Ye-Qiong Song

Ye-Qiong Song
Lorrain de Recherche en Informatique et Ses Applications | Loria

About

170
Publications
25,074
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,215
Citations

Publications

Publications (170)
Article
IEC 61850 is becoming a cornerstone standard defining communication protocols and common data and device models for ensuring critical real-time monitoring and control of smart grids. Although the interoperability can be achieved by conforming to this standard, the underlying communication network still needs, however, careful configuration and dime...
Article
Artificial intelligence (AI) and the Internet of Things (IoT) have quickly climbed in the ranking of the hottest terms in the technological arena. The integration of AI techniques within IoT is considered extremely advantageous to improve the quality of IoT applications. However, the introduction of intelligence into IoT raises new security challen...
Preprint
Full-text available
Long Range Wide Area Network (LoRaWAN) enables flexible long-range communication with low power consumption which is suitable for IoT applications. LoRaWAN’s performance is due on the one hand to its spreading factor modulation allowing the spread out of communication between end-devices and gateways on different frequency channels and data rates....
Conference Paper
Full-text available
Long Range Wide Area Network (LoRaWAN) introduces the Adaptive Data rate (ADR) mechanism [1] aiming to maximize both battery life of the end-devices and overall network capacity. ADR performs adaptive tuning of radio configurations of the nodes by adjusting bandwidth, spreading factor, coding rate and transmission power parameters whenever the sign...
Article
Full-text available
With the ever growing internet of things market, Low Power Wide Area Networks (LPWAN) become more and more attractive. Among the various LPWAN technologies, LoRa (and LoRaWAN) has drawn a lot of research attention with its great adaptation capability. In fact, its spectrum modulation spreading factor, transmission power, data rate, channel bandwidt...
Article
Full-text available
The proliferation of the Internet of Things (IoT) has paved the way for the future of smart cities. The large volume of data over the IoT can enable decision-making for various applications such as smart transportation, smart parking, and smart lighting. The key to the success of smart cities is data collection and aggregation over the IoT. Recentl...
Article
Full-text available
In cyber-physical systems, mobile actuators can enhance the system’s flexibility and scalability, but at the same time incurs complex couplings in the scheduling and controlling of the actuators. In this paper, we propose a novel event-driven method aiming at satisfying a required level of control accuracy and saving energy consumption of the actua...
Chapter
LoRa’s long-range and low-power features have made it an attractive candidate for IoT devices in various fields. In this work, we present an enhanced LoRaWAN protocol. LoRaWAN MAC protocol is characterized by the restrictive use of the channel, limited by the regulatory authorities to a 1% duty cycle per cycle (i.e., 36 s per hour) per node. This r...
Chapter
Storage systems are getting complex to handle HPC and Big Data requirements. This complexity triggers performing in-depth evaluations to ensure the absence of issues in all systems’ layers. However, the current performance evaluation activity is performed around high-level metrics for simplicity reasons. It is therefore impossible to catch potentia...
Conference Paper
Most computer experiments include a phase where metrics are gathered from and about various kinds of resources. This phase is often done via manual, non-reproducible and error-prone steps. Infrastructure monitoring tools facilitate collecting experiments' data to some extent. However, there is no conventional way for doing so, and there is still mu...
Conference Paper
Software-Defined Real-Time Networking is an architecture for dynamic and incremental allocation of time-sensitive communication flows over embedded networks of various topologies and low-level properties. One of its major advantages is the ability to leverage the path redundancy provided by resilient (e.g. mesh) networks in order to recover from li...
Conference Paper
Future autonomous vehicles and ADAS (Advanced Driver Assistance Systems) need real-time audio and video transmission together with control data traffic (CDT). Audio/video stream delay analysis has been largely investigated in AVB (Audio Video Bridging) context, but not yet with the presence of the CDT in the new TSN context. In this paper we presen...
Article
The recent advancements of technology in robotics and wireless communication have enabled the low-cost and large-scale deployment of mobile sensor nodes for target tracking which is a critical application scenario of wireless sensor networks. Due to the constraints of limited sensing range, it is of great importance to design node coordination mech...
Conference Paper
Full-text available
Wireless charging is a promising technology for provisioning dynamic power supply in wireless rechargeable sensor networks (WRSNs). The charging equipment can be carried by some mobile nodes to enhance the charging flexibility. With such mobile chargers (MCs), the charging process should simultaneously address the MC scheduling, the moving and char...
Conference Paper
Wireless sensor networks (WSN) are inherently multi - constrained. They need to preserve energy while offering reliable and timely data reporting for a non-negligible number of scenarios. This is particularly true when a node should decide which forwarder has to be chosen for routing a packet. Nevertheless, solving multi-constrained routing problem...
Conference Paper
Many WSN industrial applications impose requirements in terms of end to end delay. However, the end to end delay estimation in WSNs is not a simple task because of the high dynamic of networks, the use of duty-cycled MAC protocols as well as the impact of the routing protocols. Markov-based modelling is an interesting approach to deal with this pro...
Article
Network virtualization is a new technology that aims at allowing multiple virtual networks (VNs) to coexist in the same equipment and to hide the heterogeneity of network infrastructure. The critical issue for a given infrastructure provider (InP), is how to provide customized and on demand resources for multiple service providers (SPs) with differ...
Article
Implementing new, high-performance MAC/RDC protocols on WSN/IoT motes is a complex and requiring task; to do it efficiently, one has to encounter many challenges that need to be overcome using the best trade-off between various and often contradictory objectives.A first key point is the software platform used for implementation: many specialized OS...
Article
Classical approaches to multi-constrained routing problems generally require construction of trees and the use of heuristics to prevent combinatorial explosion. Introduced here is the notion of constrained path algebras and their application to multi-constrained path problems. The inherent combinatorial properties of these algebras make them useful...
Book
Control systems and real-time computing have for a long time been associated with control systems, with the aim of controlling a process and bringing it toward a state that complies with the objectives specified by the user. The increasing complexity of these systems requires reviewing their properties in order to better integrate the control syste...
Book
Real-time systems distributed around a network can be found in many current applications such as embedded electronic systems (in vehicles around a controller area network (CAN) and in airplanes around an avionics full duplex switched Ethernet (AFDX) network), automated production systems in which the sensors, actuators and controllers are interconn...
Article
Full-text available
Performance analysis of wireless sensor networks is a difficult task because of the high dynamic of networks and the use of duty-cycled MAC protocols. Markov-based modelling is an interesting approach to deal with this problem. However, existing Markov-based analytic models, being MAC protocol-centric rather than network-centric, work under strong...
Conference Paper
The random distribution of sensors and the irregularity of routing paths lead to unordered sensory data which are difficult to deal with in Wireless Sensor Networks (WSNs). However, for simplicity, most existing researches ignore those characteristics in the designs of Compressive Sensing based Data Aggregation Schemes (CSDAS). Since conventional s...
Conference Paper
In the current protocol stack for Internet of Things in general and wireless sensor network in particular, many devices rely on the Contiki MAC protocol at their MAC layer. This protocol is widely used and enabled by default for several industrial environments and time sensitive monitoring and control applications. However, few work exists regardin...
Conference Paper
Full-text available
The concept of network virtualization was introduced to facilitate flexible service deployment for the future Internet. This recent technology provides a powerful tool to run multiple logical networks on the same physical substrate defined as virtual networks (VNs). Each physical link is split into virtual links and each VN receives a fraction of t...
Article
Recent Wireless Sensor Network (WSN) MAC protocols focus on both very low idle trafic duty-cycle and high throughput when bursts of trafic occur.It is highly desirable to be able to integrate them into a common and open platform, not only for easing their performance comparison, but also for their effective interaction with existing higher-layer pr...
Conference Paper
Full-text available
IEEE 802.15.4 protocol stack is the basis of many wireless sensor networks (WSN) and has been proposed for low data rate and low power applications. The standard defines a duty cycle in order to allow devices to achieve efficient energy consumption. Defining the best duty cycle configuration becomes important to extend the network life time. Severa...
Conference Paper
Full-text available
The most critical issue in network virtualization is the dynamic resource allocation of the physical substrate. There is a need to monitor the running virtual routers in order to allow an adaptive change in the resource allocation. In this paper, we focus on the router data plane virtualization and we explore this issue by presenting a new dynamic...
Conference Paper
Full-text available
With this paper we offer an insight in designing and analyzing wireless sensor networks in a versatile manner. Our framework applies probabilistic and component-based design principles for the wireless sensor network modeling and consequently analysis; while maintaining flexibility and accuracy. In particular, we address the problem of allocating a...
Article
Providing service differentiation in wireless sensor networks while proposing simple and highly scalable solution is a challenging problem. We retain the use of CSMA/CA as access protocol because of its simplicity, versatility and good scalability properties. We developed CoSenS, a Collect then Send burst Scheme, on top of it to address its weaknes...
Article
Full-text available
IEEE 802.15.4 standard specifies a beacon-enabled mode which provides a synchronization environment using beacon transmissions. However, this mode is designed for single hop networks and its use in multi-hop networks is not straight-forward. The main challenges of using beacon-enabled mode in multi-hop networks are how to efficiently schedule beaco...
Article
Full-text available
In this paper, a class of periodic unipolar binary sequences are investigated for their potential applications in defining new protocols for distributed wireless multiple access. Based on linear congruence sequences, one can show that for any finite subset of these sequences with total proportional rate not exceeding a specific threshold, there can...
Conference Paper
Full-text available
In this work, we present an empirical support of an analytical approach which employs a frequency domain analysis for estimating end-to-end delay in multi-hop networks. The proposed analytical results of the end-to-end delay distribution are validated through simulation and compared with queueing based analysis by defining two concrete scenarios. O...
Article
Full-text available
Technical advances in ubiquitous sensing, embedded computing, and wireless communication are leading to a new generation of engineered systems called cyber-physical systems (CPSs). This field is attracting more and more attention from researchers and practitioners, as well as the governments. Technically, cyber-physical systems are integrations of...
Article
Data traversing packet networks experience varying delays, resulting in noticeable delay jitters. This significantly degrades overall system performance in a real-time multimedia network. This paper proposes TSJC, a novel traffic shaping algorithm with delay jitter constraints for real-time multimedia networks, on the basis of traditional shaping a...
Conference Paper
For providing real-time data collecting in a telehealthcare system composed of wireless sensor network and home automation network, a middleware called CodaQ is designed. It provides context data and takes into account QoS requirements of the applications. In this paper, we show how the data are modeled for including context information and how the...
Article
Full-text available
Abstract: We present MPIGate, a multiprotocol gateway and interface for assisted living applications. This project aims to facilitate the development of applications thanks to the abstraction of sensing data and the facility of access to read and write functions over the devices plugged to the network. The contribution includes modularity and a mid...
Article
Full-text available
PMCMTP is a Prioritized Multi-Channel Multi-Time slot MAC protocol that the authors have proposed for allowing to simultaneous use of several frequency channels. This protocol is designed for UWB of IEEE802.15.4a but it can also be used over IEEE802.15.4. In this paper, we design and implement a testbed of this protocol to demonstrate its practical...
Article
Ce rapport s'inscrit dans le cadre du projet INRIA NGE - Fireflies-rtls. Le travail consiste à dresser un panorama des solutions (MAC et routage) pour des réseaux de capteurs sans fil à faible consommation d'énergie. La première partie présente les principaux protocoles MAC visant l'optimisation de la consommation d'énergie. Il n'a pas vocation de...
Conference Paper
Wireless Networked Control Systems (WNCSs) require a special attention on communication protocols used to exchange time-constrained messages. The native IEEE 802.15.4 standard does not implement mechanisms capable to control the service offered by network. This paper proposes a solution enabling to prioritize the messages based on the blackburst me...
Conference Paper
This article addresses the problem of performance degradation of wireless sensor networks for scenarios involving data gathering to a small number of node sinks; as the data travel toward a sink, its neighbor nodes experience high loads and congestion. Using CSMA/CA as the basic access protocol, we implemented CoSenS, a collecting and sending burst...
Conference Paper
Full-text available
IEEE 802.15.4 is considered as the de facto standard for wireless sensor networks (WSN). However, the increased probability of collision at heavy load caused by the inherent behavior of CSMA/CA degrades the performance of WSN in terms of throughput and energy consumption. This led some to propose other MAC layer solutions to tackle these problems....
Article
Full-text available
One of the major concerns in wireless sensor net-works (WSNs) is improving the network lifetime. This paper addresses the problem of energy saving in an IEEE 802.15.4a large-scale full mesh WSNs based on UWB technology. It presents a three-tiered network architecture to facilitate resource sharing and to ensure load and energy balancing. With a par...
Conference Paper
Providing service differentiation in wireless sensor networks while proposing simple and highly scalable solution is a challenging problem. We retain the use of CSMA/CA as access protocol because of its simplicity, versatility and good scalability properties. We developed CoSenS on the top of it to address its weaknesses while facilitating the impl...
Conference Paper
Full-text available
The deployment strategy for achieving differentiated coverage and probabilistic connectivity in wireless sensor networks is studied in this paper. A novel solution based on elitist non-dominated sorting genetic algorithm (NSGA-II) is proposed. Simulation results show that NSGA-II based strategy can meet the desired coverage requirements and maintai...
Book
Networked control systems and control design challenges Control design: from continuous time to networked implementation Timing parameter assignment Control and task(message scheduling Diagnosis and fault tolerance in NCS Co-design approaches Outline of the book Bibliography
Article
During system and network overload periods, excessive delay or even data loss may occur. To maintain the quality of control of an NCS, the implementation system (including both computer and network) overload must be correctly handled. In this chapter, as an alternative to the explicit sampling period adjustment, we present an indirect sampling peri...
Article
Networked Control Systems (NCS) is a growing field of application and calls for the development of integrated approaches requiring multidisciplinary skills in control, real-time computing and communication protocols. This book describes co-design approaches, and establishes the links between the QoC (Quality of Control) and QoS (Quality of Service)...
Article
In this paper, the use of wireless sensor networks for networked control loop is analyzed. As the non beacon-enabled mode of IEEE 802.15.4/ZigBee does not ensure the stability for the control loop since non mechanism can prevent the perturbation coming from other applications sharing the same network, the quality of control has to be guaranteed for...
Article
The IEEE 802.15.4 has been studied for its possible use to support networked control systems. A careful management of the network resources allows the enhancement of the quality of control (QoC) of the controlled system. This can be achieved by a co-design approach to manage the interaction between the WNCS and the wireless network in order to onli...
Article
Full-text available
This report provides a reference guide to the CoSenS protocol stack. CoSenS provides a simple but efficient improvement of the MAC layer of IEEE 802.15.4 in terms of reliability, delay and throughput. The network layer uses static routing or hierarchical tree routing of ZigBee standard.
Conference Paper
Full-text available
This paper addresses a new prioritized multichannel multi-time slot MAC protocol (PMCMTP) for large-scale WSNs especially for Ultra-Wide Band (UWB) based networks. To reduce the complexity of resource sharing, the global network is composed of a set of Personal Area Networks (PANs) or cells. According to available resource and PANs duty cycle, PMCM...
Conference Paper
Full-text available
Resource allocation is a critical issue for Wireless Sensor Networks (WSNs) especially for Ultra-Wide Band (UWB) based networks. In this paper, we present frequency allocation scheme for an efficient spectrum management that is able to statically assign control channels and dynamically reuse data channels for Personal Area Networks (PANs) inside a...
Conference Paper
Full-text available
This article presents SCSP (for "sleep collect and send protocol") for wireless sensor networks, a network-MAC cross layer design that resolves the inherent conflict between energy efficiency and throughput. The protocol uses in its MAC layer a new paradigm that we call "sleep, collect and send". The idea of SCSP is that a router sleeps for a given...