Carlos García-Rubio

ORCID: 0000-0002-4635-722X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Opportunistic and Delay-Tolerant Networks
  • Mobile Ad Hoc Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Human Mobility and Location-Based Analysis
  • Context-Aware Activity Recognition Systems
  • Internet Traffic Analysis and Secure E-voting
  • Access Control and Trust
  • Network Security and Intrusion Detection
  • Vehicular Ad Hoc Networks (VANETs)
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Bluetooth and Wireless Communication Technologies
  • Caching and Content Delivery
  • Mobile Agent-Based Network Management
  • Advanced MEMS and NEMS Technologies
  • Wireless Communication Networks Research
  • Distributed systems and fault tolerance
  • Advanced Malware Detection Techniques
  • Magnetic Field Sensors Techniques
  • Media and Digital Communication
  • Mindfulness and Compassion Interventions
  • Green IT and Sustainability
  • Building Energy and Comfort Optimization
  • Sensor Technology and Measurement Systems
  • Mechanical and Optical Resonators

Universidad Carlos III de Madrid
2014-2024

Institut Superieur de l'Aeronautique et de l'Espace (ISAE-SUPAERO)
2021

Institut Català de Nanociència i Nanotecnologia
2020

Universidad de Sevilla
2019

University of Bío-Bío
2016

Instituto de Salud Carlos III
2011

Universitat de Barcelona
1995-2003

World is living an overwhelming explosion of smart devices: electronic gadgets, appliances, meters, cars, sensors, camera and even traffic lights, that are connected to the Internet extend their capabilities, constituting what known as Things (IoT). In these environments, application layer decisive for quality connection, which has dependencies transport layer, mainly when secure communications used. This paper analyses performance offered by two most popular protocols layer: Constrained...

10.1016/j.comnet.2021.108338 article EN cc-by Computer Networks 2021-07-28

The fast growth of the Internet Things (IoT) has made this technology one most promising paradigms recent years. Wireless Sensor Networks (WSNs) are important challenges things. These networks up devices with limited processing power, memory, and energy. constrained nature WSNs makes it necessary to have specific restricted protocols work in these environments. In paper, we present an energy consumption network traffic study main IoT application layer protocols, Constrained Application...

10.3390/proceedings2019031049 article EN cc-by 2019-11-20

In pervasive computing environments, mobile devices communicate via wireless links without requiring any fixed infrastructure. These must be able to discover and share services dynamically. this paper, we propose a new service discovery middleware specifically designed for kind of environments. This is composed protocol, Pervasive Discovery Protocol (PDP), description language, Generic Service Description Language (GSDL). PDP fully distributed protocol that merges characteristics both pull...

10.1109/percomw.2005.61 article EN 2005-04-01

Predicting users’ next location allows to anticipate their future context, thus providing additional time be ready for that context and react consequently. This work is focused on a set of LZ-based algorithms (LZ, LeZi Update Active LeZi) capable learning mobility patterns estimating the with low resource needs, which makes it possible execute them mobile devices. The original have been divided into two phases, being mix check combination best one obtain better prediction accuracy or lower...

10.3390/s120607496 article EN cc-by Sensors 2012-06-04

4G mobile communication networks encompass heterogeneous technologies that can be categorized at different levels according to their access coverage. Personal area, body and ad hoc are defined a personal level, WLAN UWB examples local/ home 3G such as UMTS cellular level. In spite of heterogeneity, these shall seamlessly integrated in networks, naturally creating an open architecture. By openness we mean the network architecture is divided into layers, between layers performed through...

10.1109/mwc.2004.1351676 article EN IEEE Wireless Communications 2004-10-01

In mobile phones, it is useful to know the most probable next location make decisions about future actions. this letter we compare three LZ based prediction algorithms. The originality of our work that in a cellular network, separate algorithms into two independent phases (tree updating and probability calculation), have included Active LeZi study, evaluate hit rate resource consumption, including processing time.

10.1109/lcomm.2010.08.092033 article EN IEEE Communications Letters 2010-08-01

Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be exploited by provider to build user profile of visited locations, which might disclose sensitive data, such as work or home locations. classic concept entropy is widely used evaluate in these scenarios, where information represented a sequence independent samples categorized data. However, since sent very frequently, location profiles...

10.3390/e17063913 article EN Entropy 2015-06-10

Undoubtedly, Location-based Social Networks (LBSNs) provide an interesting source of geo-located data that we have previously used to obtain patterns the dynamics crowds throughout urban areas. According our previous results, activity in LBSNs reflects real city. Therefore, unexpected behaviors social media are a trustful evidence changes In this paper introduce hybrid solution early detect these based on applying combination two approaches, use entropy analysis and clustering techniques,...

10.1016/j.future.2020.03.038 article EN cc-by-nc-nd Future Generation Computer Systems 2020-03-24

The DNS protocol plays a fundamental role in the operation of ubiquitous networks. All devices connected to these networks need work, both for traditional domain name IP address translation, and more advanced services such as resource discovery. over HTTPS (DoH) solves certain security problems present protocol. However, malicious tunnels, covert way encapsulating traffic connection, are difficult detect because encrypted data prevents performing an analysis content traffic. In this study,...

10.1016/j.comnet.2023.109910 article EN cc-by-nc-nd Computer Networks 2023-06-30

An interfacing circuit for piezoresistive pressure sensors based on CMOS current conveyors is presented. The main advantages of the proposed include use a single piezoresistor, capability offset compensation, and versatile current-mode configuration, with output or voltage input. Experimental tests confirm linear relation versus piezoresistance variation.

10.1109/19.744332 article EN IEEE Transactions on Instrumentation and Measurement 1998-06-01

Evidence of something unusual happening in urban areas can be collected from different data sources, such as police officers, cameras, or specialized physical infrastructures. In this paper, we propose using geotagged posts on location-based social networks (LBSNs) to detect crowd dynamics anomalies automatically evidence a potential event. To end, use the Instagram API media/search endpoint collect location pictures posted by users given area periodically. The locations are summarized their...

10.3390/electronics7120380 article EN Electronics 2018-12-03

Human mobility knowledge is key for urban planning or models design. Therefore, estimating reliable parameters crucial to lay an unbiased foundation. However, most works such features rely on datasets made up of the history mobile network cells where user located when she makes active use network, known as Call Data Records (CDRs), every time her device connects a new cell, without taking into account cell changes not caused by movement. Could we accurately characterize human with datasets?...

10.1109/percomw.2014.6815213 article EN 2014-03-01

Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors motion. Carrying their mobile devices, moving connected vehicles or actively participating social networks, provide a wealth of that, after properly processing, can support numerous applications for the benefit community. In context smart communities, INRISCO [1] proposal intends (i) early detection abnormal situations cities (i.e., incidents), (ii) analysis whether, according...

10.1109/access.2020.2987483 article EN cc-by IEEE Access 2020-01-01

Trust has emerged as an important facet of inter-domain relationships. management in fixed networks is not functional ad hoc P2P networks, because these require autonomous, user-centric and non-static trust management. The model the basis any security infrastructure. In this paper, we propose a trust-based middleware for secure digital content sharing between pervasive devices. Such allows to enhance support Likewise, suitable efficient file exchange protocol, WSFEP, sharing. Both...

10.1109/percom.2008.95 article EN 2008-03-01

Thanks to the research on Vehicular Ad Hoc Networks (VANETs), we will be able deploy applications roadways that contribute energy efficiency through a better planning of long trips. With this goal in mind, have designed gas/charging station advertising system, which takes advantage broadcast nature network. We found reducing number total sent packets is important, as it allows for use available bandwidth. improvements distance-based flooding scheme, so can support application with good...

10.3390/s130708612 article EN cc-by Sensors 2013-07-05

Correctly estimating the features characterizing human mobility from mobile phone traces is a key factor to improve performance of networks, as well for model design and urban planning. Most related works found their conclusions on location data based cells where each user sends or receives calls messages, known Call Detail Records (CDRs). In this work, we test if such sets provide enough detail users' movements so accurately estimate some most studied features. We perform analysis using two...

10.3390/e20100736 article EN cc-by Entropy 2018-09-25

Resumen Aunque los estándares de confort en edificios oficinas acondicionados con medios mecánicos se han estudiado ampliamente a través la norma ISO 7730 basada estudios Fanger, todavía no existe un enfoque consensuado para el térmico las viviendas. Muchas esas viviendas, que componen bloque, construido antes introdujeran normas ahorro energía, por lo alto consumo energético tiene efecto sobre medio ambiente y economía. A años, modelo más utilizado basa estático, ser humano es similar...

10.20868/ade.2016.3197 article cc-by-nc Anales de Edificación 2016-04-07

A magnetic field-to-voltage converter using a MOSFET (MAGFET) device has been designed, simulated and tested. The sensor was measured under fields ranging from 0 to 0.8 T the obtained sensitivity 0.03 T/sup 1/ with an offset value lower than 0.2%. macro model for MAGFET in saturation region is presented. Also, we have designed complete integrated measurement system including sensor, bias interface circuit A/D based on current-mode technique.

10.1109/imtc.2000.846814 article EN 2002-11-07

Randomness in people's movements might serve to detect behavior anomalies. The concept of entropy can be used for this purpose, but its estimation is computational intensive, particularly when processing long movement histories. Moreover, disclosing such histories third parties may violate user privacy. With a goal keep the mobility data mobile device itself yet being able measure randomness, we propose three fast estimators based on Lempel-Ziv (LZ) prediction algorithms. We evaluated them...

10.1109/percomw.2015.7134080 article EN 2015-03-01
Coming Soon ...