Theme Network and Security
Presentation
The Network and Security (NS) theme focuses, on the one hand, on issues related to data transmission and routing protocols in communication networks, primarily wireless and IoT networks, and, on the other hand, on the security of these protocols and services. The research activities conducted within this theme can be summarized as follows:
- Design of communication protocols and distributed algorithms for communication networks: This line of research addresses both short-range and long-range communication technologies. The investigated problems include resource allocation and interference management in LoRaWAN, Wi-Fi, cellular, and satellite networks, as well as interoperability across heterogeneous networking technologies, with the objective of building more robust and flexible communication infrastructures. As networks become increasingly complex and dense, dynamic performance optimization is becoming critical. In this context, part of our work relies on Artificial Intelligence (AI) models to dynamically optimize network performance by improving resource management and reducing interference. Additional research addresses the coordination of robotic swarms and the study of the computational power associated with different mathematical models of robots with limited capabilities (e.g., Look-Compute-Move model, luminous robots). These contributions target applications ranging from environmental monitoring to industrial use cases.


- Securing and improving the resilience of networks and communication protocols: Research efforts in this area focus on the design and validation of secure protocols or protocols guaranteeing resilience properties. First, the use of formal methods enables us to design secure protocols and to automatically prove their security properties. Several tools, such as ProVerif and Tamarin, are employed within the Dolev–Yao attacker model. A wide range of use cases is addressed, including electronic voting, messaging protocols, ticketing systems, blockchain technologies, and banking payment systems. Another key research area concerns the evaluation of the effectiveness of machine learning (ML)-based intrusion detection systems (IDS) in real network environments. Particular emphasis is placed on assessing the gap between IDS performance on training datasets and their behavior in real-world deployments. Finally, we also investigate the ability of systems to withstand unexpected or undesirable events, through the study of properties such as self-stabilization and tolerance to benign or malicious faults.
![]() |
![]() |
- Design of cryptographic primitives: Finally, part of our research is dedicated to the design of new cryptographic primitives that provide stronger privacy guarantees for users. Anonymous signature schemes and anonymous certificates are studied in order to enhance communication security. Other work has led to the development of a distributed data storage system spanning multiple cloud providers, in which users do not need to remember cryptographic keys, while ensuring data confidentiality with respect to the involved parties.
In addition to these three core research directions, the NS theme is also involved in several related projects and collaborations with other research teams and institutions. In collaboration with Institut Pascal, we work on the implementation of deep neural networks on FPGA architectures, with strong optimization constraints in terms of both performance and hardware resource utilization. A second research axis focuses on the security of complex Large Language Model (LLM) architectures—incorporating RAG pipelines, agents, and fine-tuning—within an inter-theme collaboration with the DSI theme of the SIC axis. This collaboration is structured around the endowed chair Reliable and Trustworthy Use of LLMs. Finally, a third research axis investigates zero-knowledge proofs based on physical objects (e.g., card games, Roberval balances). This work, conducted in collaboration with the Tokyo University of Electro-Communications in Japan, complements cryptographic primitives in environments where computing is not assumed, such as ballot-based elections with physical ballot boxes.
We organize a monthly seminar: https://sancy.iut.uca.fr/~durand/seminaire/
News
last publications
Sanitizable Signatures with Different Admissibility Policies for Multiple Sanitizers
ACM Asia Conference on Computer and Communications Security (ASIA CCS '26)
Quentin Bramas, Stéphane Devismes, Anaïs Durand, Pascal Lafourcade, Anissa Lamani - Jan. 14, 2026
77 Shades of Grey
Gwendoline Hochet Derévianckine, Alexandre Guitton, Oana Iova, Baozhu Ning, Fabrice Valois - Nov. 19, 2025
Hate or Love in the 2.4 GHz ISM band: The Story of LoRa® and IEEE 802.11g
ACM Transactions on Internet of Things
Mariem Zayene, Oussama Habachi, Gérard Chalhoub - Nov. 18, 2025
Toward hyper-adaptive AI-enabled 6G networks for energy efficiency: techniques, classifications and tradeoffs
Zoé Lagache, Pierre-Henri Thevenon, Maxime Puys, Oum-El-Kheir Aktouf - Nov. 12, 2025
Dissecting Mirai : Spatio-Sequential Analysis and Restoration Strategies Using MITRE ATT&CK and D3FEND
30th Nordic Conference on Secure IT Systems (NordSec)
Yan Gerard, Pascal Lafourcade, Lola-Baie Mallordy, Léo Robert - Nov. 3, 2025
Tilepaint and Aquarium Puzzles in Periodic Grids
4th International Conference on Discrete Geometry and Mathematical Morphology-DGMM
Quentin Bramas, Pascal Lafourcade, Stéphane Devismes - Nov. 1, 2025
Infinite grid exploration with synchronous myopic robots without chirality
Discrete Applied Mathematics
Oussama Habachi - Oct. 27, 2025
Joint Power Control and User Assignment in RIS-based NOMA: A Multi-kernel Neural Network Approach
MSWIM'25 - 27th International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
Tengfei An, Gewu Bu, Maria Potop-Butucaru, Bilel Zaghdoudi - Oct. 22, 2025
Randomness is good enough in DAG-based Federated Learning
Pascal Lafourcade, Elsa Lopez Perez, Charles Olivier-Anclin, Cristina Onete, Clément Papon, Mališa Vučinić - Sept. 22, 2025
Fine-grained, privacy-augmenting LI-compliance in the LAKE standard - Extended version
ESORICS 2025 - 30th European Symposium on Research in Computer Security
All publications are here
Projects
Team
Persons in charge
Lecturing Researchers
- BATTA Mohamed
- BU Gewu
- CHALHOUB Gérard
- DELOBEL François
- DE VAULX Christophe
- DURAND Anaïs
- EL RACHKIDY Nancy
- FREITAS Antonio
- GUITTON Alexandre
- HABACHI Oussama
- LAFOURCADE Pascal
- LI Jian-Jin
- MESNARD Emmanuel
- MIGDAL Denis
- OLIVIER-ANCLIN Charles
- PUYS Maxime
Emeritus professor
Postdocs
PHDs
- ADJE Karidja Dominique
- ALLABWANI Osama
- CHAGNON Dorine
- CHEBBI Samar
- DURECU Florent
- ESSAFI Ayoub
- MUKUND Shrey
- NAHNAH Oussama
- NAMA NYAM Guy Anthony
- NOUYEP NOUNDJIO Steve Durand
- ZHAO Yan


