
Jean-Marie Bonnin- Professor
- Head of Department at Institut Mines-Télécom, IMT Atlantique - IRISA - Inria
Jean-Marie Bonnin
- Professor
- Head of Department at Institut Mines-Télécom, IMT Atlantique - IRISA - Inria
About
263
Publications
89,528
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,138
Citations
Introduction
After a PhD degree in computer science at Strasbourg university in 1998. I am currently professor (HDR) at IMT Atlantique and I lead the Inria/TACOMA research team. I am the scientifique director of the IRISA's Network, Telecommunications and Services dpt.
Currently, I am interested in how to provide pervasive applications with a better perception of their environment through localized interactions (eg. cooperative autonomy).
I am cofounder and the scientific advisor of the YoGoKo startup.
Current institution
Institut Mines-Télécom, IMT Atlantique - IRISA - Inria
Current position
- Head of Department
Additional affiliations
June 2013 - present
July 2009 - present
November 2009 - present
Publications
Publications (263)
The research introduces a multi-agent simulation that uses fuzzy inference to investigate the work distribution and battery charging control of mobile baggage conveyor robots in an airport in a comprehensive manner. Thanks to a distributed system, this simulation approach provides high adaptability, adjusting to changes in conveyor agent availabili...
The research introduces a multi-agent simulation that uses fuzzy inference to investigate the work distribution and battery charging control of mobile baggage conveyor robots in an airport in a comprehensive manner. Thanks to a distributed system, this simulation approach provides high adaptability, adjusting to changes in conveyor agent availabili...
This paper presents a multi-agent simulation implemented in Python, using fuzzy logic to explore collective battery recharge management for autonomous industrial vehicles (AIVs) in an airport environment. This approach offers adaptability and resilience through a distributed system, taking into account variations in AIV battery capacity. Simulation...
The paper presents a multi-agent simulation using fuzzy inference to explore in an integrated way the task allocation and battery charging management of mobile baggage conveyor robots in an airport. This simulation approach offers high adaptability thanks to a distributed system, adapting to variations in the availability of conveyor agents, their...
In precision agriculture, risk of infection has emerged as a critical approach to optimize crop yields and resource usage. However, the current paradigm largely relies on massive data collection which expends energy resources and gathers a substantial amount of non-essential data. This paper challenges this paradigm by proposing a localized approac...
One of the challenges of Industry 4.0, is to determine and optimize the flow of data, products and materials in manufacturing companies. To realize these challenges, many solutions have been defined [1] such as the utilization of automated guided vehicles (AGVs). However, being guided is a handicap for these vehicles to fully meet the requirements...
One of the challenges of Industry 4.0, is to determine and optimize the flow of data, products and materials in manufacturing companies. To realize these challenges, many solutions have been defined such as the utilization of automated guided vehicles (AGVs). However, being guided is a handicap for these vehicles to fully meet the requirements of I...
The article presents a multi-agent simulation utilizing fuzzy logic to explore battery recharging management for Autonomous Industrial Vehicles (AIVs). This approach offers adaptability and resilience through a distributed system, accommodating variations in AIV battery capacity. Results highlight the efficacy of adaptive fuzzy multi-agent models i...
The smart factory leads to a strong digitalization of industrial processes and continuous communication between the systems integrated into the production, storage, and supply chains. One of the research areas in Industry 4.0 is the possibility of using autonomous and/or intelligent industrial vehicles. The optimization of the management of the tas...
L'Industrie 4.0 entraîne une forte digitalisation des processus industriels, mais aussi une augmentation significative de la communication et de la coopération entre les machines qui la composent. C'est le cas des véhicules industriels autonomes (VIA) et autres robots mobiles coopératifs qui se multiplient dans les usines, souvent sous forme de flo...
Smart cities today can utilize vehicular delay tolerant networks (VDTN) to collect data from connected-objects in the environment for various delay-tolerant applications. They can take advantage of the available intelligent transportation systems (ITS) infrastructures to deliver data to the central server. The system can also exploit multiple and d...
Industry 4.0 leads to a strong digitalization of industrial processes, but also a significant increase in communication and cooperation between the machines that make it up. This is the case with intelligent autonomous vehicles (IAVs) and other cooperative mobile robots which are multiplying in factories, often in the form of fleets of vehicles, an...
The context of factory 4.0 leads more and more to decentralized solutions, as centralisation shows its limits. One of the research areas of Industry 4.0 is the use of AGVs, autonomous industrial vehicles (AIVs) that must become more and more autonomous and cooperative. We propose in this paper an agent model to test scenarios in an Industry 4.0 env...
Industry 4.0 leads to a strong digitalization of industrial processes, but also a significant increase in communication and cooperation between the machines that make it up. This is the case with autonomous industrial vehicles (AIVs) and other cooperative mobile robots which are multiplying in factories, often in the form of fleets of vehicles, and...
Smart cities today can utilize Vehicular Delay Tolerant Networks (VDTN) to collect data from connected-objects in the environment for various delay-tolerant applications. They can take advantage of the available Intelligent Transportation Systems (ITS) infrastructures to deliver data to the central server. The system can also exploit multiple and d...
Demand from different actors for extended connectivity where vehicles can exchange data with other vehicles, roadside infrastructure, and traffic control centers have pushed vehicle manufacturers to invest in embedded solutions, which paves the way towards cooperative intelligent transportation systems (C-ITS). Cooperative vehicles enable the devel...
The development of innovative applications for smart cities has been made possible by the rise of Internet of Things. The situational viewing and surveillance in cities is one such category of applications which can benefit from various networking solutions available to transport images or data from installed sensor cameras. In this paper, we propo...
In smart cities, the mobility of vehicles can be used to collect data produced by connected objects and to deliver them to several applications which are delay tolerant. The Vehicular Delay Tolerant Networks (VDTN) can be utilized for such services. This paper introduces DC4LED (Data Collection for Low Energy Devices): a hierarchical VDTN routing w...
The number of connected devices will increase exponentially in the coming years, emitting a massive amount of data to the networks. A vehicle-based data collection architecture for smart cities will enable the offloading of some data for delay-tolerant applications. However, our previous work showed the diversity in data pick-up pattern by vehicles...
Technologies necessary for the development of pervasive health apps with intensive and seamless interactions with their environments are now widely available. Research studies and experimentations have demonstrated the real ability for health apps to interact with their environment. However, designing, testing and ensuring the maintenance and evolu...
The application of classification techniques based on machine learning approaches to analyze the behavior of network users has interested many researchers in the last years. In a recent work, we have proposed an architecture for optimizing the upstream bandwidth allocation in Passive Optical Network (PON) based on the traffic pattern of each user....
Modern network intrusion detection systems rely on machine learning techniques to detect traffic anomalies and thus intruders. However, the ability to learn the network behaviour in real-time comes at a cost: malicious software can interfere with the learning process, and teach the intrusion detection system to accept dangerous traffic. This paper...
The introduction of new services as well as the growth in the number of communication terminals in the last years has led to an exponential growth of data traffic in both fixed and mobile networks. Passive Optical Networks (PONs) offer high bandwidth services to service providers customers. However, due to the dynamicity of users traffic patterns,...
In this paper, we present an e-health architecture that provides secure remote medical services using WebRTC (Web Real-Time Communication). The goal is to allow patients (injured, elderly, disabled, etc.) to benefit from a medical assistance just by calling a remote medical support (doctors, nurses, hospitals, etc.) using a real-time multimedia com...
The Internet of Things (IoT) is the extension of the internet to the physical world where all objects collect information and interact with their environments with no or little human intervention. They collect and transfer sensitive and private data from various users. This puts security and privacy issues at the forefront: the ability to manage th...
In the past years, energy demand has increased and shifted especially towards electricity as the form of consuming energy. As the number of electric devices constantly grows and energy production must increasingly rely on renewable sources, this leads into noteworthy disparity between electricity production and consumption. This paper describes the...
Critical Infrastructures are known for their complexity and the strong interdependencies between the various components. As a result, cascading effects can have devastating consequences, while foreseeing the overall impact of a particular incident is not straight-forward at all and goes beyond performing a simple risk analysis. This work presents a...
VDTN concept and V2X communications capabilities can be utilised for an efficient data collection and delivery in smart cities. Here we present performance comparison of four lightweight VDTN routing protocols: First Contact, Epidemic, Spray and Wait, and MaxProp in terms of its percentage of message delivered, latency, overhead ratio, and hop coun...
For a smarter use of transportation systems, vehicles need to increase their environment awareness. This could be achieved by enabling vehicles to communicate with their environment. Once vehicles become connected, an ecosystem of applications and services could be developed around them, enabling the information exchange with other connected device...
In this paper, an e-health framework specially conceived for remote examination of patients and injured persons in case of accidents is presented. This architecture is based on coupling the real-time communication capabilities of WebRTC and the advantages brought by the Web of Things (WoT). We focus on the security aspects, especially for the secur...
The growth of the population combined with the higher number of vehicles over
the world have impacts to our quality of life, as air and noise pollution, traffic jam and
road traffic accidents.
Despite a wide variety of countermeasures applied by governments over the world,
the number of deaths on road traffic accidents remains high. Once main cause...
Vehicular ad-hoc networks faces numerous challenges, in particular Security and Privacy issues. Here, security assessment, risk evaluation and many other security features/calculations are based generally on theoretical ideas, that may project in different level real life conditions. Hence, the existing of an important risk that these analysis may...
By coupling the real-time communication capabilities of WebRTC and the advantages brought by the Web of Things (WoT), we introduce the design of a new flexible healthcare architecture, in order to propose divers e-health services. In this ongoing work, we mainly focus on the services related to the remote healthcare of patients and elderly persons....
The progress in the area of embedded systems has favored the emergence of so called “smart objects” or “Things”. These ones incorporate, in a context of low energy consumption, various wireless communication capabilities combined with a micro-controller driving sensors and/or actuators. Smartphones, connected TVs, smart watches, and so on, are conc...
Erratum to: C. Giannelli (Ed.) MobileWireless Middleware, Operating Systems, and Applications DOI: 10.1007/978-3-642-01802-2 The book was inadvertently published with an incorrect name of the copyright holder. The name of the copyright holder for this book is: © ICST Institute for Computer Science, Social Informatics and Telecommunications Engineer...
Firefox OS is an operating system for mobile devices. It is developed by Mozilla and is based on web technologies. Developed applications are therefore not tied to a given type of hardware. Mozilla works on standardisation of Web APIs, so that the device hardware could be accessed more easily. It also introduced its sign-in system for the Web and f...
Vehicular ad hoc networks (VANET) are one of many fields that faces numerous challenges in terms of security and privacy. Risk and security assessments approaches in this kind of networks may not be able to operate correctly in all the vehicular systems, because theses analyzes aspects are based generally on theoretical ideas, which may not reflect...
Le progrès dans le monde des systèmes embarqués a favorisé l’apparition d’objets dits « intelligents » (de l’anglais Smart Object ) ou encore « connectés ». Ces derniers intègrent, dans un contexte de faible consommation énergétique, un microcontrôleur permettant de piloter un capteur et/ou un actionneur alliés à
une capacité de communication. Les...
Quantitative risk assessment provides a holistic view of risk in an organisation, which is, however, often biased by the fact that risk shared by several assets is encoded multiple times in a risk analysis. An apparent solution to this issue is to take all dependencies between assets into consideration when building a risk model. However, existing...
The omnipresence of real-time communication has significantly increased in recent years. Nevertheless it is treated as any best effort traffic, regardless its vulnerability to network conditions. WebRTC allows communication between browsers and uses application layer mechanisms to assure the quality (e.g. congestion control), but would benefit from...
Software-Defined Networking (SDN) promises a flexible and programmable solution for future networks. By extracting the control logic out of forwarding devices into a specific entity as the control plane, it dramatically eases the management work of multi-tenant networks, where several customers share same network resources. Depending on the way and...
The connected services become essential in the people’s daily lives. In this context, the user needs to be connected anywhere, anytime to anything. A single access technology to connect all these heterogeneity is impractical or even impossible. Then connected applications should use existing wireless technologies (3G, WiFi, Bluetooth, etc.). In thi...
Internet of things (IoT) paradigm poses new challenges to the communication technology as numerous heterogeneous objects will need to be connected. To address these issues new radio technologies and network architectures need to be designed to cater to several future devices having connectivity demands. For radio communications, the frequency spect...
The number of connected devices — also known as Internet of Things (IoT) — is exponentially increasing. Such sensors and devices also appear in transportation systems giving some intelligence to roads, equipment and vehicles. Nowadays, it is possible to communicate with the environment in order to have better everyday services. Furthermore, the num...
In the recent years, Vehicular Ad hoc NETworks (VANETs) have known a significant interest in terms of security and dependability. Moreover, we cannot ignore that this kind of networks request further work to provide different privacy related issues. Meaning that, the private data of users of this kind of network have to be prevented from different...
In this paper, we study base station (BS) switching-off and offloading for the next-generation 5G-heterogeneous (macro/femto) networks supplied with hybrid energy sources. This type of network will form the basis of the high-data rate energy-efficient cellular networks in the years to come. A novel generalised-multimetric algorithm is presented. Ou...
Firefox OS is an operating system for mobile devices. It is developed by Mozilla and is based on web technologies. Developed applications are therefore not tied to a given type of hardware. Mozilla works on standardisation of Web APIs, so that the device hardware could be accessed more easily. It also introduced its sign-in system for the Web and f...
Real-time communications have substantially evolved in recent
years. Consequently network operators are challenged by web
companies providing Internet-wide WebRTC services that are
developer and user friendly. So far WebRTC uses best-effort
routing but it would benefit from better quality and specialized
network services provided by network operato...
Software Defined Networking (SDN) is supposed to bring flexibility, dynamicity and automation to today's network through a logically centralized network controller. We argue that reaching SDN's full capacities requires however the development of standardized programming capabilities on its top. In this paper we introduce “Bring Your Own Control” (B...
In the context of ever-increasing wireless data rates, energy consumption could increase fast, with severe consequences on the operator’s energy bill, in addition to environmental considerations. Energy-efficient cell breathing and BS switching-off algorithms are an important tool for energy reduction in cellular networks. In this paper, an energy-...
Energy-efficient cell breathing is a mechanism that consists of adapting cell sizes and number of active Base Stations (BS) to the distribution and current levels of traffic. In this article, our goal is to analyse the effect of such a technique on the electromagnetic (EM) radiation levels for mobile phone devices. Although there exist large detail...
In modern societies the process of communication is greatly influenced by information technology and computer systems. Social interactions in both real-life and cyber communities are frequently being shaped by two main features of social computing tools: (1) sharing great deal of information with whole groups of consumers and (2) deriving collectiv...
Real-time communications are much more than only traditional voice services. They have become interactive, transversal and are expected to be integrated as a feature of other applications. More and more communications services are offered by web companies that have been taking advantage of Internet flat rate charges and mostly use best-effort capab...
Software Defined Networking (SDN) is deemed to empower next generation network and cloud services in several aspects. The authors argue that its high flexibility can be exploited not only in retrieving services efficiently but also in yielding new ones by introducing programming capabilities on its top. This however requires to structure its northb...
The design of an efficient multicast for a scalable video coding (SVC) streaming combined with directional beamforming is a challenging issue. A quality of experience (QoE)-aware directional beam scheduling (QBS) scheme is proposed which optimises overall QoE for a multirate multicast of SVC, with beamforming in wireless networks. Different SVC lay...
Vehicular Delay Tolerant Networks (VDTN) are growing challenging field of Delay Tolerant Networks
(DTN) containing mobile nodes (vehicles) that communicate using the paradigm of store carry and
forward. In this model, nodes store the bundle waiting for the opportunity to transfer it to another node in
the same transmission range, and in a limited d...
Nowadays, an in-app payment mechanism is offered in most existing mobile payment solutions. However, current solutions are not flexible and impose certain restrictions: users are limited to predefined payment options and merchants need to adapt their payment mechanisms to each payment provider they use. Ideally mobile payments should be as flexible...
Due to its ease of use combined with its efficiency, traditional email service constitutes one of the main success story brought by the Internet. Its popularity hides however significant gaps. Professional email systems usually remedy such deficiencies by compiling a lot of sophisticated features in a single monolithic policy which should ideally t...
The integration of all the heterogeneous wireless networks deployed along European railway lines constitutes a key technical challenge to improve global efficiency of railway system. Emerging Cognitive Radio (CR) technologies can answer this challenge. The paper presents the first results obtained in the ANR project CORRIDOR (Cognitive Radio for Hi...
Research efforts conducted to overcome the problem of naming have given much attention to the Identifier/Locator (Id/Loc) split paradigm. Although several technical approaches have been proposed and analyzed, the exact performance of these systems is still unclear. In this paper, we develop an analytical cost model for studying the performances of...
With growing interest in using cognitive radio (CR) technology in wireless communication systems for vehicles, it is envisioned that future vehicles will be CR-enabled. This paper discusses CR technologies for vehicular networks aimed at improving vehicular communication efficiency. CR for vehicular networks has the potential of becoming a killer C...
Despite all the current controversies, the success of the email service is still valid. The ease of use of its various features contributed to its widespread adoption. In general, the email system provides for all its users the same set of features controlled by a single monolithic policy. Such solutions are efficient but limited because they grant...
The increasing use of mobile devices has resulted in an explosion in mobile Internet traffic. To cope with this growth, mobile network architectures are becoming flatter, and IP mobility support protocols must evolve along with them. The authors propose an IP mobility support protocol that doesn't rely on a single mobility anchor, but rather uses d...
In this paper we compare routing protocols of mobile vehicular ad-hoc networks (VANETs) and vehicular delay tolerant networks (VDTNs). We choose AODV as the reference protocol for evaluation because it is the most used in VANETs. Simulations of VDTN and AODV protocols are performed on ONE and NS-2 simulators respectively, with the identical scenari...
Vehicular Delay-Tolerant Networks (VDTNs) are composed of mobile nodes (vehicles) that communicate wirelessly to transfer data between nodes despite connectivity issues. It enables network connectivity in sparse or partitioned opportunistic networks, characterized by the low node density where the vehicular traffic is sparse and direct end-to-end p...
Energy efficiency in cellular networks is a major issue for current and future mobile networks. Several approaches have been proposed for this purpose: the component approach, the radio resource management (RRM) algorithms, the cell topology adaptation mechanisms, the hybrid network architectures, the cognitive radio approach and others. However, i...
The on-demand connectivity service is one of the main requirements of the cellular data network. It consists in moving sessions transparently and temporarily from one network equipment to another without causing user session interruption. This service enables networks to cope with the ever-changing network condition such as sudden congestion or arb...
The recent explosion of mobile Internet traffic is accelerating the evolution of mobile network architectures toward flat architectures with all IP backhaul support. IP mobility support protocols are thus required to be adopted in such mobile network architectures. Accordingly, the IETF Distributed Mobility Management (DMM) working group was recent...
The purpose of this paper is to study the effects on electromagnetic field levels of the green cell breathing technique in mobile networks. Although a great number of papers dedicated to QoS, radio issues and energy savings of the cell breathing algorithms have already been proposed, to the best of our knowledge, none has analyzed the effect on ele...
The world is entering a post-PC era in which more real-time entertainment traffic is delivered to mobile devices than to PCs. The unprecedented expansion of mobile Internet traffic has resulted in the development of distributed mobility management (DMM) at the IETF. In this paper, we introduce a dynamic tunneling scheme for network-based DMM, in wh...
Quality of Experience (QoE) is the key to success for multimedia applications and perceptual video quality is one of the important component of QoE. A recent video encoding scheme called Scalable Video Coding (SVC) provides the flexibility and the capability to adapt the video quality to varying network conditions and heterogeneous users. In this p...
In the context of internet of things, mobile operators face the challenge to host millions of devices with various capabilities and intelligence. With the traditional connectivity management in Long Term Evolution / Evolved Packet System (LTE/EPS) networks, security services such as confidentiality and integrity protection are designed to be activa...
While two decades of semantic web research so far have failed to fulfill the high initial promises and expectations, and the underlying quest for categorizing the world has led to increasing complexity and new levels of bureaucracy instead, in this paper we introduce a new concept for distributed reasoning aiming at simplicity, consistency and comp...
Proxy Mobile IPv6 (PMIPv6), a network-based mobility management protocol, has clearly different perceptions compared with host-based mobility management protocols. In PMIPv6, a mobile node (MN) is not involved in any mobility signaling as mobility service provisioning entities provide mobility services for the MN. This characteristic leads us to de...
The Communication Technologies for Vehicles Workshop series provides an international forum on the latest technologies and research in the field of intra- and inter-vehicles communications and is or ganized annually to present original research results in all areas related to physical layer, communication protocols and standards, mobility and traff...
In the current intensively changing technological environment, wireless
network operators try to manage the increase of global traffic, optimizing the
use of the available resources. This involves associating each user to one of
its reachable wireless networks; a decision that can be made on the user side,
in which case inefficiencies stem from use...
Nowadays, network operators face the challenge to host millions of devices having various needs. With the traditional connectivity management in EPS/LTE accesses, security services such as confidentiality and integrity protection are designed to be activated in a systematic manner leading to significant signaling and processing cost. In this paper...
Wireless sensor network (WSN) has emerged as one of the most promising technologies for the future. This has been enabled by advances in technology and availability of small, inexpensive, and smart sensors resulting in cost effective and easily deployable WSNs. However, researchers must address a variety of challenges to facilitate the widespread d...
Recent technical breakthroughs in wireless communications have facilitated significantly increased data rates and reduced end-to-end latency in cellular networks. Higher throughputs however lead to increase traffic loads on cellular networks and require mechanisms to mitigate such traffic loads on the cellular networks. In this paper, we introduce...
In our previous work we have introduced a novel social media that performs collaborative filtering on situations. This enhances user situation awareness with a collaborative effort to learn about importance of situations. In this paper we focus on defining a conceptual graph-based model used to represent situations in our system, so that it would (...
Security in the wireless access network gained increasing interest over the last years. Its implementation varies from one access network to another. The current trend in wireless access network is towards implementing mechanisms for mobility management namely handoff process and quality of service control. Consequently, security should be taken in...