Miguel Soriano

ORCID: 0000-0003-0457-8531
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Cryptography and Data Security
  • Internet Traffic Analysis and Secure E-voting
  • Coding theory and cryptography
  • Cryptographic Implementations and Security
  • Network Security and Intrusion Detection
  • Advanced Authentication Protocols Security
  • Privacy-Preserving Technologies in Data
  • Mobile Agent-Based Network Management
  • Chaos-based Image/Signal Encryption
  • graph theory and CDMA systems
  • Security in Wireless Sensor Networks
  • Digital Rights Management and Security
  • Mobile Ad Hoc Networks
  • DNA and Biological Computing
  • Privacy, Security, and Data Protection
  • Advanced Malware Detection Techniques
  • Cognitive Radio Networks and Spectrum Sensing
  • Peer-to-Peer Network Technologies
  • Cellular Automata and Applications
  • Digital Media Forensic Detection
  • Wireless Communication Security Techniques
  • Access Control and Trust
  • User Authentication and Security Systems
  • IPv6, Mobility, Handover, Networks, Security

Universitat Politècnica de Catalunya
2011-2023

Pfizer-University of Granada-Junta de Andalucía Centre for Genomics and Oncological Research
2021

University of Almería
2021

Centre Tecnologic de Telecomunicacions de Catalunya
2009-2019

Scytl (Spain)
2015

Georgia State University
2005

Applied Mathematics (United States)
2002

Abstract Cognitive radio is a promising technology aiming to improve the utilization of electromagnetic spectrum. A cognitive device uses general purpose computer processors that run applications software perform signal processing. The use this enables sense and understand its environment actively change mode operation based on observations. Unfortunately, solution entails new security challenges. Our objective in paper analyze issues main recent developments architectures networks. We...

10.1002/dac.1102 article EN International Journal of Communication Systems 2010-02-10

Whilst security is generally perceived as an important constituent of communication systems, this paper offers a viable security-communication-tradeoff particularly tailored to Advanced Metering Infrastructures (AMIs) in Smart Grid systems. These often composed embedded nodes with highly constrained resources, require e.g. metering data be delivered efficiently whilst neither jeopardizing nor security. Data aggregation natural choice such settings, where the challenge facilitate per-hop well...

10.1109/smartgrid.2010.5622063 article EN 2010-10-01

This research aims to increase our understanding about active learning effects, applying PBL methodologies, students’ the motivation in various class groups of a Graphic Engineering subject. The measurement instruments were cross-sectional survey carried out (n = 269) during years 2015 2019 through triangulation data analysis. A quantitative comparison students' evaluations has also been out. provide new evidence improve using methodologies. development these teaching activities, addition...

10.14434/ijpbl.v19i1.33426 article EN cc-by-nc-nd Interdisciplinary Journal of Problem-based Learning 2025-04-06

While security is generally perceived as an important constituent of communication systems, this paper offers a viable security-communication trade-off particularly tailored to smart grids. These often composed embedded nodes with highly constrained resources, require, e.g., metering data be delivered efficiently while neither jeopardizing nor security. Data aggregation natural choice in such settings, where additional challenge facilitate per-hop and end-to-end well mechanism protect the...

10.1109/tsg.2011.2162431 article EN IEEE Transactions on Smart Grid 2011-09-12

This paper considers energy constrained routing protocols and workload balancing techniques for improving MANET efficiency. We give new protocol that employs adaptive load technique to the with node caching enhancement. Also, we show application of efficiency metrics evaluation limited power supply. Our contributions include: (i) New efficient AODV-based (AODV-NC-WLB); (ii) protocols; (iii) An implementation simulation study in NS-2 AODV-NC-WLB sustaining considerable improvement throughput,...

10.1109/snpd-sawn.2005.34 article EN 2005-06-07

Cognitive radio is a promising technology aiming to improve the utilization of electromagnetic spectrum. A cognitive device uses general purpose computer processors that run applications software perform signal processing. The use this enables sense and understand its environment actively change mode operation based on observations. Unfortunately, solution entails new security challenges. In paper we present cross-layer attack TCP connections in networks propose potential countermeasures mitigate it.

10.1109/iwcld.2009.5156526 article EN 2009-06-01

Cognitive radio is a promising technology aiming to improve the utilization of electromagnetic spectrum. A cognitive smart device which runs applications software perform signal processing. The use this enables sense and understand its environment actively change mode operation based on observations. Unfortunately, solution entails new security challenges. In paper, we present cross-layer attack TCP connections in networks, analyze impact throughput via analytical model simulation, propose...

10.1155/2011/242304 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2010-08-03

ABSTRACT A key aspect in the design of smart cities is, undoubtedly, a plan for efficient management utilities, enabled by technologies such as those entailing metering residential consumption electricity, water or gas. While one cannot object to appealing advantages metering, privacy risks posed submission frequent, data‐rich measurements simply remain overlooked. The objective this paper is provide general perspective on contrasting issues and utility management, surveying main...

10.1002/ett.2708 article EN Transactions on Emerging Telecommunications Technologies 2013-09-24

The possibility of making the Internet accessible via mobile telephones has generated an important opportunity for electronic commerce. WAP was intended to become a general standard business. Nevertheless, some deficiencies hinder its mass acceptance in e-commerce applications. End-to-end security and speed information delivery are absolutely necessary conditions. authors present solution, or at least partial this situation. Wireless is typically more constrained environment than Internet....

10.1109/mcom.2002.1024416 article EN IEEE Communications Magazine 2002-08-01

In the context of fleet management, various challenges, including equipment breakdowns, rising maintenance costs, inefficient resource utilization, and outdated telematics systems, necessitate a transformative approach. Traditional systems encounter limitations such as closed compatibility with specific brands, unique network protocols, insufficient data analysis decision-making support. Therefore, these challenges can be addressed by using IoT-driven solutions. This paper introduces an...

10.1109/access.2023.3343920 article EN cc-by-nc-nd IEEE Access 2023-01-01

To protect intellectual property and distribution rights against dishonest customers in the multimedia content market, fingerprinting schemes that use error-correcting codes help identify users illegally redistributing media. This article presents a traitor-tracing algorithm takes advantage of soft-decision decoding techniques to find all identifiable traitors.

10.1109/mmul.2004.1289040 article EN IEEE Multimedia 2004-04-01
Coming Soon ...