
Thomas Noël- Professor at University of Strasbourg
Thomas Noël
- Professor at University of Strasbourg
About
140
Publications
42,661
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,405
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (140)
The Internet of Things and the Wireless Sensor Networks are providing new ways to connect physical variables from the environment to the cybernetic world. As their applications become more ubiquitous, they require better energy efficiency to reduce the size of the batteries or extend their lifetime as much as possible, while keeping good quality ne...
In an effort to extend the lifetime and reliability of multi-hop wireless sensor networks we recently presented LoBaPS, a protocol to select opportunistic parents and achieve load balancing. This algorithm takes advantage of the wake-up radio for its ultra-low power consumption and always-on feature. Moreover, it overcomes an open problem in the ro...
The internet of Things (IoT) is a data stream environment where a large scale deployment of smart things continuously report readings. These data streams are then consumed by pervasive applications, i.e. data consumers, to offer ubiquitous services. The data quality (DQ) is a key criteria for IoT data consumers especially when considering the inher...
This paper is a survey of the current work to understand the available security measures in the literature for constrained environments. First of all, this paper introduces the specific problem of security in constrained environments and the need for a consistent solution. The necessary set of security measures that must be present in an architectu...
In this paper, we explore the role of simulators and testbeds in the development procedure of protocols or applications for Wireless Sensor Networks (WSNs) and Internet of Things (IoT). We investigate the complementarity between simulation and experimentation studies by evaluating latest features available among open testbeds (e.g., energy monitori...
This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016.
The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of...
Breast cancer represents one of the diseases that make a high number of deaths every year. It is the most common type of all cancers and the main cause of women's deaths worldwide. Classification and data mining methods are an effective way to classify data. Especially in medical field, where those methods are widely used in diagnosis and analysis...
Recent boom of mobile applications has become an essential class of mobile Internet of Things (IoT), whereby large amounts of sensed data are collected and shared by mobile sensing devices for observing phenomena such as traffic or the environmental. Currently, most of the proposed Medium Access Control (MAC) protocols mainly focus on static networ...
Low Power and Lossy Networks (LLNs) are inherently dynamic - nodes move or experience link perturbations. Routing packets in LLNs is generally performed by the IETF IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL). To face the dynamics of LLN, RPL is helped by external mechanisms such as Neighbor Unreachability Detection (NUD) or Bidire...
Performance analysis of newly designed solutions is essential for efficient Internet of Things and Wireless Sensor Network (WSN) deployments. Simulation and experimental evaluation practices are vital steps for the development process of protocols and applications for wireless technologies. Nowadays, the new solutions can be tested at a very large...
While more and more deployments of Wireless Sensor Networks (WSNs) are successful, very few are actually mobility-aware. Due to their intermittent connectivity, mobile nodes induce certain instabilities, and thus, require to transmit multiple data packets in a short period of time. The nature of mobile nodes can lead to a link quality deterioration...
In the Internet of Things (IoT), data gathered from a global-scale deployment of smart-things, are the base for making intelligent decisions and providing services. If data are of poor quality, decisions are likely to be unsound. Data quality (DQ) is crucial to gain user engagement and acceptance of the IoT paradigm and services. This paper aims at...
The Internet of Things (IoT) refers to a broad variety of objects with communication capabilities that are integrated into Internet. The interconnection between those objects and the Internet is enabled thanks to border routers. In this article, we investigate the aftermath of the failure of border routers on ongoing communications. Next, we propos...
Transport Layer Security (TLS) is a protocol defined by the IETF to secure communications on the Internet, and Datagram Transport Layer Security (DTLS) is its version based on UDP. DTLS is the proposed solution to secure the Internet of Things (IoT). As IoT devices are constrained in memory, in code size and in computation speed, DTLS overhead is a...
Datagram Transport Layer Security est un protocole défini par l'IETF pour sécuriser les communications sur Internet, puis réutilisé dans l'Internet des Objets. Cependant, le protocole n'a pas été conçu pour des appareils contraints en mémoire, en taille de code et en vitesse de calcul comme nous pouvons retrouver dans ce domaine. Ce papier propose...
Verification of theoretical analysis is a vital step to the development of an application or a protocol for wireless networks. Most of proposals are evaluated through mathematical analysis followed by either simulation or experimental validation campaigns. In this paper, we analyze a large set of statistics on articles published (i.e. 674 papers in...
In Wireless Sensor Networks (WSNs), during the design of Medium Access Control (MAC) protocols, mobile nodes may pose many communication challenges. These difficulties require first a link establishment between a mobile and static node, and then an efficient and effective data packet transmissions. In this study, we propose MobiXplore, a MAC scheme...
Reliable data packet transfer is an essential facet of quality of service in Wireless Sensor Networks (WSNs). WSNs require pertinent and reliable data collection schemes to provide dependable information. We analyze the factors that affect reliability, and design efficient combinations of the possible options. While many researchers have tackled th...
De nouveaux protocoles ont été standardisés afin d'intégrer les réseaux de capteurs sans fil (WSN) dans l'Internet. Parmi eux, RPL pour la couche routage et IEEE 802.15.4 pour la couche MAC. L'objectif de cette thèse est d'améliorer ces protocoles en prenant compte des contraintes énergétiques des dispositifs du WSN. Tout d'abord, nous avons conçu...
This demonstration aims at observing in an interactive manner the impact of modification of preamble and sampling periods at the low-power family of MAC protocols, and thus, illustrating in real-time the energy consumption and delay performance of each node accordingly. To do so, we implemented the ability for users to generate traffic at some
remo...
This article aims at observing in an interactive manner the impact of modification of preamble and sampling periods at the low-power family of MAC protocols, and thus, illustrating in real-time the energy consumption and delay performance of each node accordingly. To do so, we implemented the ability for users to generate traffic at some remote nod...
Energy is a very scarce resource in Wireless Sensor Networks. While most of the current proposals focus on minimizing the global energy consumption, we aim here at designing an energy-balancing routing protocol that maximizes the lifetime of the most constraint nodes. To improve the network lifetime, each node should consume the same (minimal) quan...
In Wireless Sensor Networks (WSNs) the nodes can be either static or mobile depending on the requirements of each application. During the design of Medium Access Control (MAC) protocols, mobility may pose many communication challenges. These difficulties require first a link establishment between mobile and static nodes, and then an energy efficien...
Sensor networks have long been an active research field. However, deployments are still often specialized for one particular task while emerging commercial products use proprietary low-end technologies. The new CoAP protocol, designed for resource constrained devices and being standardized by the IETF may bring a partial answer to this divergence....
This paper introduces the FIT IoT-LAB testbed, an open testbed with thousands of wireless devices available for experimenting with large-scale wireless IoT technologies, ranging from low-level protocols to advanced Internet services. IoT-LAB is built to accelerate the development of to-morrow's Internet of Things technology by offering an accurate...
Energy is a very scarce resource in Wireless Sensor Networks. While most of the current proposals focus on minimizing the global energy consumption, we aim here at designing an energy-balancing routing protocol that maximizes the lifetime of the most constraint nodes. To improve the network lifetime, each node should consume the same (minimal) quan...
In the last years the Low Power and Lossy Networks (LLNs), have become more and more popular. LLNs are inherently dynamic - nodes move, associate, disassociate or experience link perturbations. In order to meet the specific requirements for LLNs, the IETF has developed a new routing protocol - IPv6 Routing Protocol for Low-Power and Lossy Networks...
Low-power and Lossy Wireless Networks (LLN) is a crucial enabling technology for a broad range of applications that will touch everybody's life and be driving forces for new businesses. Example of the rapidly emerging application domains are the Internet of Things, Smart Cities and Smart Homes. Recently, there is strong effort to provide LLN with I...
In traditional routing protocols designed for Wireless Sensor Networks, each sensor node is related to one or more neighbors that will forward its readings up to the sink. This technique performs well for static topologies with homogeneous configurations, but usually fails to cope with network dynamics such as mobility and node failures. Opportunis...
This work focuses on Medium Access Control (MAC) protocols for Wireless Sensor Networks (WSNs). We investigate preamble-sampling solutions that allow asynchronous operation. We introduce anycast transmission to ContikiMAC where a mobile node first emits an anycast data packet whose first acknowledging node will serve as responsible to forward it to...
After many successful deployments, Wireless Sensor Networks (WSNs) now appear open for a paradigm shift in traffic resulting from applications. Consequently to the traditional event or time-driven a priori known traffic patterns, those networks face occasional, bursty and unanticipated multi-hop data transmissions. This specific case is rarely addr...
The devices composing Wireless Sensor Networks (WSN) are very limited in terms of memory, processing power and battery. We need efficient routing algorithms to ensure a long lifetime of the WSN. However, many solutions focus on minimizing the average energy consumption of all the nodes. Since the lifetime is rather given by the death of the first n...
The IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) standard allows heavily constrained devices to connect to IPv6 networks. This is an important step towards the Internet of Things, in which most of the physical objects will be connected to the Internet. Among them, a large number is likely to be mobile and therefore requires a mobil...
The last decade saw the emergence of the Internet of Things (IoT) paradigm, which aims to connect any object to the Internet. As in IoT networks, the radio component is usually the main source of energy depletion, specific medium access control protocols have been designed to reduce its usage. Among those, X-MAC has gained much interest in recent y...
A straightforward idea to prolong wireless sensor networks network lifetime is to schedule activities of nodes, that will turn into either Active or Passive states during the deployment. Several papers proposed solutions to turn Passive a large subset of nodes. However, only few of those provide information on how to translate this activity state i...
The Internet of Things (IoT) paradigm aims at connecting any object to the Internet (i.e. to the IP world). Due to the physical constraints (limited energy capacities) and deployment conditions (numerous autonomous devices scattered into an area) of such Things, power management and scalability are key issues in IoT deployments. While the problemat...
Validation of protocols and mechanisms is an essential step to the development of object networks in critical domains. Most papers still provide evaluation either obtained through theoretical analysis or simulations campaigns. Yet, simulators and formal models fail to precisely reproduce the unique specificities of the deployment environments those...
The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is one of the emerging routing standards for multihop Wireless Sensor Networks (WSN). RPL is based on the construction of a Destination-Oriented Directed Acyclic Graph (DODAG), which offers a loop-free topology to route data packets. While several routing metrics have been proposed in...
Due to their physical constraints and deployment conditions, power management is a key issue in Wireless Sensor Networks. The radio component being the most responsible for energy wastage, controlling medium access is of prime importance in order to obtain desired network lifetime. Several existing mechanisms realize energy gains by alternating act...
Mobility has recently been contemplated as a way to improve sensing coverage and connectivity in unattended Wireless Sensor
Networks. However, accessing the medium in such dynamic topologies raises multiple problems on mobile sensors. Synchronization
issues between fixed and mobile nodes may prevent the latter from successfully sending data to thei...
In this article we present how all the benefits of multihoming could be obtained in a mobile IPv6 network with multiple mobile routers. Along with the motivations and problems that arise in such a situation, we define a set of requirements that potential solutions should consider. After a brief overview of the current state of the art, we present a...
Defined by the Internet Engineering Task Force, the IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) standard allows heavily constrained devices (such as wireless sensors) to connect to IPv6 networks. This is an important step towards the Internet of Things, in which connected devices will be present anywhere. Due to the pervasive natu...
Mobility management in Wireless Sensor Networks (WSNs) is a complex problem that must be taken into account in all layers of the protocol stack. But this mobility becomes very challenging at the MAC level in order to do not degrade the en-ergy efficiency between sensor nodes that are in communication. However, among medium access protocols, samplin...
Recent deployments of wireless sensor networks have targeted challenging monitoring and surveillance applications. The medium access control being the main source of energy wastage, energy-efficiency has always been kept in mind while designing the communication stack embedded in spread sensors. Especially, versatile protocols have emerged to offer...
Convergecast traffic pattern is predominant in current wireless sensor networks. Few packets are periodically sent toward
the sink, but interesting events may generate a burst of packets for a limited period of time. Such burst may create congestion
in the surrounding of the event and thus may result in packet loss. Several congestion avoidance sol...
In the past few years, the concept of pervasive connectivity has become of crucial importance. New protocols have therefore been standardized to enable IPv6 mobility, such as the Network Mobility Basic Support (NEMO BS) protocol. This protocol is particularly suited for providing a global IPv6 connectivity in intelligent transportation systems. Yet...
We present SensLAB, a very large scale wireless sensor network testbed1. SensLAB is distributed among 4 sites having different topologies and consists of 1024 wireless nodes based on open source hardware & software. Within a given site, each one of the 256 nodes is able to communicate via its radio interface (868Mhz or 2.4Ghz) to its neighbors. Fur...
Wireless sensor networks (WSN) require pertinent and reliable data collection schemes in order to provide information about their deployment area. This article aims at detailing our contribution for message loss avoidance along prone-to-failure paths that monitoring reports would follow from sensors to sink stations. While many researchers have tac...
This paper presents a description of SensLAB(Very Large Scale Open Wireless Sensor Network Testbed) that has been developed
and deployed in order to allow the evaluation through experimentations of scalable wireless sensor network protocols and applications.
SensLAB’s main and most important goal is to offer an accurate open access multi-users scie...
This paper presents a precise description of SensLAB: Very Large Scale Open Wireless Sensor Network Testbed that has been developed and deployed in order to allow the evaluation of scalable wireless sensor network protocols and applications. SensLAB’s main and most important goal is to offer an accurate open access multi-users scientific tool to su...
The medium access control being the main source of energy wastage in wireless sensor networks, energy-efficiency is always kept in mind while designing the communication stack. Especially, versatile preamble-sampling MAC protocols emerged to offer a suitable solution over multiple deployment characteristics. For instance, some works have targeted b...
Although mobility management within a network of wireless sensors is a relatively new subject, we envision that a mobile sensor will move through different networks. However, it is very likely that the routing protocol supported in a visited network is different from the one supported by the mobile sensor. In a convergecast communication model, it...
Despite of the evolution of Data Stream Management Systems (DSMS), storage and processing of data flow persists as a major
problem, especially if it comes from a network of mobile, including a set of vehicles.
One solution proposed for such problems is to summarize the data stream into portions called short summaries. Several selection
techniques s...
Vehicular Ad-Hoc Networks (VANET) consists of moving vehicles exchanging data wirelessly without an existing
infrastructure. With such communication mechanism a network participant can receive information directly from its close
neighbours, as well as indirectly from any other vehicles in the network by using the rest of its peers as intermediate r...
The Layered Mobility Model Architecture (LEMMA) stipulates that a mobility model can be divided into five distinct layers, which communicate unidirectionally via simple interlayer interfaces. It has been shown that this general framework can be used for the creation of empirical and theoretical models, and that any mobility model can be represented...
The main goal of Cluster-based sensor networks is to decrease system delay and reduce energy consumption. LEACH is a cluster-based protocol for micro sensor networks which achieves energy-efficient, scalable routing and fair media access for sensor nodes. However, the election of a malicious or compromised sensor node as the cluster head is one the...
Access control is a critical security service in Wire-less Sensor Networks (WSNs). To prevent malicious nodes from joining the sensor network, access control is required. On one hand, WSN must be able to authorize and grant users the right to access to the network. On the other hand, WSN must organize data collected by sensors in such a way that an...
In this paper, we briefly describe an interactive roulette game enabled over a wireless sensor network platform. It basically consists in a train speeding in one way (the spinning roulette) and in a message hopping along some deployed sensors in the other way (the wheeling ball). This demonstration aims at illustrating in an interactive manner the...
Bien que la gestion de la mobilité au sein d'un réseau de capteurs sans fil soit un thème assez récent, nous pouvons déjà entrevoir la prochaine étape : un capteur mobile pourra transiter à travers différents réseaux. Cependant, il est très probable que le protocole de routage supporté dans un réseau visité ne soit pas compatible avec celui support...
Wireless sensor networks operate in constrained environments. In addition to the limitations in terms of energy, memory and computation, the use of mobile sensors has recently been contemplated. However, only a few medium access control protocols consider the dynamic of such scenarios. In this paper, we present potential problems that could arise w...
Les réseaux de capteurs sans fil opèrent en environnements contraints. Aux limitations en termes d'énergie, de mémoire et de capacité de calcul s'ajoute la récente perspective d'utiliser des capteurs mobiles. Toutefois, peu de protocoles d'accès au médium prennent en compte la dynamique de tels scénarios. Dans ce papier, nous parlerons tout d'abord...
The layered mobility model architecture, as introduced earlier, provides a framework for the construction of microscopic mobility models for wireless network simulations. In this paper, we are continuing our study of the architecture and provide the fundamental results necessary for the definition and analysis of theoretic models. This is done for...
ABSTRACT Although research on algorithms and communication,pro- tocols in Wireless Sensor Networks (WSN) has yielded a tremendous eort so far, most of these protocols are hardly used in real deployments nowadays. Several reasons have been put forward in recent publications. In this paper, we further investigate this trend from a Medium Access Contr...
This paper presents the generic layered architecture for mobility models (LEMMA), which can be used to construct a wide variety of mobility models, including the majority of models used in wireless network simulations. The fundamental components of the architecture are described and analyzed, in addition to its benefits. One of the core principles...
In this paper we introduce an open-source multiagent microsimulator implementing the Layered Mobility Model Architecture (LEMMA) [1]. Its design is described briefly, along with several examples of layers that have been implemented. Even though the number of layer descriptions is limited, we have introduced 8 layers, allowing the creation of 16 uni...
We introduce a generic layered architecture that can be used to construct a wide variety of mobility models, including the majority of models used in wireless network simulations. Each mobility model is divided in five distinct layers that communicate via interfaces, thus allowing their easy replacement and recombination. We review 18 layers that c...
The Network Mobility Basic Support (NEMO BS) protocol is the IETF standard to manage the mobility of entire IPv6 networks. One of the typical applications of this protocol is to deploy NEMO BS in transportations such as train or bus. As a result, passengers can benefit from global and permanent IPv6 connectivity with legacy IPv6 terminals equipped...
The development of network technologies such as wireless LAN have made it possible for users to benefit from Internet connectivity almost anywhere and at anytime. In order to improve user experience, the IETF has defined the Mobile IPv6 protocol which allows mobile nodes to maintain their communication uninterrupted while roaming across various IPv...
In this paper we have analyzed traces gathered from 36 buildings part of 3 different universities, libraries, laboratories and public places. The availability of login information allowed us to quantify the MAC address sharing. In addition, we have described a procedure applicable to both WPA/802.1X and captive portal authentication logs, which in...
The mobile IPv6 protocol is becoming one of the most common ways to support IPv6 mobility. Yet, despite its popularity the protocol still suffers various limitations which prevent it from being adopted in large scale commercial deployments. Among these is the protocol's poor support (or lack thereof) for rapid and seamless handovers. When moving fr...
With the development of wireless technologies, devices (laptop, PDA, etc.) become easily mobile. When they are moving together, they can form a mobile network. NEMO basic support was standardized to provide network mobility. As it does not define any solution for route optimization, it suffers from triangular routing. Optimized NEMO (ONEMO) is one...
Innovation in wireless technologies is changing the Internet and the way users connect. It is now possible to communicate while on the move. However, the standard procedures that enable user mobility across networks do not match the requirements of real-time communications in terms of delay and packet loss. The FMIPv6 protocol, lately accepted as s...
In this paper, we introduce a replacement Medium Access Control layer for wireless communications using the IEEE 802.11 standard. We justify this replacement by the performances achieved using the ratified Medium Access Control protocol which has several flaws although its design is based on fairness. We will especially focus on power consumption b...
Les performances ainsi que la popularité grandissante des réseaux sans fil IEEE 802.11 les destinent à véhiculer une grande diversité de trafic. Cependant, les communications temps réel, particulièrement sensibles aux temps de latence, peuvent être perturbées lors de la phase de handover. Ce phénomène est d'autant plus aggravé si le handover de niv...
The evolution of both Internet and cellular networks tends toward an IP mobility scheme for data and voice communication. Mobile IPv6 has the general purpose of managing mobility between IPv6 networks and it does not focus on optimizing heterogeneous interfaces usage. Yet, new handled devices usually come with more than one means of connecting to t...
This paper proposes a solution framework for Mobile IPv6 to anticipate movement over IEEE 802.11 networks. Layer 2 triggers such as the signal strength is used to trigger in advance scanning phases, in which a mobile device probes the adjacent access points. This scanning phase is performed alternatively with communication. Sufficient Layer 3 infor...
Ad hoc networks are formed by the spontaneous collaboration of wireless nodes when no networking infrastructure is available.
When communication to the Internet is desired, one or more nodes must act as gateways for the ad hoc network. In this case,
global addressing of ad hoc nodes is required. This article presents a protocol which can be used by...
While moving across several networks, mobile nodes have to support mobility management protocol in order to be able to continue their ongoing communications. The common solutions to enable user movements over IPv6 networks are the mobile IPv6 and the NEMO basic support protocols. Although the mobile IPv6 protocol is quite efficient, it requires tha...
Straightforward, transparent mobility management has now been available for some time with IPv6 through the mobile IPv6 protocol. There are numerous MIPv6 implementations available and some have been successfully deployed and tested in real world scenarios. Yet, certain aspects of that mobility support, such as security, seamless handovers, and het...
This paper introduces a new mechanism for IEEE 802.11 infrastructure networks that allows to save energy on battery powered devices by adding some processing on the wireless Access Point (AP). Although the main advantage of this mechanism is energy efficiency, it aims at improving the link Quality of Service (QoS) by providing better throughput and...
Ad hoc networks are formed by the spontaneous collaboration of wireless nodes when no networking infrastructure is available. When communication to the Internet is desired, one or more nodes must act as gateways for the ad hoc network. In this case, global addressing of ad hoc nodes is required. This article presents and evaluates three algorithms...
Wireless Mesh Networks (WMNs) have emerged as one of the new hot topics in wireless communications. They con- sist of a number of static wireless routers which form an access network for end users to IP-based services. Unlike traditional WLAN deployments, wireless mesh networks provide multihop routing, facilitating an easy and cost-effective deplo...
IEEE 802.11 networks are now very common and are present in various locations. While roaming through access points, a mobile node is often required to perform a link layer handover. This mechanism causes user-interceptable connection loss and breaks in time-sensitive communication, especially if a network layer handover follows the link layer hando...
It is important for both network researchers and operators to know the behavior of mobile nodes (mobile hosts and mobile routers), and to find anomalies in their behavior. This paper describes an on-going effort within the Nautilus Project to provide a set of free tools to build a statistics repository, called SONAR, containing detailed information...
Given the relatively limited coverage area of 802.11 access points, stations moving inside WLAN are often required to perform a handover. The time needed for a STA to switch from one AP to another is too long for real-time applications to continue operating seamlessly, even if no layer 3 handover is to occur ulteriorly. Many solutions have been pro...