Papers by Jean-Yves Boudec
Lecture Notes in Computer Science, 2002
Terminode routing, defined for potentially very large mobile ad hoc networks, forwards packets al... more Terminode routing, defined for potentially very large mobile ad hoc networks, forwards packets along anchored paths. An anchored path is a list of fixed geographic points, called anchors. Given that geographic points do not move, the advantage to traditional routing paths is that an anchored path is always "valid". In order to forward packets along anchored paths, the source needs to acquire them by means of path discovery methods. We present two of such methods: Friend Assisted Path Discovery assumes a common protocol in all nodes and a high collaboration among nodes for providing paths. It is a social oriented path discovery scheme. Geographic Maps-based Path Discovery needs to have or to build a summarized view of the network topology, but does not require explicit collaboration of nodes for acquiring path. The two schemes are complementary and can coexist.
We describe the real-time monitoring infrastructure of the smart-grid pilot on the EPFL campus. W... more We describe the real-time monitoring infrastructure of the smart-grid pilot on the EPFL campus. We experimentally validate the concept of a real-time state-estimation for a 20 kV active distribution network. We designed and put into operation the whole infrastructure composed by the following main elements: (1) dedicated PMUs connected on the medium-voltage side of the network secondary substations by means of specific current/voltage transducers; (2) a dedicated communication network engineered to support stringent time limits and (3) an innovative state estimation process for real-time monitoring that incorporates phasor-data concentration and state estimation processes. Special care was taken to make the whole chain resilient to cyber-attacks, equipment failures and power outages. The achieved latency is within 65ms. The refresh rate of the estimated state is 20ms. The real-time visualization of the state estimator output is made publicly available, as well as the historical data (PMU measurements and estimated states). To the best of our knowledge, the work presented here is the first operational system that provides low-latency real-time stateestimation by using PMU measurements of a real active distribution network.
Proceedings of the 29th Annual ACM Symposium on Applied Computing - SAC '14, 2014
Active power distribution networks require sophisticated monitoring and control strategies for ef... more Active power distribution networks require sophisticated monitoring and control strategies for efficient energy management and automatic adaptive reconfiguration of the power infrastructure. Such requirements are realised by deploying a large number of various electronic automation and communication field devices, such as Phasor Measurement Units (PMUs) or Intelligent Electronic Devices (IEDs), and a reliable two-way communication infrastructure that facilitates transfer of sensor data and control signals. In this paper, we perform a detailed threat analysis in a typical active distribution network's automation system. We also propose mechanisms by which we can design a secure and reliable communication network for an active distribution network that is resilient to insider and outsider malicious attacks, natural disasters, and other unintended failure. The proposed security solution also guarantees that an attacker is not able to install a rogue field device by exploiting an emergency situation during islanding.
Either your web browser doesn't support Javascript or it is currently turned off. In the lat... more Either your web browser doesn't support Javascript or it is currently turned off. In the latter case, please turn on Javascript support in your web browser and reload this page. ... Find all citations by this author (default). ... Find all citations by this author (default). ... Find all citations by this author (default). ... Find all citations by this author (default). ... Find all citations by this author (default). ... UK PubMed Central is a service of the UKPMC Funders Group working in partnership with the European Bioinformatics Institute, University of Manchester and the ...
We analyze the performance of the multiplexing of heterogeneous VBR connections over aVBR trunk, ... more We analyze the performance of the multiplexing of heterogeneous VBR connections over aVBR trunk, to provide guaranteed lossless or statistical service. The method extends theresults of Lo Presti et al [1] and uses recent results of network calculus [2]. For the losslesscase, we consider the multiplexed and the segregated systems, and we show that the resourcesrequired are the same for both systems if an optimal allocation is performed. For statisticalservice, we develop a new method for...
We analyse and illustrate two approaches that we have developed for providing reservations to ows... more We analyse and illustrate two approaches that we have developed for providing reservations to ows. The rst approach uses the explicit reservation model: a tra c pro le is negotiated between users and the network. ATM and RSVP are two examples for this approach. In this paper we describe our experience in the ACT project EXPERT (AC094) with the explicit reservation model in the context of ATM. We show that the integration of ATM in a TCP/IP oriented operating system is easy and does not require developing applications specially for ATM. The method we have designed is called Arequipa and is described in RFC 2170. It is fully implemented in Linux.
Proceedings of SPIE - The International Society for Optical Engineering
ABSTRACT
Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and ... more Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate. We propose a protocol, called CONFIDANT, for making misbehavior unattractive; it is based on selective altruism and utilitarianism. It aims at detecting and isolating misbehaving nodes, thus making it unattractive to deny cooperation. Trust relationships and routing decisions are based on experienced, observed, or reported routing and forwarding behavior of other nodes. The detailed implementation of CONFIDANT in this paper assumes that the network layer is based on the Dynamic Source Routing (DSR) protocol. We present a performance analysis of DSR fortified by CONFIDANT and compare it to regular defenseless DSR. It shows that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network. All simulations have been implemented and performed in GloMoSim.
In mobile ad-hoc networks, nodes do not rely on any routing infrastructure but relay packets for ... more In mobile ad-hoc networks, nodes do not rely on any routing infrastructure but relay packets for each other. Thus communication in mobile ad-hoc networks functions properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate, for example to save power or to launch security attacks such as denial-of-service. In this paper, we give an overview of potential vulnerabilities and requirements of mobile ad-hoc networks, and of proposed prevention, detection and reaction mechanisms to thwart attacks.
Lecture Notes in Computer Science, 1996
We consider the issue of increasing the number of connections that connection oriented networks, ... more We consider the issue of increasing the number of connections that connection oriented networks, such as ATM, can handle. We describe one step that arises at reducing connection awareness inside the network. To that end, connections between the same pair of access nodes are grouped together and made indistinguishable inside the network. The concept of dynamic virtual path trunks is introduced as a support mechanism, and it is shown how virtual path links can be setup and maintained without additional round-trip delays.
In this paper we present the main challenges in mobile ad-hoc wide area networks (MAWANs). A MAWA... more In this paper we present the main challenges in mobile ad-hoc wide area networks (MAWANs). A MAWAN is a wide area, large, (potentially) entirely wireless networks. We describe the Terminodes
2008 46th Annual Allerton Conference on Communication, Control, and Computing, 2008
A network user's decision to start and continue using security products is based on economic cons... more A network user's decision to start and continue using security products is based on economic considerations. The cost of a security compromise (e.g., worm infection) is compared against the cost of deploying and maintaining a sufficient level of security. These costs are not necessarily the real ones, but rather the perceived costs, which depend on the amount of information available to a user at each time. Moreover, the costs (whether real or perceived) depend on the decisions of other users, too: The probability of a user getting infected depends on the security deployed by all the other users.
Lecture Notes in Control and Information Sciences, 2003
Network Calculus is a set of recent developments, which provide a deep insight into flow problems... more Network Calculus is a set of recent developments, which provide a deep insight into flow problems encountered in networking. It can be viewed as the system theory that applies to computer networks. Contrary to traditional system theory, it relies on maxplus and min-plus algebra. In this paper, we show how a simple but important fixedpoint theorem (residuation theorem in min-plus algebra) can be successfully applied to a number of problems in networking, such as window flow control, multimedia smoothing, and bounds on loss rates.
Proceedings of the 2nd International Conference on Energy-Efficient Computing and Networking - e-Energy '11, 2011
We study the energy consumptions of two strategies that increase the capacity of an LTE network: ... more We study the energy consumptions of two strategies that increase the capacity of an LTE network: (1) the deployment of redundant macro and micro base stations by the operator at locations where the traffic is high, and (2) the deployment of publicly accessible femto base stations by home users. Previous studies show the deployment of publicly accessible residential femto base stations is considerably more energy efficient; however, the results are proposed using an abstracted model of LTE networks, where the coverage constraint was neglected in the study, as well as some other important physical and traffic layer specifications of LTE networks. We study a realistic scenario where coverage is provided by a set of non-redundant macro-micro base stations and additional capacity is provided by redundant macro-micro base stations or by femto base stations. We quantify the energy consumption of macro-micro and femto deployment strategies by using a simulation of a plausible LTE deployment in a mid-size metropolitan area, based on data obtained from an operator and using detailed models of heterogeneous devices, traffic, and physical layers. The metrics of interest are operator-energy-consumption/totalenergy-consumption per unit of network capacity.
Electric Power Systems Research, 2015
The conventional approach for the control of distribution networks, in the presence of active gen... more The conventional approach for the control of distribution networks, in the presence of active generation and/or controllable loads and storage, involves a combination of both frequency and voltage regulation at different time scales. With the increased penetration of stochastic resources, distributed generation and demand response, this approach shows * Corresponding Author. Phone number: +41 21 69 37369, Postal address: EPFL STI IEL DESL, ELL016, Station 11, CH-1015 Lausanne and the benefits of the proposed method are discussed in Part III.
Uploads
Papers by Jean-Yves Boudec