Sylvie Delaët
University of Paris-Sud
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sylvie Delaët.
Distributed Computing | 2007
Joffroy Beauquier; Sylvie Delaët; Shlomi Dolev; Sébastien Tixeuil
We present fault detectors for transient faults, (i.e., corruptions of the memory of the processors, but not of the code of the processors). We distinguish fault detectors for tasks (i.e., the problem to be solved) from failure detectors for implementations (i.e., the algorithm that solves the problem). The aim of our fault detectors is to detect a memory corruption as soon as possible. We study the amount of memory needed by the fault detectors for some specific tasks, and give bounds for each task. The amount of memory is related to the size and the number of views that a processor has to maintain to ensure a quick detection. This work may give the implementation designer hints concerning the techniques and resources that are required for implementing a task.
Journal of Aerospace Computing Information and Communication | 2006
Sylvie Delaët; Bertrand Ducourthial; Sébastien Tixeuil
We present a generic distributed algorithm for solving silents tasks such as shortest path calculus, depth-first-search tree construction, best reliable transmitters, in directed networks where communication may be only unidirectional. Our solution is written for the asynchronous message passing communication model, and tolerates multiple kinds of failures (transient and intermittent). First, our algorithm is self-stabilizing, so that it recovers correct behavior after finite time starting from an arbitrary global state caused by a transient fault. Second, it tolerates fair message loss, finite message duplication, and arbitrary message reordering, during both the stabilizing phase and the stabilized phase. This second property is most interesting since, in the context of unidirectional networks, there exist no self-stabilizing reliable data-link protocol. The correctness proof subsumes previous proofs for solutions in the simpler reliable shared memory communication model.
Journal of Parallel and Distributed Computing | 2002
Sylvie Delaët; Sébastien Tixeuil
Fault tolerance is a crucial property for recent distributed systems. We propose an algorithm that solves the census problem (list all processor identifiers and their relative distance) on an arbitrary strongly connected network.This algorithm tolerates transient faults that corrupt the processors and communication links memory (it is self-stabilizing) as well as intermittent faults (fair loss, reorder, finite duplication of messages) on communication media. A formal proof establishes its correctness for the considered problem. Our algorithm leads to the construction of algorithms for any silent problems that are self-stabilizing while supporting the same communication hazards.
distributed computing in sensor systems | 2008
Sylvie Delaët; Partha Sarathi Mandal; Mariusz A. Rokicki; Sébastien Tixeuil
Position verification problem is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes report false location information in order to fake their actual position. In this paper we propose the first deterministic distributed protocol for accurate identification of faking sensors in a WSN. Our scheme does notrely on a subset of trustednodes that cooperate and are not allowed to misbehave. Thus, any subset of nodes is allowed to try faking its position. As in previous approaches, our protocol is based on distance evaluation techniques developed for WSN. On the positive side, we show that when the received signal strength (RSS) technique is used, our protocol handles at most
principles of distributed computing | 1994
Joffroy Beauquier; Sylvie Delaët
\lfloor \frac{n}{2} \rfloor-2
international symposium on distributed computing | 1998
Joffroy Beauquier; Sylvie Delaët; Shlomi Dolev; Sébastien Tixeuil
faking sensors. When the time of flight (ToF) technique is used, our protocol manages at most
International Conference on Networked Systems | 2014
Peva Blanchard; Shlomi Dolev; Joffroy Beauquier; Sylvie Delaët
\lfloor \frac{n}{2} \rfloor - 3
international conference on stabilization safety and security of distributed systems | 2006
Joffroy Beauquier; Sylvie Delaët; Sammy Haddad
misbehaving sensors. On the negative side, we prove that no deterministic protocol can identify faking sensors if their number is
Lecture Notes in Computer Science | 2005
Sylvie Delaët; Bertrand Ducourthial; Sébastien Tixeuil
\lceil \frac{n}{2}\rceil -1
international symposium on stabilization safety and security of distributed systems | 2008
Adnan Vora; Mikhail Nesterenko; Sébastien Tixeuil; Sylvie Delaët
. Thus, our scheme is almost optimal with respect to the number of faking sensors. We discuss application of our technique in the trusted sensor model. More specifically, our results can be used to minimize the number of trusted sensors that are needed to defeat faking ones.