Nga Nguyen is Associate Professor in Computer Science at ESILV and member of the Digital Group. Her research interests include software verification, safety and security of embedded systems.
Ihab Taleb; Guillaume Guérard; Frédéric Fauberteau; Nga Nguyen
Holonic Energy Management Systems: Towards Flexible and Resilient Smart Grids Article de journal
Dans: Agents and Artificial Intelligence, vol. 14546, p. 95-112, 2024.
@article{taleb_2936,
title = {Holonic Energy Management Systems: Towards Flexible and Resilient Smart Grids},
author = {Ihab Taleb and Guillaume Guérard and Frédéric Fauberteau and Nga Nguyen},
url = {https://link.springer.com/chapter/10.1007/978-3-031-55326-4_5},
year = {2024},
date = {2024-03-01},
journal = {Agents and Artificial Intelligence},
volume = {14546},
pages = {95-112},
abstract = {The increasing global warming and soaring fossil fuel prices have made energy generation minimization a crucial objective. As a result, the relevance of smart grids has significantly grown, especially in the context of regulating energy demand based on available resources. This necessitates the implementation of Demand Side Management (DSM) tools for effective regulation. While various models and architectures have been developed for smart grids, the utilization of holonic architectures remains limited in existing literature. In this paper, we propose a holonic architecture specifically tailored for smart grids, which proves to be highly advantageous. Holonic architectures are particularly valuable in smart grids as they enable seamless operation among different actors, even during technical challenges. Our proposed model consists of interconnected agents forming holons, with five agents working in tandem to ensure flexibility across multiple aspects. We have tested this model in three different scenarios. The first scenario represents a healthy grid. The second scenario simulates a grid with production mismanagement. Lastly, the third one simulates a grid experiencing a region-specific blackout. Results show how the grid distributes the available energy depending on the available production, storage (if any) and the assurance of the distribution across the various requesting holons.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Théo Serru; Nga Nguyen; Michel Batteux; Antoine Rauzy
Minimal Critical Sequences in Model-Based Safety and Security Analyses: Commonalities and Differences Article de journal
Dans: ACM Transactions on Cyber-Physical Systems, vol. 7, no. 3, p. 1-20, 2023.
@article{serru_2313,
title = {Minimal Critical Sequences in Model-Based Safety and Security Analyses: Commonalities and Differences},
author = {Théo Serru and Nga Nguyen and Michel Batteux and Antoine Rauzy},
url = {https://dl.acm.org/doi/10.1145/3593811},
year = {2023},
date = {2023-07-01},
journal = {ACM Transactions on Cyber-Physical Systems},
volume = {7},
number = {3},
pages = {1-20},
abstract = {Discrete event systems are increasingly used as a modeling tool to assess safety and cybersecurity of complex systems. In both cases, the analysis relies on the extraction of critical sequences. This approach proves to be very powerful. It suffers however from the combinatorial explosion of the number of sequences to look at. To push the limits of what is feasible with reasonable computational resources, extraction algorithms use cutoffs and minimality criteria.
In this article, we review the principles of extraction algorithms and we show that there are important differences between critical sequences extracted in the context of safety analyses and those extracted in the context of cybersecurity analyses. Based on this thorough comparison, we introduce a new cutoff criterion, so-called footprint, that aims at capturing the willfulness of an intruder performing a cyberattack. We illustrate our presentation by means of three case studies, one focused on the analysis of failures and two focused on the analysis of cyberattacks and their effects on safety. We show experimentally the interest of the footprint criterion.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Ihab Taleb; Guillaume Guérard; Frédéric Fauberteau; Nga Nguyen
Holonic Energy Management Systems: Towards Flexible and Resilient Smart Grids Article de journal
Dans: 2023.
@article{taleb_2073,
title = {Holonic Energy Management Systems: Towards Flexible and Resilient Smart Grids},
author = {Ihab Taleb and Guillaume Guérard and Frédéric Fauberteau and Nga Nguyen},
url = {https://link.springer.com/chapter/10.1007/978-3-031-55326-4_5},
year = {2023},
date = {2023-02-01},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Théo Serru; Nga Nguyen; Michel Batteux; Antoine Rauzy
Modeling Cyberattack Propagation and Impacts on Cyber-Physical System Safety: An Experiment Article de journal
Dans: Electronics, vol. 12, no. 1, p. 77, 2022.
@article{serru_2072,
title = {Modeling Cyberattack Propagation and Impacts on Cyber-Physical System Safety: An Experiment},
author = {Théo Serru and Nga Nguyen and Michel Batteux and Antoine Rauzy},
url = {https://www.mdpi.com/2079-9292/12/1/77},
year = {2022},
date = {2022-12-01},
journal = {Electronics},
volume = {12},
number = {1},
pages = {77},
abstract = {In this article, we present an experiment we conducted with discrete event simulations
to analyze the effects of multi-step cyberattacks on the safety of cyber-physical systems. We show how to represent systems, their components (either software and/or hardware), communication links, security measures, and attacks from a malicious intruder. The latter are typically taken from the MITRE ATT&CK knowledge base. The discrete event simulation method makes it possible to represent any event affecting the system. We illustrate our approach by means of an illustrative example involving cyberattacks against the navigation system of an autonomous ship. We show how the formal modeling language AltaRica, primarily dedicated to safety analyses, can assess this illustrative example by representing the system and automatically extracting sequences of attacks,
leading to a safety-critical situation, namely the deviation of the ship by the attacker. This article aims to discuss this approach and to outline the lessons learned from our experience.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Ihab Taleb; Guillaume Guérard; Nga Nguyen; Frédéric Fauberteau
A Flexible Deep Learning Method for Energy Forecasting Article de journal
Dans: Energies, vol. 15, no. 11, p. 3926, 2022.
@article{taleb_1836,
title = {A Flexible Deep Learning Method for Energy Forecasting},
author = {Ihab Taleb and Guillaume Guérard and Nga Nguyen and Frédéric Fauberteau},
url = {https://www.mdpi.com/1996-1073/15/11/3926},
year = {2022},
date = {2022-05-01},
journal = {Energies},
volume = {15},
number = {11},
pages = {3926},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Saoussen Mili; Nga Nguyen; Rachid Chelouah
Model-Driven Architecture Based Security Analysis Article de journal
Dans: Systems Engineering, vol. 24, no. 5, p. 307-321, 2021.
@article{mili_1606,
title = {Model-Driven Architecture Based Security Analysis},
author = {Saoussen Mili and Nga Nguyen and Rachid Chelouah},
url = {https://onlinelibrary.wiley.com/doi/10.1002/sys.21581},
year = {2021},
date = {2021-09-01},
journal = {Systems Engineering},
volume = {24},
number = {5},
pages = {307-321},
abstract = {This paper proposes a Model-Driven Architecture approach for the development of an embedded system validation platform namely Model-Based Security Analysis for Embedded Systems (MBSAES). The security properties are formally modeled and verified at an early stage of the design process of the system, which helps to reduce late errors and development time. A separation of the attack scenarios and the system design from the implementation details has been respected. To transform semi-formal models from SysML to NuSVM model checking platform, two Model-to-Text, horizontal and exogenous transformations have been implemented. The first one employs a programming approach with Java to create a Computational Tree Logic specification from an Extended Attack Tree, whereas the second one uses a template approach with Acceleo to generate NuSMV code from SysML structural and behavioral models. To illustrate our approach, a case study, involving attacks aiming to unlock car door systems, via signal jamming and code replaying, is considered. The results of this research will contribute to the automatic validation of system designs against security vulnerabilities via a database of extended attack trees building from existing atomic attacks.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Lylia Alouache; Nga Nguyen; Makhlouf Aliouat; Rachid Chelouah
HSDN-GRA: a hybrid SDN-based geographic routing protocol with multi-agent approach Article de journal
Dans: International Journal Of Communication Systems, vol. 33, no. 15, p. 1-xx, 2020.
@article{alouache_2624,
title = {HSDN-GRA: a hybrid SDN-based geographic routing protocol with multi-agent approach},
author = {Lylia Alouache and Nga Nguyen and Makhlouf Aliouat and Rachid Chelouah},
url = {https://onlinelibrary.wiley.com/doi/10.1002/dac.4521},
year = {2020},
date = {2020-10-01},
journal = {International Journal Of Communication Systems},
volume = {33},
number = {15},
pages = {1-xx},
abstract = {We propose in this paper a Hybrid Software-Defined Networking-based Geographical Routing Protocol (HSDN-GRA) with a clustering approach. It takes into account three different criteria to select the best relay to send data: (1) the contact duration between vehicles, (2) the available load of each vehicle, (3) and the log of encountered communication errors embedded in each cluster head. The multi-criteria strategy allows the selection of the most reliable vehicles by avoiding communication problems and ensuring connection availability. Once the hybrid control plane has found out the next eligible neighbor, the data plane will be in charge of dividing and sending data. To validate our approach, HSDN-GRA has been modeled and implemented in JADE, a multi-agent platform, to be compared to other multi-agent based protocols. Simulation results show that HSDN-GRA achieves good performance with respect to the average routing overhead, the packet drop rate, and the throughput.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Anis Baklouti; Nga Nguyen; Faïda Mhenni; Jean-Yves Choley; Abdelfattah Mlika
Dynamic fault tree generation for safety critical systems within a systems engineering approach Article de journal
Dans: Ieee Systems Journal, vol. 14, no. 1, p. 1512 - 1522, 2020.
@article{baklouti_2622,
title = {Dynamic fault tree generation for safety critical systems within a systems engineering approach},
author = {Anis Baklouti and Nga Nguyen and Faïda Mhenni and Jean-Yves Choley and Abdelfattah Mlika},
url = {10.1109/JSYST.2019.2930184},
year = {2020},
date = {2020-03-01},
journal = {Ieee Systems Journal},
volume = {14},
number = {1},
pages = {1512 - 1522},
abstract = {Systems are getting increasingly complex and challenging to design. For safety-critical systems, the integration between model-based systems engineering and model-based safety assessment to improve the choice of the system architecture since the early design stage becomes a necessity. One of the integration solutions is to generate fault trees (FTs), either static or dynamic, directly from the system description. In this paper, we are particularly interested in the generation of the dynamic fault trees (DFTs) of the systems that contain redundancies, which is widely used in safety-critical systems to enhance their reliability. The goal of this paper is, first, to propose a redundancy profile and, second, to automatically generate the DFTs from system models. Since errors are propagated via input and output ports of the components, the generation process starts with a depth-first search graph traversal through the systems modeling language internal block diagram of the system. This diagram is considered as a multidirected graph in order to detect the external inputs, the nonredundant components, the switch components, and the redundant components of the system. Then, the redundancy information incorporated in the system model is used to generate the appropriate combinations of the FT. This FT is represented in a suitable format that can be studied using FT analysis tools, for both qualitative and quantitative safety analyses.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Saoussen Mili; Nga Nguyen; Rachid Chelouah
Transformation-based approach to security verification for cyber-physical systems Article de journal
Dans: Ieee Systems Journal, vol. 13, no. 4, p. 3989-4000, 2019.
@article{mili_2620,
title = {Transformation-based approach to security verification for cyber-physical systems},
author = {Saoussen Mili and Nga Nguyen and Rachid Chelouah},
url = {10.1109/JSYST.2019.2923818},
year = {2019},
date = {2019-12-01},
journal = {Ieee Systems Journal},
volume = {13},
number = {4},
pages = {3989-4000},
abstract = {The increasing complexity of cyber-physical systems motivates new modeling approaches to ensure system security right from the design process. In this paper, we present a model-based approach to formally validate communicating systems against cyber-attacks. Security requirements are modeled by using the unified modeling language (UML) extended attack tree profile with temporal logic operators. Moreover, to identify attack propagation, another UML profile, i.e., the connectivity profile, has been integrated to model interactions between system components. In order to carry out a formal verification of the system, a transformation platform that automatically generates a new symbolic model verifier code from systems modeling language (SysML) models for both static and dynamic aspects has been developed. The modeling and validation process is illustrated via two case studies on connected cars: 2014 Jeep Cherokee attack and 2016 Tesla Model S attack.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Nga Nguyen; Faïda Mhenni; Jean-Yves Choley; Abdelfattah Mlika
Improved safety analysis integration in systems engineering approach. Article de journal
Dans: vol. 9, no. 6, p. 1-18, 2019.
@article{nguyen_2619,
title = {Improved safety analysis integration in systems engineering approach.},
author = {Nga Nguyen and Faïda Mhenni and Jean-Yves Choley and Abdelfattah Mlika},
url = {https://doi.org/10.3390/app9061246},
year = {2019},
date = {2019-03-01},
volume = {9},
number = {6},
pages = {1-18},
abstract = {The goal of the paper is the integration of safety analysis in a model-based systems engineering approach to ensure consistency between system design and safety artifacts. This integration permits the continuous improvement of the structure and behavior of the system. It also reduces system development time and prevents late detection of errors. To reach this purpose, the SafeSysE methodology is extended. In SafeSysE, a preliminary Failure Mode and Effects Analysis (FMEA) is automatically generated from a SysML model, and this FMEA is then completed by the safety expert but no further development was proposed. The contribution of this paper is to suggest recommendations based on the FMEA analysis in order to enhance the system design and make it comply with safety requirements. First, an updated system structure that may contain redundancy is proposed. Then, a redundancy profile is used to enrich the system model with redundancy information, which will allow the generation of a dynamic fault tree considering the system behavior. Finally, the generated dynamic fault tree should be analyzed in order to create a state machine diagram that describes the behavior of the system. The created state machine with an internal block diagram will help the system designers to better understand the system dysfunctions by simulating the system. The proposed methodology is applied to an Electro-Mechanical Actuator system which is used in the aeronautics domain.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Lylia Alouache; Nga Nguyen; Makhlouf Aliouat; Rachid Chelouah
Survey on IoV routing protocols: Security and network architecture Article de journal
Dans: International Journal Of Communication Systems, vol. 32, no. 2, p. 1-21, 2019.
@article{alouache_2617,
title = {Survey on IoV routing protocols: Security and network architecture},
author = {Lylia Alouache and Nga Nguyen and Makhlouf Aliouat and Rachid Chelouah},
url = {https://doi.org/10.1002/dac.3849},
year = {2019},
date = {2019-01-01},
journal = {International Journal Of Communication Systems},
volume = {32},
number = {2},
pages = {1-21},
abstract = {As today, vehicles are equipped with wireless sensors and on-board computers capable of collecting and processing a large amount of data; they can communicate to each other via different communication types and through different relay nodes. Internet of Vehicles (IoV) routing protocols are deployed to monitor these communications with various strategies to achieve a high availability of communication. In this paper, we propose to extend an existing taxonomy representing the necessary criteria to build IoV routing algorithms, by adding two new important criteria: security aspect and network architecture. Enhanced vehicular routing protocols with different security mechanisms have been studied, compared, and classified with respect to the authentication, the integrity, the confidentiality, the nonrepudiation, and the availability of data and communications. Routing protocols using the software-defined networking (SDN) paradigm have also been reviewed in order to compare with those with traditional network architectures. Three types of SDN routing protocols, namely, centralized, decentralized, and hybrid control planes, have been analyzed. This survey will be useful for the choice of IoV routing protocols that take into account the flexibility, the scalability, and the intelligence of vehicular networks, as well as the security mechanisms against cyberattacks while being cost aware.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Faïda Mhenni; Nga Nguyen; Jean-Yves Choley
SafeSysE: A safety analysis integration in systems engineering approach Article de journal
Dans: Ieee Systems Journal, vol. 12, no. 1, p. 161-172, 2018.
@article{mhenni_2613,
title = {SafeSysE: A safety analysis integration in systems engineering approach},
author = {Faïda Mhenni and Nga Nguyen and Jean-Yves Choley},
url = {10.1109/JSYST.2016.2547460},
year = {2018},
date = {2018-03-01},
journal = {Ieee Systems Journal},
volume = {12},
number = {1},
pages = {161-172},
abstract = {The main objective of this paper is the integration of safety analysis in a SysML-based systems engineering approach in order to make it more effective and efficient. It helps to ensure the consistency between safety analyses and system design and then to avoid late errors and to reduce system development time. To achieve this purpose, we tackled the following axes: 1) formalizing a SysML-based design methodology that will be the support for safety analyses; 2) providing an extension of SysML to enable the integration of specific needs for safety concepts in the system model; and 3) performing an automated exploration of the SysML models to generate necessary information to elaborate safety artifacts such as failure mode and effects analysis (FMEA) and fault tree analysis (FTA). The proposed methodology named safety integration in systems engineering (SafeSysE) is applied to a real case study from the aeronautics domain: electromechanical actuator (EMA).},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Nga Nguyen
Organisation et bilan du cours Securing Embedded Software à l'ESILV Conférence
Rendez-vous de la recherche et de l'enseignement de la sécurité des systèmes d'information, Eppe-Sauvage, 2024.
@conference{nguyen_2894,
title = {Organisation et bilan du cours Securing Embedded Software à l'ESILV},
author = {Nga Nguyen},
url = {https://ressi2024.sciencesconf.org/},
year = {2024},
date = {2024-05-01},
booktitle = {Rendez-vous de la recherche et de l'enseignement de la sécurité des systèmes d'information},
address = {Eppe-Sauvage},
abstract = {Cet article présente mes retours d'expérience de l'enseignement du cours Sécurisation du logiciel embarqué aux étudiants ingénieurs de la majeure Objets connectés et Cybersécurité de l'ESILV. Le premier objectif de ce cours est d'enseigner les abstractions présentes entre un programme et sa plate-forme d'exécution, ainsi que certains détails d'implantation, afin que les étudiants soient capables de trouver et d'éliminer efficacement les bogues et de protéger les systèmes embarqués contre les attaques qui peuvent nuire à leur sûreté et à leur sécurité. Le deuxième objectif est d'introduire les concepts essentiels liés à la notion de qualité des logiciels embarqués, avec les différentes méthodes de vérification et de validation.
Des travaux pratiques ludiques sous forme de labs avec des scores mis à jour en temps réel sur un serveur sont réalisés, selon le rythme d'avancement de chaque étudiant. Lors de ce cours, nous utilisons des outils open-source d'analyse dynamique et statique du code afin d'assurer la qualité du logiciel embarqué. L'enseignement a des retours très positifs des étudiants, futurs ingénieurs en cybersécurité.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Théo Serru; Nga Nguyen; Michel Batteux
Position Paper, 42nd International Conference on Computer Safety, Reliability and Security, Toulouse, France, 2023.
@conference{serru_2381,
title = {Modeling Cyberattacks Affecting Systems' Safety with AltaRica: Achievements and Future Works, Position Paper},
author = {Théo Serru and Nga Nguyen and Michel Batteux},
url = {https://safecomp2023.cnrs.fr/},
year = {2023},
date = {2023-09-01},
booktitle = {Position Paper, 42nd International Conference on Computer Safety, Reliability and Security},
address = {Toulouse, France},
abstract = {Cyber-physical systems are safety and security-critical because of their close interactions with humans and the environment. For this reason, their failures may have effects on humans, making them safety-critical. On the other hand, the integration of computational capabilities brings the risks of cyberattacks that may have effects on confidentiality, integrity, availability, and also safety. In the industry, the cybersecurity risk analysis of cyber-physical systems is insufficiently automatized and error-prone.
To tackle this open issue, we propose a model-based approach using the formal language AltaRica and the industrial tool SimfiaNeo, to model systems, their behaviors in case of cyberattacks, and automatically generate the full set of attack scenarios leading to a safety-critical situation. In addition to the modeling, we propose a heuristic cutoff to reduce the state-space explosion. We end this position paper by evoking the remaining issues and future challenges of this work.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Théo Serru; Nga Nguyen; Michel Batteux; Antoine Rauzy; Raphaël Blaize; Laurent Sagaspe; Emmanuel Arbaretier
Discussions About Model Based Security for Cyber Physical Systems Conférence
Congrès de maîtrise des risques et de sûreté de fonctionnement, Paris, France, 2022.
@conference{serru_1806,
title = {Discussions About Model Based Security for Cyber Physical Systems},
author = {Théo Serru and Nga Nguyen and Michel Batteux and Antoine Rauzy and Raphaël Blaize and Laurent Sagaspe and Emmanuel Arbaretier},
url = {https://www.imdr-lambdamu.eu/},
year = {2022},
date = {2022-10-01},
booktitle = {Congrès de maîtrise des risques et de sûreté de fonctionnement},
address = {Paris, France},
abstract = {Cyber-Physical Systems (CPSs) are intensively used in many different kinds of industrial
systems. Whether you are driving a recent car, taking the plane, having a smartphone or smart watch, you interact with CPSs. If we sometimes feel more comfortable or secure with them, these systems are very exposed to cyber-attacks. This is due to their highly interconnected nature and implies that they need to be carefully protected. Thus, one of their main challenges is to ensure their security.
Recent years have seen an increasing concern about the cybersecurity of CPSs and many methods have been developed to answer their challenges.
In this article, we focus on a recent philosophy of doing cybersecurity, inspired by Model
Based System Engineering (MBSE), called Model Based Security (MBS) or Model Driven Security [1]. This specialization of MBSE has been first applied to IT systems and is now a growing research field for CPSs as it helps to automatize cybersecurity assessments that are quickly intractable for engineers working on complex systems.
Despite the growing interest regarding MBS for CPSs, this method is poorly applied in
industry. Most of the works have been made in research labs and have not yet reached industrial application level. Furthermore, these works are relatively diverse and focus on different fields or different aspects of security. This variety is a chance and a problem because there is no consensus in the community on how to apply MBS to CPSs. Indeed, there is no established formal way to define systems (especially the interactions between the physical and cyber layer), threat models, scenarios of
attacks (qualitative analysis), potentiality evaluation (quantitative analysis), deployment phases, etc. [1] [2]. In addition, the abstraction is too high level to describe the complex interactions involved in CPSs or too low level to handle complexity [3].
The major contribution of this work is thus to summarize the actual strengths and weaknesses
of MBS for CPS. To do so, we propose to dig into some recent works and analyze them to understand the needs and missing theoretical background in this field. Then, with a clear overview of the issues about MBS, we will identify some solutions or trigger points that might help to make this type of
approach more attractive and exhaustive.
Finally, it will be possible to introduce an approach allowing MBS for CPS with the concern to cover some challenges of MBS for CPS with a simplistic, yet comprehensive, formalism.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Ihab Taleb; Guillaume Guérard; Frédéric Fauberteau; Nga Nguyen
A Holonic Smart Grid Model for Isolated Areas Conférence
European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, PhD Forum, Grenoble, France, 2022.
@conference{taleb_1934,
title = {A Holonic Smart Grid Model for Isolated Areas},
author = {Ihab Taleb and Guillaume Guérard and Frédéric Fauberteau and Nga Nguyen},
url = {https://2022.ecmlpkdd.org/index.php/phd-forum/},
year = {2022},
date = {2022-09-01},
booktitle = {European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, PhD Forum},
address = {Grenoble, France},
abstract = {Since the beginning of the $21$st century, smart grid models are gaining more and more importance as they play a major role in the demand side management and the flexible integration of renewable energy sources. Indeed, diverse architectures and models have been proposed for smart grids. In this paper, we propose a model composed of two parts, the first part is to optimize, on a weekly scale, thermal generation, and energy storage while prioritizing renewable energy sources to minimize global costs and global warming effects. The second part consists of, having optimized production and storage, the negotiation between neighboring holons on the same level using evolutionary game theory, combined with simulated annealing and Q-learning approaches to ensure a back and forth between the various levels.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Lylia Alouache; Nga Nguyen; Makhlouf Aliouat; Rachid Chelouah
New robust protocol for IoV communications Book Section
Dans: Szoniecky, Imad Saleh; Mehdi Ammi; Samuel (Ed.): Challenges of the Internet of Things : Technology, Use, Ethics, vol. 1, p. 137-163, Wiley Data and Cybersecurity, France, 2018, ISBN: 9781119549758.
@incollection{alouache_2615,
title = {New robust protocol for IoV communications},
author = {Lylia Alouache and Nga Nguyen and Makhlouf Aliouat and Rachid Chelouah},
editor = {Imad Saleh; Mehdi Ammi; Samuel Szoniecky},
url = {0.1002/9781119549765.ch7},
issn = {9781119549758},
year = {2018},
date = {2018-01-01},
booktitle = {Challenges of the Internet of Things : Technology, Use, Ethics},
volume = {1},
pages = {137-163},
publisher = {Wiley Data and Cybersecurity},
address = {France},
abstract = {This chapter presents some definitions of vehicle networks, application areas, communication technologies and barriers that disrupt communications and deteriorate quality of service (QoS) in the Internet of Vehicles (IoV). Next, it describes the latest developments in vehicular networks, the axes of research concerning the layered architecture of the IoV and an overview of the work being conducted pertaining to multi?hop and reactive routing protocols. The chapter further gives a detailed explanation of the authors' routing protocol for IoV communications. This is made up of three different phases: the estimation of contact duration and load balancing, the use and updating of communication anomaly logs and hop?by?hop routing calculation. The goal of the routing algorithm proposed is to find a solution for one?to?one communications between a mobile source and a fixed or a mobile source, via intermediary vehicles, as part of the application of the IoV on a one?dimensional plane.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Lylia Alouache; Nga Nguyen; Makhlouf Aliouat; Rachid Chelouah
Importance des stratégies de routage dans la gestion des systèmes de transport intelligent Book Section
Dans: Didier Nappi-Choulet Desponds, Ingrid (Ed.): Territoires intelligents : un modèle si smart, vol. 2018, p. 87-100, Editions de l'Aube, France, 2018, ISBN: 978-2-8159-3002-4.
@incollection{alouache_2616,
title = {Importance des stratégies de routage dans la gestion des systèmes de transport intelligent},
author = {Lylia Alouache and Nga Nguyen and Makhlouf Aliouat and Rachid Chelouah},
editor = {Desponds, Didier Nappi-Choulet, Ingrid},
url = {https://www.scholarvox.com/catalog/book/88863492},
issn = {978-2-8159-3002-4},
year = {2018},
date = {2018-01-01},
booktitle = {Territoires intelligents : un modèle si smart},
volume = {2018},
pages = {87-100},
publisher = {Editions de l'Aube},
address = {France},
abstract = {Partout dans le monde surgissent des projets urbains qui réfèrent aux « territoires intelligents » : simple effet de mode ou signe d'une mutation profonde dans la manière d'articuler sobriété énergétique, mobilités innovantes, pratiques participatives ? En croisant les approches de spécialistes venus des horizons les plus variés (sciences et techniques, sciences humaines et sociales, communication, responsables territoriaux), cet ouvrage vise à interroger le sens de ces transformations émergentes. Comment passe-t-on du démonstrateur à la transformation des écosystèmes territoriaux ? Comment intègre-t-on les intérêts spécifiques et souvent divergents des entreprises, des acteurs politiques et des habitants ? Comment dépasse-t-on les modèles « clés en main » pour prendre en compte les besoins des populations ? A quelles conditions les nouveaux projets peuvent-ils être acceptés versus rejetés par ceux auxquels ils sont censés être destinés ? Voici quelques-unes des questions que cet ouvrage se propose d'aborder, en décryptant les enjeux soulevés par cette nouvelle utopie.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Ihab Taleb; Guillaume Guérard; Frédéric Fauberteau; Nga Nguyen
Holonic Energy Management Systems: Towards Flexible and Resilient Smart Grids Proceedings Article
Dans: International Conference on Agents and Artificial Intelligence, p. 95-112, Springer, Lisbon, Portugal, 2024.
@inproceedings{taleb_2936,
title = {Holonic Energy Management Systems: Towards Flexible and Resilient Smart Grids},
author = {Ihab Taleb and Guillaume Guérard and Frédéric Fauberteau and Nga Nguyen},
url = {https://link.springer.com/chapter/10.1007/978-3-031-55326-4_5},
year = {2024},
date = {2024-03-01},
booktitle = {International Conference on Agents and Artificial Intelligence},
volume = {14546},
pages = {95-112},
publisher = {Springer},
address = {Lisbon, Portugal},
edition = {LNCS},
abstract = {The increasing global warming and soaring fossil fuel prices have made energy generation minimization a crucial objective. As a result, the relevance of smart grids has significantly grown, especially in the context of regulating energy demand based on available resources. This necessitates the implementation of Demand Side Management (DSM) tools for effective regulation. While various models and architectures have been developed for smart grids, the utilization of holonic architectures remains limited in existing literature. In this paper, we propose a holonic architecture specifically tailored for smart grids, which proves to be highly advantageous. Holonic architectures are particularly valuable in smart grids as they enable seamless operation among different actors, even during technical challenges. Our proposed model consists of interconnected agents forming holons, with five agents working in tandem to ensure flexibility across multiple aspects. We have tested this model in three different scenarios. The first scenario represents a healthy grid. The second scenario simulates a grid with production mismanagement. Lastly, the third one simulates a grid experiencing a region-specific blackout. Results show how the grid distributes the available energy depending on the available production, storage (if any) and the assurance of the distribution across the various requesting holons.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Sa?chez-Girón Coca Celia; Luc Perera; Mathis Boiteau; Antoine Costanza; Jérôme Grison; Sarnette Emmanuel; Michèle Kanhonou; Frédéric Fauberteau; Nga Nguyen; Jouvelot Pierre
Tala Box: an Interactive Embedded System to Accompany Patients with Cognitive Disorders Proceedings Article
Dans: IEEE/ACM international conference on Connected Health: Applications, Systems and Engineering Technologies, Orlando (Florida), United States, 2023, ISBN: 979-8-4007-0102-3.
@inproceedings{celia_2314,
title = {Tala Box: an Interactive Embedded System to Accompany Patients with Cognitive Disorders},
author = {Sa?chez-Girón Coca Celia and Luc Perera and Mathis Boiteau and Antoine Costanza and Jérôme Grison and Sarnette Emmanuel and Michèle Kanhonou and Frédéric Fauberteau and Nga Nguyen and Jouvelot Pierre},
url = {https://hal-mines-paristech.archives-ouvertes.fr/hal-04071711},
issn = {979-8-4007-0102-3},
year = {2023},
date = {2023-06-01},
booktitle = {IEEE/ACM international conference on Connected Health: Applications, Systems and Engineering Technologies},
address = {Orlando (Florida), United States},
abstract = {Given the lack of drugs to treat cognitive deficit disorders, nonpharmacological approaches have become popular to address these pathologies. In particular, music therapy has been successfully used with Alzheimer's patients to improve their mood and functional abilities. The Tala Sound project studies whether non-Western music from the southern regions of India can be used to improve the mood and functional abilities of Western people suffering from Alzheimer's disease. This traditional style of music, called Carnatic music, is based on specific rhythm sequences, called "talas", that have an irregular rhythm compared to the ones found in Western music. In this paper, we describe the Tala Box, a new multimedia sensory device with which patients can interact while a Carnatic song is being played. The motivation for the development of this embedded system is the intent, in addition to the unusual nature of the music played, to use motor and cognitive stimulation to better engage Alzheimer's patients and, hopefully, improve their mood and mental state. Preliminary testing with healthy seniors has shown great interest in the Tala Box.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Alexis Raynaud; Théo Serru; Nga Nguyen
Attack Scenarios Generation Algorithm Based on Discrete Event System Formalism Proceedings Article
Dans: Challenges and New Approaches for Dependable and Cyber-Physical System Engineering (DeCPS 2023), Lisbon, Portugal, 2023.
@inproceedings{raynaud_2317,
title = {Attack Scenarios Generation Algorithm Based on Discrete Event System Formalism},
author = {Alexis Raynaud and Théo Serru and Nga Nguyen},
url = {http://www.ada-europe.org/conference2023/media/AEiC_2023_Final_Program.pdf},
year = {2023},
date = {2023-06-01},
booktitle = {Challenges and New Approaches for Dependable and Cyber-Physical System Engineering (DeCPS 2023)},
address = {Lisbon, Portugal},
abstract = {To help automatize the security risk assessment process of Cyber-Physical Systems (CPS), we propose a tool based on Discrete Event Systems (DES) to model the architecture and the behavior of CPS in the presence of cyberattacks.
Then, we present a lightweight algorithm to generate all the attack scenarios threatening a system, i.e. the sequences of attacks leading to a critical state (e.g. loss of control, collision, etc.).
This kind of generation being prone to combinatorial explosion, our algorithm embeds state-space reduction capabilities focused on the specificities of cyber-physical attacks.
Finally, we illustrate the performance of our algorithm on a case study: the navigation system of an autonomous vessel.
This work can be seen as an alternative to heavy tools expressed in specific languages.
It is open source and aims to give a good compromise between expressiveness, modeling time and computational power.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Ihab Taleb; Guillaume Guérard; Frédéric Fauberteau; Nga Nguyen
A holonic multi-agent architecture for smart grids Proceedings Article
Dans: International Conference on Agents and Artificial Intelligence, Lisbon, Portugal, 2023, ISBN: 978-989-758-547-0.
@inproceedings{taleb_2073,
title = {A holonic multi-agent architecture for smart grids},
author = {Ihab Taleb and Guillaume Guérard and Frédéric Fauberteau and Nga Nguyen},
url = {https://icaart.scitevents.org/},
issn = {978-989-758-547-0},
year = {2023},
date = {2023-02-01},
booktitle = {International Conference on Agents and Artificial Intelligence},
address = {Lisbon, Portugal},
abstract = {The global warming and the increase of fossil fuel prices make the minimization of energy generation an important objective. Thus, smart grids are becoming more and more relevant in a context where we want to regulate the demand according to the available energy. This regulation can be operated thanks to Demand Side Management (DSM) tools. While different models and architectures have been developed for smart grids, only few papers used holonic architectures. For this, we propose in this paper a holonic architecture for smart grids. This type of architectures is relevant to smart grids as it allow the various actors in the grids to work even in the cases of technical problems. Holons in the proposed model are composed of five interconnecting agents that ensure flexibility on the various aspects. This model has been tested and has proven to work on 3 different scenarios. The first scenario simulates a grid in its healthy state. The second one simulates a grid where a region can be disconnected from a blackout for example. The third one simulates a grid with production mismanagement. Results show how the grid distributes the available energy depending on the available production, priorities (if any) and the assurance of the distribution across the various requesting holons.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Ihab Taleb; Guillaume Guérard; Frédéric Fauberteau; Nga Nguyen
A holonic multi-agent architecture for smart grids Proceedings Article
Dans: International Conference on Agents and Artificial Intelligence, Lisbon, Portugal, 2023.
@inproceedings{taleb_2237,
title = {A holonic multi-agent architecture for smart grids},
author = {Ihab Taleb and Guillaume Guérard and Frédéric Fauberteau and Nga Nguyen},
url = {http://www.wikicfp.com/cfp/servlet/event.showcfp?copyownerid=90704&eventid=167079},
year = {2023},
date = {2023-02-01},
booktitle = {International Conference on Agents and Artificial Intelligence},
address = {Lisbon, Portugal},
abstract = {The global warming and the increase of fossil fuel prices make the minimization of energy generation animportant objective. Thus, smart grids are becoming more and more relevant in a context where we want toregulate the demand according to the available energy. This regulation can be operated thanks to Demand SideManagement (DSM) tools. While different models and architectures have been developed for smart grids,only few papers used holonic architectures. For this, we propose in this paper a holonic architecture for smartgrids. This type of architectures is relevant to smart grids as it allows the various actors in the grids to workeven in the cases of technical problems. Holons in the proposed model are composed of five interconnectingagents that ensure flexibility on the various aspects. This model has been tested and has proven to work on3 different scenarios. The first scenario simulates a grid in its healthy state. The second one simulates agrid where a region can be disconnected from a blackout for example. The third one simulates a grid withproduction mismanagement. Results show how the grid distributes the available energy depending on theavailable production, priorities (if any) and the assurance of the distribution across the various requestingholons.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Guillaume Guérard; Ihab Taleb; Frédéric Fauberteau; Nga Nguyen
Modélisation Multi-Agent pour les Réseaux Energétique Insulaires Proceedings Article
Dans: Journées Francophones sur les Systèmes Multi-Agents, Saint-Etienne, France, 2022.
@inproceedings{guerard_1831,
title = {Modélisation Multi-Agent pour les Réseaux Energétique Insulaires},
author = {Guillaume Guérard and Ihab Taleb and Frédéric Fauberteau and Nga Nguyen},
url = {https://ci.mines-stetienne.fr/pfia2022/conferences/jfsma/},
year = {2022},
date = {2022-06-01},
booktitle = {Journées Francophones sur les Systèmes Multi-Agents},
address = {Saint-Etienne, France},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Adam Talbi; Arthur Viens; Louis-Clément Leroux; Morgane François; Mathias Caillol; Nga Nguyen
Feature Importance And Deep Learning For Android Malware Detection Proceedings Article
Dans: International Conference on Information Systems Security and Privacy, Vienna, Austria, 2022.
@inproceedings{talbi_1741,
title = {Feature Importance And Deep Learning For Android Malware Detection},
author = {Adam Talbi and Arthur Viens and Louis-Clément Leroux and Morgane François and Mathias Caillol and Nga Nguyen},
url = {https://icissp.scitevents.org/Home.aspx},
year = {2022},
date = {2022-02-01},
booktitle = {International Conference on Information Systems Security and Privacy},
address = {Vienna, Austria},
abstract = {Effective and efficient malware detection is key in today's world to prevent systems from being compromised, to protect personal user data, and to tackle other security issues. In this paper, we worked on Android malware detection by using static analysis features and deep learning methods to separate benign applications from malicious ones. Custom feature vectors are extracted from the Drebin and the AndroZoo dataset and different data science methods of feature importance are used to improve the results of Deep Neural Network classification.
Experimental results on the Drebin dataset were significant with 99.31% accuracy in malware detection. We extended our work on more recent applications with a complete pipeline for the AndroZoo dataset, with about 40,000 APKs used from 2014 to 2021 pre-tagged as reported malicious or not. The pipeline includes static features extracted from the manifest file and bytecode such as suspicious behaviors, restricted and suspicious API calls, etc. The accuracy result for AndroZoo is 97.7%, confirming the power of deep learning on Android malware detection.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Nga Nguyen
RobAFIS: Lessons Learned from a Robotic Systems Engineering Challenge Proceedings Article
Dans: 2021 International Symposium on Systems Engineering Proceedings, Vienna, Austria, 2021.
@inproceedings{nguyen_1596,
title = {RobAFIS: Lessons Learned from a Robotic Systems Engineering Challenge},
author = {Nga Nguyen},
url = {https://2021.ieeeisse.org/wp-content/uploads/sites/37/2021/08/ISSE_2021_Program-02.pdf},
year = {2021},
date = {2021-09-01},
booktitle = {2021 International Symposium on Systems Engineering Proceedings},
address = {Vienna, Austria},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Nga Nguyen; Faïda Mhenni; Jean-Yves Choley
A study on SysML and AltaRica models transformation Proceedings Article
Dans: IEEE International Systems Conference, Montreal, Canada, 2020, ISBN: 978-1-7281-5366-7.
@inproceedings{nguyen_2612,
title = {A study on SysML and AltaRica models transformation},
author = {Nga Nguyen and Faïda Mhenni and Jean-Yves Choley},
url = {10.1109/SysCon47679.2020.9275868},
issn = {978-1-7281-5366-7},
year = {2020},
date = {2020-04-01},
booktitle = {IEEE International Systems Conference},
address = {Montreal, Canada},
abstract = {Today's systems involve increasing functionality and different engineering domains, and thus are getting more complex. To deal with this complexity while designing safety-critical systems, it is required to integrate systems engineering and safety assessment to support functional and dysfunctional behaviors as early as possible. The use of models is also compulsory for the design of complex systems to perform simulations and evaluate several alternatives with regard to various requirements and constraints. In this paper, we propose to explore the feasibility of a model transformation to automatically generate safety analysis models with AltaRica 3.0 from system models with SysML. The meta-models linking the two languages that share some similar concepts to model system architecture and behavior are used to generate classes, blocks, events, transitions and assertions in AltaRica. Starting from the same system specification, the automatically generated safety code from systems engineering models can be compared to code written manually by safety engineers to verify if they are semantically equivalent. This transformation provides systems engineers and safety experts with means to collaborate, reduces error-proneness and inconsistencies, and ensures that safety experts perform safety assessment on up-to-date system models.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Lylia Alouache; Nga Nguyen; Makhlouf Aliouat; Rachid Chelouah
Credit based incentive approach for V2V cooperation in vehicular cloud computing Proceedings Article
Dans: 5th International Conference Internet of Vehicles Lecture Notes in Computer Science book series (LNISA,volume 11253), Paris, France, 2018, ISBN: 978-3-030-05080-1.
@inproceedings{alouache_2611,
title = {Credit based incentive approach for V2V cooperation in vehicular cloud computing},
author = {Lylia Alouache and Nga Nguyen and Makhlouf Aliouat and Rachid Chelouah},
url = {https://doi.org/10.1007/978-3-030-05081-8_7},
issn = {978-3-030-05080-1},
year = {2018},
date = {2018-11-01},
booktitle = {5th International Conference Internet of Vehicles Lecture Notes in Computer Science book series (LNISA,volume 11253)},
address = {Paris, France},
abstract = {The Vehicular Cloud Computing (VCC) represents an important factor of smart cities through which Internet access can be offered to vehicular networks to store and download content via mobile gateways. The deployment of this service is focused on the exchange and the share of information between network entities. However, selfish nodes are an obstacle in a totally distributed network. As a solution, a compensation could be provided to the vehicles that are willing to participate in VCC or to become an Internet gateway, while preserving their anonymity. Different credit-based incentive schemes are discussed in this paper. A scenario based on the Blockchain technology which implements a virtual payment service for the VCC members, for the resource consumption and for the gateway service in V2V routing mode, is proposed.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Nga Nguyen; Faïda Mhenni; Jean-Yves Choley
AltaRica 3.0 code generation from SysML models Proceedings Article
Dans: 28th European Safety and Reliability Conference Safety and Reliability - Safe Societies in a Changing World, Tronheim, Norway, 2018, ISBN: 9781351174664.
@inproceedings{nguyen_2608,
title = {AltaRica 3.0 code generation from SysML models},
author = {Nga Nguyen and Faïda Mhenni and Jean-Yves Choley},
url = {https://www.taylorfrancis.com/chapters/oa-edit/10.1201/9781351174664-306/altarica-3-0-code-generation-sysml-models-nga-nguyen-faida-mhenni-jean-yves-choley},
issn = {9781351174664},
year = {2018},
date = {2018-06-01},
booktitle = {28th European Safety and Reliability Conference Safety and Reliability - Safe Societies in a Changing World},
address = {Tronheim, Norway},
abstract = {In order to bridge the gap between Model-Based Systems Engineering and Model-Based Safety Assessment, we propose in this paper a language transformation between SysML semi-formal models and the formal language AltaRica 3.0. Meta-data of SysML Block Definition Diagram and Internal Block Diagram that describe system architecture as well as meta-data of SysML State Machine Diagram that represent system behavior (in a limited formalism with respect to AltaRica's Guarded Transitions System) are used to generate AltaRica classes, blocks, events, transitions, etc. Flow port directions and connectors are used to create flow propagation assertions. The object and prototype-oriented paradigm of AltaRica 3.0 with class, composition, inheritance, etc. will be respected since SysML and AltaRica's System Structure Modeling Language share commonalities in structuring constructs. It is obvious that one modeling language cannot be replaced by the other because their goals and domains are different, but the mapping between languages such as SysML and AltaRica allows better understanding and communication between systems engineers and safety experts. Once the preliminary AltaRica 3.0 code is generated with structural and behavioral information, safety experts will complete and validate the code with stochastic models, synchronization, common cause failures and redundancy mechanism to carry out safety assessment based on the expressive power of the language, thanks to its mathematical framework.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Saoussen Mili; Nga Nguyen; Rachid Chelouah
Attack modeling and verification for connected system security Proceedings Article
Dans: 2018 13th Annual Conference on System of Systems Engineering (SoSE), Paris, France, 2018, ISBN: 978-1-5386-4877-3.
@inproceedings{mili_2609,
title = {Attack modeling and verification for connected system security},
author = {Saoussen Mili and Nga Nguyen and Rachid Chelouah},
url = {10.1109/SYSOSE.2018.8428695},
issn = {978-1-5386-4877-3},
year = {2018},
date = {2018-06-01},
booktitle = {2018 13th Annual Conference on System of Systems Engineering (SoSE)},
address = {Paris, France},
abstract = {n the development process of critical systems, one of the main challenges is to provide early system validation and verification against vulnerabilities in order to reduce cost caused by late error detection. We propose in this paper an approach that, firstly allows formally describe system security specifications, thanks to our suggested extended attack tree. Secondly, static and dynamic system modeling by using a SysML connectivity profile to model error propagation is introduced. Finally, a model checker has been used in order to validate system specifications.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Fa¨?da Mhenni; Mhenni Fa¨?da; Jean-Yves Choley; Nga Nguyen
Verification and validation of the consistency between multi-domain system models Proceedings Article
Dans: IEEE International Systems Conference, Vancouver, Canada, 2018, ISBN: 2472-9647.
@inproceedings{mhenni_2606,
title = {Verification and validation of the consistency between multi-domain system models},
author = {Fa¨?da Mhenni and Mhenni Fa¨?da and Jean-Yves Choley and Nga Nguyen},
url = {10.1109/SYSCON.2018.8369561},
issn = {2472-9647},
year = {2018},
date = {2018-04-01},
booktitle = {IEEE International Systems Conference},
address = {Vancouver, Canada},
abstract = {The modeling of mechatronic systems requires the collaboration of several professions such as systems architect, safety expert, mechanical engineer and electronic engineer. Thus, various complex system models using different modeling languages are provided. This paper presents a verification and validation approach that aims to assure the structural consistency between such models. First, the system representations using SysML, AltaRica and Modelica languages for systems engineering, safety analysis and multi-physics respectively, are transformed into labeled and directed multi-graphs. Then, these graphs will be compared for equivalence by using different graph concepts such as isomorphism, subgraph, number of system inputs and outputs, etc. This method allows to synchronize models into one single representation respecting all specifications inherent to each modeling language. Furthermore, inconsistencies are identified when passing from one model to another and feedbacks will be given to each domain expert for validation. A case study from an aeronautical system is used throughout the paper to illustrate our approach.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Lylia Alouache; Nga Nguyen; Rachid Chelouah
Toward a hybrid SDN architecture for V2V communication in IoV environment Proceedings Article
Dans: 2018 Fifth International Conference on Software Defined Systems (SDS), Barcelona, Spain, 2018, ISBN: 978-1-5386-5901-4.
@inproceedings{alouache_2607,
title = {Toward a hybrid SDN architecture for V2V communication in IoV environment},
author = {Lylia Alouache and Nga Nguyen and Rachid Chelouah},
url = {10.1109/SDS.2018.8370428},
issn = {978-1-5386-5901-4},
year = {2018},
date = {2018-04-01},
booktitle = {2018 Fifth International Conference on Software Defined Systems (SDS)},
address = {Barcelona, Spain},
abstract = {Internet of Vehicles (IoV) represents the evolution of Vehicular Ad-hoc Networks into Internet of Things paradigm using cloud computing as support. In IoV, Vehicle-to-Vehicle is the principal communication mode where the vehicles are either data transmitter, relay or receiver. This type of communication is subject to disturbances which deteriorate connectivity and hence the quality of service as it prevents access to cloud services on board vehicle. In this paper, we propose a robust routing protocol for the transmission of data packets satisfying the evolution of the topology and the mobility of the network by adopting a hybrid Software-Defined Networking architecture. This is done by disassociating the control plane that makes decisions about where data is sent from the data plane that forwards data to the selected destination. The control decisions are based on different criteria, namely the contact duration, the free load and the communication errors, which are carried out by each vehicle, in a decentralized mode. However, the error logs are handled within clusters, by an elected cluster head node, in a locally centralized mode. An implementation of this proposed hybrid protocol on a multi-agent platform with a comparative study is presented in this paper.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Nga Nguyen; Saoussen Mili; Rachid Chelouah
Modélisation et validation des systèmes embarqués communicants Divers
Embedded SEC, 2018.
@misc{nguyen_2625,
title = {Modélisation et validation des systèmes embarqués communicants},
author = {Nga Nguyen and Saoussen Mili and Rachid Chelouah},
url = {https://embedded-sec18.eventmaker.io/},
year = {2018},
date = {2018-12-01},
howpublished = {Embedded SEC},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
No posts by this author.
N'hésitez pas à contacter le service des admissions pour tout renseignement complémentaire :