Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fabrice Peyrard is active.

Publication


Featured researches published by Fabrice Peyrard.


local computer networks | 2000

Mobile stations localization in a WLAN

Fabrice Peyrard; Christian Soutou; Jean-Jacques Mercier

This paper proposes a localization protocol of mobile stations in a WLAN (wireless local area network). The originality of this protocol is made of two parts (i) we use an object-relational database and (ii) we use a semaphore channel devoted to localize mobile stations in access point coverage areas and in virtual coverage areas via near-to-near relays. The database manages the knowledge of the mobile stations related to the access points (roaming) and an historical record of the last moves of the mobile stations. This protocol was written in Java, we also used the JDBC (Java DataBase Connectivity) classes to interoperate with the database.


Computer Communications | 2003

Study and simulation of the infrared WLAN IrDA: an alternative to the radio

Thierry Val; Fabrice Peyrard; Michel Misson

The dramatic development of radio solutions for wireless communications tends to blur the wider use that can be made of infrared transmissions in a room, a workshop or even a building. For some local applications for which a wireless part often constitutes the end point of global networks, the infrared medium can be a real alternative to the radio medium. Infrareds offer undeniable advantages, and are a technological niche in the field of in-house wireless LAN. Here the characteristics of this technology are illustrated and compared with better known radio solutions. As the world of communications is constantly readjusting to new standards, the essential characteristics of IrDA, the most significant standard are presented. The IrDA standard keeps changing to include new aspects. It now features a set of layers for a complete infrared local network providing the usual functionality of the different OSI layers. Thus, baud rates of IrDA products have increased from 115200bps to 4Mbps, (even 30Mbps) paving the way for future multimedia applications demanding high baud rates. Many new modelisations and simulations with OPNET have facilitated the study and the analysis of this IR standard.


Future Generation Computer Systems | 2018

Trusted mobile computing: An overview of existing solutions

Mohamed Amine Bouazzouni; Emmanuel Conchon; Fabrice Peyrard

Nowadays, smartphones are able to process large amounts of data enabling the use of applications for personal or professional use. In these contexts, the smartphone needs to process, store and transfer sensitive data in a secure way. Encryption is a commonly used solution to enforce security but the encryption keys it relies on have also to be securely processed and stored. Several research works have investigated these issues and different solutions have been proposed. They can be classified into two main categories: hardware-based solutions (Secure Elements, Trusted Platform Module and Trusted Execution Environments) and software-based solutions (Virtualization Environments). This paper overviews/surveys these two categories highlighting their pros and cons. Examples of trusted computing applications are then provided for each category. Finally, a discussion is provided about trends and perspectives for trusted mobile computing.


Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks | 2010

Optimized HCCA schedulers for an IEEE 802.11e/AFDX hybrid network

Bafing C. Sambou; Fabrice Peyrard; Christian Fraboul

This paper proposes a new HCCA scheduling scheme for AFDX (Avionics Full DupleX switched Ethernet) traffics on IEEE 802.11e Wireless LAN (WLAN). The AFDX requirements are related to the temporal constraints (end-to-end latency and jitter). Our scheduling algorithm AWS (AFDX Wireless Scheduler) improves the HCCA reference scheduler (RS); in order to convey AFDX traffic on IEEE 802.11e wireless network. Notice that, the HCCA reference scheduler is more suitable for CBR (Constant Bit Rate) traffics. AWS is based on the priority class, on the frame retransmission management, on the EDF (Earliest Deadline First) algorithm and on the maximal jitter. We also present, in this paper, an optimized version of AWS (OAWS) which uses the un-used bandwidth of TXOPs to transmit frames in critical or retransmission state. The simulation results show that we have a very large reduction of dropped packets (reached deadline) with AWS compared to RS, and the OAWS performances are better than AWS performances.


2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC) | 2016

Evaluation of RAIN RFID authentication schemes

Ahmad Shahrafidz Khalid; Emmanuel Conchon; Fabrice Peyrard

In this paper, we present different authentication schemes of Radio Frequency Identification (RFID) Generation 2 version 2 (Gen2V2) in UHF mode. We model the anti-collision management and evaluate it by simulation with OMNeT++. We evaluate the overall performance of RFID Gen2v2 network in terms of measurement of collisions and association time. We present four main cryptographic suites of the Gen2V2 standard, namely XOR, AES128, PRESENT80 and CryptoGPS. After their modelling and simulation, the obtained results allow us to put forward the necessary time for each authentication algorithms. The objective of this work is to show the impact of the cryptographic suites used to ensure the authentication of connected objects in the Internet of Things.


mobile computing, applications, and services | 2013

An Improvement of NFC-SEC with Signed Exchanges for an e-Prescription-Based Application

Mohamad Hamze; Fabrice Peyrard; Emmanuel Conchon

In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standard ISO/IED 13157 (NFC-SEC) is proposed to handle electronic signature based on a public key infrastructure.


international symposium on computers and communications | 2011

Scheduling avionics flows on an IEEE 802.11e HCCA and AFDX hybrid network

Bafing C. Sambou; Fabrice Peyrard; Christian Fraboul

Our goal is to design an IEEE 802.11e/AFDX (WiFi with QoS/Avionics Full DupleX switched Ethernet) hybrid network. More precisely the aim is to guarantee the QoS requirements of AFDX traffics transmitted on an IEEE 802.11e wireless network, for on-ground maintenance applications. The AFDX requirements are related to the temporal constraints (latency and jitter). The use of IEEE 802.11e induces several constraints due to the wireless communication medium (QoS, non-deterministic access method, high packet loss rate, transmission errors). In this paper, we present a HCCA (HCF Controlled Channel Access) scheduling algorithm named AWS (AFDX Wireless Scheduler) which improves the performance of the HCCA Reference Scheduler (RS) in order to convey AFDX traffics on an IEEE 802.11e wireless network. AWS is based on the classification of flows, on the retransmission management of frames and on the guarantee of deadline and maximum jitter of frames. We also present, in this paper, an optimized version of AWS (OAWS) which uses the available bandwidth of TXOP periods for transmitting frames near of their deadline and frames in retransmission. Performance evaluation results show that a very large reduction of dropped packets and a better throughput are obtained with AWS compared to RS. The performance of the optimized version of AWS (OAWS) are better than those of AWS.


international conference on wireless communications and mobile computing | 2011

AFDX Wireless Scheduler and free bandwidth managing in 802.11e(HCCA)/AFDX network

Bafing C. Sambou; Fabrice Peyrard; Christian Fraboul

In this paper, we present a HCCA (HCF Controlled Channel Access) scheduler called AWS (AFDX Wireless Scheduler) which improves the performances of the HCCA Reference Scheduler (RS); in order to convey AFDX (Avionics Full DupleX switched Ethernet) traffics on an IEEE 802.11e WLAN and guarantee their QoS requirements (bandwidth, maximum latency and jitter). AWS is based on the classification of flows (priority class), on a retransmission policy of frames, on the frame deadlines and on the maximum jitter. We also present, in this paper, two strategies for managing the free bandwidth of each TXOP. The first (OAWS, Optimized AWS) uses the free bandwidth of TXOPs for transmitting frames in Critical or Retransmission state. The latest (AWS-RB, AWS with Release Bandwidth) releases the free bandwidth of TXOPs and schedules the following flows.


international conference on security and cryptography | 2017

A Card-less TEE-based Solution for Trusted Access Control.

Mohamed Amine Bouazzouni; Emmanuel Conchon; Fabrice Peyrard; Pierre-François Bonnefoi

In this paper, we present a new card-less access control system aiming to replace existing systems based on vulnerable contact-less cards. These existing systems have many vulnerabilities which makes them not secure enough to be deployed to protect restricted areas. We propose to deploy a new access control architecture based on the use of a smartphone to remove the physical card. Our secure access control system is based on Trusted Execution Environment (TEE) in the cloud and Identity Based Encryption (IBE) mechanisms. The authentication protocol deployed on our architecture is based on IBAKE. Finally, a performance evaluation of the protocol is provided.


ubiquitous intelligence and computing | 2016

Trusted Access Control System for Smart Campus

Mohamed Amine Bouazzouni; Emmanuel Conchon; Fabrice Peyrard; Pierre-François Bonnefoi

Many access control systems are still based on the first generation of contactless technologies like RFID or NFC despite well known cloning attack. Furthermore, the cost of the deployment of secure cards for large organizations (DESFIRE for instance) is expensive. Also, these systems do not always check authentication of the holders of RFID tags or NFC cards. In this paper, we present a proposal for an architecture to build a secure access control system based on Trusted Execution Environments (TEE), Identity Based Encryption (IBE) mechanisms. We also identify the challenges to overcome before deploying such an architecture.

Collaboration


Dive into the Fabrice Peyrard's collaboration.

Top Co-Authors

Avatar

Thierry Val

University of Toulouse

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eric Campo

University of Toulouse

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge