Hors, la gestion de cette mobilité dans une infrastruct...
Full-fledged software radio platforms are complex and expensive systems, focused on signal processing, and not very suitable for easy development and large scale experimentation. We propose a Multi-Processor System-on-Chip (MPSoC) prototyping platform targeting the support for flexible radio. This platform is fully customizable at every layer of th...
In this paper, we propose Hashing Backoff, an access method in which stations select backoff values by means of asymptotically or- thogonal hashing functions, so that contending stations converge to a collision-free state. This solution is a half-way between TDMA, CDMA, and random access. Our simulations show that it presents significant improvemen...
In a typical deployment of IEEE 802.11 wireless LANs in the infrastructure mode, an access point acts as a bridge between the wireless and the wired part of the network. Under the current IEEE 802.11 DCF access method, which provides equal channel access probability to all devices in a cell, the access point cannot relay all the frames it receives...
We propose Binary Waypoint Routing, a novel geographical routing protocol for wireless mesh networks. Its idea is to learn and maintain source routes to a small number of nodes called binary waypoints that are placed in subspaces con- structed as a result of binary space partitioning. A source node sends a packet to a waypoint for a given destinati...
We propose a packet scheduling discipline called virtual flow queueing (VFQ) to improve the end-to-end performance of TCP connections over IEEE 802.11 WLANs. VFQ is based on an inter-layer approach: the IP layer schedules packets over the wireless link according to the information coming from both the transport and MAC layers. The scheduler compute...
In this paper, we propose a mobility management scheme and a location service for spontaneous wireless mesh networks. Our mobility scheme builds upon separation between a persistent node identifier and its current address. We propose to use addresses coupled with geographical locations of nodes and maintain the mapping between identifiers and addre...
In this paper, we consider spontaneous wireless mesh networks that can provide wide coverage connectivity to mobile nodes. Our mobility scheme builds upon separation between a persistent node identifier and its current address. When joining the mesh, a mobile node associates with a mesh router that updates a location service managed in the mesh as...
Wireless mesh networks can increase wireless connectivity by routing packets through multiple wireless hops. However, a very efficient wireless interconnection is necessary to make these networks operative in practice. In this paper we describe a technique to increase the throughput of wireless mesh networks, based on cooperative communications. In...
In this paper, we present an evaluation of chosen wireless LAN access methods involving stations with different bit error rates: n-1 stations in ideal transmission conditions (BER = 0) and 1 station with a given bit error rate (BER ne 0). The simulation results show that the IEEE 802.11 DCF and its modifications (Slow Decrease, AOB) are very sensit...
An overwhelming part of research work on wireless net- works validates new concepts or protocols with simulation or analytical modeling. Unlike this approach, we present our experience with implementing theIdle Senseaccess method on programmable off-the-shelf hardware—the Intel IPW2915/abg chipset. We also present measurements and performance compa...
Traditional measurement tools are not suitable for fine-grain performance evaluation of 802.11 wireless networks. To improve this situation, we have developed Interar-rival Histograms, a method for measuring transmission delays based on gathering statistics of interarrival inter-vals at a receiving station. By measuring a sufficient number of inter...
In this paper, we present an evaluation of chosen wireless LAN access methods involving stations with different bit error rates: n - 1 stations in ideal transmission conditions (BER = 0) and 1 station with a given bit error rate (BER ¿ 0). The simulation results show that the IEEE 802.11 DCF and its modifications (Slow Decrease, AOB) are very sens...
In this paper, we address the issue of evaluating performance of wireless LANs in multicell scenarios. We try to understand the complex behavior of the DCF (Distributed Coordination Function) access method defined in the IEEE 802.11 standard [1] and its modifications proposed for improving performance: Slow Decrease [2], Asymptotically Optimal Back...
We have defined an execution architecture for playing back synchronized multimedia documents. We suppose that such documents are specified by means of several abstractions including hypertime links, time bases, and dynamic layout. Our architecture is based on three concepts: synchronization events, synchronization managers, and synchronizable media...
Several modifications of the IEEE 802.11 DCF access method have been proposed recently to improve the performance of wireless LANs. Up to now, such proposals have only been compared under ideal channel conditions. In this paper, we evaluate the impact of transmission errors on their performance in terms of aggregate throughput and fairness Peer rev...
In this paper, we introduce a framework for the automatic configuration of applications running in dynamic environments where
changes are frequent. We propose a way to describe, for each application, its configuration policy, and the execution environment’s
factors that affect its behavior. On this basis, we can generate application-specific config...