• Home
  • Jean-Marie Bonnin
Jean-Marie Bonnin

Jean-Marie Bonnin
  • Professor
  • Head of Department at Institut Mines-Télécom, IMT Atlantique - IRISA - Inria

About

263
Publications
89,528
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,138
Citations
Introduction
After a PhD degree in computer science at Strasbourg university in 1998. I am currently professor (HDR) at IMT Atlantique and I lead the Inria/TACOMA research team. I am the scientifique director of the IRISA's Network, Telecommunications and Services dpt. Currently, I am interested in how to provide pervasive applications with a better perception of their environment through localized interactions (eg. cooperative autonomy). I am cofounder and the scientific advisor of the YoGoKo startup.
Current institution
Institut Mines-Télécom, IMT Atlantique - IRISA - Inria
Current position
  • Head of Department
Additional affiliations
June 2013 - present
Institute for Research in IT and Random Systems
Position
  • Head of Department
July 2009 - present
Institut Mines-Télécom
Position
  • Head of Department (professor)
November 2009 - present
Institut Mines-Télécom
Position
  • Professor
Description
  • Head of RSM department

Publications

Publications (263)
Preprint
The research introduces a multi-agent simulation that uses fuzzy inference to investigate the work distribution and battery charging control of mobile baggage conveyor robots in an airport in a comprehensive manner. Thanks to a distributed system, this simulation approach provides high adaptability, adjusting to changes in conveyor agent availabili...
Article
Full-text available
The research introduces a multi-agent simulation that uses fuzzy inference to investigate the work distribution and battery charging control of mobile baggage conveyor robots in an airport in a comprehensive manner. Thanks to a distributed system, this simulation approach provides high adaptability, adjusting to changes in conveyor agent availabili...
Article
Full-text available
This paper presents a multi-agent simulation implemented in Python, using fuzzy logic to explore collective battery recharge management for autonomous industrial vehicles (AIVs) in an airport environment. This approach offers adaptability and resilience through a distributed system, taking into account variations in AIV battery capacity. Simulation...
Conference Paper
Full-text available
The paper presents a multi-agent simulation using fuzzy inference to explore in an integrated way the task allocation and battery charging management of mobile baggage conveyor robots in an airport. This simulation approach offers high adaptability thanks to a distributed system, adapting to variations in the availability of conveyor agents, their...
Conference Paper
Full-text available
In precision agriculture, risk of infection has emerged as a critical approach to optimize crop yields and resource usage. However, the current paradigm largely relies on massive data collection which expends energy resources and gathers a substantial amount of non-essential data. This paper challenges this paradigm by proposing a localized approac...
Chapter
Full-text available
One of the challenges of Industry 4.0, is to determine and optimize the flow of data, products and materials in manufacturing companies. To realize these challenges, many solutions have been defined [1] such as the utilization of automated guided vehicles (AGVs). However, being guided is a handicap for these vehicles to fully meet the requirements...
Preprint
Full-text available
One of the challenges of Industry 4.0, is to determine and optimize the flow of data, products and materials in manufacturing companies. To realize these challenges, many solutions have been defined such as the utilization of automated guided vehicles (AGVs). However, being guided is a handicap for these vehicles to fully meet the requirements of I...
Conference Paper
Full-text available
The article presents a multi-agent simulation utilizing fuzzy logic to explore battery recharging management for Autonomous Industrial Vehicles (AIVs). This approach offers adaptability and resilience through a distributed system, accommodating variations in AIV battery capacity. Results highlight the efficacy of adaptive fuzzy multi-agent models i...
Article
The smart factory leads to a strong digitalization of industrial processes and continuous communication between the systems integrated into the production, storage, and supply chains. One of the research areas in Industry 4.0 is the possibility of using autonomous and/or intelligent industrial vehicles. The optimization of the management of the tas...
Conference Paper
Full-text available
L'Industrie 4.0 entraîne une forte digitalisation des processus industriels, mais aussi une augmentation significative de la communication et de la coopération entre les machines qui la composent. C'est le cas des véhicules industriels autonomes (VIA) et autres robots mobiles coopératifs qui se multiplient dans les usines, souvent sous forme de flo...
Article
Full-text available
Smart cities today can utilize vehicular delay tolerant networks (VDTN) to collect data from connected-objects in the environment for various delay-tolerant applications. They can take advantage of the available intelligent transportation systems (ITS) infrastructures to deliver data to the central server. The system can also exploit multiple and d...
Conference Paper
Full-text available
Industry 4.0 leads to a strong digitalization of industrial processes, but also a significant increase in communication and cooperation between the machines that make it up. This is the case with intelligent autonomous vehicles (IAVs) and other cooperative mobile robots which are multiplying in factories, often in the form of fleets of vehicles, an...
Conference Paper
Full-text available
The context of factory 4.0 leads more and more to decentralized solutions, as centralisation shows its limits. One of the research areas of Industry 4.0 is the use of AGVs, autonomous industrial vehicles (AIVs) that must become more and more autonomous and cooperative. We propose in this paper an agent model to test scenarios in an Industry 4.0 env...
Article
Industry 4.0 leads to a strong digitalization of industrial processes, but also a significant increase in communication and cooperation between the machines that make it up. This is the case with autonomous industrial vehicles (AIVs) and other cooperative mobile robots which are multiplying in factories, often in the form of fleets of vehicles, and...
Preprint
Full-text available
Smart cities today can utilize Vehicular Delay Tolerant Networks (VDTN) to collect data from connected-objects in the environment for various delay-tolerant applications. They can take advantage of the available Intelligent Transportation Systems (ITS) infrastructures to deliver data to the central server. The system can also exploit multiple and d...
Chapter
Demand from different actors for extended connectivity where vehicles can exchange data with other vehicles, roadside infrastructure, and traffic control centers have pushed vehicle manufacturers to invest in embedded solutions, which paves the way towards cooperative intelligent transportation systems (C-ITS). Cooperative vehicles enable the devel...
Conference Paper
Full-text available
The development of innovative applications for smart cities has been made possible by the rise of Internet of Things. The situational viewing and surveillance in cities is one such category of applications which can benefit from various networking solutions available to transport images or data from installed sensor cameras. In this paper, we propo...
Conference Paper
Full-text available
In smart cities, the mobility of vehicles can be used to collect data produced by connected objects and to deliver them to several applications which are delay tolerant. The Vehicular Delay Tolerant Networks (VDTN) can be utilized for such services. This paper introduces DC4LED (Data Collection for Low Energy Devices): a hierarchical VDTN routing w...
Conference Paper
Full-text available
The number of connected devices will increase exponentially in the coming years, emitting a massive amount of data to the networks. A vehicle-based data collection architecture for smart cities will enable the offloading of some data for delay-tolerant applications. However, our previous work showed the diversity in data pick-up pattern by vehicles...
Chapter
Technologies necessary for the development of pervasive health apps with intensive and seamless interactions with their environments are now widely available. Research studies and experimentations have demonstrated the real ability for health apps to interact with their environment. However, designing, testing and ensuring the maintenance and evolu...
Conference Paper
Full-text available
The application of classification techniques based on machine learning approaches to analyze the behavior of network users has interested many researchers in the last years. In a recent work, we have proposed an architecture for optimizing the upstream bandwidth allocation in Passive Optical Network (PON) based on the traffic pattern of each user....
Article
Full-text available
Modern network intrusion detection systems rely on machine learning techniques to detect traffic anomalies and thus intruders. However, the ability to learn the network behaviour in real-time comes at a cost: malicious software can interfere with the learning process, and teach the intrusion detection system to accept dangerous traffic. This paper...
Conference Paper
Full-text available
The introduction of new services as well as the growth in the number of communication terminals in the last years has led to an exponential growth of data traffic in both fixed and mobile networks. Passive Optical Networks (PONs) offer high bandwidth services to service providers customers. However, due to the dynamicity of users traffic patterns,...
Conference Paper
Full-text available
In this paper, we present an e-health architecture that provides secure remote medical services using WebRTC (Web Real-Time Communication). The goal is to allow patients (injured, elderly, disabled, etc.) to benefit from a medical assistance just by calling a remote medical support (doctors, nurses, hospitals, etc.) using a real-time multimedia com...
Article
Full-text available
The Internet of Things (IoT) is the extension of the internet to the physical world where all objects collect information and interact with their environments with no or little human intervention. They collect and transfer sensitive and private data from various users. This puts security and privacy issues at the forefront: the ability to manage th...
Chapter
Full-text available
In the past years, energy demand has increased and shifted especially towards electricity as the form of consuming energy. As the number of electric devices constantly grows and energy production must increasingly rely on renewable sources, this leads into noteworthy disparity between electricity production and consumption. This paper describes the...
Conference Paper
Full-text available
Critical Infrastructures are known for their complexity and the strong interdependencies between the various components. As a result, cascading effects can have devastating consequences, while foreseeing the overall impact of a particular incident is not straight-forward at all and goes beyond performing a simple risk analysis. This work presents a...
Conference Paper
Full-text available
VDTN concept and V2X communications capabilities can be utilised for an efficient data collection and delivery in smart cities. Here we present performance comparison of four lightweight VDTN routing protocols: First Contact, Epidemic, Spray and Wait, and MaxProp in terms of its percentage of message delivered, latency, overhead ratio, and hop coun...
Article
Full-text available
For a smarter use of transportation systems, vehicles need to increase their environment awareness. This could be achieved by enabling vehicles to communicate with their environment. Once vehicles become connected, an ecosystem of applications and services could be developed around them, enabling the information exchange with other connected device...
Conference Paper
Full-text available
In this paper, an e-health framework specially conceived for remote examination of patients and injured persons in case of accidents is presented. This architecture is based on coupling the real-time communication capabilities of WebRTC and the advantages brought by the Web of Things (WoT). We focus on the security aspects, especially for the secur...
Chapter
The growth of the population combined with the higher number of vehicles over the world have impacts to our quality of life, as air and noise pollution, traffic jam and road traffic accidents. Despite a wide variety of countermeasures applied by governments over the world, the number of deaths on road traffic accidents remains high. Once main cause...
Article
Vehicular ad-hoc networks faces numerous challenges, in particular Security and Privacy issues. Here, security assessment, risk evaluation and many other security features/calculations are based generally on theoretical ideas, that may project in different level real life conditions. Hence, the existing of an important risk that these analysis may...
Conference Paper
Full-text available
By coupling the real-time communication capabilities of WebRTC and the advantages brought by the Web of Things (WoT), we introduce the design of a new flexible healthcare architecture, in order to propose divers e-health services. In this ongoing work, we mainly focus on the services related to the remote healthcare of patients and elderly persons....
Chapter
Full-text available
The progress in the area of embedded systems has favored the emergence of so called “smart objects” or “Things”. These ones incorporate, in a context of low energy consumption, various wireless communication capabilities combined with a micro-controller driving sensors and/or actuators. Smartphones, connected TVs, smart watches, and so on, are conc...
Chapter
Erratum to: C. Giannelli (Ed.) MobileWireless Middleware, Operating Systems, and Applications DOI: 10.1007/978-3-642-01802-2 The book was inadvertently published with an incorrect name of the copyright holder. The name of the copyright holder for this book is: © ICST Institute for Computer Science, Social Informatics and Telecommunications Engineer...
Chapter
Full-text available
Firefox OS is an operating system for mobile devices. It is developed by Mozilla and is based on web technologies. Developed applications are therefore not tied to a given type of hardware. Mozilla works on standardisation of Web APIs, so that the device hardware could be accessed more easily. It also introduced its sign-in system for the Web and f...
Conference Paper
Vehicular ad hoc networks (VANET) are one of many fields that faces numerous challenges in terms of security and privacy. Risk and security assessments approaches in this kind of networks may not be able to operate correctly in all the vehicular systems, because theses analyzes aspects are based generally on theoretical ideas, which may not reflect...
Article
Full-text available
Le progrès dans le monde des systèmes embarqués a favorisé l’apparition d’objets dits « intelligents » (de l’anglais Smart Object ) ou encore « connectés ». Ces derniers intègrent, dans un contexte de faible consommation énergétique, un microcontrôleur permettant de piloter un capteur et/ou un actionneur alliés à une capacité de communication. Les...
Article
Full-text available
Quantitative risk assessment provides a holistic view of risk in an organisation, which is, however, often biased by the fact that risk shared by several assets is encoded multiple times in a risk analysis. An apparent solution to this issue is to take all dependencies between assets into consideration when building a risk model. However, existing...
Conference Paper
Full-text available
The omnipresence of real-time communication has significantly increased in recent years. Nevertheless it is treated as any best effort traffic, regardless its vulnerability to network conditions. WebRTC allows communication between browsers and uses application layer mechanisms to assure the quality (e.g. congestion control), but would benefit from...
Conference Paper
Full-text available
Software-Defined Networking (SDN) promises a flexible and programmable solution for future networks. By extracting the control logic out of forwarding devices into a specific entity as the control plane, it dramatically eases the management work of multi-tenant networks, where several customers share same network resources. Depending on the way and...
Poster
Full-text available
The connected services become essential in the people’s daily lives. In this context, the user needs to be connected anywhere, anytime to anything. A single access technology to connect all these heterogeneity is impractical or even impossible. Then connected applications should use existing wireless technologies (3G, WiFi, Bluetooth, etc.). In thi...
Article
Internet of things (IoT) paradigm poses new challenges to the communication technology as numerous heterogeneous objects will need to be connected. To address these issues new radio technologies and network architectures need to be designed to cater to several future devices having connectivity demands. For radio communications, the frequency spect...
Conference Paper
The number of connected devices — also known as Internet of Things (IoT) — is exponentially increasing. Such sensors and devices also appear in transportation systems giving some intelligence to roads, equipment and vehicles. Nowadays, it is possible to communicate with the environment in order to have better everyday services. Furthermore, the num...
Conference Paper
In the recent years, Vehicular Ad hoc NETworks (VANETs) have known a significant interest in terms of security and dependability. Moreover, we cannot ignore that this kind of networks request further work to provide different privacy related issues. Meaning that, the private data of users of this kind of network have to be prevented from different...
Article
In this paper, we study base station (BS) switching-off and offloading for the next-generation 5G-heterogeneous (macro/femto) networks supplied with hybrid energy sources. This type of network will form the basis of the high-data rate energy-efficient cellular networks in the years to come. A novel generalised-multimetric algorithm is presented. Ou...
Chapter
Full-text available
Firefox OS is an operating system for mobile devices. It is developed by Mozilla and is based on web technologies. Developed applications are therefore not tied to a given type of hardware. Mozilla works on standardisation of Web APIs, so that the device hardware could be accessed more easily. It also introduced its sign-in system for the Web and f...
Conference Paper
Full-text available
Real-time communications have substantially evolved in recent years. Consequently network operators are challenged by web companies providing Internet-wide WebRTC services that are developer and user friendly. So far WebRTC uses best-effort routing but it would benefit from better quality and specialized network services provided by network operato...
Conference Paper
Full-text available
Software Defined Networking (SDN) is supposed to bring flexibility, dynamicity and automation to today's network through a logically centralized network controller. We argue that reaching SDN's full capacities requires however the development of standardized programming capabilities on its top. In this paper we introduce “Bring Your Own Control” (B...
Article
In the context of ever-increasing wireless data rates, energy consumption could increase fast, with severe consequences on the operator’s energy bill, in addition to environmental considerations. Energy-efficient cell breathing and BS switching-off algorithms are an important tool for energy reduction in cellular networks. In this paper, an energy-...
Article
Energy-efficient cell breathing is a mechanism that consists of adapting cell sizes and number of active Base Stations (BS) to the distribution and current levels of traffic. In this article, our goal is to analyse the effect of such a technique on the electromagnetic (EM) radiation levels for mobile phone devices. Although there exist large detail...
Article
Full-text available
In modern societies the process of communication is greatly influenced by information technology and computer systems. Social interactions in both real-life and cyber communities are frequently being shaped by two main features of social computing tools: (1) sharing great deal of information with whole groups of consumers and (2) deriving collectiv...
Conference Paper
Full-text available
Real-time communications are much more than only traditional voice services. They have become interactive, transversal and are expected to be integrated as a feature of other applications. More and more communications services are offered by web companies that have been taking advantage of Internet flat rate charges and mostly use best-effort capab...
Conference Paper
Full-text available
Software Defined Networking (SDN) is deemed to empower next generation network and cloud services in several aspects. The authors argue that its high flexibility can be exploited not only in retrieving services efficiently but also in yielding new ones by introducing programming capabilities on its top. This however requires to structure its northb...
Article
The design of an efficient multicast for a scalable video coding (SVC) streaming combined with directional beamforming is a challenging issue. A quality of experience (QoE)-aware directional beam scheduling (QBS) scheme is proposed which optimises overall QoE for a multirate multicast of SVC, with beamforming in wireless networks. Different SVC lay...
Article
Full-text available
Vehicular Delay Tolerant Networks (VDTN) are growing challenging field of Delay Tolerant Networks (DTN) containing mobile nodes (vehicles) that communicate using the paradigm of store carry and forward. In this model, nodes store the bundle waiting for the opportunity to transfer it to another node in the same transmission range, and in a limited d...
Conference Paper
Full-text available
Nowadays, an in-app payment mechanism is offered in most existing mobile payment solutions. However, current solutions are not flexible and impose certain restrictions: users are limited to predefined payment options and merchants need to adapt their payment mechanisms to each payment provider they use. Ideally mobile payments should be as flexible...
Conference Paper
Due to its ease of use combined with its efficiency, traditional email service constitutes one of the main success story brought by the Internet. Its popularity hides however significant gaps. Professional email systems usually remedy such deficiencies by compiling a lot of sophisticated features in a single monolithic policy which should ideally t...
Conference Paper
The integration of all the heterogeneous wireless networks deployed along European railway lines constitutes a key technical challenge to improve global efficiency of railway system. Emerging Cognitive Radio (CR) technologies can answer this challenge. The paper presents the first results obtained in the ANR project CORRIDOR (Cognitive Radio for Hi...
Article
Research efforts conducted to overcome the problem of naming have given much attention to the Identifier/Locator (Id/Loc) split paradigm. Although several technical approaches have been proposed and analyzed, the exact performance of these systems is still unclear. In this paper, we develop an analytical cost model for studying the performances of...
Article
Full-text available
With growing interest in using cognitive radio (CR) technology in wireless communication systems for vehicles, it is envisioned that future vehicles will be CR-enabled. This paper discusses CR technologies for vehicular networks aimed at improving vehicular communication efficiency. CR for vehicular networks has the potential of becoming a killer C...
Conference Paper
Despite all the current controversies, the success of the email service is still valid. The ease of use of its various features contributed to its widespread adoption. In general, the email system provides for all its users the same set of features controlled by a single monolithic policy. Such solutions are efficient but limited because they grant...
Article
The increasing use of mobile devices has resulted in an explosion in mobile Internet traffic. To cope with this growth, mobile network architectures are becoming flatter, and IP mobility support protocols must evolve along with them. The authors propose an IP mobility support protocol that doesn't rely on a single mobility anchor, but rather uses d...
Conference Paper
Full-text available
In this paper we compare routing protocols of mobile vehicular ad-hoc networks (VANETs) and vehicular delay tolerant networks (VDTNs). We choose AODV as the reference protocol for evaluation because it is the most used in VANETs. Simulations of VDTN and AODV protocols are performed on ONE and NS-2 simulators respectively, with the identical scenari...
Article
Full-text available
Vehicular Delay-Tolerant Networks (VDTNs) are composed of mobile nodes (vehicles) that communicate wirelessly to transfer data between nodes despite connectivity issues. It enables network connectivity in sparse or partitioned opportunistic networks, characterized by the low node density where the vehicular traffic is sparse and direct end-to-end p...
Conference Paper
Energy efficiency in cellular networks is a major issue for current and future mobile networks. Several approaches have been proposed for this purpose: the component approach, the radio resource management (RRM) algorithms, the cell topology adaptation mechanisms, the hybrid network architectures, the cognitive radio approach and others. However, i...
Conference Paper
Full-text available
The on-demand connectivity service is one of the main requirements of the cellular data network. It consists in moving sessions transparently and temporarily from one network equipment to another without causing user session interruption. This service enables networks to cope with the ever-changing network condition such as sudden congestion or arb...
Article
Full-text available
The recent explosion of mobile Internet traffic is accelerating the evolution of mobile network architectures toward flat architectures with all IP backhaul support. IP mobility support protocols are thus required to be adopted in such mobile network architectures. Accordingly, the IETF Distributed Mobility Management (DMM) working group was recent...
Conference Paper
The purpose of this paper is to study the effects on electromagnetic field levels of the green cell breathing technique in mobile networks. Although a great number of papers dedicated to QoS, radio issues and energy savings of the cell breathing algorithms have already been proposed, to the best of our knowledge, none has analyzed the effect on ele...
Conference Paper
The world is entering a post-PC era in which more real-time entertainment traffic is delivered to mobile devices than to PCs. The unprecedented expansion of mobile Internet traffic has resulted in the development of distributed mobility management (DMM) at the IETF. In this paper, we introduce a dynamic tunneling scheme for network-based DMM, in wh...
Conference Paper
Full-text available
Quality of Experience (QoE) is the key to success for multimedia applications and perceptual video quality is one of the important component of QoE. A recent video encoding scheme called Scalable Video Coding (SVC) provides the flexibility and the capability to adapt the video quality to varying network conditions and heterogeneous users. In this p...
Conference Paper
In the context of internet of things, mobile operators face the challenge to host millions of devices with various capabilities and intelligence. With the traditional connectivity management in Long Term Evolution / Evolved Packet System (LTE/EPS) networks, security services such as confidentiality and integrity protection are designed to be activa...
Conference Paper
Full-text available
While two decades of semantic web research so far have failed to fulfill the high initial promises and expectations, and the underlying quest for categorizing the world has led to increasing complexity and new levels of bureaucracy instead, in this paper we introduce a new concept for distributed reasoning aiming at simplicity, consistency and comp...
Article
Proxy Mobile IPv6 (PMIPv6), a network-based mobility management protocol, has clearly different perceptions compared with host-based mobility management protocols. In PMIPv6, a mobile node (MN) is not involved in any mobility signaling as mobility service provisioning entities provide mobility services for the MN. This characteristic leads us to de...
Conference Paper
The Communication Technologies for Vehicles Workshop series provides an international forum on the latest technologies and research in the field of intra- and inter-vehicles communications and is or ganized annually to present original research results in all areas related to physical layer, communication protocols and standards, mobility and traff...
Article
Full-text available
In the current intensively changing technological environment, wireless network operators try to manage the increase of global traffic, optimizing the use of the available resources. This involves associating each user to one of its reachable wireless networks; a decision that can be made on the user side, in which case inefficiencies stem from use...
Conference Paper
Full-text available
Nowadays, network operators face the challenge to host millions of devices having various needs. With the traditional connectivity management in EPS/LTE accesses, security services such as confidentiality and integrity protection are designed to be activated in a systematic manner leading to significant signaling and processing cost. In this paper...
Article
Full-text available
Wireless sensor network (WSN) has emerged as one of the most promising technologies for the future. This has been enabled by advances in technology and availability of small, inexpensive, and smart sensors resulting in cost effective and easily deployable WSNs. However, researchers must address a variety of challenges to facilitate the widespread d...
Conference Paper
Recent technical breakthroughs in wireless communications have facilitated significantly increased data rates and reduced end-to-end latency in cellular networks. Higher throughputs however lead to increase traffic loads on cellular networks and require mechanisms to mitigate such traffic loads on the cellular networks. In this paper, we introduce...
Conference Paper
Full-text available
In our previous work we have introduced a novel social media that performs collaborative filtering on situations. This enhances user situation awareness with a collaborative effort to learn about importance of situations. In this paper we focus on defining a conceptual graph-based model used to represent situations in our system, so that it would (...
Chapter
Full-text available
Security in the wireless access network gained increasing interest over the last years. Its implementation varies from one access network to another. The current trend in wireless access network is towards implementing mechanisms for mobility management namely handoff process and quality of service control. Consequently, security should be taken in...

Network

Cited By