73 research outputs found

    QoS-aware Routing for Real-Time and Multimedia Applications in Mobile Ad Hoc Networks

    Get PDF
    International audienceWith the increasing development of real-time and multimedia applications, there is a need to provide bandwidth and delay guarantees. Most of QoS ad hoc network routing protocols select path guaranteeing delay and/or bandwidth. However, they don't consider throughput optimization, which results in a low number of admitted real-time and multimedia flows. In this paper, we propose a cross-layer TDMA-based routing protocol to meet delay and bandwidth requirements while optimizing network throughput. Since in TDMA-based ad hoc networks, slot reservation impacts two-hops neighbors, our routing protocol selects paths with the lowest number of neighbors. To show the effectiveness of our protocol, we present simulations using NS-2

    Modular Approach for Expert System toward Anomaly: N-Layers

    No full text
    International audience—Smart cities and smart homes are booming fields of development of pervasive systems. With the high stakes these systems have to manage, and their sheer complexity, anomalies have to be considered. In these complex systems are many connected components with computing capacities. They can manage anomalies, even if partially, and can act as some kind of expert systems. These expert systems can be relied upon to provide anomaly management. The complexity to manage generic expert systems brings us to suggest another approach. In this paper, the N-layers is discussed. It layers the various existing expert systems to organize them as a more generic expert system. It also aims to correct some difficulties to develop and integrate generic expert systems into various scales complex systems, such as smart cities or smart homes

    A Framework for Anomaly Diagnosis in Smart Homes Based on Ontology

    Get PDF
    International audienceSmart homes are pervasive environments to enhance the comfort, the security, the safety and the energy consumption of the residence. An ambient intelligence system uses information of devices to represent the context of the home and its residents. Based on a context database, this system infer the daily life activities of the resident. Hence, abnormal behavior or chronic disease can be detected by the system. Due to the complexity of these systems, a large variety of anomalies may occur and disrupt the functioning of critical and essential applications. To detect anomalies and take appropriate measures, an anomaly management system has to be integrated in the overall architecture. In this paper, we propose an anomaly management framework for smart homes. This framework eases the work of designers in the conception of anomaly detection modules and processes to respond to an anomaly appropriately. Our framework can be used in all heterogeneous environments such as smart home because it uses Semantic Web ontologies to represent anomaly information. Our framework can be useful to detect hardware, software, network, operator and context faults. To test the efficiency of our anomaly management framework, we integrate it in the universAAL middleware. Based on a reasoner, our framework can easily infer some context anomalies and take appropriate measures to restore the system in a full functioning state

    Helping and monitoring robots at low cost

    No full text
    nombre de pages : 6National audienceThrough European countries the dependency ratio of elders and people with disability will rise in the next years. To avoid a degradation of the life quality of dependant persons, they may be maintained in their home. To ensure people safety and avoid isolation problems, some mechanisms are needed. We propose a new method, the X-development method, to guide generic product design from end-to-end. In this paper, the design is focused on robots for dependant people. To respect the environmental constraints and to reduce the amount of waste, the robots have to be designed properly. The aim of the X-development method is to ease the manufacturing process thanks to the tight association between the modelling and design phases of smart systems. Our robots are remotely controlled in order to achieve monitoring and social tasks. Caregivers or relatives can control each robot to interact with the dependant person. The robots increase the social interaction of dependant people. During the design phase, we keep in mind to maintain the price of the robot as cheap as possible, because it is the key point in the generalization of this one

    Software Defined Networking Reactive Stateful Firewall

    No full text
    Part 3: Cyber InfrastructureInternational audienceNetwork security is a crucial issue of Software Defined Networking (SDN). It is probably, one of the key features for the success and the future pervasion of the SDN technology. In this perspective, we propose a SDN reactive stateful firewall. Our solution is integrated into the SDN architecture. The application filters TCP communications according to the network security policies. It records and processes the different states of connections and interprets their possible transitions into OpenFlow (OF) rules. The proposition uses a reactive behavior in order to reduce the number of OpenFlow rules in the data plane devices and to mitigate some Denial of Service (DoS) attacks like SYN Flooding. The firewall processes the Finite State Machine of network protocols so as to withdraw useless traffic not corresponding to their transitions' conditions. In terms of cost efficiency, our proposal empowers the behavior of Openflow compatible devices to make them behaving like stateful firewalls. Therefore, organizations do not need to spend money and resources on buying and maintaining conventional firewalls. Furthermore, we propose an orchestrator in order to spread and to reinforce security policies in the whole network with a fine grained strategy. It is thereupon able to secure the network by filtering the traffic related to an application , a node, a subnetwork connected to a data plane device, a sub SDN network connected to a controller, traffic between different links, etc. The deployment of rules of the firewall becomes flexible according to a holistic network view provided by the management plane. In addition, the solution enlarges the security perimeter inside the network by securing accesses between its internal nodes

    Ontology-Based Solution for Handling Safety and Cybersecurity Interdependency in Safety-Critical Systems

    Get PDF
    In case, safety-critical systems face an anomaly (either intentional or not), safety and cybersecurity impact humans and environment. Thus, they affect each other and so they are considered as interdependent. An ontology-based solution for safety is needed to handle this interdependency. We propose a new safety ontology for Network Function Virtualization (NFV) framework which is able to cover reliability, availability, maintainability, and integrity-related breakdown types, since they interact and influence safety according to ENISA. Our ontology allows us to have a uniformized representation of the potential anomalies that a system and its elements can face. Based on this representation, a decision-making process takes place to avoid potential conflicts between safety and cybersecurity in order to best handle their interdependency. The results of our implementation show that our ontology handles the safety and cybersecurity interdependency and has little impact on decision-making time, which makes it an effective methodology for NFV framework

    New Method for Localization and Human Being Detection using UWB Technology: Helpful Solution for Rescue Robots

    No full text
    International audienceTwo challenges for rescue robots are to detect human beings and to have an accurate positioning system. In indoor positioning, GPS receivers cannot be used due to the reflections or attenuation caused by obstacles. To detect human beings, sensors such as thermal camera, ultrasonic and microphone can be embedded on the rescue robot. The drawback of these sensors is the detection range. These sensors have to be in close proximity to the victim in order to detect it. UWB technology is then very helpful to ensure precise localization of the rescue robot inside the disaster site and detect human beings. We propose a new method to both detect human beings and locate the rescue robot at the same time. To achieve these goals we optimize the design of UWB pulses based on B-splines. The spectral effectiveness is optimized so the symbols are easier to detect and the mitigation with noise is reduced. Our positioning system performs to locate the rescue robot with an accuracy about 2 centimeters. During some tests we discover that UWB signal characteristics abruptly change after passing through a human body. Our system uses this particular signature to detect human body

    PROCEDE DE TRAITEMENT D'UNE INTRUSION DANS UN RESEAU DE COMMUNICATION SANS FIL, DISPOSITIF, ET PROGRAMME D'ORDINATEURS ASSOCIES

    No full text
    L'invention concerne un procédé de traitement d'une intrusion dans un réseau de communication comprenant une pluralité d'équipements nœuds, ledit procédé comprenant les étapes suivantes, mises en œuvre par un dit équipement nœud, dit nœud courant (NC) : Découverte (T'1) d'un voisinage du nœud courant, comprenant une d'affectation (ΤΊ3) d'un groupe de résilience au nœud voisin, en fonction d'au moins une information représentative d'un niveau de résilience du nœud voisin à au moins un type d'attaque; Détection (T'2) d'une intrusion concernant au moins un nœud suspect (x) du voisinage du nœud courant; Etablissement (T'3) d'un consensus concernant ledit au moins un nœud suspect dans un voisinage (V(x)) du nœud suspect par comptabilisation d'un nombre de groupes de résilience (Nb-VtG) ayant détecté l'intrusion dans le voisinage du nœud suspect et d'un nombre total (Nb-GR) de groupes de résilience représentés dans le voisinage du nœud suspect dans le voisinage du nœud suspect; Décision de changement de statut du nœud suspect en fonction du résultat du consensus par comparaison des deux nombres
    • …
    corecore