- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- IPv6, Mobility, Handover, Networks, Security
- Vehicular Ad Hoc Networks (VANETs)
- Human Mobility and Location-Based Analysis
- Access Control and Trust
- Internet Traffic Analysis and Secure E-voting
- Context-Aware Activity Recognition Systems
- Mobile Agent-Based Network Management
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Caching and Content Delivery
- Distributed systems and fault tolerance
- Bluetooth and Wireless Communication Technologies
- Service-Oriented Architecture and Web Services
- Energy Efficient Wireless Sensor Networks
- Green IT and Sustainability
- Smart Grid Energy Management
- Peer-to-Peer Network Technologies
- Cloud Data Security Solutions
- Wireless Networks and Protocols
- Wireless Communication Networks Research
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Autonomous Vehicle Technology and Safety
Universidad Carlos III de Madrid
2014-2024
Instituto de Salud Carlos III
2011
World is living an overwhelming explosion of smart devices: electronic gadgets, appliances, meters, cars, sensors, camera and even traffic lights, that are connected to the Internet extend their capabilities, constituting what known as Things (IoT). In these environments, application layer decisive for quality connection, which has dependencies transport layer, mainly when secure communications used. This paper analyses performance offered by two most popular protocols layer: Constrained...
The fast growth of the Internet Things (IoT) has made this technology one most promising paradigms recent years. Wireless Sensor Networks (WSNs) are important challenges things. These networks up devices with limited processing power, memory, and energy. constrained nature WSNs makes it necessary to have specific restricted protocols work in these environments. In paper, we present an energy consumption network traffic study main IoT application layer protocols, Constrained Application...
In pervasive computing environments, mobile devices communicate via wireless links without requiring any fixed infrastructure. These must be able to discover and share services dynamically. this paper, we propose a new service discovery middleware specifically designed for kind of environments. This is composed protocol, Pervasive Discovery Protocol (PDP), description language, Generic Service Description Language (GSDL). PDP fully distributed protocol that merges characteristics both pull...
Predicting users’ next location allows to anticipate their future context, thus providing additional time be ready for that context and react consequently. This work is focused on a set of LZ-based algorithms (LZ, LeZi Update Active LeZi) capable learning mobility patterns estimating the with low resource needs, which makes it possible execute them mobile devices. The original have been divided into two phases, being mix check combination best one obtain better prediction accuracy or lower...
In mobile phones, it is useful to know the most probable next location make decisions about future actions. this letter we compare three LZ based prediction algorithms. The originality of our work that in a cellular network, separate algorithms into two independent phases (tree updating and probability calculation), have included Active LeZi study, evaluate hit rate resource consumption, including processing time.
Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be exploited by provider to build user profile of visited locations, which might disclose sensitive data, such as work or home locations. classic concept entropy is widely used evaluate in these scenarios, where information represented a sequence independent samples categorized data. However, since sent very frequently, location profiles...
Mobile phones are becoming the chosen platforms for web access, with a forecast that over coming decade more users will connect to internet through mobile than conventional desktop computers. Internet search is likely going remain one of major ways find information and services on web. In order provide satisfactory usability, searches have take into consideration nature handsets. Being both pervasive person-centric they continuously capture about their context. Context awareness can enhance...
Undoubtedly, Location-based Social Networks (LBSNs) provide an interesting source of geo-located data that we have previously used to obtain patterns the dynamics crowds throughout urban areas. According our previous results, activity in LBSNs reflects real city. Therefore, unexpected behaviors social media are a trustful evidence changes In this paper introduce hybrid solution early detect these based on applying combination two approaches, use entropy analysis and clustering techniques,...
Road safety has become a main issue for governments and car manufacturers in the last twenty years. The concept of Intelligent Transportation Systems (ITS) is used when talking about communication technologies between vehicles infrastructure to improve, among others, road safety. In this paper, we propose warning service prevent accidents by alerting drivers dangerous conditions. This includes definition new broadcast dissemination mechanism. A VANET highway scenario simulated evaluate how...
The DNS protocol plays a fundamental role in the operation of ubiquitous networks. All devices connected to these networks need work, both for traditional domain name IP address translation, and more advanced services such as resource discovery. over HTTPS (DoH) solves certain security problems present protocol. However, malicious tunnels, covert way encapsulating traffic connection, are difficult detect because encrypted data prevents performing an analysis content traffic. In this study,...
Evidence of something unusual happening in urban areas can be collected from different data sources, such as police officers, cameras, or specialized physical infrastructures. In this paper, we propose using geotagged posts on location-based social networks (LBSNs) to detect crowd dynamics anomalies automatically evidence a potential event. To end, use the Instagram API media/search endpoint collect location pictures posted by users given area periodically. The locations are summarized their...
The authors review MMAPI technology and explore how users might use their phones' cameras as more than just conventional cameras. Their goal was to understand this its limitations clarify what we can (and canýt) achieve with smartcamera phones.
Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service a challenging issue for this kind network. This article proposes new mechanism discovering advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated validity similar version OLSR (OLSRv1). order to advertise services, have added type-length-value...
Human mobility knowledge is key for urban planning or models design. Therefore, estimating reliable parameters crucial to lay an unbiased foundation. However, most works such features rely on datasets made up of the history mobile network cells where user located when she makes active use network, known as Call Data Records (CDRs), every time her device connects a new cell, without taking into account cell changes not caused by movement. Could we accurately characterize human with datasets?...
Trust has emerged as an important facet of inter-domain relationships. management in fixed networks is not functional ad hoc P2P networks, because these require autonomous, user-centric and non-static trust management. The model the basis any security infrastructure. In this paper, we propose a trust-based middleware for secure digital content sharing between pervasive devices. Such allows to enhance support Likewise, suitable efficient file exchange protocol, WSFEP, sharing. Both...
Thanks to the research on Vehicular Ad Hoc Networks (VANETs), we will be able deploy applications roadways that contribute energy efficiency through a better planning of long trips. With this goal in mind, have designed gas/charging station advertising system, which takes advantage broadcast nature network. We found reducing number total sent packets is important, as it allows for use available bandwidth. improvements distance-based flooding scheme, so can support application with good...
Correctly estimating the features characterizing human mobility from mobile phone traces is a key factor to improve performance of networks, as well for model design and urban planning. Most related works found their conclusions on location data based cells where each user sends or receives calls messages, known Call Detail Records (CDRs). In this work, we test if such sets provide enough detail users' movements so accurately estimate some most studied features. We perform analysis using two...
Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors motion. Carrying their mobile devices, moving connected vehicles or actively participating social networks, provide a wealth of that, after properly processing, can support numerous applications for the benefit community. In context smart communities, INRISCO [1] proposal intends (i) early detection abnormal situations cities (i.e., incidents), (ii) analysis whether, according...