In this talk, we present a unified formal model of the WireGuard protocol in the symbolic model. Using the automatic cryptographic protocol verifiers SAPIC+, PROVERIF and TAMARIN, we conduct a thorough security assessment of the protocol with regard to an adversary that can read or set static, ephemeral or pre-shared keys, read or set ecdh pre-computations and control key distribution. We consider a complete protocol execution, including cookie messages used for resistance against denial...
Cloud storage is used to store huge amounts of data, both for companies and private users. Multi-cloud emerged to prevent data from system failure by storing simultaneously several copies of the data among multiple clouds. Yet, this solution is costly in memory, and often does not guarantee confidentiality nor integrity of the data. Moreover, handling communication with each server can be a daunting task for private users. Using secret sharing, we propose an approach involving multiple...
Reaching consensus is fundamental for many coordination problems in distributed computing. Yet, this problem is impossible in an asynchronous system as soon as one process may crash. We show that an additional constraint on failure occurrences allows solving the consensus problem in crash-prone environments. We will consider so-called λ-constrained failures that can happen only while a predefined contention threshold λ has not yet been bypassed. Assuming these failures, we...
Répétition de soutenance de thèse
Dans le cadre de cette présentation, nous analysons d'abord les algorithmes d'adaptation de débit existants et leur impact sur les performances d'un réseau Wi-Fi. Ensuite, nous étudions les meilleures pratiques pour le déploiement de ces réseaux au sein d'une exploitation agricole, notamment le nombre de points d'accès requis et leur emplacement pour maximiser la couverture et les performances dans le cadre d'une application de...
Attracted by the advantages of Non-Orthogonal Multiple Access (NOMA) in accommodating multiple users within the same resources, this paper jointly addresses the resource allocation and power control problem for Machine Type Devices (MTDs) in a Hybrid NOMA system. Particularly, we model the problem using a Mean Field Game (MFG) framework underlying a Multi-Armed Bandit (MAB) approach. Firstly, the devices invoke the MAB tool to arrange themselves into multiple NOMA coalitions. Then, within...