2015
Autores
Samano Robles, R; Gameiro, A; Pereira, N;
Publicação
2015 FOURTH INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT)
Abstract
The performance of wireless networks will experience a considerable improvement by the use of novel technologies such as distributed antenna systems (DASs), multi-cell cooperation (MCC), and cognitive radio (CR). These solutions have shown considerable gains at the physical-layer (PHY). However, several issues remain open in the system-level evaluation, radio resource management (RRM), and particularly in the design of billing/licensing schemes for this type of system. This paper proposes a system-level simulator (SLS) that will help in addressing these issues. The paper focuses on the description of the modules of a generic SLS that need a modification to cope with the new transtnission/econotnic paradigms. An advanced RRM solution is proposed for a multi-cell DAS with two levels of cooperation: inside the cell (intra-cell) to coordinate the transmission of distributed nodes within the cell, and between cells (inter-cell or MCC) to adapt cell transmissions according to the collected inter-cell interference measurements. The RRM solution blends network and financial metrics using the theory of multi objective portfolio optimization. The core of the RRM solution is an iterative weighted least squares (WLS) optimization algorithm that aims to schedule in a fair manner as many terminals as possible across all the radio resources of the available frequency bands (licensed and non-licensed), while considering different economic metrics. The RRM algorithm includes joint terminal scheduling, link adaptation, space division multiplexing, spectrtun selection, and resource allocation.
2015
Autores
Abdelzaher, T; Pereira, N; Tovar, E;
Publicação
Lecture Notes in Computer Science
Abstract
2015
Autores
Abdelzaher, TF; Pereira, N; Tovar, E;
Publicação
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Abstract
2015
Autores
Serna, MA; Casado, R; Bermudez, A; Pereira, N; Tennina, S;
Publicação
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
Abstract
Disaster management is one of the most relevant application fields of wireless sensor networks. In this application, the role of the sensor network usually consists of obtaining a representation or a model of a physical phenomenon spreading through the affected area. In this work we focus on forest firefighting operations, proposing three fully distributed ways for approximating the actual shape of the fire. In the simplest approach, a circular burnt area is assumed around each node that has detected the fire and the union of these circles gives the overall fire's shape. However, as this approach makes an intensive use of the wireless sensor network resources, we have proposed to incorporate two in-network aggregation techniques, which do not require considering the complete set of fire detections. The first technique models the fire by means of a complex shape composed of multiple convex hulls representing different burning areas, while the second technique uses a set of arbitrary polygons. Performance evaluation of realistic fire models on computer simulations reveals that the method based on arbitrary polygons obtains an improvement of 20% in terms of accuracy of the fire shape approximation, reducing the overhead in-network resources to 10% in the best case.
2018
Autores
Rajagopal, N; Lazik, P; Pereira, N; Chayapathy, S; Sinopoli, B; Rowe, A;
Publicação
2018 17TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN)
Abstract
Indoor localization systems typically determine a position using either ranging measurements, inertial sensors, environmental-specific signatures or some combination of all of these methods. Given a floor plan, inertial and signature-based systems can converge on accurate locations by slowly pruning away inconsistent states as a user walks through the space. In contrast, range-based systems are capable of instantly acquiring locations, but they rely on densely deployed beacons and suffer from inaccurate range measurements given non-line-of-sight (NLOS) signals. In order to get the best of both worlds, we present an approach that systematically exploits the geometry information derived from building floor plans to directly improve location acquisition in range-based systems. Our solving approach can disambiguate multiple feasible locations taking into account a mix of LOS and NLOS hypotheses to accurately localize with significantly fewer beacons. We demonstrate our geometry-aware solving approach using a new ultrasonic beacon platform that is able to perform direct time-of-flight ranges on commodity smartphones. The platform uses Bluetooth Low Energy (BLE) for time synchronization and ultrasound for measuring propagation distance. We evaluate our system's accuracy with multiple deployments in a university campus and show that our approach shifts the 80% accuracy point from 4-8m to 1m as compared to solvers that do not use the floor plan information. We are able to detect and remove NLOS signals with 91.5% accuracy.
2019
Autores
Eldefrawy, M; Butun, I; Pereira, N; Gidlund, M;
Publicação
COMPUTER NETWORKS
Abstract
Recent Low Power Wide Area Networks (LPWAN) protocols are receiving increased attention from industry and academia to offer accessibility for Internet of Things (IoT) connected remote sensors and actuators. In this work, we present a formal study of LoRaWAN security, an increasingly popular technology, which defines the structure and operation of LPWAN networks based on the LoRa physical layer. There are previously known security vulnerabilities in LoRaWAN that lead to the proposal of several improvements, some already incorporated into the latest protocol specification. Our analysis of LoRaWAN security uses Scyther, a formal security analysis tool and focuses on the key exchange portion of versions 1.0 (released in 2015) and 1.1 (the latest, released in 2017). For version 1.0, which is still the most widely deployed version of LoRaWAN, we show that our formal model allowed to uncover weaknesses that can be related to previously reported vulnerabilities. Our model did not find weaknesses in the latest version of the protocol (v1.1), and we discuss what this means in practice for the security of LoRaWAN as well as important aspects of our model and tools employed that should be considered. The Scyther model developed provides realistic models for LoRaWAN v1.0 and v1.1 that can be used and extended to formally analyze, inspect, and explore the security features of the protocols. This, in turn, can clarify the methodology for achieving secrecy, integrity, and authentication for designers and developers interested in these LPWAN standards. We believe that our model and discussion of the protocols security properties are beneficial for both researchers and practitioners. To the best of our knowledge, this is the first work that presents a formal security analysis of LoRaWAN.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.