About
204
Publications
36,068
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
10,199
Citations
Citations since 2017
Introduction
Publications
Publications (204)
Despite the highly secure content sharing and the optimized forwarding mechanism, the content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities that can be exploited to reduce the efficiency of such architecture. Malicious attacks in NDN have become more sophisticated and the foremost challenge is to identify unknow...
Basic Named Data Networks (NDN) security mechanisms, rely on two main key features. The first one is the caching mechanism where it manages to minimize both the bandwidth usage and the data retrieval delay all along with congestion avoidance by storing, in the intermediate routers, the contents recently demanded to quickly serve future consumers’ r...
In recent years, cloud computing has played an important role in accessing services around the world. Thanks to its rapid development in the IT industry it has gained huge appeal. It offers users the ability to store, retrieve and share data and resources with other users however and whenever they wish. Availability, confidentiality and integrity a...
Many technological enhancements are being developed worldwide to enable the "Internet of Things" (IoT). IoT networks largely rely on distributed access of billions of devices, but are still lagging in terms of combined reliability and low latency. To mend that shortcoming, it is paramount to adapt existing random access methods for the IoT setting....
Proposals for Information Centric Networking (ICN) have recently emerged to rethink the foundations of the Internet and design a native data-oriented network architecture. Among the current ICN projects, Named Data Networking (NDN) is a promising architecture supported by the National Science Foundation (NSF). The NDN communication model is based o...
Vehicular Ad hoc Networks (VANETs), while promising new approaches to improving road safety, must be protected from a variety of threats. Greedy behavior attacks at the level of the Medium Access (MAC) Layer can have devastating effects on the performance of a VANET. This kind of attack has been extensively studied in contention-based MAC protocols...
Localization is the process of determining the position of an entity in a given coordinate system. Due to its wide range of applications (e.g. autonomous driving, Internet-of-Things), it has gained much focus from the industry and academia. Channel State Information (CSI) has overtaken Received Signal Strength Indicator (RSSI) to achieve localizati...
Named Data Networking (NDN) is a promising architecture that aims to natively satisfy emerging applications such as the Internet of Things (IoT). Therefore, enabling NDN in real-world IoT deployments is becoming essential in order to benefit from Information Centric Networking (ICN) features. To design realistic NDN-based communication solutions fo...
The main objective of Vehicular ad hoc networks (VANETs) is to make road transportation systems more intelligent in order to anticipate and avoid dangerous, potentially life-threatening situations. Due to its promising safety applications, this type of network has attracted a lot of attention in the research community. The dissemination of warning...
Wireless communications play an important part in the systems of the Internet of Things (IoT). Recently, there has been a trend towards long-range communications systems for IoT, including cellular networks. For many use cases, such as massive machine-type communications (mMTC), performance can be gained by going out of the classical model of conne...
Advances in technology have lead to the creation of a connected world. Due the increase in the number of smart and autonomous cars, the safety and associated comfort level of driving has led to attempts to adopt conventional vehicular access network to the world of connected vehicles. Consolidating the cooperative safety and collected mobility mana...
Recently, blockchain technology has been one of the most promising fields of research aiming to enhance the security and privacy of systems. It follows a distributed mechanism to make the storage system fault-tolerant. However, even after adopting all the security measures, there are some risks for cyberattacks in the blockchain. From a statistical...
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Machine Learning for Networking, MLN 2019, held in Paris, France, in December 2019. The 26 revised full papers included in the volume were carefully reviewed and selected from 75 submissions. They present and discuss new trends in deep and reinforcem...
Vehicular ad hoc networks, known as VANETs, are deployed to improve passenger comfort as well as to reduce the risk of road accidents by allowing vehicles to provide a warning in real time when a critical event is detected. In such networks, communication is possible both between the vehicles themselves and between the vehicles and the infrastructu...
The constantly growing number of vehicles on our roads has become an increasing major cause of serious injury and death. Efficient data dissemination in Vehicular Ad hoc Networks (VANETs) inevitably requires an efficient and robust routing protocol. In this context, several categories of routing protocols have been proposed in the literature to mee...
Urban traffic forecasting models generally follow either a Gaussian Mixture Model (GMM) or a Support Vector Classifier (SVC) to estimate the features of potential road accidents. Although SVC can provide good performances with less data than GMM, it incurs a higher computational cost. This paper proposes a novel framework that combines the descript...
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Machine Learning for Networking, MLN 2019, held in Paris, France, in December 2019. The 26 revised full papers included in the volume were carefully reviewed and selected from 75 submissions. They present and discuss new trends in deep and reinforcem...
Location-based routing protocols for vehicular ad hoc networks (VANETs) use location information to determine routing decisions. This information is provided by a location service that is queried by nodes in order to properly forward packets to communication partners. This paper presents the semiflooding location service, a proactive flooding-based...
Indoor localization has attracted much attention due to its many possible applications e.g. autonomous driving, Internet-Of-Things (IOT), and routing, etc. Received Signal Strength Indicator (RSSI) has been used extensively to achieve localization. However, due to its temporal instability, the focus has shifted towards the use of Channel State Info...
A Vehicular Ad-Hoc NETwork (VANET) is an emerging technology consisting in a set of vehicles, mobile devices and an infrastructure, which uses wireless transmission technologies to enable real-time communication between them. VANETs help to improve traffic safety and efficiency by enabling each vehicle to exchange information about vehicle position...
Latency is a very important metric to be taken into account in the design of the Connected and Automated Driving (CAD) technology. Today, connected vehicles have a dedicated technology named vehicle-to-everything (V2X). Many current research efforts and standardization activities aim to make the next generation of V2X technology able to offer new u...
VANETs currently represent one of the most prominent solutions that aim to reduce the number of road accident victims and congestion problems while improving the quality of driving. VANETs form a very dynamic open network in which vehicles exchange information and warnings about road situations and other traffic information through several routing...
IP has been designed for Internet decades ago to connect computers and share expensive resources such as tape drives and printers. Nowadays, Internet of Things and other emerging applications use Internet to fetch and exchange content such as monitoring data and movies. This content-centric use of Internet highlights the limitations of the IP archi...
The proliferation of Internet of Things (IoT) devices has given a new dimension to networking operations. In fact, IoT issues in terms of complex communication patterns, dynamic topologies and security force to re-think basic networking operations in a more adapted way. Moreover, the IoT needs contribute to show the limitations of the IP model to s...
In this paper we present a simple, stochastic-geometric model of a wireless access network exploiting the LoRA (Long Range) protocol, which is a non-expensive technology allowing for long-range, single-hop connectivity for the Internet of Things. We assume a space-time Poisson model of packets transmitted by LoRA nodes to a fixed base station. Foll...
In this paper, we propose an analysis of a slot-based protocol designed for devices of the Internet of Things (IoT). In contrast to other TDMA-based protocols, this scheme uses a random technique to access shared slots, similarly to CSMA protocols. In practice, the transmissions are scheduled in a given backoff window of slots whose duration allows...
In this paper we present a simple, stochastic-geometric model of a wireless access network exploiting the LoRA (Long Range) protocol, which is a non-expensive technology allowing for long-range, single-hop connectivity for the Internet of Things. We assume a space-time Poisson model of packets transmitted by LoRA nodes to a fixed base station. Foll...
In this paper, we design and experiment ODYSSE (Opportunistic Duty cYcle based routing protocol for wirelesS Sensor nEtworks) protocol. It combines three main mechanisms: (i) duty cycle, where nodes alternate between active and sleep states, (ii) opportunistic routing where routing tables do not exist and the next hop is elected once the packet arr...
Named Data Networking is a promising architecture for emerging Internet applications such as the Internet of Things (IoT). Many studies have already investigated how NDN can be an alternative for IP in future IoT deployments. However, NDN-IoT propositions need accurate evaluation at network level and system level as well. This paper introduces an N...
The IEEE802.15.4 wireless technology is one of the enablers of the Internet of Things. It allows constrained devices to communicate with a satisfactory data rate, payload size and distance range, all with reduced energy consumption. To provide IoT devices with a global Internet identity, 6LoWPAN defines the IPv6 adaptation to communicate over IEEE8...
Motivated by scenario requirements for 5G cellular networks, we study one of the candidate protocols for massive random access: the family of random access methods known as Coded Slotted ALOHA (CSA). A recent trend in research has explored aspects of such methods in various contexts, but one aspect has not been fully taken into account: the impact...
Named Data Networking (NDN) is a new architecture which allows communications using data's natural names rather than hosts' logical addresses. In recent years, several research projects have demonstrated the ability of NDN to support emerging IoT applications like home automation, smart cities and smart farming applications. This work aims to integ...
Conventionally, the exposure regarding knowledge of the inter vehicle link duration is a significant parameter in Vehicular Networks to estimate the delay during the failure of a specific link during the transmission. However, the mobility and dynamics of the nodes is considerably higher in a smart city than on highways and thus could emerge a comp...
Avehicular ad hoc network (VANET) is a mobile network in which vehicles acting as moving nodes communicate with each other through an ad hoc wireless network. VANETs have become the core component of Intelligent Transportation Systems (ITS) which aim to improve the road safety and efficiency. Only if the communication scheme used in a VANET is stab...
In this paper we propose a model of the IEEE 802.11 Enhanced Distributed Coordination Function (EDCF) which can build different access priorities for different classes of traffic. These priorities are obtained using different inter frame spacings called Arbitration Inter Frame Spacings (AIFSs) to differentiate the access of different classes of tra...
Results are presented for optimizing device-to-device communications in cellular networks, while maintaining spectral efficiency of the base-station-to-device downlink channel. We build upon established and tested stochastic geometry models of signal-to-interference ratio (SIR) in wireless networks based on the Poisson point process, which incorpor...
-Performance of Vehicular Adhoc Networks (VANETs) in high node density
situation has long been a major field of studies. Particular attention has been
paid to the frequent exchange of Cooperative Awareness Messages (CAMs) on which
many road safety applications rely. In the present paper, se focus on the
European Telecommunications Standard Institut...
—This paper proposes and analyzes different broadcast strategies in IEEE 802.11p Vehicular Ad-hoc NETworks (VANETs). The first strategy is the default IEEE 802.11p strategy. Using a model derived from the Bianchi model, we provide the network performance in terms of throughput and success rate. The second strategy is to use an acknowledgment techni...
Emerging ITS applications, such as point of interest distribution, require information delivery from the Internet to a group of vehicles. Such an Internet-to-VANET multicast service raises several challenges including efficient multicast mobility management and multicast message delivery in a geographic area (geocast). In this paper we propose to e...
In our basic model, we study a stationary Poisson pattern of nodes on a line embedded in an independent planar Poisson field of interfering nodes. Assuming slotted Aloha and the signal-to-interference-and-noise ratio capture condition, with the usual power-law path loss model and Rayleigh fading, we explicitly evaluate several local and end-to-end...
The purpose of this paper is to analyze the so-called back-off technique of the IEEE 802.11 protocol in broadcast mode with waiting queues. In contrast to existing models, packets arriving when a station (or node) is in back-off state are not discarded, but are stored in a buffer of infinite capacity. As in previous studies, the key point of our an...
Vehicular Ad hoc NETworks (VANETs) are a major component recently used in the development of Intelligent Transportation Systems (ITSs). VANETs have a highly dynamic and portioned network topology due to the constant and rapid movement of vehicles. Currently, clustering algorithms are widely used as the control schemes to make VANET topology less dy...
Indoor location estimation is a significant task for many ubiquitous and pervasive computing applications, with numerous solutions based on IEEE802.11, bluetooth, ultrasound and infrared technologies. Most of these techniques use the fingerprint-based approach, which needs exhaustive collection of the received signal strengths in various positions...