- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- IPv6, Mobility, Handover, Networks, Security
- Human Mobility and Location-Based Analysis
- Context-Aware Activity Recognition Systems
- Internet Traffic Analysis and Secure E-voting
- Access Control and Trust
- Network Security and Intrusion Detection
- Vehicular Ad Hoc Networks (VANETs)
- Energy Efficient Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Bluetooth and Wireless Communication Technologies
- Caching and Content Delivery
- Mobile Agent-Based Network Management
- Advanced MEMS and NEMS Technologies
- Wireless Communication Networks Research
- Distributed systems and fault tolerance
- Advanced Malware Detection Techniques
- Magnetic Field Sensors Techniques
- Media and Digital Communication
- Mindfulness and Compassion Interventions
- Green IT and Sustainability
- Building Energy and Comfort Optimization
- Sensor Technology and Measurement Systems
- Mechanical and Optical Resonators
Universidad Carlos III de Madrid
2014-2024
Institut Superieur de l'Aeronautique et de l'Espace (ISAE-SUPAERO)
2021
Institut Català de Nanociència i Nanotecnologia
2020
Universidad de Sevilla
2019
University of Bío-Bío
2016
Instituto de Salud Carlos III
2011
Universitat de Barcelona
1995-2003
World is living an overwhelming explosion of smart devices: electronic gadgets, appliances, meters, cars, sensors, camera and even traffic lights, that are connected to the Internet extend their capabilities, constituting what known as Things (IoT). In these environments, application layer decisive for quality connection, which has dependencies transport layer, mainly when secure communications used. This paper analyses performance offered by two most popular protocols layer: Constrained...
The fast growth of the Internet Things (IoT) has made this technology one most promising paradigms recent years. Wireless Sensor Networks (WSNs) are important challenges things. These networks up devices with limited processing power, memory, and energy. constrained nature WSNs makes it necessary to have specific restricted protocols work in these environments. In paper, we present an energy consumption network traffic study main IoT application layer protocols, Constrained Application...
In pervasive computing environments, mobile devices communicate via wireless links without requiring any fixed infrastructure. These must be able to discover and share services dynamically. this paper, we propose a new service discovery middleware specifically designed for kind of environments. This is composed protocol, Pervasive Discovery Protocol (PDP), description language, Generic Service Description Language (GSDL). PDP fully distributed protocol that merges characteristics both pull...
Predicting users’ next location allows to anticipate their future context, thus providing additional time be ready for that context and react consequently. This work is focused on a set of LZ-based algorithms (LZ, LeZi Update Active LeZi) capable learning mobility patterns estimating the with low resource needs, which makes it possible execute them mobile devices. The original have been divided into two phases, being mix check combination best one obtain better prediction accuracy or lower...
4G mobile communication networks encompass heterogeneous technologies that can be categorized at different levels according to their access coverage. Personal area, body and ad hoc are defined a personal level, WLAN UWB examples local/ home 3G such as UMTS cellular level. In spite of heterogeneity, these shall seamlessly integrated in networks, naturally creating an open architecture. By openness we mean the network architecture is divided into layers, between layers performed through...
In mobile phones, it is useful to know the most probable next location make decisions about future actions. this letter we compare three LZ based prediction algorithms. The originality of our work that in a cellular network, separate algorithms into two independent phases (tree updating and probability calculation), have included Active LeZi study, evaluate hit rate resource consumption, including processing time.
Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be exploited by provider to build user profile of visited locations, which might disclose sensitive data, such as work or home locations. classic concept entropy is widely used evaluate in these scenarios, where information represented a sequence independent samples categorized data. However, since sent very frequently, location profiles...
Undoubtedly, Location-based Social Networks (LBSNs) provide an interesting source of geo-located data that we have previously used to obtain patterns the dynamics crowds throughout urban areas. According our previous results, activity in LBSNs reflects real city. Therefore, unexpected behaviors social media are a trustful evidence changes In this paper introduce hybrid solution early detect these based on applying combination two approaches, use entropy analysis and clustering techniques,...
The DNS protocol plays a fundamental role in the operation of ubiquitous networks. All devices connected to these networks need work, both for traditional domain name IP address translation, and more advanced services such as resource discovery. over HTTPS (DoH) solves certain security problems present protocol. However, malicious tunnels, covert way encapsulating traffic connection, are difficult detect because encrypted data prevents performing an analysis content traffic. In this study,...
An interfacing circuit for piezoresistive pressure sensors based on CMOS current conveyors is presented. The main advantages of the proposed include use a single piezoresistor, capability offset compensation, and versatile current-mode configuration, with output or voltage input. Experimental tests confirm linear relation versus piezoresistance variation.
Evidence of something unusual happening in urban areas can be collected from different data sources, such as police officers, cameras, or specialized physical infrastructures. In this paper, we propose using geotagged posts on location-based social networks (LBSNs) to detect crowd dynamics anomalies automatically evidence a potential event. To end, use the Instagram API media/search endpoint collect location pictures posted by users given area periodically. The locations are summarized their...
Human mobility knowledge is key for urban planning or models design. Therefore, estimating reliable parameters crucial to lay an unbiased foundation. However, most works such features rely on datasets made up of the history mobile network cells where user located when she makes active use network, known as Call Data Records (CDRs), every time her device connects a new cell, without taking into account cell changes not caused by movement. Could we accurately characterize human with datasets?...
Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors motion. Carrying their mobile devices, moving connected vehicles or actively participating social networks, provide a wealth of that, after properly processing, can support numerous applications for the benefit community. In context smart communities, INRISCO [1] proposal intends (i) early detection abnormal situations cities (i.e., incidents), (ii) analysis whether, according...
Trust has emerged as an important facet of inter-domain relationships. management in fixed networks is not functional ad hoc P2P networks, because these require autonomous, user-centric and non-static trust management. The model the basis any security infrastructure. In this paper, we propose a trust-based middleware for secure digital content sharing between pervasive devices. Such allows to enhance support Likewise, suitable efficient file exchange protocol, WSFEP, sharing. Both...
Thanks to the research on Vehicular Ad Hoc Networks (VANETs), we will be able deploy applications roadways that contribute energy efficiency through a better planning of long trips. With this goal in mind, have designed gas/charging station advertising system, which takes advantage broadcast nature network. We found reducing number total sent packets is important, as it allows for use available bandwidth. improvements distance-based flooding scheme, so can support application with good...
Correctly estimating the features characterizing human mobility from mobile phone traces is a key factor to improve performance of networks, as well for model design and urban planning. Most related works found their conclusions on location data based cells where each user sends or receives calls messages, known Call Detail Records (CDRs). In this work, we test if such sets provide enough detail users' movements so accurately estimate some most studied features. We perform analysis using two...
Resumen Aunque los estándares de confort en edificios oficinas acondicionados con medios mecánicos se han estudiado ampliamente a través la norma ISO 7730 basada estudios Fanger, todavía no existe un enfoque consensuado para el térmico las viviendas. Muchas esas viviendas, que componen bloque, construido antes introdujeran normas ahorro energía, por lo alto consumo energético tiene efecto sobre medio ambiente y economía. A años, modelo más utilizado basa estático, ser humano es similar...
A magnetic field-to-voltage converter using a MOSFET (MAGFET) device has been designed, simulated and tested. The sensor was measured under fields ranging from 0 to 0.8 T the obtained sensitivity 0.03 T/sup 1/ with an offset value lower than 0.2%. macro model for MAGFET in saturation region is presented. Also, we have designed complete integrated measurement system including sensor, bias interface circuit A/D based on current-mode technique.
Randomness in people's movements might serve to detect behavior anomalies. The concept of entropy can be used for this purpose, but its estimation is computational intensive, particularly when processing long movement histories. Moreover, disclosing such histories third parties may violate user privacy. With a goal keep the mobility data mobile device itself yet being able measure randomness, we propose three fast estimators based on Lempel-Ziv (LZ) prediction algorithms. We evaluated them...