Celeste Campo

ORCID: 0000-0003-1788-890X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Human Mobility and Location-Based Analysis
  • Access Control and Trust
  • Internet Traffic Analysis and Secure E-voting
  • Context-Aware Activity Recognition Systems
  • Mobile Agent-Based Network Management
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Caching and Content Delivery
  • Distributed systems and fault tolerance
  • Bluetooth and Wireless Communication Technologies
  • Service-Oriented Architecture and Web Services
  • Energy Efficient Wireless Sensor Networks
  • Green IT and Sustainability
  • Smart Grid Energy Management
  • Peer-to-Peer Network Technologies
  • Cloud Data Security Solutions
  • Wireless Networks and Protocols
  • Wireless Communication Networks Research
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Autonomous Vehicle Technology and Safety

Universidad Carlos III de Madrid
2014-2024

Instituto de Salud Carlos III
2011

World is living an overwhelming explosion of smart devices: electronic gadgets, appliances, meters, cars, sensors, camera and even traffic lights, that are connected to the Internet extend their capabilities, constituting what known as Things (IoT). In these environments, application layer decisive for quality connection, which has dependencies transport layer, mainly when secure communications used. This paper analyses performance offered by two most popular protocols layer: Constrained...

10.1016/j.comnet.2021.108338 article EN cc-by Computer Networks 2021-07-28

The fast growth of the Internet Things (IoT) has made this technology one most promising paradigms recent years. Wireless Sensor Networks (WSNs) are important challenges things. These networks up devices with limited processing power, memory, and energy. constrained nature WSNs makes it necessary to have specific restricted protocols work in these environments. In paper, we present an energy consumption network traffic study main IoT application layer protocols, Constrained Application...

10.3390/proceedings2019031049 article EN cc-by 2019-11-20

In pervasive computing environments, mobile devices communicate via wireless links without requiring any fixed infrastructure. These must be able to discover and share services dynamically. this paper, we propose a new service discovery middleware specifically designed for kind of environments. This is composed protocol, Pervasive Discovery Protocol (PDP), description language, Generic Service Description Language (GSDL). PDP fully distributed protocol that merges characteristics both pull...

10.1109/percomw.2005.61 article EN 2005-04-01

Predicting users’ next location allows to anticipate their future context, thus providing additional time be ready for that context and react consequently. This work is focused on a set of LZ-based algorithms (LZ, LeZi Update Active LeZi) capable learning mobility patterns estimating the with low resource needs, which makes it possible execute them mobile devices. The original have been divided into two phases, being mix check combination best one obtain better prediction accuracy or lower...

10.3390/s120607496 article EN cc-by Sensors 2012-06-04

In mobile phones, it is useful to know the most probable next location make decisions about future actions. this letter we compare three LZ based prediction algorithms. The originality of our work that in a cellular network, separate algorithms into two independent phases (tree updating and probability calculation), have included Active LeZi study, evaluate hit rate resource consumption, including processing time.

10.1109/lcomm.2010.08.092033 article EN IEEE Communications Letters 2010-08-01

Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be exploited by provider to build user profile of visited locations, which might disclose sensitive data, such as work or home locations. classic concept entropy is widely used evaluate in these scenarios, where information represented a sequence independent samples categorized data. However, since sent very frequently, location profiles...

10.3390/e17063913 article EN Entropy 2015-06-10

Mobile phones are becoming the chosen platforms for web access, with a forecast that over coming decade more users will connect to internet through mobile than conventional desktop computers. Internet search is likely going remain one of major ways find information and services on web. In order provide satisfactory usability, searches have take into consideration nature handsets. Being both pervasive person-centric they continuously capture about their context. Context awareness can enhance...

10.1109/mic.2012.17 article EN IEEE Internet Computing 2012-01-17

Undoubtedly, Location-based Social Networks (LBSNs) provide an interesting source of geo-located data that we have previously used to obtain patterns the dynamics crowds throughout urban areas. According our previous results, activity in LBSNs reflects real city. Therefore, unexpected behaviors social media are a trustful evidence changes In this paper introduce hybrid solution early detect these based on applying combination two approaches, use entropy analysis and clustering techniques,...

10.1016/j.future.2020.03.038 article EN cc-by-nc-nd Future Generation Computer Systems 2020-03-24

Road safety has become a main issue for governments and car manufacturers in the last twenty years. The concept of Intelligent Transportation Systems (ITS) is used when talking about communication technologies between vehicles infrastructure to improve, among others, road safety. In this paper, we propose warning service prevent accidents by alerting drivers dangerous conditions. This includes definition new broadcast dissemination mechanism. A VANET highway scenario simulated evaluate how...

10.1109/saconet.2013.6654564 article EN 2013-06-01

The DNS protocol plays a fundamental role in the operation of ubiquitous networks. All devices connected to these networks need work, both for traditional domain name IP address translation, and more advanced services such as resource discovery. over HTTPS (DoH) solves certain security problems present protocol. However, malicious tunnels, covert way encapsulating traffic connection, are difficult detect because encrypted data prevents performing an analysis content traffic. In this study,...

10.1016/j.comnet.2023.109910 article EN cc-by-nc-nd Computer Networks 2023-06-30

Evidence of something unusual happening in urban areas can be collected from different data sources, such as police officers, cameras, or specialized physical infrastructures. In this paper, we propose using geotagged posts on location-based social networks (LBSNs) to detect crowd dynamics anomalies automatically evidence a potential event. To end, use the Instagram API media/search endpoint collect location pictures posted by users given area periodically. The locations are summarized their...

10.3390/electronics7120380 article EN Electronics 2018-12-03

The authors review MMAPI technology and explore how users might use their phones' cameras as more than just conventional cameras. Their goal was to understand this its limitations clarify what we can (and canýt) achieve with smartcamera phones.

10.1109/mprv.2005.36 article EN IEEE Pervasive Computing 2005-01-01

Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service a challenging issue for this kind network. This article proposes new mechanism discovering advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated validity similar version OLSR (OLSRv1). order to advertise services, have added type-length-value...

10.3390/s150717621 article EN cc-by Sensors 2015-07-20

Human mobility knowledge is key for urban planning or models design. Therefore, estimating reliable parameters crucial to lay an unbiased foundation. However, most works such features rely on datasets made up of the history mobile network cells where user located when she makes active use network, known as Call Data Records (CDRs), every time her device connects a new cell, without taking into account cell changes not caused by movement. Could we accurately characterize human with datasets?...

10.1109/percomw.2014.6815213 article EN 2014-03-01

Trust has emerged as an important facet of inter-domain relationships. management in fixed networks is not functional ad hoc P2P networks, because these require autonomous, user-centric and non-static trust management. The model the basis any security infrastructure. In this paper, we propose a trust-based middleware for secure digital content sharing between pervasive devices. Such allows to enhance support Likewise, suitable efficient file exchange protocol, WSFEP, sharing. Both...

10.1109/percom.2008.95 article EN 2008-03-01

Thanks to the research on Vehicular Ad Hoc Networks (VANETs), we will be able deploy applications roadways that contribute energy efficiency through a better planning of long trips. With this goal in mind, have designed gas/charging station advertising system, which takes advantage broadcast nature network. We found reducing number total sent packets is important, as it allows for use available bandwidth. improvements distance-based flooding scheme, so can support application with good...

10.3390/s130708612 article EN cc-by Sensors 2013-07-05

Correctly estimating the features characterizing human mobility from mobile phone traces is a key factor to improve performance of networks, as well for model design and urban planning. Most related works found their conclusions on location data based cells where each user sends or receives calls messages, known Call Detail Records (CDRs). In this work, we test if such sets provide enough detail users' movements so accurately estimate some most studied features. We perform analysis using two...

10.3390/e20100736 article EN cc-by Entropy 2018-09-25

Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors motion. Carrying their mobile devices, moving connected vehicles or actively participating social networks, provide a wealth of that, after properly processing, can support numerous applications for the benefit community. In context smart communities, INRISCO [1] proposal intends (i) early detection abnormal situations cities (i.e., incidents), (ii) analysis whether, according...

10.1109/access.2020.2987483 article EN cc-by IEEE Access 2020-01-01
Coming Soon ...