Paul Muhlethaler

Paul Muhlethaler
National Institute for Research in Computer Science and Control | INRIA

About

204
Publications
36,068
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
10,199
Citations
Citations since 2017
63 Research Items
3007 Citations
20172018201920202021202220230100200300400500600
20172018201920202021202220230100200300400500600
20172018201920202021202220230100200300400500600
20172018201920202021202220230100200300400500600

Publications

Publications (204)
Article
Full-text available
Despite the highly secure content sharing and the optimized forwarding mechanism, the content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities that can be exploited to reduce the efficiency of such architecture. Malicious attacks in NDN have become more sophisticated and the foremost challenge is to identify unknow...
Chapter
Basic Named Data Networks (NDN) security mechanisms, rely on two main key features. The first one is the caching mechanism where it manages to minimize both the bandwidth usage and the data retrieval delay all along with congestion avoidance by storing, in the intermediate routers, the contents recently demanded to quickly serve future consumers’ r...
Chapter
Full-text available
In recent years, cloud computing has played an important role in accessing services around the world. Thanks to its rapid development in the IT industry it has gained huge appeal. It offers users the ability to store, retrieve and share data and resources with other users however and whenever they wish. Availability, confidentiality and integrity a...
Article
Full-text available
Many technological enhancements are being developed worldwide to enable the "Internet of Things" (IoT). IoT networks largely rely on distributed access of billions of devices, but are still lagging in terms of combined reliability and low latency. To mend that shortcoming, it is paramount to adapt existing random access methods for the IoT setting....
Chapter
Proposals for Information Centric Networking (ICN) have recently emerged to rethink the foundations of the Internet and design a native data-oriented network architecture. Among the current ICN projects, Named Data Networking (NDN) is a promising architecture supported by the National Science Foundation (NSF). The NDN communication model is based o...
Conference Paper
Vehicular Ad hoc Networks (VANETs), while promising new approaches to improving road safety, must be protected from a variety of threats. Greedy behavior attacks at the level of the Medium Access (MAC) Layer can have devastating effects on the performance of a VANET. This kind of attack has been extensively studied in contention-based MAC protocols...
Article
Localization is the process of determining the position of an entity in a given coordinate system. Due to its wide range of applications (e.g. autonomous driving, Internet-of-Things), it has gained much focus from the industry and academia. Channel State Information (CSI) has overtaken Received Signal Strength Indicator (RSSI) to achieve localizati...
Article
Full-text available
Named Data Networking (NDN) is a promising architecture that aims to natively satisfy emerging applications such as the Internet of Things (IoT). Therefore, enabling NDN in real-world IoT deployments is becoming essential in order to benefit from Information Centric Networking (ICN) features. To design realistic NDN-based communication solutions fo...
Chapter
The main objective of Vehicular ad hoc networks (VANETs) is to make road transportation systems more intelligent in order to anticipate and avoid dangerous, potentially life-threatening situations. Due to its promising safety applications, this type of network has attracted a lot of attention in the research community. The dissemination of warning...
Chapter
Wireless communications play an important part in the systems of the Internet of Things (IoT). Recently, there has been a trend towards long-range communications systems for IoT, including cellular networks. For many use cases, such as massive machine-type communications (mMTC), performance can be gained by going out of the classical model of conne...
Chapter
Advances in technology have lead to the creation of a connected world. Due the increase in the number of smart and autonomous cars, the safety and associated comfort level of driving has led to attempts to adopt conventional vehicular access network to the world of connected vehicles. Consolidating the cooperative safety and collected mobility mana...
Chapter
Recently, blockchain technology has been one of the most promising fields of research aiming to enhance the security and privacy of systems. It follows a distributed mechanism to make the storage system fault-tolerant. However, even after adopting all the security measures, there are some risks for cyberattacks in the blockchain. From a statistical...
Book
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Machine Learning for Networking, MLN 2019, held in Paris, France, in December 2019. The 26 revised full papers included in the volume were carefully reviewed and selected from 75 submissions. They present and discuss new trends in deep and reinforcem...
Article
Vehicular ad hoc networks, known as VANETs, are deployed to improve passenger comfort as well as to reduce the risk of road accidents by allowing vehicles to provide a warning in real time when a critical event is detected. In such networks, communication is possible both between the vehicles themselves and between the vehicles and the infrastructu...
Conference Paper
The constantly growing number of vehicles on our roads has become an increasing major cause of serious injury and death. Efficient data dissemination in Vehicular Ad hoc Networks (VANETs) inevitably requires an efficient and robust routing protocol. In this context, several categories of routing protocols have been proposed in the literature to mee...
Article
Urban traffic forecasting models generally follow either a Gaussian Mixture Model (GMM) or a Support Vector Classifier (SVC) to estimate the features of potential road accidents. Although SVC can provide good performances with less data than GMM, it incurs a higher computational cost. This paper proposes a novel framework that combines the descript...
Book
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Machine Learning for Networking, MLN 2019, held in Paris, France, in December 2019. The 26 revised full papers included in the volume were carefully reviewed and selected from 75 submissions. They present and discuss new trends in deep and reinforcem...
Article
Full-text available
Location-based routing protocols for vehicular ad hoc networks (VANETs) use location information to determine routing decisions. This information is provided by a location service that is queried by nodes in order to properly forward packets to communication partners. This paper presents the semiflooding location service, a proactive flooding-based...
Chapter
Indoor localization has attracted much attention due to its many possible applications e.g. autonomous driving, Internet-Of-Things (IOT), and routing, etc. Received Signal Strength Indicator (RSSI) has been used extensively to achieve localization. However, due to its temporal instability, the focus has shifted towards the use of Channel State Info...
Chapter
A Vehicular Ad-Hoc NETwork (VANET) is an emerging technology consisting in a set of vehicles, mobile devices and an infrastructure, which uses wireless transmission technologies to enable real-time communication between them. VANETs help to improve traffic safety and efficiency by enabling each vehicle to exchange information about vehicle position...
Article
Full-text available
Latency is a very important metric to be taken into account in the design of the Connected and Automated Driving (CAD) technology. Today, connected vehicles have a dedicated technology named vehicle-to-everything (V2X). Many current research efforts and standardization activities aim to make the next generation of V2X technology able to offer new u...
Article
Full-text available
VANETs currently represent one of the most prominent solutions that aim to reduce the number of road accident victims and congestion problems while improving the quality of driving. VANETs form a very dynamic open network in which vehicles exchange information and warnings about road situations and other traffic information through several routing...
Article
Full-text available
IP has been designed for Internet decades ago to connect computers and share expensive resources such as tape drives and printers. Nowadays, Internet of Things and other emerging applications use Internet to fetch and exchange content such as monitoring data and movies. This content-centric use of Internet highlights the limitations of the IP archi...
Article
The proliferation of Internet of Things (IoT) devices has given a new dimension to networking operations. In fact, IoT issues in terms of complex communication patterns, dynamic topologies and security force to re-think basic networking operations in a more adapted way. Moreover, the IoT needs contribute to show the limitations of the IP model to s...
Conference Paper
In this paper we present a simple, stochastic-geometric model of a wireless access network exploiting the LoRA (Long Range) protocol, which is a non-expensive technology allowing for long-range, single-hop connectivity for the Internet of Things. We assume a space-time Poisson model of packets transmitted by LoRA nodes to a fixed base station. Foll...
Article
In this paper, we propose an analysis of a slot-based protocol designed for devices of the Internet of Things (IoT). In contrast to other TDMA-based protocols, this scheme uses a random technique to access shared slots, similarly to CSMA protocols. In practice, the transmissions are scheduled in a given backoff window of slots whose duration allows...
Preprint
In this paper we present a simple, stochastic-geometric model of a wireless access network exploiting the LoRA (Long Range) protocol, which is a non-expensive technology allowing for long-range, single-hop connectivity for the Internet of Things. We assume a space-time Poisson model of packets transmitted by LoRA nodes to a fixed base station. Foll...
Article
Full-text available
In this paper, we design and experiment ODYSSE (Opportunistic Duty cYcle based routing protocol for wirelesS Sensor nEtworks) protocol. It combines three main mechanisms: (i) duty cycle, where nodes alternate between active and sleep states, (ii) opportunistic routing where routing tables do not exist and the next hop is elected once the packet arr...
Conference Paper
Full-text available
Named Data Networking is a promising architecture for emerging Internet applications such as the Internet of Things (IoT). Many studies have already investigated how NDN can be an alternative for IP in future IoT deployments. However, NDN-IoT propositions need accurate evaluation at network level and system level as well. This paper introduces an N...
Conference Paper
Full-text available
The IEEE802.15.4 wireless technology is one of the enablers of the Internet of Things. It allows constrained devices to communicate with a satisfactory data rate, payload size and distance range, all with reduced energy consumption. To provide IoT devices with a global Internet identity, 6LoWPAN defines the IPv6 adaptation to communicate over IEEE8...
Conference Paper
Full-text available
Motivated by scenario requirements for 5G cellular networks, we study one of the candidate protocols for massive random access: the family of random access methods known as Coded Slotted ALOHA (CSA). A recent trend in research has explored aspects of such methods in various contexts, but one aspect has not been fully taken into account: the impact...
Article
Full-text available
Named Data Networking (NDN) is a new architecture which allows communications using data's natural names rather than hosts' logical addresses. In recent years, several research projects have demonstrated the ability of NDN to support emerging IoT applications like home automation, smart cities and smart farming applications. This work aims to integ...
Conference Paper
Full-text available
Conventionally, the exposure regarding knowledge of the inter vehicle link duration is a significant parameter in Vehicular Networks to estimate the delay during the failure of a specific link during the transmission. However, the mobility and dynamics of the nodes is considerably higher in a smart city than on highways and thus could emerge a comp...
Chapter
Avehicular ad hoc network (VANET) is a mobile network in which vehicles acting as moving nodes communicate with each other through an ad hoc wireless network. VANETs have become the core component of Intelligent Transportation Systems (ITS) which aim to improve the road safety and efficiency. Only if the communication scheme used in a VANET is stab...
Conference Paper
In this paper we propose a model of the IEEE 802.11 Enhanced Distributed Coordination Function (EDCF) which can build different access priorities for different classes of traffic. These priorities are obtained using different inter frame spacings called Arbitration Inter Frame Spacings (AIFSs) to differentiate the access of different classes of tra...
Article
Results are presented for optimizing device-to-device communications in cellular networks, while maintaining spectral efficiency of the base-station-to-device downlink channel. We build upon established and tested stochastic geometry models of signal-to-interference ratio (SIR) in wireless networks based on the Poisson point process, which incorpor...
Article
Full-text available
-Performance of Vehicular Adhoc Networks (VANETs) in high node density situation has long been a major field of studies. Particular attention has been paid to the frequent exchange of Cooperative Awareness Messages (CAMs) on which many road safety applications rely. In the present paper, se focus on the European Telecommunications Standard Institut...
Article
Full-text available
—This paper proposes and analyzes different broadcast strategies in IEEE 802.11p Vehicular Ad-hoc NETworks (VANETs). The first strategy is the default IEEE 802.11p strategy. Using a model derived from the Bianchi model, we provide the network performance in terms of throughput and success rate. The second strategy is to use an acknowledgment techni...
Conference Paper
Full-text available
Emerging ITS applications, such as point of interest distribution, require information delivery from the Internet to a group of vehicles. Such an Internet-to-VANET multicast service raises several challenges including efficient multicast mobility management and multicast message delivery in a geographic area (geocast). In this paper we propose to e...
Article
In our basic model, we study a stationary Poisson pattern of nodes on a line embedded in an independent planar Poisson field of interfering nodes. Assuming slotted Aloha and the signal-to-interference-and-noise ratio capture condition, with the usual power-law path loss model and Rayleigh fading, we explicitly evaluate several local and end-to-end...
Article
Full-text available
The purpose of this paper is to analyze the so-called back-off technique of the IEEE 802.11 protocol in broadcast mode with waiting queues. In contrast to existing models, packets arriving when a station (or node) is in back-off state are not discarded, but are stored in a buffer of infinite capacity. As in previous studies, the key point of our an...
Article
Full-text available
Vehicular Ad hoc NETworks (VANETs) are a major component recently used in the development of Intelligent Transportation Systems (ITSs). VANETs have a highly dynamic and portioned network topology due to the constant and rapid movement of vehicles. Currently, clustering algorithms are widely used as the control schemes to make VANET topology less dy...
Article
Full-text available
Indoor location estimation is a significant task for many ubiquitous and pervasive computing applications, with numerous solutions based on IEEE802.11, bluetooth, ultrasound and infrared technologies. Most of these techniques use the fingerprint-based approach, which needs exhaustive collection of the received signal strengths in various positions...