Institut Telecom

Displaying 1-40 of 54 results

  • White Papers // Jul 2013

    Minimum Cost Maximum Flow Algorithm for Dynamic Resource Allocation in Cloud Computing

    A minimum cost maximum flow algorithm is proposed for resources (e.g. virtual machines) placement in clouds confronted to dynamic workloads and flows variations. The algorithm is compared to an exact method generalizing the classical bin-packing formulation using a linear integer program. A directed graph is used to model the allocation...

    Provided By Institut Telecom

  • White Papers // Mar 2013

    Homology Based Algorithm for Disaster Recovery in Wireless Networks

    In this paper, the authors provide a homology based algorithm for disaster recovery of wireless networks. They consider a damaged wireless network presenting coverage holes that they need to restore by patching the holes. They propose an algorithm which adds supernumerary vertices to cover the entire area, then run an...

    Provided By Institut Telecom

  • White Papers // Jan 2013

    System Architecture for Collaborative Security and Privacy Monitoring in Multi-Domain Networks

    The system architecture presented in this paper is developed in DEMONS project of the European FP7 framework project to realize the trustworthy multi-domain network with collaborative and decentralized security and privacy monitoring system. The system architecture so developed comprises of five sub-systems: programmable monitoring nodes called BlockMon nodes providing the...

    Provided By Institut Telecom

  • White Papers // Oct 2012

    Semantic Analysis of Role Mining Results and Shadowed Roles Detection

    The use of role engineering has grown in importance with the expansion of highly abstracted access control frameworks in organizations. In particular, the use of role mining techniques for the discovery of roles from previously deployed authorizations has facilitated the configuration of such frameworks. However, the literature lacks from a...

    Provided By Institut Telecom

  • White Papers // Oct 2012

    Handling Stateful Firewall Anomalies

    A security policy consists of a set of rules designed to protect an information system. To ensure this protection, the rules must be deployed on security components in a consistent and non-redundant manner. Unfortunately, an empirical approach is often adopted by network administrators, to the detriment of theoretical validation. While...

    Provided By Institut Telecom

  • White Papers // Aug 2012

    On the Use of ID-Based Cryptography for the Definition of New EAP Authentication Methods

    The authors propose in this paper, two ID-Based authentication methods for the Extensible Authentication Protocol (EAP), as an alternative to methods relying on Public Key Infrastructure (PKI), to provide nodes with private and public keys. ID-Based Cryptography (IBC) proposes to derive the public key from the node's identity directly. As...

    Provided By Institut Telecom

  • White Papers // Aug 2012

    Handling the M in MANet: An Algorithm to Identify Stable Groups of Peers Using Crosslayering Information

    This paper proposes an algorithm to identify groups of users connected to a mobile ad hoc network that remain stable over time. Several similar algorithms have been proposed to manage mobility either by predicting disconnections or by identifying groups of peers stable over time. They all rely on information such...

    Provided By Institut Telecom

  • White Papers // Jun 2012

    A Contextual Privacy-Aware Access Control Model for Network Monitoring Work Ows: Work in Progress

    Network monitoring activities are surrounded by serious privacy implications. The inherent leakage-proneness is harshened due to the increasing complexity of the monitoring procedures and infrastructures, that may include multiple traffic observation points, distributed mitigation mechanisms and even inter-operator cooperation. In this paper, the authors report a work in progress policy...

    Provided By Institut Telecom

  • White Papers // Jun 2012

    Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress

    The EPC Class-1 Generation-2 (Gen2 for short) is a standard Radio Frequency IDentification (RFID) technology that has gained a prominent place on the retail industry. The Gen2 standard lacks, however, of verifiable security functionalities. Eavesdropping attacks can, for instance, affect the security of monitoring applications based on the Gen2 technology....

    Provided By Institut Telecom

  • White Papers // May 2012

    Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications

    The use of role engineering has grown in importance with the expansion of highly abstracted access control frameworks in organizations. In particular, the use of role mining techniques for the discovery of roles from previously deployed authorizations has facilitated the configuration of such frameworks. However, the literature lacks from a...

    Provided By Institut Telecom

  • White Papers // May 2012

    An Experimental Approach to a Low-Complexity Two-Step TOA Measurement for TR-UWB Signals

    A proposal for a two-step Time Of Arrival (TOA) estimation based on the Time Delayed Sampling and Correlation (TDSC) method for Transmitted Reference Ultra-WideBand (TRUWB) signals is presented and experimentally tested in a wireless environment. It relies on the sliding correlation over a symbol length, at the coarse step, to...

    Provided By Institut Telecom

  • White Papers // May 2012

    Erlang-Based Dimensioning for IPv4 Address+Port Translation

    As the IPv4 address pool is being exhausted, it becomes urgent to find a way to migrate IPv4 network architectures to IPv6, or to reduce the use of IPv4 addresses. In this paper, the authors discuss a strategy known as "Address + Port" translation, which consists in several users sharing...

    Provided By Institut Telecom

  • White Papers // May 2012

    Impairment-Aware Radio-Over-Fiber Control Plane for LTE Antenna Backhauling

    Provisioning ubiquitous broadband wireless services necessitates the duplication of the radio equipment or/and the reduction of the size of the radio cells. However, both approaches are not economically viable for the operators. The concept of distributed antennas is proposed as an alternative solution offering low-cost broadband access. In this matter,...

    Provided By Institut Telecom

  • White Papers // May 2012

    Minimum Cost Maximum Flow Algorithm for Dynamic Resource Allocation in Clouds

    A minimum cost maximum flow algorithm is proposed for resources (e.g. virtual machines) placement in clouds confronted to dynamic workloads and flows variations. The algorithm is compared to an exact method generalizing the classical bin-packing formulation using a linear integer program. A directed graph is used to model the allocation...

    Provided By Institut Telecom

  • White Papers // Apr 2012

    Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused

    Java Card 3.0 specifications have brought many new features in the Java Card world, amongst which a true garbage collection mechanism. In this paper, the authors show how one could use this specific feature to predict the references that will be assigned to object instances to be created. They also...

    Provided By Institut Telecom

  • White Papers // Feb 2012

    Performance Evaluation of Biometric Template Update

    Template update allows to modify the biometric reference of a user while he uses the biometric system. With such kind of mechanism the authors expect the biometric system uses always an up-to-date representation of the user, by capturing his intra-class (temporary or permanent) variability. Although several studies exist in the...

    Provided By Institut Telecom

  • White Papers // Feb 2012

    RSM: A Small and Fast Countermeasure for AES, Secure Against 1st and 2nd-Order Zero-Offset SCAs

    Amongst the many existing countermeasures against Side Channel Attacks (SCA) on symmetrical cryptographic algorithms, masking is one of the most widespread, thanks to its relatively low overhead, its low performance loss and its robustness against first-order attacks. However, several articles have recently pinpointed the limitations of this countermeasure when matched...

    Provided By Institut Telecom

  • White Papers // Feb 2012

    An AHP-Based Resource Management Scheme for CRRM in Heterogeneous Wireless Networks

    In a heterogeneous wireless environment, a variety of Radio Access Technologies (RATs) coexist. Since, the number of RATs is anticipated to increase in the near future, it is desirable to have radio and network resources managed in a cooperative manner using the Common Radio Resource Management (CRRM) strategy. In order...

    Provided By Institut Telecom

  • White Papers // Jan 2012

    Promoting Mashup Creation Through Unstructured Data Extraction

    Service composition tools are usually based on an input/output mapping pattern. Inputs and output are declared by the service developer when publishing his service. However, services might also generate unstructured data such as email and instant messages content. That data are hardly expectable by developers. Consequently, much data are unavoidably...

    Provided By Institut Telecom

  • White Papers // Jan 2012

    Distributed Algorithms for Green IP Networks

    The authors propose a novel distributed approach to exploit sleep mode capabilities of links in an Internet Service Provider network. Differently from other works, neither a central controller, nor the knowledge of the current traffic matrix is assumed, favoring a major step towards making sleep mode enabled networks practical in...

    Provided By Institut Telecom

  • White Papers // Dec 2011

    A Multi-Class MAC for Time-Slotted WDM Optical Packet Ring

    In this paper, the authors present an approach for supporting best effort traffic on an ECOFRAME ring network which has been dimensioned primarily for Guaranteed Traffic. This approach is reservation based, and is combined within the ECOFRAME MAC with the opportunistic access method used for Guaranteed traffic. The reservation method...

    Provided By Institut Telecom

  • White Papers // Dec 2011

    Multiple-Polynomial LFSR based Pseudorandom Number Generator for EPC Gen2 RFID Tags

    The authors present a lightweight Pseudo-Random Number Generator (PRNG) design for EPC Gen2 RFID tags. It is based on a Linear Feedback Shift Register (LFSR) configured with multiple feedback polynomials that are selected by a physical source of randomness. The proposal successfully handles the inherent linearity of LFSR based PRNGs...

    Provided By Institut Telecom

  • White Papers // Nov 2011

    Multi Group Key Agreement Mechanism for Mobile P2P Wireless Networks

    Secure and efficient communication among a set of mobile nodes is one of the most important aspect in P2P wireless networks. Security of various group-oriented applications requires a group secret shared between all participants. Several group key protocols have been presented in the literature to enable secrecy of communication among...

    Provided By Institut Telecom

  • White Papers // Nov 2011

    Robust Estimation of Noise Standard Deviation in Presence of Signals With Unknown Distributions and Occurrences

    In many applications, d-dimensional observations result from the random presence or absence of random signals in independent and additive white Gaussian noise. An estimate of the noise standard deviation can then be very useful to detect or to estimate these signals, especially when standard likelihood theory cannot be applied because...

    Provided By Institut Telecom

  • White Papers // Sep 2011

    A Solution for Partial Video Voice Over IP Session Transfer and Retrieval

    Ubiquitous digital devices with rich media processing and networking capabilities open an avenue for enriching user experiences, especially in video voice over IP communication sessions because a communication session can be transferred partially to multiple devices that are in the vicinity of caller and (or) callee. Then, the transferred partial...

    Provided By Institut Telecom

  • White Papers // Jul 2011

    Distributed Convex Stochastic Optimization Under Few Constraints in Large Networks

    This paper introduces a distributed convex optimization algorithm in a constrained multi-agent system composed by a large number of nodes. The authors focus on the case where each agent seeks to optimize its own local parameter under few coupling equality and inequality constraints. The objective function is of the power...

    Provided By Institut Telecom

  • White Papers // Mar 2011

    Tailored Shielding and Bypass Testing of Web Applications

    User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is inefficient because hackers bypass these checks and directly send malicious data to the server. User input validation thus has to be duplicated from the...

    Provided By Institut Telecom

  • White Papers // Mar 2011

    Apple-to-Apple: A Common Framework for Energy-Efficiency in Networks

    Research on energy-efficiency in and through communication networks has already gained the attention of a broad research community. Specifically, the authors consider efforts towards improving environmental sustainability by making networks energy-aware. One of the first, and perhaps most important step towards this direction is establishing a comprehensive methodology for measuring...

    Provided By Institut Telecom

  • White Papers // Feb 2011

    A Self-Organization Mechanism for a Cold Chain Monitoring System

    In this paper, the authors propose an autonomous self-organization mechanism for the monitoring of the cold chain. All along the transportation through this logistic chain, the sensors are moved with the goods in very different networks. They argue that depending on the situation some protocols are more suited than others...

    Provided By Institut Telecom

  • White Papers // Jan 2011

    The Green-Game: Striking a Balance Between QoS and Energy Saving

    The energy consumed by communication networks can be reduced in several ways. A promising technique consists in concentrating the workload of an infrastructure on a reduced set of devices, while switching off the others. This technique, called "Resource consolidation", is particularly appealing when routing data traffic over a lightly loaded...

    Provided By Institut Telecom

  • White Papers // Nov 2010

    MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies

    The authors present the core functionality of MIRAGE, a management tool for the analysis and deployment of configuration policies over network security components, such as firewalls, intrusion detection systems, and VPN routers. They review the two main functionalities embedded in their current prototype: a bottom-up analysis of already deployed network...

    Provided By Institut Telecom

  • White Papers // Oct 2010

    Secure Geo-Localization of Wireless Sensor Nodes in the Presence of Misbehaving Anchor Nodes

    Geo-localization of nodes in a Wireless Sensor Network (WSN) is a process that allows location-unaware nodes to discover their spatial coordinates. This process requires the cooperation of all the nodes in the system. Ensuring the correctness of the process, especially in the presence of misbehaving nodes, is crucial for ensuring...

    Provided By Institut Telecom

  • White Papers // Sep 2010

    A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags

    The Electronic Product Code Generation 2 (EPC Gen2) is an international standard that proposes the use of Radio Frequency IDentification (RFID) in the supply chain. It is designed to balance cost and functionality. As a consequence, security on board of EPC Gen2 tags is often minimal. It is, indeed, mainly...

    Provided By Institut Telecom

  • White Papers // Aug 2010

    Reducing Collision Probability on a Shared Medium Using a Variational Method

    The authors consider a network with N nodes competing for access to the channel using un-slotted ALOHA. When a request is sent, each node may answer after a certain backoff time. Only the first answer is of importance, that is why they want to minimize the loss rate of the...

    Provided By Institut Telecom

  • White Papers // Jun 2010

    LQI-DCP: A LQI Based Multihop Clustering Protocol for Wireless Sensor Networks

    The Link Quality Indicator (LQI) is defined in the 802.15.4 standard, but its context of use is not specified in this standard. Some works on the LQI, few of which are field experiments, have shown that the LQI decreases as the distance increases. In WSN, it is not often desirable...

    Provided By Institut Telecom

  • White Papers // May 2010

    Apple-to-Apple: A Framework Analysis for Energy-Efficiency in Networks

    Research on energy-efficiency in and through communication networks has already gained the attention of a broad research community. Specifically, the authors consider efforts towards improving environmental sustainability by making networks energy-aware. One of the first, and perhaps most important step in this direction is establishing a comprehensive methodology for measuring...

    Provided By Institut Telecom

  • White Papers // May 2010

    Using LQI to Improve ClusterHead Locations in Dense ZigBee Based Wireless Sensor Networks

    In WSN, it is not often desirable to use the GPS technology. Indeed, the use of GPS is expensive and may reduce the overall network performance. Moreover, indoor reception of the GPS signal is not possible. The Link Quality Indicator (LQI) is defined in the 802.15.4 standard, but its context...

    Provided By Institut Telecom

  • White Papers // May 2010

    An ID-Based Authentication Scheme for the IEEE 802.11s Mesh Network

    Nowadays authentication in Wireless Mesh Networks (WMN) refers to the 802.1X authentication methods or a Pre-shared key authentication, and makes use of certificates or shared secrets. In wireless environments, management of certificates is disadvantageous. Certificates require deploying a Public Key Infrastructure (PKI) and Certification Authorities (CA) and they require defining...

    Provided By Institut Telecom

  • White Papers // Apr 2010

    RFID EPC-Gen2 for Postal Applications: A Security and Privacy Survey

    Security and privacy on low-cost RFID deployments is focusing the attention of researchers due to the progressive adoption by retailers, making the RFID a real ubiquitous technology. Besides the retail sector, other logistics industries are starting to improve their processes with this technology like the postal companies, supposed to be...

    Provided By Institut Telecom

  • White Papers // Mar 2010

    Energy-Awareness in Network Dimensioning: A Fixed Charge Network Flow Formulation

    Reduction of unnecessary energy consumption is becoming a major concern in wired networking, in reason of both the potential economical benefits and its forecast environmental impact. These issues, usually referred to as "Green networking", relate to embody energy-awareness in the network elements and processes. Once a network has been designed...

    Provided By Institut Telecom

  • White Papers // Sep 2011

    A Solution for Partial Video Voice Over IP Session Transfer and Retrieval

    Ubiquitous digital devices with rich media processing and networking capabilities open an avenue for enriching user experiences, especially in video voice over IP communication sessions because a communication session can be transferred partially to multiple devices that are in the vicinity of caller and (or) callee. Then, the transferred partial...

    Provided By Institut Telecom

  • White Papers // Feb 2012

    RSM: A Small and Fast Countermeasure for AES, Secure Against 1st and 2nd-Order Zero-Offset SCAs

    Amongst the many existing countermeasures against Side Channel Attacks (SCA) on symmetrical cryptographic algorithms, masking is one of the most widespread, thanks to its relatively low overhead, its low performance loss and its robustness against first-order attacks. However, several articles have recently pinpointed the limitations of this countermeasure when matched...

    Provided By Institut Telecom

  • White Papers // Aug 2012

    On the Use of ID-Based Cryptography for the Definition of New EAP Authentication Methods

    The authors propose in this paper, two ID-Based authentication methods for the Extensible Authentication Protocol (EAP), as an alternative to methods relying on Public Key Infrastructure (PKI), to provide nodes with private and public keys. ID-Based Cryptography (IBC) proposes to derive the public key from the node's identity directly. As...

    Provided By Institut Telecom

  • White Papers // Apr 2012

    Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused

    Java Card 3.0 specifications have brought many new features in the Java Card world, amongst which a true garbage collection mechanism. In this paper, the authors show how one could use this specific feature to predict the references that will be assigned to object instances to be created. They also...

    Provided By Institut Telecom

  • White Papers // Jun 2012

    A Contextual Privacy-Aware Access Control Model for Network Monitoring Work Ows: Work in Progress

    Network monitoring activities are surrounded by serious privacy implications. The inherent leakage-proneness is harshened due to the increasing complexity of the monitoring procedures and infrastructures, that may include multiple traffic observation points, distributed mitigation mechanisms and even inter-operator cooperation. In this paper, the authors report a work in progress policy...

    Provided By Institut Telecom

  • White Papers // Jun 2012

    Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress

    The EPC Class-1 Generation-2 (Gen2 for short) is a standard Radio Frequency IDentification (RFID) technology that has gained a prominent place on the retail industry. The Gen2 standard lacks, however, of verifiable security functionalities. Eavesdropping attacks can, for instance, affect the security of monitoring applications based on the Gen2 technology....

    Provided By Institut Telecom

  • White Papers // Oct 2012

    Handling Stateful Firewall Anomalies

    A security policy consists of a set of rules designed to protect an information system. To ensure this protection, the rules must be deployed on security components in a consistent and non-redundant manner. Unfortunately, an empirical approach is often adopted by network administrators, to the detriment of theoretical validation. While...

    Provided By Institut Telecom

  • White Papers // May 2012

    An Experimental Approach to a Low-Complexity Two-Step TOA Measurement for TR-UWB Signals

    A proposal for a two-step Time Of Arrival (TOA) estimation based on the Time Delayed Sampling and Correlation (TDSC) method for Transmitted Reference Ultra-WideBand (TRUWB) signals is presented and experimentally tested in a wireless environment. It relies on the sliding correlation over a symbol length, at the coarse step, to...

    Provided By Institut Telecom

  • White Papers // May 2012

    Erlang-Based Dimensioning for IPv4 Address+Port Translation

    As the IPv4 address pool is being exhausted, it becomes urgent to find a way to migrate IPv4 network architectures to IPv6, or to reduce the use of IPv4 addresses. In this paper, the authors discuss a strategy known as "Address + Port" translation, which consists in several users sharing...

    Provided By Institut Telecom

  • White Papers // May 2012

    Impairment-Aware Radio-Over-Fiber Control Plane for LTE Antenna Backhauling

    Provisioning ubiquitous broadband wireless services necessitates the duplication of the radio equipment or/and the reduction of the size of the radio cells. However, both approaches are not economically viable for the operators. The concept of distributed antennas is proposed as an alternative solution offering low-cost broadband access. In this matter,...

    Provided By Institut Telecom

  • White Papers // Dec 2011

    A Multi-Class MAC for Time-Slotted WDM Optical Packet Ring

    In this paper, the authors present an approach for supporting best effort traffic on an ECOFRAME ring network which has been dimensioned primarily for Guaranteed Traffic. This approach is reservation based, and is combined within the ECOFRAME MAC with the opportunistic access method used for Guaranteed traffic. The reservation method...

    Provided By Institut Telecom

  • White Papers // Mar 2013

    Homology Based Algorithm for Disaster Recovery in Wireless Networks

    In this paper, the authors provide a homology based algorithm for disaster recovery of wireless networks. They consider a damaged wireless network presenting coverage holes that they need to restore by patching the holes. They propose an algorithm which adds supernumerary vertices to cover the entire area, then run an...

    Provided By Institut Telecom

  • White Papers // Jul 2011

    Distributed Convex Stochastic Optimization Under Few Constraints in Large Networks

    This paper introduces a distributed convex optimization algorithm in a constrained multi-agent system composed by a large number of nodes. The authors focus on the case where each agent seeks to optimize its own local parameter under few coupling equality and inequality constraints. The objective function is of the power...

    Provided By Institut Telecom

  • White Papers // Oct 2009

    Distributed Turbo-Like Codes for Multi-User Cooperative Relay Networks

    In this paper, a distributed turbo-like coding scheme for wireless networks with relays is proposed. The authors consider a scenario where multiple sources communicate with a single destination with the help of a relay. The proposed scheme can be regarded as of the decode-and-forward type. The relay decodes the information...

    Provided By Institut Telecom

  • White Papers // Nov 2009

    Peer-to-Peer Time-Shifted Streaming Systems

    In live streaming systems (IPTV, life-stream services, etc.), an attractive service consists in allowing users to access past portions of the stream. This is called a time-shifted streaming system. In the vision, centralized time-shifted streaming system face scalability and ethical issues, therefore, the authors address the problem of designing a...

    Provided By Institut Telecom

  • White Papers // Jan 2010

    Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking

    Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security mechanism to guarantee their confidentiality, integrity and traceability in an autonomous way. In this paper, watermarking has been recently proposed as a complementary...

    Provided By Institut Telecom

  • White Papers // Jul 2009

    MUQAMI+: A Scalable and Locally Distributed Key Management Scheme for Clustered Sensor Networks

    Wireless Sensor Networks (WSN) is susceptible to node capture and many network levels attacks. In order to provide protection against such threats, WSNs require lightweight and scalable key management schemes because the nodes are resource-constrained and high in number. Also, the effect of node compromise should be minimized and node...

    Provided By Institut Telecom

  • White Papers // Nov 2008

    ReDEx: Receiver Diversity Exploitation Mechanism for 802.11 Wireless Networks

    The authors' objective is to increase the individual throughput of each node in the network by exploiting neighbors with more favorable channel conditions in terms of bit rate and packet loss ratio. They propose a per-neighbor message queue in order to reduce the effect of the Head Of Line (HOL)...

    Provided By Institut Telecom

  • White Papers // May 2010

    An ID-Based Authentication Scheme for the IEEE 802.11s Mesh Network

    Nowadays authentication in Wireless Mesh Networks (WMN) refers to the 802.1X authentication methods or a Pre-shared key authentication, and makes use of certificates or shared secrets. In wireless environments, management of certificates is disadvantageous. Certificates require deploying a Public Key Infrastructure (PKI) and Certification Authorities (CA) and they require defining...

    Provided By Institut Telecom

  • White Papers // Nov 2011

    Robust Estimation of Noise Standard Deviation in Presence of Signals With Unknown Distributions and Occurrences

    In many applications, d-dimensional observations result from the random presence or absence of random signals in independent and additive white Gaussian noise. An estimate of the noise standard deviation can then be very useful to detect or to estimate these signals, especially when standard likelihood theory cannot be applied because...

    Provided By Institut Telecom

  • White Papers // Mar 2010

    A Maximum Entropy Framework for Statistical Modeling of Underwater Acoustic Communication Channels

    Based on a method of inductive inference known as the principle of maximum entropy, a time-varying underwater acoustic channel model is derived. The resulting model is proved to be consistent so that it only relies on the available knowledge of the environment to model. While requiring only a few parameters...

    Provided By Institut Telecom

  • White Papers // Jan 2009

    Blind Noise Variance Estimation for OFDMA Signals

    The authors present two new noise variance estimation methods for OFDMA signals transmitted through an unknown multipath fading channel. They focus on blind estimation as it does not require any pilot sequences and is therefore applicable to contexts, such as cognitive radio for instance, where little prior signal knowledge is...

    Provided By Institut Telecom

  • White Papers // Oct 2010

    Secure Geo-Localization of Wireless Sensor Nodes in the Presence of Misbehaving Anchor Nodes

    Geo-localization of nodes in a Wireless Sensor Network (WSN) is a process that allows location-unaware nodes to discover their spatial coordinates. This process requires the cooperation of all the nodes in the system. Ensuring the correctness of the process, especially in the presence of misbehaving nodes, is crucial for ensuring...

    Provided By Institut Telecom

  • White Papers // Jan 2011

    The Green-Game: Striking a Balance Between QoS and Energy Saving

    The energy consumed by communication networks can be reduced in several ways. A promising technique consists in concentrating the workload of an infrastructure on a reduced set of devices, while switching off the others. This technique, called "Resource consolidation", is particularly appealing when routing data traffic over a lightly loaded...

    Provided By Institut Telecom

  • White Papers // May 2010

    Apple-to-Apple: A Framework Analysis for Energy-Efficiency in Networks

    Research on energy-efficiency in and through communication networks has already gained the attention of a broad research community. Specifically, the authors consider efforts towards improving environmental sustainability by making networks energy-aware. One of the first, and perhaps most important step in this direction is establishing a comprehensive methodology for measuring...

    Provided By Institut Telecom

  • White Papers // Mar 2011

    Apple-to-Apple: A Common Framework for Energy-Efficiency in Networks

    Research on energy-efficiency in and through communication networks has already gained the attention of a broad research community. Specifically, the authors consider efforts towards improving environmental sustainability by making networks energy-aware. One of the first, and perhaps most important step towards this direction is establishing a comprehensive methodology for measuring...

    Provided By Institut Telecom

  • White Papers // Nov 2011

    Multi Group Key Agreement Mechanism for Mobile P2P Wireless Networks

    Secure and efficient communication among a set of mobile nodes is one of the most important aspect in P2P wireless networks. Security of various group-oriented applications requires a group secret shared between all participants. Several group key protocols have been presented in the literature to enable secrecy of communication among...

    Provided By Institut Telecom

  • White Papers // Mar 2010

    Energy-Awareness in Network Dimensioning: A Fixed Charge Network Flow Formulation

    Reduction of unnecessary energy consumption is becoming a major concern in wired networking, in reason of both the potential economical benefits and its forecast environmental impact. These issues, usually referred to as "Green networking", relate to embody energy-awareness in the network elements and processes. Once a network has been designed...

    Provided By Institut Telecom

  • White Papers // Jan 2012

    Distributed Algorithms for Green IP Networks

    The authors propose a novel distributed approach to exploit sleep mode capabilities of links in an Internet Service Provider network. Differently from other works, neither a central controller, nor the knowledge of the current traffic matrix is assumed, favoring a major step towards making sleep mode enabled networks practical in...

    Provided By Institut Telecom

  • White Papers // Mar 2011

    Tailored Shielding and Bypass Testing of Web Applications

    User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is inefficient because hackers bypass these checks and directly send malicious data to the server. User input validation thus has to be duplicated from the...

    Provided By Institut Telecom

  • White Papers // Feb 2012

    Performance Evaluation of Biometric Template Update

    Template update allows to modify the biometric reference of a user while he uses the biometric system. With such kind of mechanism the authors expect the biometric system uses always an up-to-date representation of the user, by capturing his intra-class (temporary or permanent) variability. Although several studies exist in the...

    Provided By Institut Telecom

  • White Papers // Feb 2012

    An AHP-Based Resource Management Scheme for CRRM in Heterogeneous Wireless Networks

    In a heterogeneous wireless environment, a variety of Radio Access Technologies (RATs) coexist. Since, the number of RATs is anticipated to increase in the near future, it is desirable to have radio and network resources managed in a cooperative manner using the Common Radio Resource Management (CRRM) strategy. In order...

    Provided By Institut Telecom

  • White Papers // Aug 2009

    CA3M: A Runtime Model and a Middleware for Dynamic Context Management

    In ubiquitous environments, context-aware applications need to monitor their execution context. They use middleware services such as context managers for this purpose. The space of monitorable entities is huge and each context-aware application has specific monitoring requirements which can change at runtime as a result of new opportunities or constraints...

    Provided By Institut Telecom

  • White Papers // Aug 2012

    Handling the M in MANet: An Algorithm to Identify Stable Groups of Peers Using Crosslayering Information

    This paper proposes an algorithm to identify groups of users connected to a mobile ad hoc network that remain stable over time. Several similar algorithms have been proposed to manage mobility either by predicting disconnections or by identifying groups of peers stable over time. They all rely on information such...

    Provided By Institut Telecom

  • White Papers // Jan 2012

    Promoting Mashup Creation Through Unstructured Data Extraction

    Service composition tools are usually based on an input/output mapping pattern. Inputs and output are declared by the service developer when publishing his service. However, services might also generate unstructured data such as email and instant messages content. That data are hardly expectable by developers. Consequently, much data are unavoidably...

    Provided By Institut Telecom

  • White Papers // Feb 2011

    A Self-Organization Mechanism for a Cold Chain Monitoring System

    In this paper, the authors propose an autonomous self-organization mechanism for the monitoring of the cold chain. All along the transportation through this logistic chain, the sensors are moved with the goods in very different networks. They argue that depending on the situation some protocols are more suited than others...

    Provided By Institut Telecom

  • White Papers // Aug 2010

    Reducing Collision Probability on a Shared Medium Using a Variational Method

    The authors consider a network with N nodes competing for access to the channel using un-slotted ALOHA. When a request is sent, each node may answer after a certain backoff time. Only the first answer is of importance, that is why they want to minimize the loss rate of the...

    Provided By Institut Telecom

  • White Papers // Feb 2010

    Link Quality and Local Load Balancing Routing Mechanisms in Wireless Sensor Networks

    The choice of a routing protocol in a Wireless Sensor Network (WSN) depends on the nature of the application and on its primary mission. Lot of works addressed the problem of routing mechanisms with more or less effectiveness, some of which pointed out the use of the Link Quality Indicator...

    Provided By Institut Telecom

  • White Papers // Jun 2010

    LQI-DCP: A LQI Based Multihop Clustering Protocol for Wireless Sensor Networks

    The Link Quality Indicator (LQI) is defined in the 802.15.4 standard, but its context of use is not specified in this standard. Some works on the LQI, few of which are field experiments, have shown that the LQI decreases as the distance increases. In WSN, it is not often desirable...

    Provided By Institut Telecom

  • White Papers // May 2010

    Using LQI to Improve ClusterHead Locations in Dense ZigBee Based Wireless Sensor Networks

    In WSN, it is not often desirable to use the GPS technology. Indeed, the use of GPS is expensive and may reduce the overall network performance. Moreover, indoor reception of the GPS signal is not possible. The Link Quality Indicator (LQI) is defined in the 802.15.4 standard, but its context...

    Provided By Institut Telecom