Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by Manuel Ricardo

2017

Mistrustful P2P: Deterministic privacy-preserving P2P file sharing model to hide user content interests in untrusted peer-to-peer networks

Authors
da Silva, PM; Dias, J; Ricardo, M;

Publication
COMPUTER NETWORKS

Abstract
P2P networks endowed individuals with the means to easily and efficiently distribute digital media over the Internet, but user legal liability issues may be raised as they also facilitate the unauthorized distribution and reproduction of copyrighted material. Traditional P2P file sharing systems focus on performance and scalability, disregarding any privacy or legal issues that may arise from their use. Lacking alternatives, and unaware of the privacy issues that arise from relaying traffic of insecure applications, users have adopted anonymity systems for P2P file sharing. This work aims at hiding user content interests from malicious peers through plausible deniability. The Mistrustful P2P model is built on the concept of mistrusting all the entities participating in the P2P network, hence its name. It provides a deterministic and configurable privacy protection that relies on cover content downloads to hide user content interests, has no trust requirements, and introduces several mechanisms to prevent user legal liability and reduce network overhead while enabling timely content downloads. We extend previous work on the Mistrustful P2P model by discussing its legal and ethical framework, assessing its feasibility for more use cases, providing a security analysis, comparing it against a traditional P2P file sharing model, and further defining and improving its main mechanisms.

2014

Neighbors and Relative Location Identification Using RSSI in a Dense Wireless Sensor Network

Authors
Abdellatif, MM; Oliveira, JM; Ricardo, M;

Publication
2014 13TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET)

Abstract
Wireless Sensor Networks (WSNs) are made of a large amount of small devices that are able to sense changes in the environment, and communicate these changes throughout the network. An example of such network is a photo voltaic (PV) power plant, where there is a sensor connected to each solar panel. Because such a network covers a large area, the number of sensors can be very large. The task of each sensor is to sense the output of the panel which is then sent to a central node for processing. As the network grows, it becomes impractical and even impossible to configure all these nodes manually. And so, the use of self-organization and auto-configuration algorithms becomes essential. In this paper, two algorithms are proposed that can be used to allow each node in the network to automatically identify its closest neighbors as well as its relative location in the network using the value of the Received Signal Strength indicator (RSSI) of the messages sent back and forth during the setup phase. Results show that the error in neighbor identification decreases as we increase the number of RSSI values used for decision making. Additionally, the number of nodes in the network affects the setup error greatly. However, the value of the error is still acceptable even for high number of simulated columns.

2014

RPL Modifications to Improve the End-to-End Delay Estimation in WSN

Authors
Pinto, P; Pinto, A; Ricardo, M;

Publication
2014 11TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATIONS SYSTEMS (ISWCS)

Abstract
Real-time monitoring applications deployed in Low-power and Lossy Networks may generate flows sensitive to delay, where the information is useful for the destination only if it is received within a strict delay boundary. Data packets that will likely miss the application deadline could be discarded during their routing through the network or even be not transmitted at all, thus contributing for a better usage of the network resources. This paper presents RA-EEDEM, a set of modifications made to RPL that improve the End-to-End Delay (EED) estimation accuracy. The RA-EEDEM modifications include changes to the RPL metrics and to its Objective Function (OF). The results show that RA-EEDEM improves the accuracy of EED estimation while minimizing its impact on the average EED and Packet Reception Ratio (PRR).

2013

The Effect of Data Aggregation on the Performance of a Wireless Sensor Network Employing a Polling Based Data Collecting Technique

Authors
Abdellatif, MM; Oliveira, JM; Ricardo, M;

Publication
2013 IFIP WIRELESS DAYS (WD)

Abstract
Wireless Sensor Networks (WSNs) consist of small devices capable of sensing various variables in the environment, process and communicate them through the network. These devices interact together to carry out monitoring tasks. A photo-voltaic (PV) power plant is an example of such network, where each solar panel has a sensor connected to it. The number of interconnected solar panels can become very large in order to cover a large area. Each sensor senses the output of the panel and sends this value to a central node for processing. In this paper we study and compare the performance of a multi-hop wireless sensor network, employing a polling based data collecting technique with data aggregation, against the performance of a one hop network employing two different data collecting techniques. The study considers a wireless network with fixed number of nodes using different values of the offered load, estimating the network throughput for each technique and offered load. The use of a multi-hop setup was chosen in order to reduce transmission power and interference among nodes. Results show that the multi-hop network, using the polling based data collecting technique with data aggregation, performs close to the one hop network using the other two techniques. The study involves both simulation and testbed experimentation.

2015

Improving ns-3 emulation support in real-world networking scenarios

Authors
Fontes, H; Campos, R; Ricardo, M;

Publication
Proceedings of the 8th International Conference on Simulation Tools and Techniques, Athens, Greece, August 24-26, 2015

Abstract
A common problem in networking research and development is the duplicate effort of writing simulation and implementation code. This duplication can be avoided through the use of fast-prototyping methodologies, which enable reusing simulation code in real prototyping and in production environments. Although this functionality is already available by using ns-3 emulation, there are still limitations regarding the support of real network interfaces and easy configuration of the network settings, such as IP and MAC addresses. In this paper we propose an improved version of the ns-3 emulation component by introducing new functionalities that address these limitations. The new functionalities include the support of new types of real network interfaces and the easier integration of emulation nodes with existing networks by means of a new auto-configuration mechanism for ns-3 nodes. Experimental results obtained in a laboratorial testbed and in a real vehicular network testbed demonstrate the new functionalities proper operation, and their backwards compatibility with previously coded ns-3 scenarios. Copyright © 2015 ICST.

2017

A Trace-based ns-3 Simulation Approach for Perpetuating Real-World Experiments

Authors
Fontes, H; Campos, R; Ricardo, M;

Publication
Proceedings of the Workshop on ns-3, Porto, Portugal, June 13 - 14, 2017

Abstract
A common problem in mobile networking research and development is the cost related to deploying and running real-world mobile testbeds. Due to cost and operational constraints, these testbeds usually run for short time periods but generate very unique and relevant results that are hard to reproduce. We propose the use of ns-3 as a solution to successfully reproduce real-world mobile testbed experiments. This is accomplished by feeding ns-3 with real testbed traces including node positions and radio link quality only. In order to validate our approach, the network throughput between a fixed Base Station and a Unmanned Aerial Vehicle (UAV) was measured in a real-world testbed. The experimental results were compared to the network throughput achieved using the ns-3 trace-based simulation and a plain ns-3 simulation. The obtained results show the high accuracy of the trace-based simulation, thus validating our approach. © 2017 ACM.

  • 4
  • 24