scispace - formally typeset
A

Alexis Olivereau

Researcher at Motorola

Publications -  56
Citations -  1356

Alexis Olivereau is an academic researcher from Motorola. The author has contributed to research in topics: Node (networking) & The Internet. The author has an hindex of 15, co-authored 55 publications receiving 1221 citations. Previous affiliations of Alexis Olivereau include Commissariat à l'énergie atomique et aux énergies alternatives & Alternatives.

Papers
More filters
Journal ArticleDOI

Trust management system design for the Internet of Things: A context-aware and multi-service approach

TL;DR: Simulation results show the good performance of the proposed trust management system and especially highlight its ability to deter a class of common attacks designed to target trust management systems.
Proceedings ArticleDOI

Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain

TL;DR: This work investigates how the use of a blockchain infrastructure can meet the requirements of the Internet of Things, with a focus on availability, and proposes a peer-to-peer mechanism, to spread updates between objects that have limited access to the Internet.
Patent

Apparatus and method for name resolution in an aggregation of mobile networks

TL;DR: In this paper, a method and apparatus for establishing internet protocol (IP) communication with a node in an aggregation of one or more mobile networks each having a name server is provided.
Proceedings ArticleDOI

Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples

TL;DR: The proposed method is lightweight and allows the protection of IoT devices through strong encryption and authentication means, so that constrained devices can benefit from the same security functionalities that are typical of unconstrained domains, without however having to execute computationally intensive operations.
Journal ArticleDOI

Lightweight collaborative key establishment scheme for the Internet of Things

TL;DR: This paper revisit existing end-to-end security standards and key establishment schemes and discusses their limitations considering the specific scenarios of the IoT and proposes novel collaborative approaches for key establishment designed to reduce the requirements of these existing security protocols.