Contents
Academic literature on the topic 'Systèmes de communication sans fil – Fiabilité'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Systèmes de communication sans fil – Fiabilité.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Systèmes de communication sans fil – Fiabilité"
Troël, Arnaud, Frédéric Weis, and Michel Banâtre. "Prise en compte du mouvement dans les systèmes de communication sans fil." Techniques et sciences informatiques 24, no. 1 (2005): 65–94. http://dx.doi.org/10.3166/tsi.24.65-94.
Full textDissertations / Theses on the topic "Systèmes de communication sans fil – Fiabilité"
Amirzadeh, Ahmadreza, and Ahmadreza Amirzadeh. "Amélioration de la sécurité et de la fiabilité des systèmes de communication sans fil." Master's thesis, Université Laval, 2017. http://hdl.handle.net/20.500.11794/27478.
Full textDans ce mémoire, de nouvelles approches ont été introduites pour concevoir les systèmes de communication fiables, Section 1, et sécurisées, Section 2, où les codes LDPC ont été choisis comme schéma de codage principal. Ce mémoire comprend deux sections : Section 1 : Les codes LDPC réguliers et irréguliers sont définis et différents décodeurs basés sur l’échange de message de décisions fermes et souples sont introduits. Par la suite, quelques définitions, comme le seuil des codes LDPC utilisant l’évolution de la densité de probabilité (ou la propagation de croyance), l’écart multiplicatif et les distributions de degrés de noeuds de parité et de noeuds de variable, sont énoncées. Par après, ces concepts préliminaires sont utilisés pour concevoir des ensembles de code LDPC irréguliers approchant la capacité du canal à l’aide de programmation linéaire et d’un algorithme génétique. Section 2 : Une méthode est introduite pour l’amélioration du secret dans ce genre de système. Cette méthode fonctionne sur la base de demande de retransmission de paquets d’information. Selon cette approche, lorsque le récepteur ne peut pas converger vers le bon message, une demande de retransmission est envoyée. Au lieu d’envoyer le paquet entier dans le cas d’une défaillance à la sortie du décodeur du destinataire, la retransmission des sous-paquets est explorée. Le système proposé dans cette phase est appelé protocole HARQ-Granulaire Adaptatif (AG-HARQ). Il essaie de réduire au minimum le taux requis pour un décodage réussi par les parties légitimes tout en augmentant la sécurité en minimisant les fuites d’information vers un espion éventuel. En outre, pour améliorer encore le niveau de sécurité dans la méthode AG-HARQ proposée, le schéma de contamination d’erreur intra-trame (IntraEC) et le schéma de contamination d’erreur inter-trame (InterEC) sont utilisés en conjonction avec cette méthode. Cette combinaison permet un haut niveau de sécurité dans le système de communication sans fil.
In this memoir, new approaches have been introduced for designing reliable, Section 1, and secure, Section 2, communication systems where the LDPC codes have been chosen as the principal coding scheme. This memoir comprises two sections: Section 1: Regular and irregular LDPC codes are defined and different message passing decoders based on hard and soft decisions are introduced. Afterward, some definitions like the threshold of LDPC codes using Density Evolution (or Belief Propagation), the Multiplicative Gap, and the check node and variable node degree distributions are explained in detail. Later, these preliminary concepts are used to design the channel capacity approaching Irregular LDPC codes combining Genetic Algorithm and Linear Programming. Section 2: A new scheme is introduced for secrecy enhancement for these systems. This method is based on feedback retransmission requests. With this approach, when the intended recipient cannot converge to the right message, a retransmission request is sent back to the transmitter. The retransmission of the sub-packets, instead of sending the whole packet in the case of failure at the intended recipient’s decoder output, is explored in detail. Our proposed scheme is called Adaptive Granular Hybrid Automatic Repeat reQuest (AG-HARQ) protocol, which tries to minimize the required rate for successful decoding of the legitimate parties while amplifying the privacy by minimizing the information leakage to a wiretapper. In addition, to further improve the security level of the proposed AG-HARQ method, Intra-frame error contamination (IntraEC) and Inter-frame error contamination (InterEC) schemes are used in conjunction with this method. This combination can provide a high level of security in wireless communication systems.
In this memoir, new approaches have been introduced for designing reliable, Section 1, and secure, Section 2, communication systems where the LDPC codes have been chosen as the principal coding scheme. This memoir comprises two sections: Section 1: Regular and irregular LDPC codes are defined and different message passing decoders based on hard and soft decisions are introduced. Afterward, some definitions like the threshold of LDPC codes using Density Evolution (or Belief Propagation), the Multiplicative Gap, and the check node and variable node degree distributions are explained in detail. Later, these preliminary concepts are used to design the channel capacity approaching Irregular LDPC codes combining Genetic Algorithm and Linear Programming. Section 2: A new scheme is introduced for secrecy enhancement for these systems. This method is based on feedback retransmission requests. With this approach, when the intended recipient cannot converge to the right message, a retransmission request is sent back to the transmitter. The retransmission of the sub-packets, instead of sending the whole packet in the case of failure at the intended recipient’s decoder output, is explored in detail. Our proposed scheme is called Adaptive Granular Hybrid Automatic Repeat reQuest (AG-HARQ) protocol, which tries to minimize the required rate for successful decoding of the legitimate parties while amplifying the privacy by minimizing the information leakage to a wiretapper. In addition, to further improve the security level of the proposed AG-HARQ method, Intra-frame error contamination (IntraEC) and Inter-frame error contamination (InterEC) schemes are used in conjunction with this method. This combination can provide a high level of security in wireless communication systems.
Kremer, Guillaume. "Métrologie des réseaux sans-fil : à la frontière du signal et du numérique." Toulouse 3, 2014. http://thesesups.ups-tlse.fr/2470/.
Full textThe multiplication of wireless networks may result in more medium contention and stronger spectral pollution. To maintain the communications quality, nodes will have to be more adaptive and take benefits of the available informations about the state of the medium and of the communications. In that optic, this thesis presents 3 contributions which respectively tackle the following fields of wireless networks research: measurements, modeling and development of new solutions for nodes adaptability. The first contribution concerns the design and implementation of a measurement test bench which complies with the requirements of these studies (i. E. It must allow cross-layer measurements starting from the physical layer and offering maximal control over the environment and its perturbations). Our solution is to perform the communications inside the RF protected environment of an anechoic room. To interfere with these communications, a modulated AWGN noise is injected inside the room with the help of a directive antenna. Inside the room, measurements are made using WIFI devices and RF equipments. The second contribution aims to take advantage of the experimental platform measurements for improving the realism of ns-3 simulations. In fact, despite a recognized lack of realism, network simulators such as ns-3 are massively used to test new wireless protocols and applications. We then propose a root cause analysis (RCA) method designed for detecting configuration, implementation or modeling anomalies between the simulator and the experimental bench. The application of this method results in a major improvement of the realism of the ns-3 WIFI model. The third contribution consists in the application of three machine learning algorithms, namely SVR, k-nn and DT, in order to predict the IP throughput on a wireless link. The estimations are based on SNR, RSS and noise measurements at the receiver side. The different algorithms are evaluated according to the accuracy of their estimations but also according to their functional characteristics (e. G. Model size, training time,. . . ). The results show that the SVR and DT algorithms used in conjunction of the SNR metric obtain the most accurate estimates. Moreover the SVR and DT algorithms are respectively the most efficient in terms of memory and time
Helluy-Lafont, Étienne. "Sécurité et détection d'intrusion dans les réseaux sans fil." Thesis, Lille, 2021. http://www.theses.fr/2021LILUI017.
Full textThis thesis focuses on the security of wireless communications, as used on devices such as mobile phones, laptops, or connected devices that make up the Internet of Things. Nowadays, wireless communications are carried out using integrated components (modem), which can themselves be the target of attacks. Indeed, these modems contain Closed Source software, that are poorly audited, and may have flaws. During this thesis, we pursued two complementary approaches that aim to address the problem of wireless modems security. The first is to detect attacks in order to mitigate the risks posed by vulnerabilities ; the second is to identify and correct these vulnerabilities in order to eliminate the risks. Wireless modems pose particular constraints for Intrusion Detection Systems (IDS). In fact, if the modem is at risk of being compromised, the operating system (OS) cannot trust the information it is sending back : the modem is unreliable. This makes it difficult to detect wireless attacks from the OS, as it has no reliable source of information on whichto base detection. In this context, it is preferable to perform intrusion detection at the network level, by directly capturing the signals exchanged wirelessly. However, it is not always easy to recover the signals of interest. Today’s equipment supports a multitude of different communication standards. This heterogeneity represents a challenge for capture solutions. In addition, some protocols do not lend themselves well to passive capture of their exchanges, and are sometimes even specifically designed to prevent it. Finally, data is usually encrypted, which is an additional obstacle for intrusion detection systems. Software Defined Radio (SDR) can partly meet the challenges posed by this diversity. They consist of a hardware part, but above all of software, which can be adapted to receive signals of any standard - within the limits of the material. In this thesis, we present a SDR specifically designed to allow the capture and analysis of a given frequency band, in order to identify and label the signals present. It is an elementary building block for building wireless intrusion detection systems. In addition, software radio processes signals in terms of their physical representation. This allows them to collect additional information, which would not have been accessible if a conventional modem had been used to capture the signals. In this thesis, we describe methods to identify the model of a Bluetooth device by analysing the physical representation of the packets it transmits. In the second part of this thesis, we analysed the firmware of several Bluetooth modems, in order to identify vulnerabilities that would allow remote control. This allowed us to discover several exploitable vulnerabilities in widely used modems. Finally, we developeda free and open-source Bluetooth modem that allows interaction with real-world modems to facilitate research and development on their security
Zhang, Ruifeng. "Analysis of energy-delay performance in multi-hop wireless sensor networks." Lyon, INSA, 2009. http://theses.insa-lyon.fr/publication/2009ISAL0109/these.pdf.
Full textLes réseaux de capteurs sans fil représentent un nouveau paradigme dans les réseaux de communication qui permet de développer de nombreuses applications allant de la surveillance de l’environnement aux applications militaires. Les performances de ces réseaux peuvent être caractérisées par trois fonctions objectives caractérisant les transmissions de bout en bout: la fiabilité, le délai et la consommation d’énergie. Cette thése a pour but de trouver les param¨¨tres optimaux afin d’améliorer les performances de la couche physique, la couche MAC ainsi que la couche protocolaire des réseaux de capteurs. Dans ce travail, nous considérons la fiabilité comme un critère prépondérant et la traitons comme une contrainte dure. La consommation d’énergie et le délai de transmission sont considérés comme des contraintes secondaires concurrentes. Comme dans tous les réseaux radio, dans les réseaux de capteurs sans fil, les canaux radios ne sont pas fiables. Pour assurer la fiabilité bout-en-bout, la plupart des travaux existants, excluent les liens radios non fiables de la communication et se focalisent sur la sélection des liens fiables. Nous nous différencions par rapport à ces travaux par la prise en compte aussi bien des liens fiables que des liens non fiables. Nous démontrons aussi que les performances telles que la consommation d’énergie et le délai de transmission sont considérablement améliorées en exploitant efficacement les liens non fiables dans les réseaux, et tout en garantissant une fiabilité de bout en bout importante. Dans une première partie de la thèse, nous analysons le compromis entre la consommation d’énergie et le délai dans les réseaux multi-saut classiques. Nous proposons deux métriques. La première exprime l’efficacité énergétique sous la forme du rapport moyen énergie-distance par bit. La seconde exprime le délai sous la forme du rapport moyen délai-distance par bit. En utilisant ces deux métriques et un modèle réaliste de liaison radio à erreur, nous déduisons l’ensemble des solutions de compromis Energie-Délai sous la forme du front de Pareto à partir des performances d’une transmission à un saut, et obtenons une formule exprimant le compromis Energie-Délai. Ces résultats sont étendus aux transmissions multi-sauts. Ensuite, nous validons la limite inférieure à l’aide de simulations, sur des réseaux 2-D, issues d’une distribution Poissonnienne. Les analyses théoriques et les simulations montrent que les liens non-fiables dans les transmissions multi-sauts contribuent à améliorer l’efficacité énergétique du système ix évanouissements rapides de Rayleigh et le canal à évanouissements de Rayleigh par blocs. Sur la base de l’expression de la borne inférieure du compromis Energie-Délai, un cadre multi-couche est fourni pour optimiser les param¨¨tres des couches physique, MAC et routage sous contrainte de délai. Dans la seconde partie de la thèse, nous abordons après la non-fiabilité, une autre caractéristique importante des canaux sans fil, qui a trait à la nature diffusante des communications radio. Les communications opportunistes exploitent ces deux propriétés pour améliorer la performance du réseau. Nous analysons les performances d’énergie et de délai des communications opportunistes ainsi que l’optimisation des paramètres connexes. D’abord, nous proposons un cadre de conception pour évaluer l’efficacitè énergétique des communications opportunistes. Ce dernier fournit une méthode pour optimiser les différents mécanismes opportunistes. Ensuite, nous déduisons la borne inférieure du compromis Energie-Délais dans les communications opportunistes, tout en tenant compte du mécanisme de sélection des candidats pour une transmission optimale. La fromule exprimant la borne inférieure est obtenue sous l’hypothèse d’un nombre fixe de candidats à retransmettre. Un algorithme de recherche du nombre optimal de candidats est également proposé. Selon les analyses théoriques obtenues, nous proposons un nouvel algorithme opportuniste pour minimiser la consommation d’énergie face à une limite de délai moyen et intégrant les couches MAC et routage. Les résultats des simulations sur les mécanismes opportunistes proposés dans un réseau issu d’une distribution Poissonnienne correspondent à la limite inférieure théorique du compromis Energie-Délai. Enfin, nous discutons l’optimisation des paramètres de la couche physique. Dans la troisième partie de la thèse, nous considérons l’aspect coopératif des transmissions. Dans les communications opportunistes, seule la coopération de réception est réalisée, tandis que dans les communications coopératives prennent en compte une coopération des deux côtés : récepteur et émetteur. Dans cette partie, nous considérons l’approche CMIMO (cooperative multiple input multiple output). D’abord, nous analysons la baisse liée au compromis Energie-Délai de CMIMO par l’exploitation d’un modèle de liaison non fiable lorsque le nombre d’émetteurs et de récepteurs coopératifs est fixe. Ensuite, nous fournissons un algorithme de recherche du nombre optimal de noeuds coopératifs de chaque côté. Enfin, nous comparons les limites inférieures de ces trois schémas de communication dans les différents canaux respectivement. Les résultats obtenus montrent que pour parvenir à une meilleure performance Energie-Délai, les mécanismes de communication suivants devraient être adoptés selon le type de canal : les communications multi-saut traditionnelles sont les plus performantes pour le canal à bruit additif blanc Gaussien, alors que les communications opportunistes le sont pour les canaux à évanouissements de Rayleigh par blocs et enfin le CMIMO pour les canaux à évanouissements rapides de Rayleigh
Abgrall, Cédric. "Allocation de ressources dans les réseaux sans fil denses." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00581776.
Full textGorcitz, Raul Adrian. "From small-scale data dissemination to large data transfers in vehicular environments." Paris 6, 2013. http://www.theses.fr/2013PA066271.
Full textAs we have previously seen, vehicle-to-vehicle communication is an essential part of coop- erative driving as messages need to be disseminated over large interest areas with on-board communication devices. Vehicular networks are shared environments where each vehicle competes for a share of the bandwidth, thus when sending general purpose message that could potentially interest every driver in a certain area, broadcast-based communication is more adapted to the characteristics of this environment. Yet the role of the vehicle is expanding and is not limited to inter-vehicular communication. New functionalities are introduce that exploit the inherent properties of this environment. Although vehicles enjoy a high degree of freedom, their mobility can be predicted to a certain extent. Vehicles are generally restricted to the use of the road-infrastructure that links geographically distinct points of interests situated tens, hundreds or thousands of kilometers apart. They are fulfilling a purpose by carrying a ’load’ from a source to a destination. Therefore, the road-infrastructure is constituted of a network of intersecting roads on which transiting vehicles respond to the requirements of their owners. By taking advantage of these characteristics, new applications can be developed that exploit the technologies present in the modern car. We direct our attention towards the large volume of data that transit the internet everyday. A large part of this data tolerates a certain amount of delay before it is being ’consumed’. Disruptive solutions could ease the burden on the legacy internet infrastructure by considering vehicles as a future data delivery alternative
Hamouda, Ossama Mohamed Fawzi. "Modélisation et évaluation de la sûreté de fonctionnement d'applications véhiculaires basées sur des réseaux ad-hoc mobiles." Toulouse 3, 2010. http://thesesups.ups-tlse.fr/998/.
Full textThis thesis focuses on developing methods and models making it possible to evaluate quantitative measures characterizing the dependability of mobile services as perceived by the users. These models and measures are aimed at providing support to the designers during the selection and analysis of candidate architectures that are well suited to fulfill the dependability requirements. We consider the case of vehicular applications using inter-vehicle communications based on ad-hoc networks and may have access to services located on fixed infrastructure. We propose an approach combining: 1) dependability models based on stochastic activity networks, in order to describe the system failure modes and associated recovery mechanisms, and 2) simulation and analytical models allowing the estimation of connectivity characteristics, taking into account different mobility scenarios and environment. This approach is illustrated on three case studies including a virtual black box based on cooperative data replication and backup, and an automated highway system (Platooning application)
Singh, Arun Kumar. "Le compromis Débit-Fiabilité-Complexité dans les systèmes MMO multi-utilisateurs et coopératifs avec décodeurs ML et Lattice." Thesis, Paris, ENST, 2012. http://www.theses.fr/2012ENST0005/document.
Full textIn telecommunications, rate-reliability and encoding-decoding computational complexity (floating point operations - flops), are widely considered to be limiting and interrelated bottlenecks. For this reason, any attempt to significantly reduce complexity may be at the expense of a substantial degradation in error-performance. Establishing this intertwined relationship constitutes an important research topic of substantial practical interest. This dissertation deals with the question of establishing fundamental rate, reliability and complexity limits in general outage-limited multiple-input multiple-output (MIMO) communications, and its related point-to-point, multiuser, cooperative, two-directional, and feedback-aided scenarios. We explore a large subset of the family of linear lattice encoding methods, and we consider the two main families of decoders; maximum likelihood (ML) based and lattice-based decoding. Algorithmic analysis focuses on the efficient bounded-search implementations of these decoders, including a large family of sphere decoders. Specifically, the presented work provides high signal-to-noise (SNR) analysis of the minimum computational reserves (flops or chip size) that allow for a) a certain performance with respect to the diversity-multiplexing gain tradeoff (DMT) and for b) a vanishing gap to the uninterrupted (optimal) ML decoder or a vanishing gap to the exact implementation of (regularized) lattice decoding. The derived complexity exponent describes the asymptotic rate of exponential increase of complexity, exponential in the number of codeword bits
Ismaïl, Mohamed Amine. "Study and optimization of data protection, bandwidth usage and simulation tools for wireless networks." Nice, 2010. http://www.theses.fr/2010NICE4074.
Full textToday, many technical challenges remain in the design of wireless networks to support emerging services. The main contributions of this thesis are three-fold in addressing some of these issues. The first contribution addresses the reliability of wireless links, in particular through data protection against long fading time (also known as slow fading) in the context of a direct satellite-to-mobile link. We propose an innovative algorithm, called Multi Burst Sliding Encoding (MBSE), that extends the existing DVB-H intra-burst (MPEFEC) protection to an inter-burst protection. Our MBSE algorithm allows complete burst losses to be recovered, while taking into account the specificity of mobile hand-held devices. Based on an optimized data organization, our algorithm provides protection against long term fading, while still using the Reed-Solomon code already implemented in mobile hand-held chipsets. MBSE has been approved by the DVB Forum and was integrated in the DVB-SH standard in which it now plays a key role. The second contribution is related to the practical optimization of bandwidth usage in the context of wireless links. We have proposed WANcompress, a bandwidth compression technique for detecting and eliminating redundant network traffic by sending only a label instead of the original packets. It differs from standard compression techniques in that it removes redundant patterns over a large range of time (days/weeks, i. E. Giga-bytes) where as existing compression techniques operate on a smaller windwos scales (seconds, i. E. Few kilo-bytes). We performed intensive experiments that achieved compression factors up to 25 times, and acceleration factors up to 22 times. In a corporate trial conducted over a WiMAX network for one week, WANcompress improved the bitrate up to 10 times, and on average 33% of the bandwidth was saved. The third contribution is related to the simulation of wireless networks. We have proposed a 802. 16 WiMAX module for the widely used ns-3 simulator. Our module provides a detailed and standard-compliant implementation of the Point to Multi-Point (PMP) topology with Time Division Duplex (TDD) mode. It supports a large number of features, thus enabling the simulation of a rich set of WiMAX scenarios, and providing close-to-real results. These features include Quality of Service (QoS) management, efficient scheduling for both up-link and downlink, packet classification, bandwidth management, dynamic flow creation, as well as scalable OFDM physical layer simulation. This module was merged with the main development branch of the ns-3 simulator, and has become one of its standard features as of version v3. 8
Zaouche, Lotfi. "Sécurité et fiabilité des communications dans les réseaux d’essaims." Thesis, Compiègne, 2017. http://www.theses.fr/2017COMP2339/document.
Full textThe emergence of small and inexpensive Unmanned Aerial Vehicles (UAVs) promotes their use in several applications. UAVs are usually equipped with different sensors and have the ability to communicate via wireless connections. Their capability to fly freely in the space offers new opportunities to monitoring and tracking applications. A Flying Ad hoc Network (FANET) is composed of a fleet of autonomous UAVs and is used for monitoring applications in hostile environments, surveillance or site inspection. FANETs could also be used for filming special events such as bike races or soccer matches, so, the connections must guarantee a minimum of quality of service. In FANETs, saving energy of UAVs that have limited battery is very challenging and protecting the network from malicious attacks is even more difficult. In this thesis, we focus on tracking and filming a moving target using a fleet of UAVs. Since the target is moving, the UAVs have to follow it continuously, and a path to the ground station must be available. In this context, we propose an efficient solution that allows the coordination of the UAVs to maintain an optimal path between the target and the ground station. The proposed solution is time and energy efficient. We also propose a solution based on hierarchical protocols to save more energy in the communication process with the ground station. Another solution that allows energy saving is to force selfish nodes to participate in the network to route received packets towards their destination. Indeed, a selfish node is concerned only about its own welfare, refusing to route packets of other node, causing an extra charge for the rest of nodes in the network. We validate our solutions through simulation campaigns
Books on the topic "Systèmes de communication sans fil – Fiabilité"
Optimizing wireless communication systems. Springer, 2009.
H, Levesque Allan, ed. Wireless information networks. Wiley, 1995.
Prasad, Ramjee. Universal wireless personal communications. Artech House, 1998.
Designing wireless information services. Wiley Computer Pub., 2000.
Programming applications with the wireless application protocol: The complete developer's guide. Wiley, 2000.
Cavalcanti, Francisco Rodrigo Porto, and Sören Andersson. Optimizing Wireless Communication Systems. Springer, 2009.
Cavalcanti, Francisco Rodrigo Porto, and Sören Andersson. Optimizing Wireless Communication Systems. Springer, 2014.
UltraWideband PulseBased Radio Analog Circuits and Signal Processing. Springer, 2009.
Rouphael, Tony. Wireless Receiver Architectures and Design: Antennas, RF, Mixed Signal, and Digital Signal Processing. Elsevier Science & Technology Books, 2014.
Wireless Information Networks. John Wiley & Sons, Ltd., 2005.