Département systèmes réseaux, cybersécurité et droit du numérique (SRCD)

Le département « Systèmes réseaux, cybersécurité et droit du numérique » (SRCD) est situé sur le campus de Rennes d'IMT Atlantique. À ce jour, il est composé de 25 enseignants-chercheurs permanents, plus de 20 post-doctorants et ingénieurs contractuels, et près de 40 doctorants. Ses domaines d'activité recouvrent tous les aspects de l'enseignement et de la recherche en :

  • systèmes réseaux au sens large, couvrant les technologies pour les réseaux fixes et mobiles jusqu'à l'internet des objets, en passant par l'étude et la sécurisation des systèmes complexes que ceux-ci permettent de construire. Les domaines d'application sont variées, tels que l'énergie, les villes et transports intelligents et l'industrie ;

  • cybersécurité, par le renforcement de la sécurité des systèmes complexes, de l’industrie du futur et des infrastructures critiques ;

  • droit et économie des activités numériques, à l’échelle d'un contexte européen et/ou international.

Recherche
Formation
Innovation et Transfert

The next events of the department

Il n'y a pas d'événement en cours ou à venir pour le département.
Les dernières publications du département
Communication dans un congrès
Cordova Juana, Espinoza Gonzalo, Nuaymi Loutfi
Simple capacity estimations in the complex 5G/New Radio system
PIMRC 2018, Sep 2019, Bologne, Italy
Details
Quote
Bibtext :
@inproceedings{cordova:hal-01924302,
TITLE = {{Simple capacity estimations in the complex 5G/New Radio system}},
AUTHOR = {Cordova, Juana and Espinoza, Gonzalo and Nuaymi, Loutfi},
URL = {https://hal-imt-atlantique.archives-ouvertes.fr/hal-01924302},
BOOKTITLE = {{PIMRC 2018}},
ADDRESS = {Bologne, Italy},
YEAR = {2019},
MONTH = Sep,
HAL_ID = {hal-01924302},
HAL_VERSION = {v1},
}
Endnote :
%0 Conference Paper
%F Oral
%T Simple capacity estimations in the complex 5G/New Radio system
%+ Département Systèmes Réseaux, Cybersécurité et Droit du numérique (SRCD)
%+ Advanced technologies for operated networks (ADOPNET)
%A Cordova, Juana
%A Espinoza, Gonzalo
%A Nuaymi, Loutfi
%< avec comité de lecture
%B PIMRC 2018
%C Bologne, Italy
%8 2019-09
%D 2019
%Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers
%G English
%L hal-01924302
%U https://hal-imt-atlantique.archives-ouvertes.fr/hal-01924302
%~ IMT-ATLANTIQUE
%~ CNRS
%~ UNIV-UBS
%~ IRISA_SET
%~ UNIV-RENNES1
%~ CENTRALESUPELEC
%~ IRISA
%~ INRIA
%~ IMTA_SRCD
%~ TEST-UR-CSS
%~ UNIV-RENNES
%~ IRISA-ADOPNET-IMTA
%~ UR1-MATH-STIC
%~ UR1-HAL
%~ UR1-UFR-ISTIC
%~ IRISA_IMTA
%~ INRIA-AUT
Communication dans un congrès
Er Ngurah Indra, Singh Kamal Deep, Bonnin Jean-Marie
DC4LED: A Hierarchical VDTN Routing for Data Collection in Smart Cities
CCNC 2019 - 16th IEEE Annual Consumer Communications and Networking Conference, Jan 2019, Las Vegas, United States. 〈http://ccnc2019.ieee-ccnc.org〉
Bibtext :
@inproceedings{er:hal-01894719,
TITLE = {{DC4LED: A Hierarchical VDTN Routing for Data Collection in Smart Cities}},
AUTHOR = {Er, Ngurah Indra and Singh, Kamal Deep and BONNIN, Jean-Marie},
URL = {https://hal.archives-ouvertes.fr/hal-01894719},
BOOKTITLE = {{CCNC 2019 - 16th IEEE Annual Consumer Communications and Networking Conference}},
ADDRESS = {Las Vegas, United States},
YEAR = {2019},
MONTH = Jan,
KEYWORDS = {Smart Cities ; Data Collection ; VDTN Routing ; DC4LED ; Hierarchical Routing},
PDF = {https://hal.archives-ouvertes.fr/hal-01894719/file/DC4LED_A_Hierarchical.pdf},
HAL_ID = {hal-01894719},
HAL_VERSION = {v1},
}
Endnote :
%0 Conference Proceedings
%T DC4LED: A Hierarchical VDTN Routing for Data Collection in Smart Cities
%+ Département Systèmes Réseaux, Cybersécurité et Droit du numérique (SRCD)
%+ Enabling Affordable Smarter Environment (EASE)
%+ Udayana University [Bali]
%+ Université Jean Monnet [Saint-Étienne] (UJM)
%+ Laboratoire Hubert Curien [Saint Etienne] (LHC)
%A Er, Ngurah Indra
%A Singh, Kamal Deep
%A BONNIN, Jean-Marie
%< avec comité de lecture
%B CCNC 2019 - 16th IEEE Annual Consumer Communications and Networking Conference
%C Las Vegas, United States
%8 2019-01-12
%D 2019
%K Smart Cities
%K Data Collection
%K VDTN Routing
%K DC4LED
%K Hierarchical Routing
%Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]
%Z Computer Science [cs]/Modeling and SimulationConference papers
%X In smart cities, the mobility of vehicles can be used to collect data produced by connected objects and to deliver them to several applications which are delay tolerant. The Vehicular Delay Tolerant Networks (VDTN) can be utilized for such services. This paper introduces DC4LED (Data Collection for Low Energy Devices): a hierarchical VDTN routing which takes advantage of the specific mobility patterns of the various type of vehicles. It provides a low-cost delivery service for applications that need to gather data produced from the field. The idea is to propose a simple routing scheme where cars, taxis, and buses route data hierarchically in a store-carry-forward mechanism to any of the several available Internet Point-of-Presences in the city. This paper aims to explore the possibility of implementing a very simple mechanism for very simple services, as opposed to utilizing complex VDTN mechanisms proposed in the literature. Our simulations compare the performance of DC4LED routing with two legacy VDTN routing schemes which represent the extreme ends of VDTN routing spectrum: First-contact and Epidemic routing. It show that DC4LED has much lower network overhead in comparison with the two legacy routing schemes, which is advantageous for its implementation scalability. The DC4LED also maintains comparable data delivery probability and latency to Epidemic routing.
%G English
%2 https://hal.archives-ouvertes.fr/hal-01894719/document
%2 https://hal.archives-ouvertes.fr/hal-01894719/file/DC4LED_A_Hierarchical.pdf
%L hal-01894719
%U https://hal.archives-ouvertes.fr/hal-01894719
%~ UNIV-RENNES
%~ UR1-MATH-STIC
%~ UNIV-RENNES1
%~ CENTRALESUPELEC
%~ IRISA_SET
%~ INRIA-RENNES
%~ UNIV-UBS
%~ TDS-MACS
%~ IOGS
%~ PARISTECH
%~ IOGS-SACLAY
%~ IMTA_SRCD
%~ INRIA_TEST
%~ UNIV-ST-ETIENNE
%~ IRISA_IMTA
%~ TEST-UR-CSS
%~ UR1-UFR-ISTIC
%~ UR1-HAL
%~ CNRS
%~ IRISA-EASE-IMTA
%~ INRIA-RENGRE
%~ IMT-ATLANTIQUE
%~ INRIA
%~ IRISA
%~ UNIV-PARIS-SACLAY
Communication dans un congrès
Chouayakh Ayman, Bechler Aurelien, Amigo Isabel, Nuaymi Loutfi, Maillé Patrick
Auction mechanisms for Licensed Shared Access: reserve prices and revenue-fairness tradeoffs
IFIP WG PERFORMANCE 2018 - 36th International Symposium on Computer Performance, Modeling, Measurements and Evaluation 2018, Dec 2018, Toulouse, France. Proceedings 36th International Symposium on Computer Performance, Modeling, Measurements and Evaluation 2018, 2018
Details
Quote
Bibtext :
@inproceedings{chouayakh:hal-01923465,
TITLE = {{Auction mechanisms for Licensed Shared Access: reserve prices and revenue-fairness tradeoffs}},
AUTHOR = {Chouayakh, Ayman and Bechler, Aurelien and Amigo, Isabel and Nuaymi, Loutfi and Maill{\'e}, Patrick},
URL = {https://hal.archives-ouvertes.fr/hal-01923465},
BOOKTITLE = {{IFIP WG PERFORMANCE 2018 - 36th International Symposium on Computer Performance, Modeling, Measurements and Evaluation 2018}},
ADDRESS = {Toulouse, France},
HAL_LOCAL_REFERENCE = {19173},
PAGES = {.},
YEAR = {2018},
MONTH = Dec,
HAL_ID = {hal-01923465},
HAL_VERSION = {v1},
}
Endnote :
%0 Conference Proceedings
%T Auction mechanisms for Licensed Shared Access: reserve prices and revenue-fairness tradeoffs
%+ Département Systèmes Réseaux, Cybersécurité et Droit du numérique (SRCD)
%+ Orange Labs [Issy les Moulineaux]
%+ Advanced technologies for operated networks (ADOPNET)
%+ Département Informatique (INFO)
%+ Objets communicants pour l'Internet du futur (OCIF)
%+ Dependability Interoperability and perfOrmance aNalYsiS Of networkS (DIONYSOS)
%A Chouayakh, Ayman
%A Bechler, Aurelien
%A Amigo, Isabel
%A Nuaymi, Loutfi
%A Maillé, Patrick
%< avec comité de lecture
%Z 19173
%( Proceedings 36th International Symposium on Computer Performance, Modeling, Measurements and Evaluation 2018
%B IFIP WG PERFORMANCE 2018 - 36th International Symposium on Computer Performance, Modeling, Measurements and Evaluation 2018
%C Toulouse, France
%P .
%8 2018-12-05
%D 2018
%Z Computer Science [cs]/Computer Science and Game Theory [cs.GT]
%Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]
%Z Computer Science [cs]/Human-Computer Interaction [cs.HC]Conference papers
%X Licensed shared access (LSA) is a new approach that allows Mobile Network Operators to use a portion of the spectrum initially licensed to another incumbent user, by obtaining a license from the regulator via an auction mechanism. In this context, di‚erent truthful auction mechanisms have been proposed, and di‚er in terms of allocation (who gets the spectrum) but also on revenue. Since those mechanisms could generate an extremely low revenue, we extend them by introducing a reserve price per bidder which represents the minimum amount that each winning bidder should pay. Since this may be at the expense of the allocation fairness, for each mechanism we €nd by simulation the reserve price that optimizes a trade-o‚ between expected fairness and expected revenue. Also, for each mechanism, we analytically express the expected revenue when valuations of operators for the spectrum are independent and identically distributed from a uniform distribution.
%G English
%L hal-01923465
%U https://hal.archives-ouvertes.fr/hal-01923465
%~ CNRS
%~ UNIV-UBS
%~ IRISA_SET
%~ UNIV-RENNES1
%~ CENTRALESUPELEC
%~ IRISA
%~ INRIA
%~ IMT-ATLANTIQUE
%~ IMTA_SRCD
%~ TEST-UR-CSS
%~ IRISA-OCIF-IMTA
%~ UNIV-RENNES
%~ IRISA-ADOPNET-IMTA
%~ IMTA_INFO
%~ UR1-MATH-STIC
%~ UR1-HAL
%~ UR1-UFR-ISTIC
%~ IRISA_IMTA
%~ INRIA-RENNES
%~ INRIA_TEST
%~ INRIA-RENGRE
%~ IRISA-DIONYSOS-IMTA
Communication dans un congrès
Maillé Patrick, Tuffin Bruno
Analysis of Sponsored Data in the Case of Competing Wireless Service Providers
NETGCOOP 2018 - 9th International Conference on Network Games, Control and Optimization, Nov 2018, New York City, United States. pp.1-16, 2018
Bibtext :
@inproceedings{maille:hal-01670139,
TITLE = {{Analysis of Sponsored Data in the Case of Competing Wireless Service Providers}},
AUTHOR = {Maill{\'e}, Patrick and Tuffin, Bruno},
URL = {https://hal.inria.fr/hal-01670139},
BOOKTITLE = {{NETGCOOP 2018 - 9th International Conference on Network Games, Control and Optimization}},
ADDRESS = {New York City, United States},
PAGES = {1-16},
YEAR = {2018},
MONTH = Nov,
PDF = {https://hal.inria.fr/hal-01670139/file/Sponsored-data1col.pdf},
HAL_ID = {hal-01670139},
HAL_VERSION = {v2},
}
Endnote :
%0 Conference Proceedings
%T Analysis of Sponsored Data in the Case of Competing Wireless Service Providers
%+ Département Systèmes Réseaux, Cybersécurité et Droit du numérique (SRCD)
%+ Dependability Interoperability and perfOrmance aNalYsiS Of networkS (DIONYSOS)
%A Maillé, Patrick
%A Tuffin, Bruno
%< avec comité de lecture
%B NETGCOOP 2018 - 9th International Conference on Network Games, Control and Optimization
%C New York City, United States
%P 1-16
%8 2018-11-14
%D 2018
%Z Computer Science [cs]/Operations Research [cs.RO]Conference papers
%X With wireless sponsored data, a third party, content or service provider, can pay for some of your data traffic so that it is not counted in your plan's monthly cap. This type of behavior is currently under scrutiny, with telecommunication regulators wondering if it could be applied to prevent competitors from entering the market, and what the impact on all telecommunication actors can be. To answer those questions, we design and analyze in this paper a model where a Content Provider (CP) can choose the proportion of data to sponsor and a level of advertisement to get a return on investment, and several Internet Service Providers (ISPs) in competition. We distinguish three scenarios: no sponsoring, the same sponsoring to all users, and a different sponsoring depending on the ISP you have subscribed to. This last possibility may particularly be considered an infringement of the network neutrality principle. We see that sponsoring can be beneficial to users and ISPs depending on the chosen advertisement level. We also discuss the impact of zero-rating where an ISP offers free data to a CP to attract more customers, and vertical integration where a CP and an ISP are the same company.
%G English
%2 https://hal.inria.fr/hal-01670139v2/document
%2 https://hal.inria.fr/hal-01670139/file/Sponsored-data1col.pdf
%L hal-01670139
%U https://hal.inria.fr/hal-01670139
%~ CNRS
%~ UNIV-UBS
%~ INRIA-RENNES
%~ IRISA_SET
%~ UNIV-RENNES1
%~ IMTA_SRCD
%~ INRIA_TEST
%~ UR1-HAL
%~ CENTRALESUPELEC
%~ IRISA
%~ INRIA
%~ IMT-ATLANTIQUE
%~ TEST-UR-CSS
%~ UNIV-RENNES
%~ INRIA-RENGRE
%~ IRISA-DIONYSOS-IMTA
%~ UR1-MATH-STIC
%~ UR1-UFR-ISTIC
%~ IRISA_IMTA
Communication dans un congrès
Chouayakh Ayman, Bechler Aurelien, Amigo Isabel, Nuaymi Loutfi, Maillé Patrick
A truthful auction mechanism for dynamic allocation of LSA spectrum blocks for 5G
NetGCoop 2018 - 9th International Conference on NETwork Games, COntrol and OPtimisation, Nov 2018, New York, United States. Proceedings NetGCoop'18, 2018
Details
Quote
Bibtext :
@inproceedings{chouayakh:hal-01923463,
TITLE = {{A truthful auction mechanism for dynamic allocation of LSA spectrum blocks for 5G}},
AUTHOR = {Chouayakh, Ayman and Bechler, Aurelien and Amigo, Isabel and Nuaymi, Loutfi and Maill{\'e}, Patrick},
URL = {https://hal.archives-ouvertes.fr/hal-01923463},
BOOKTITLE = {{NetGCoop 2018 - 9th International Conference on NETwork Games, COntrol and OPtimisation}},
ADDRESS = {New York, United States},
HAL_LOCAL_REFERENCE = {19218},
PAGES = {.},
YEAR = {2018},
MONTH = Nov,
HAL_ID = {hal-01923463},
HAL_VERSION = {v1},
}
Endnote :
%0 Conference Proceedings
%T A truthful auction mechanism for dynamic allocation of LSA spectrum blocks for 5G
%+ Orange Labs [Issy les Moulineaux]
%+ Département Systèmes Réseaux, Cybersécurité et Droit du numérique (SRCD)
%+ Advanced technologies for operated networks (ADOPNET)
%+ Département Informatique (INFO)
%+ Objets communicants pour l'Internet du futur (OCIF)
%+ Dependability Interoperability and perfOrmance aNalYsiS Of networkS (DIONYSOS)
%A Chouayakh, Ayman
%A Bechler, Aurelien
%A Amigo, Isabel
%A Nuaymi, Loutfi
%A Maillé, Patrick
%< avec comité de lecture
%Z 19218
%( Proceedings NetGCoop'18
%B NetGCoop 2018 - 9th International Conference on NETwork Games, COntrol and OPtimisation
%C New York, United States
%P .
%8 2018-11-14
%D 2018
%Z Computer Science [cs]/Computer Science and Game Theory [cs.GT]
%Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]
%Z Computer Science [cs]/Human-Computer Interaction [cs.HC]Conference papers
%X Licensed shared access is a new frequency sharing concept that allows Mobile Network Operators (MNOs) to use some of the spectrum initially allocated to other incumbents, after obtaining a temporary license from the regulator. The allocation is made among groups such that two base stations in the same group can use the same spectrum simultaneously. In this context, different auction schemes were proposed, however they consider the scenario in which the regulator has one and only one block of LSA frequency to allocate. In this paper, we remove this hypothesis: we suppose that the regulator has K identical blocks of spectrum to allocate, and we propose a truthful auction mechanism based on the Vickrey-Clarke- Groves mechanism (VCG).We evaluate the efficiency of our mechanism in terms of social welfare, which depends on the allocation rule of the mechanism. Simulations show that the efficiency of the proposed mechanism is at least 60 % of that of VCG, which is known to be optimal.
%G English
%L hal-01923463
%U https://hal.archives-ouvertes.fr/hal-01923463
%~ CNRS
%~ UNIV-UBS
%~ IRISA_SET
%~ UNIV-RENNES1
%~ CENTRALESUPELEC
%~ IRISA
%~ INRIA
%~ IMT-ATLANTIQUE
%~ IMTA_SRCD
%~ TEST-UR-CSS
%~ IRISA-OCIF-IMTA
%~ UNIV-RENNES
%~ IRISA-ADOPNET-IMTA
%~ IMTA_INFO
%~ UR1-MATH-STIC
%~ UR1-HAL
%~ UR1-UFR-ISTIC
%~ IRISA_IMTA
%~ INRIA-RENNES
%~ INRIA_TEST
%~ INRIA-RENGRE
%~ IRISA-DIONYSOS-IMTA
Communication dans un congrès
Anceaume Emmanuelle, Guellier Antoine, Ludinard Romaric, Sericola Bruno
Sycomore : a Permissionless Distributed Ledger that self-adapts to Transactions Demand
NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications, Nov 2018, Boston, United States. pp.1-8
Bibtext :
@inproceedings{anceaume:hal-01888265,
TITLE = {{Sycomore : a Permissionless Distributed Ledger that self-adapts to Transactions Demand}},
AUTHOR = {Anceaume, Emmanuelle and Guellier, Antoine and Ludinard, Romaric and Sericola, Bruno},
URL = {https://hal.archives-ouvertes.fr/hal-01888265},
BOOKTITLE = {{NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications}},
ADDRESS = {Boston, United States},
ORGANIZATION = {{IEEE}},
PAGES = {1-8},
YEAR = {2018},
MONTH = Nov,
PDF = {https://hal.archives-ouvertes.fr/hal-01888265/file/sycomore.pdf},
HAL_ID = {hal-01888265},
HAL_VERSION = {v1},
}
Endnote :
%0 Conference Proceedings
%T Sycomore : a Permissionless Distributed Ledger that self-adapts to Transactions Demand
%+ Confidentialité, Intégrité, Disponibilité et Répartition (CIDRE)
%+ Département Systèmes Réseaux, Cybersécurité et Droit du numérique (SRCD)
%+ Advanced technologies for operated networks (ADOPNET)
%+ Dependability Interoperability and perfOrmance aNalYsiS Of networkS (DIONYSOS)
%A Anceaume, Emmanuelle
%A Guellier, Antoine
%A Ludinard, Romaric
%A Sericola, Bruno
%< avec comité de lecture
%B NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications
%C Boston, United States
%P 1-8
%8 2018-11-01
%D 2018
%Z Computer Science [cs]
%Z Computer Science [cs]/Data Structures and Algorithms [cs.DS]
%Z Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC]Conference papers
%X We propose a new way to organise both transactions and blocks in a distributed ledger to address the performance issues of permissionless ledgers. In contrast to most of the existing solutions in which the ledger is a chain of blocks extracted from a tree or a graph of chains, we present a distributed ledger whose structure is a balanced directed acyclic graph of blocks. We call this specific graph a SYC-DAG. We show that a SYC-DAG allows us to keep all the remarkable properties of the Bitcoin blockchain in terms of security, immutability, and transparency, while enjoying higher throughput and self-adaptivity to transactions demand. To the best of our knowledge, such a design has never been proposed so far.
%G English
%2 https://hal.archives-ouvertes.fr/hal-01888265/document
%2 https://hal.archives-ouvertes.fr/hal-01888265/file/sycomore.pdf
%L hal-01888265
%U https://hal.archives-ouvertes.fr/hal-01888265
%~ CNRS
%~ UNIV-UBS
%~ INRIA-RENNES
%~ IRISA_SET
%~ UNIV-RENNES1
%~ INRIA_TEST
%~ UR1-HAL
%~ CENTRALESUPELEC
%~ IRISA
%~ INRIA
%~ SUP_CIDRE
%~ TEST-UR-CSS
%~ UNIV-RENNES
%~ INRIA-RENGRE
%~ UR1-MATH-STIC
%~ CENTRALESUPELEC-SACLAY-VP
%~ UR1-UFR-ISTIC
%~ CENTRALESUPELEC-SACLAY
%~ UNIV-PARIS-SACLAY
%~ IMTA_SRCD
%~ IMT-ATLANTIQUE
%~ IRISA-ADOPNET-IMTA
%~ IRISA-DIONYSOS-IMTA
%~ IRISA_IMTA
Communication dans un congrès
Anceaume Emmanuelle, Busnel Yann, Cazacu Vasile
On the Fly Detection of the Top-k Items in the Distributed Sliding Window Model
NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications, Nov 2018, Boston, United States. IEEE, pp.1-8
Bibtext :
@inproceedings{anceaume:hal-01888298,
TITLE = {{On the Fly Detection of the Top-k Items in the Distributed Sliding Window Model}},
AUTHOR = {Anceaume, Emmanuelle and Busnel, Yann and Cazacu, Vasile},
URL = {https://hal.archives-ouvertes.fr/hal-01888298},
BOOKTITLE = {{NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications}},
ADDRESS = {Boston, United States},
ORGANIZATION = {{IEEE}},
PUBLISHER = {{IEEE}},
PAGES = {1-8},
YEAR = {2018},
MONTH = Nov,
PDF = {https://hal.archives-ouvertes.fr/hal-01888298/file/NCA_2018.pdf},
HAL_ID = {hal-01888298},
HAL_VERSION = {v1},
}
Endnote :
%0 Conference Proceedings
%T On the Fly Detection of the Top-k Items in the Distributed Sliding Window Model
%+ Confidentialité, Intégrité, Disponibilité et Répartition (CIDRE)
%+ IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique)
%+ Dependability Interoperability and perfOrmance aNalYsiS Of networkS (DIONYSOS)
%+ Département Systèmes Réseaux, Cybersécurité et Droit du numérique (SRCD)
%A Anceaume, Emmanuelle
%A Busnel, Yann
%A Cazacu, Vasile
%< avec comité de lecture
%B NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications
%C Boston, United States
%I IEEE
%P 1-8
%8 2018-11-01
%D 2018
%Z Computer Science [cs]
%Z Computer Science [cs]/Data Structures and Algorithms [cs.DS]
%Z Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC]Conference papers
%X This paper presents a new algorithm that detects on the fly the k most frequent items in the sliding window model. This algorithm is distributed among the nodes of the system. It is inspired by a recent and innovative approach, which consists in associating a stochastic value correlated with the item's frequency instead of trying to estimate its number of occurrences. This stochastic value corresponds to the number of consecutive heads in coin flipping until the first tail occurs. The original approach was to retain just the maximum of consecutive heads obtained by an item, since an item that often occurs will have a higher probability of having a high value. While effective for very skewed data distributions, the correlation is not tight enough to robustly distinguish items with comparable frequencies. To address this important issue, we propose to combine the stochastic approach together with a deterministic counting of items. Specifically, in place of keeping the maximum number of consecutive heads obtained by an item, we count the number of times the coin flipping process of an item has exceeded a given threshold. This threshold is defined by combining theoretical results in leader election and coupon collector problems. Results on simulated data show how impressive is the detection of the top-k items in a large range of distributions.
%G English
%2 https://hal.archives-ouvertes.fr/hal-01888298/document
%2 https://hal.archives-ouvertes.fr/hal-01888298/file/NCA_2018.pdf
%L hal-01888298
%U https://hal.archives-ouvertes.fr/hal-01888298
%~ CNRS
%~ UNIV-UBS
%~ INRIA-RENNES
%~ IRISA_SET
%~ UNIV-RENNES1
%~ INRIA_TEST
%~ UR1-HAL
%~ CENTRALESUPELEC
%~ IRISA
%~ INRIA
%~ SUP_CIDRE
%~ TEST-UR-CSS
%~ UNIV-RENNES
%~ INRIA-RENGRE
%~ UR1-MATH-STIC
%~ CENTRALESUPELEC-SACLAY-VP
%~ UR1-UFR-ISTIC
%~ CENTRALESUPELEC-SACLAY
%~ UNIV-PARIS-SACLAY
%~ IMTA_SRCD
%~ IMT-ATLANTIQUE
%~ IRISA-DIONYSOS-IMTA
%~ IRISA_IMTA
Communication dans un congrès
Er Ngurah Indra, Singh Kamal Deep, Bonnin Jean-Marie
Contact Strategy for VDTN Data Collection in Smart Cities
ICSGTEIS 2018 - International Conference on Smart-Green Technology in Electrical and Information Systems, Oct 2018, Bali, Indonesia. 〈https://icsgteis.unud.ac.id〉
Bibtext :
@inproceedings{er:hal-01894540,
TITLE = {{Contact Strategy for VDTN Data Collection in Smart Cities}},
AUTHOR = {Er, Ngurah Indra and Singh, Kamal Deep and BONNIN, Jean-Marie},
URL = {https://hal.archives-ouvertes.fr/hal-01894540},
BOOKTITLE = {{ICSGTEIS 2018 - International Conference on Smart-Green Technology in Electrical and Information Systems}},
ADDRESS = {Bali, Indonesia},
YEAR = {2018},
MONTH = Oct,
KEYWORDS = {Data Collection ; Contact Strategy ; Smart Cities ; DC4LED ; Hierarchical VDTN Routing},
PDF = {https://hal.archives-ouvertes.fr/hal-01894540/file/Contact_Strategy_Author_Version.pdf},
HAL_ID = {hal-01894540},
HAL_VERSION = {v1},
}
Endnote :
%0 Conference Paper
%F Oral
%T Contact Strategy for VDTN Data Collection in Smart Cities
%+ Département Systèmes Réseaux, Cybersécurité et Droit du numérique (SRCD)
%+ Enabling Affordable Smarter Environment (EASE)
%+ Udayana University [Bali]
%+ Université Jean Monnet [Saint-Étienne] (UJM)
%+ Laboratoire Hubert Curien [Saint Etienne] (LHC)
%A Er, Ngurah Indra
%A Singh, Kamal Deep
%A BONNIN, Jean-Marie
%< avec comité de lecture
%B ICSGTEIS 2018 - International Conference on Smart-Green Technology in Electrical and Information Systems
%C Bali, Indonesia
%8 2018-10-25
%D 2018
%K Data Collection
%K Contact Strategy
%K Smart Cities
%K DC4LED
%K Hierarchical VDTN Routing
%Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]
%Z Computer Science [cs]/Modeling and SimulationConference papers
%X The number of connected devices will increase exponentially in the coming years, emitting a massive amount of data to the networks. A vehicle-based data collection architecture for smart cities will enable the offloading of some data for delay-tolerant applications. However, our previous work showed the diversity in data pick-up pattern by vehicles based on location in the city. Build on those findings this paper introduces a preliminary study on a contact strategy for wireless sensors data collection utilizing Vehicular Delay Tolerant Networks (VDTN). The strategy formulates relation between mutual communications range, vehicle's speed, and periodic discovery time by the sensor. We then propose sensor's buffer occupancy value as a measure for the adaptation of its communications discovery period, with the purpose of reducing energy consumption.
%G English
%2 https://hal.archives-ouvertes.fr/hal-01894540/document
%2 https://hal.archives-ouvertes.fr/hal-01894540/file/Contact_Strategy_Author_Version.pdf
%L hal-01894540
%U https://hal.archives-ouvertes.fr/hal-01894540
%~ IOGS-SACLAY
%~ CENTRALESUPELEC
%~ INRIA_TEST
%~ IMTA_SRCD
%~ UNIV-RENNES1
%~ TDS-MACS
%~ IRISA_SET
%~ INRIA-RENNES
%~ UNIV-UBS
%~ IOGS
%~ PARISTECH
%~ UNIV-ST-ETIENNE
%~ IRISA
%~ INRIA
%~ UNIV-RENNES
%~ IRISA_IMTA
%~ TEST-UR-CSS
%~ UR1-UFR-ISTIC
%~ UR1-HAL
%~ UR1-MATH-STIC
%~ CNRS
%~ IRISA-EASE-IMTA
%~ INRIA-RENGRE
%~ IMT-ATLANTIQUE
%~ UNIV-PARIS-SACLAY
Communication dans un congrès
Jacq Olivier, Boudvin Xavier, Brosset David, Kermarrec Yvon, Simonin Jacques
Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre
Cyber Security In Networking Conference, Oct 2018, Paris, France. Proceedings Cyber Security In Networking Conference, 2018
Details
Quote
Bibtext :
@inproceedings{jacq:hal-01911640,
TITLE = {{Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre}},
AUTHOR = {Jacq, Olivier and Boudvin, Xavier and Brosset, David and Kermarrec, Yvon and Simonin, Jacques},
URL = {https://hal.archives-ouvertes.fr/hal-01911640},
BOOKTITLE = {{Cyber Security In Networking Conference}},
ADDRESS = {Paris, France},
HAL_LOCAL_REFERENCE = {19267},
PAGES = {.},
YEAR = {2018},
MONTH = Oct,
KEYWORDS = {ICS ; SOC ; Maritime ; Cyber situation awareness},
HAL_ID = {hal-01911640},
HAL_VERSION = {v1},
}
Endnote :
%0 Conference Proceedings
%T Detecting and Hunting Cyberthreats in a Maritime Environment: Specification and Experimentation of a Maritime Cybersecurity Operations Centre
%+ Chaire cyberdéfense systèmes navals (Ecole Navale, IMT-Atlantique, THALES, DCNS)
%+ Département Logique des Usages, Sciences sociales et Sciences de l'Information (LUSSI)
%+ Département Systèmes Réseaux, Cybersécurité et Droit du numérique (SRCD)
%+ Lab-STICC_IMTA_CID_IRIS
%+ Lab-STICC_IMTA_CID_DECIDE
%A Jacq, Olivier
%A Boudvin, Xavier
%A Brosset, David
%A Kermarrec, Yvon
%A Simonin, Jacques
%< avec comité de lecture
%Z 19267
%( Proceedings Cyber Security In Networking Conference
%B Cyber Security In Networking Conference
%C Paris, France
%P .
%8 2018-10-24
%D 2018
%K ICS
%K SOC
%K Maritime
%K Cyber situation awareness
%Z Computer Science [cs]/Computers and Society [cs.CY]Conference papers
%X The vast majority of worldwide goods exchanges are made by sea. In some parts of the world, the concurrence for dominance at sea is very high and definitely seen as a main military goal. Meanwhile, new generation ships highly rely on information systems for communication, navigation and platform management. This ever-spreading attack surface and permanent satellite links have grown a concern about the potential impact of cyberattacks on a ship at sea or on naval shore infrastructures. Therefore, on top of the usual cyberprotection measures taken for safety reasons, it is essential to implement an ongoing cyber monitoring of ships in order to detect, react accordingly, and stop any incoming threat. In this paper, we explain the specific constraints when trying to assess the cyber situation awareness of maritime information systems. As we will demonstrate, those systems combine physical and logical constraints which complexify their cyber monitoring process and architecture. Gathering valuable data while having a limited and controlled impact on the satellite bandwidth, maintaining a high level of integrity on remote systems in production are, for instance, thriving challenges for both civilian and military ships. We have designed and set up a research platform which fulfils those specifications to streamline the cyber monitoring process.We will then describe the architecture used to detect cyber-threats and collect potential Indices of Compromise from naval systems, as well as the results we have currently achieved.
%G English
%L hal-01911640
%U https://hal.archives-ouvertes.fr/hal-01911640
%~ CNRS
%~ UNIV-BREST
%~ UNIV-UBS
%~ INSTITUT-TELECOM
%~ ENIB
%~ TDS-MACS
%~ LAB-STICC
%~ IMT-ATLANTIQUE
%~ IMTA_SRCD
%~ LAB-STICC_IMTA_CID_IRIS
%~ LAB-STICC_IMTA_CID_DECIDE
%~ IMTA_LUSSI
%~ LAB-STICC_IMTA
Communication dans un congrès
Kabil Alexandre, Duval Thierry, Cuppens Nora, Le Comte Gérard, Halgand Yoran, Ponchel Christophe
3D CyberCOP: a Collaborative Platform for Cybersecurity Data Analysis and Training
Luo, Yuhua. 15th International Conference on Cooperative Design, Visualization and Engineering, Oct 2018, Hangzou, China. Springer, pp.176-183, Cooperative Design, Visualization, and Engineering. 〈http://www.cdve.org/〉
Bibtext :
@inproceedings{kabil:hal-01831965,
TITLE = {{3D CyberCOP: a Collaborative Platform for Cybersecurity Data Analysis and Training}},
AUTHOR = {Kabil, Alexandre and Duval, Thierry and Cuppens, Nora and Le Comte, G{\'e}rard and Halgand, Yoran and Ponchel, Christophe},
URL = {https://hal.archives-ouvertes.fr/hal-01831965},
NOTE = {in proceedings of CDVE 2018 (15th International Conference on Cooperative Design, Visualization and Engineering), Springer, p. 176-183, Hangzhou, China, October 21-24, 2018},
BOOKTITLE = {{15th International Conference on Cooperative Design, Visualization and Engineering}},
ADDRESS = {Hangzou, China},
EDITOR = {Luo, Yuhua},
PUBLISHER = {{Springer}},
SERIES = {Cooperative Design, Visualization, and Engineering},
PAGES = {176-183},
YEAR = {2018},
MONTH = Oct,
PDF = {https://hal.archives-ouvertes.fr/hal-01831965/file/CDVE2018.pdf},
HAL_ID = {hal-01831965},
HAL_VERSION = {v1},
}
Endnote :
%0 Conference Proceedings
%T 3D CyberCOP: a Collaborative Platform for Cybersecurity Data Analysis and Training
%+ Lab-STICC_IMTA_CID_IHSEV
%+ Département Logique des Usages, Sciences sociales et Sciences de l'Information (LUSSI)
%+ Lab-STICC_IMTA_CID_IRIS
%+ Département Systèmes Réseaux, Cybersécurité et Droit du numérique (SRCD)
%+ Société Générale
%+ EDF (EDF)
%+ Airbus Defence & Space [Elancourt] (Airbus group)
%A Kabil, Alexandre
%A Duval, Thierry
%A Cuppens, Nora
%A Le Comte, Gérard
%A Halgand, Yoran
%A Ponchel, Christophe
%Z in proceedings of CDVE 2018 (15th International Conference on Cooperative Design, Visualization and Engineering), Springer, p. 176-183, Hangzhou, China, October 21-24, 2018
%< avec comité de lecture
%B 15th International Conference on Cooperative Design, Visualization and Engineering
%C Hangzou, China
%Y Luo, Yuhua
%I Springer
%3 Cooperative Design, Visualization, and Engineering
%P 176-183
%8 2018-10-21
%D 2018
%Z Computer Science [cs]/Graphics [cs.GR]
%Z Computer Science [cs]/Human-Computer Interaction [cs.HC]
%Z Computer Science [cs]/Cryptography and Security [cs.CR]Conference papers
%X Although Immersive Analytics solutions are now developed in order to ease data analysis, cyber security systems are still using classical graphical representations and are not harnessing yet the potential of virtual reality systems and collaborative virtual environments. 3D Col-laborative Virtual Environments (3DCVE) can be used in order to merge learning and data analysis approaches, as they can allow users to have a better understanding of a cyber situation by mediating interactions towards them and also by providing different points of view of the same data, on different scales. So we propose a 3D Cyber Common Operational Picture (3D CyberCOP) that will allow operators to face together a situation by using immersive and non immersive visualizations and by collaborating through user-defined roles. After visiting French Security Operations Centers (SOCs), we have defined a collaborative interaction model and some use-cases, to assess of the effectiveness of our solution.
%G English
%Z Chaire Cyber CNI
%2 https://hal.archives-ouvertes.fr/hal-01831965/document
%2 https://hal.archives-ouvertes.fr/hal-01831965/file/CDVE2018.pdf
%L hal-01831965
%U https://hal.archives-ouvertes.fr/hal-01831965
%~ CNRS
%~ UNIV-UBS
%~ INSTITUT-TELECOM
%~ ENIB
%~ LAB-STICC
%~ IMTA_SRCD
%~ LAB-STICC_IMTA_CID_IHSEV
%~ UNIV-BREST
%~ IMT-ATLANTIQUE
%~ LAB-STICC_IMTA_CID_IRIS
%~ IMTA_LUSSI
%~ EDF
%~ LAB-STICC_IMTA
See all publications of the department
Contacts
Responsable de département : Yann BUSNEL
Tél : +33 2 99 12 70 50
Assistante de département : Sandrine FROUIN
Tél : +33 2 99 12 70 54
> See all department's members
Useful informations: