Nicolas Montavont’s research while affiliated with IMT Atlantique and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (144)


Local Peak Shaving for Electric Vehicles: A ready-to-deploy Smart Charging Solution
  • Conference Paper

November 2024

·

3 Reads

Matthieu Silard

·

Anne-Cécile Orgerie

·

Nicolas Montavont

·


Authentication and Authorization Frameworks for IoT

November 2023

·

8 Reads

·

Salvador Pérez

·

·

[...]

·

Security in the communications in the Internet of Things (IoT) is an essential task due to the characteristics of IoT deployments that go beyond the traditional Internet, having to consider it from the beginning, not as an afterthought. In this chapter, we introduce the basic concepts related to securing the communications such as authentication, authorization and key management and their relation to the term bootstrapping. We see how through bootstrapping we can set the basis for securing the communications in IoT. We review works such as ZigBee IP and the Open Mobile Alliance (OMA) focusing on how they deal with security, and then we introduce the current work done by the Internet Engineering Task Force (IETF) standardization organization. Finally, we provide a framework to secure the communications for IoT through bootstrapping and key management, and to provide authorization to an IoT deployment.


Figure 1. Levels of interoperability by Tolk and Muguira in [8].
Figure 2. The proposed IoT architecture.
Figure 3. Tree representation in levels of Listing 16.
Figure 4. Representation of horizontal delta and vertical delta of Listing 18.
Figure 8. Fragmentation for the article example depicted in Listing 13 per SF.

+8

Yet Another Compact Time Series Data Representation using CBOR Templates (YACTS)
  • Article
  • Full-text available

May 2023

·

119 Reads

The Internet of Things (IoT) technology is growing rapidly, while the IoT devices are being deployed massively. However, interoperability with information systems remains a major challenge for this accelerated device deployment. Furthermore, most of the time, IoT information is presented as Time Series (TS), and while the majority of the studies in the literature focus on the prediction, compression, or processing of TS, no standardized representation format has emerged. Moreover, apart from interoperability, IoT networks contain multiple constrained devices which are designed with limitations, e.g., processing power, memory, or battery life. Therefore, in order to reduce the interoperability challenges and increase the lifetime of IoT devices, this article introduces a new format for TS based on CBOR. The format exploits the compactness of CBOR by leveraging delta values to represent measurements, employing tags to represent variables, and utilizing templates to convert the TS data representation into the appropriate format for the cloud-based application. Moreover, we introduce a new refined and structured metadata to represent additional information for the measurements, then we provide a Concise Data Definition Language (CDDL) code to validate the CBOR structures against our proposal, and finally, we present a detailed performance evaluation to validate the adaptability and the extensibility of our approach. Our performance evaluation results show that the actual data sent by IoT devices can be reduced by between 88% and 94% compared to JavaScript Object Notation (JSON), between 82% and 91% compared to Concise Binary Object Representation (CBOR) and ASN.1, and between 60% and 88% compared to Protocol buffers. At the same time, it can reduce Time-on-Air by between 84% and 94% when a Low PowerWide Area Networks (LPWAN) technology such as LoRaWAN is employed, leading to a 12-fold increase in battery life compared to CBOR format or between a 9-fold and 16-fold increase when compared to Protocol buffers and ASN.1, respectively. In addition, the proposed metadata represent an additional 0.5% of the overall data transmitted in cases where networks such as LPWAN or Wi-Fi are employed. Finally, the proposed template and data format provide a compact representation of TS that can significantly reduce the amount of data transmitted containing the same information, extend the battery life of IoT devices, and improve their lifetime. Moreover, the results show that the proposed approach is effective for different data types and it can be integrated seamlessly into existing IoT systems.

Download



The Contributions of Biometrics and Artificial Intelligence in Securing the IoT

June 2022

·

44 Reads

·

1 Citation

This chapter focuses on the contributions of biometrics and artificial intelligence in optimizing the security of some Internet of Things (IoT) applications. It introduces the principles of authentication based on biometrics. The chapter presents multifactor authentication techniques based on biometrics, especially for the IoT. It then details authentication techniques based on biometrics and machine learning such as, neural networks, support‐vector machines, k‐nearest neighbors, and decision tree. Security in the IoT happens mainly by protecting connected objects by ensuring mechanisms such as authentication, access control and detection of malware. Biometric authentication is a technique that calls on the statistical analysis of biological characteristics. In the main, there are two types of biometric techniques that are used for identification applications, physiological techniques and behavioral techniques. Today, security protocols based on biometrics are much used to ensure authentication or verification of identity in environments that demand a fairly high level of security such as e‐health.


IoT Network Management within the Electric Vehicle Battery Management System

January 2022

·

3,075 Reads

·

16 Citations

Journal of Signal Processing Systems

The Battery Management System of an Electric Vehicle is a system designed to ensure safe operation of the battery pack, and report its state to other systems. It is a distributed system, and the communication between its sub-modules is performed through wired buses. In this article, we study the opportunity to use a wireless technology named IEEE Std 802.15.4 Time Slotted Channel Hopping, a standardized protocol for low power and lossy networks. We first describe the real-world experiments we did to measure the link quality, at Medium Access Control layer, for wireless nodes placed inside an EV battery pack. Then, we propose two topology management and scheduling strategies using techniques named Linear Programming and Simple Descent, based on the results obtained in the experiments. Their goal is to achieve efficient data transfer while complying to the battery management constraints.


Apports de la biométrie et de l’intelligence artificielle dans la sécurisation de l’IoT

January 2022

·

29 Reads

L’Internet des objets (en anglais Internet of Things, IoT), aujourd’hui omniprésent, a grandement contribué à l’accroissement du trafic des données sur Internet. Les technologies d’accès IoT et les contraintes des objets peuvent causer des problèmes de performances et de sécurité. Cela démontre l’importance des défis liés à cet environnement comme le contrôle des communications radio et de l’accès au réseau, la gestion de la qualité de service et de la consommation énergétique ou l’implémentation de mécanismes de sécurité dédiés à l’IoT.En réponse à ces problématiques, cet ouvrage présente de nouvelles solutions pour la gestion et le contrôle des performances et de la sécurité dans l’IoT. L’originalité de ces propositions réside principalement dans l’utilisation de techniques intelligentes. Cette notion d’intelligence permet, entre autres, de supporter l’hétérogénéité des objets, leurs capacités limitées et la grande dynamique caractérisant l’IoT.


Vers une gestion intelligente de la qualité de service dans l’IoT : cas d’un réseau Low Rate WPAN

January 2022

·

16 Reads

L’Internet des objets (en anglais Internet of Things, IoT), aujourd’hui omniprésent, a grandement contribué à l’accroissement du trafic des données sur Internet. Les technologies d’accès IoT et les contraintes des objets peuvent causer des problèmes de performances et de sécurité. Cela démontre l’importance des défis liés à cet environnement comme le contrôle des communications radio et de l’accès au réseau, la gestion de la qualité de service et de la consommation énergétique ou l’implémentation de mécanismes de sécurité dédiés à l’IoT.En réponse à ces problématiques, cet ouvrage présente de nouvelles solutions pour la gestion et le contrôle des performances et de la sécurité dans l’IoT. L’originalité de ces propositions réside principalement dans l’utilisation de techniques intelligentes. Cette notion d’intelligence permet, entre autres, de supporter l’hétérogénéité des objets, leurs capacités limitées et la grande dynamique caractérisant l’IoT.



Citations (71)


... In [17], we introduced a new and versatile format for standardizing the representation of time series data, based on CBOR. This format is highly efficient and aims to separate the format of sensor data from the application. ...

Reference:

Yet Another Compact Time Series Data Representation using CBOR Templates (YACTS)
Toward a Standard Time Series Representation for IoT based on CBOR Templates

... Rincon et al. [34,35] proposed a network architecture featuring high reliability and low power consumption, utilizing an enhanced version of the IEEE Std 802.15.4 [36] Time Slotted Channel Hopping (TSCH) Medium Access Control (MAC) mode over the BLE physical layer. They implemented the proposed wBMS network to a Renault Zoe battery, consisting of 12 modules with eight cells each. ...

From Wired to Wireless BMS in Electric Vehicles
  • Citing Conference Paper
  • December 2021

... Authors in [7] propose a deep learning solution for 802.11az positioning in sub-6 GHz channels. While works as [8] show that malicious sub-6 GHz STAs may inject wrong position reports, or attack the signal used to obtain the Time of Flight (ToF) [9]. However, the domain of 802.11az operating at mmWave still remains unexplored in the literature. ...

Ranging and Location attacks on 802.11 FTM
  • Citing Conference Paper
  • September 2021

... Non-standard PHY and MAC operations might escape such congestion strategies, in conjunction with typical approaches like space, frequency, and time. Moreover, the implementation of FHSS-based MAC options to standards like IEEE 802.15.4 has given rise to numerous protocols [104] that implement channel hopping across a spectrum band to avoid external interference but is still it is not sufficient to protect against purposeful congestion threats and attacks. Multi-radio techniques, on the other hand, might enable swarm communications over different bands, so mitigating this hazard. ...

Enabling Robust Wireless Communication for BMS on Electric Vehicles
  • Citing Conference Paper
  • October 2021

... To address these limitations, there is a growing interest in integrating advanced technologies such as artificial intelligence (AI), the Internet of Things (IoT) [8], [9], Blockchain, and big data analytics [10] into BMS. These technologies aim to enhance the capabilities of BMS by enabling comprehensive data acquisition, realtime analytics, predictive maintenance, and enhanced decision-making processes [11], [12]. ...

IoT Network Management within the Electric Vehicle Battery Management System

Journal of Signal Processing Systems

... Therefore, we use a centralized scheduling method and distribute it to the nodes. We should note that this schedule has been created manually, but it is possible to generate one automatically using a controller, as can be seen in [8]. ...

A Centralized Controller for Reliable and Available Wireless Schedules in Industrial Networks
  • Citing Conference Paper
  • December 2020

... Among the challenges, FTM assumes that the AP geo-location is configured. However, getting this location information is very difficult indoor, and our next contribution (chapter 5) [7] [8] [9] is to design a machine-learning method to have APs automatically learn their geo-location through FTM exchanges with one another, and with external stations running a GPS client. This technique solves a fundamental obstacle to an infrastructure adoption of the FTM technique, allowing network owners to simply deploy APs, then let them learn their location by themselves. ...

A Geometric Approach to Noisy EDM Resolution in FTM Measurements

... The integration of 6LoWPAN [1,[8][9][10]39] and MQTT-SN [21] in low-power wireless networks improves the reliability and efficiency of IoT communication [5,28,29,40], especially in resource-constrained scenarios. This protocol ensures effective event-driven communication [26,27], which is crucial for IoT devices in industrial environments. ...

Defragmenting the 6LoWPAN Fragmentation Landscape: A Performance Evaluation

... In [15], the authors explore the construction of several routes between nodes using multipath RPL to send data to the sink node. Figure 1 illustrates a multipath DODAG, where each node has at most two paths, one designated as primary and the other as alternate. ...

ODeSe: On-Demand Selection for multi-path RPL networks

Ad Hoc Networks

... Our extension uses existing RPL control messages to insure disjointness rather than leveraging the multiinstance opportunity provided by RPL as done by authors of [7]. As for [11], complete disjointness can be achieved using a detection mechanism at a common node during data transfer. This is allowed by the fact that these routes are used in a replication scenario. ...

Thorough Investigation of multipath Techniques in RPL based Wireless Networks
  • Citing Conference Paper
  • July 2020