Alexandre Mouradian

Learn More
Along with Cognitive Radio Networks are been developed, to design optimistic security mechanisms is becoming a big challenge. This paper proposes a taxonomy of attacks on Cognitive Radio Networks. This will help researches in the area to better understand the security problems and design more optimistic countermeasures. A new simulation framework for(More)
Protocols developed during the last years for Wireless Sensor Networks (WSNs) are mainly focused on energy efficiency and autonomous mechanisms (e.g. self-organization, selfconfiguration, etc). Nevertheless, with new WSN applications, appear new QoS requirements such as time constraints. Real-time applications require the packets to be delivered before a(More)
More and more critical Wireless Sensor Networks (WSNs) applications are emerging. Those applications need reliability and respect of time constraints. The underlying mechanisms such as MAC and routing must handle such requirements. Our approach to the time constraint problem is to bound the hop-count between a node and the sink and the time it takes to do a(More)
Wireless Sensor Networks (WSNs) are usually deployed in order to monitor parameters of an area. When an event occurs in the network an alarm is sent to a special node called the sink. In critical real-time applications, when an event is detected, the Worst Case Traversal Time (WCTT) of the message must be bounded. Although real-time protocols for WSNs have(More)
Road safety applications are one of the main incentives to deploy vehicular networks. These applications rely on periodic message exchange among vehicles (known as beaconing). The beacon messages contain information about the environment which is used to perceive dangerous situations and alert the drivers. The inter-beacon delay is the time between two(More)