Rolando Trujillo-Rasua, Agusti Solanas

Computer Networks 55 (15), 3211-3223

Description: There is a need for efficient communication protocols that allow the private and scalable deployment of RFID systems with a large number of tags. In this paper, we leverage the idea of using distributed, collaborative readers to identify RFID tags and propose a new probabilistic communication protocol for those readers to privately identify RFID tags more efficiently in terms of computational cost and bandwidth usage. Our protocol, which is based on hash-locks, allows readers to exchange information so as to reduce the amount of tag IDs stored in their caches. Consequently, our proposal improves the scalability of the system, and allows the easy management of large amounts of tags. We provide simulation results showing that our proposal is more efficient and flexible than previous ones in terms of computational cost and bandwidth usage.

Jose Maria de Fuentes, Lorena Gonzalez-Manzano, Agusti Solanas, Fatbardh Veseli

Computer 51 (7), 44-53

Description: Smart city-based IoT devices enable collection of vast amounts of data, which can be used to provide more efficient public and private services. Among these, healthcare is especially relevant, and smart health (s-health) models are already being deployed. The authors propose attribute-based credentials (ABCs) to cope with s-health privacy issues and to set the stage for the further adoption in other privacy-aware IoT-based smart cities' services.

Constantinos Patsakis, Agusti Solanas

IEEE Communications Magazine 51 (12), 122-128

Description: Vehicles are equipped with more technology with each passing day. Acronyms such as ABS (anti-lock braking system), EBD (electronic brakeforce distribution) or EPS (electric power steering) have become commonplace, and are used as synonyms for safety and comfort. On the contrary, others like EDR (event data recorder) are not as popular. EDR, commonly known as automotive black boxes, are devices used to col- lect data about a vehicle and its occupants, which can be accessed after an accident to clarify its cause. With the upcoming regulation of the National Highway Traffic Safety Administration requiring manufacturers to include EDR in all new vehicles, privacy advocates have raised some alarms related to the storage of and access to these data. In this article, we propose a novel privacy-aware solution for the EDR of modern vehicles. Our solution is based on modern cryp- tographic primitives like timed release encryp- tion (TRE), and it guarantees the privacy of the vehicle’s occupants while allowing the full func- tionality of EDR in case of emergency.

Hamed Habibi Aghdam, Domenec Puig, Agusti Solanas

Computational and mathematical methods in medicine 2013,

Description: The extraction of the breast boundary is crucial to perform further analysis of mammogram. Methods to extract the breast boundary can be classified into two categories: methods based on image processing techniques and those based on models. The former use image transformation techniques such as thresholding, morphological operations, and region growing. In the second category, the boundary is extracted using more advanced techniques, such as the active contour model. The problem with thresholding methods is that it is a hard to automatically find the optimal threshold value by using histogram information. On the other hand, active contour models require defining a starting point close to the actual boundary to be able to successfully extract the boundary. In this paper, we propose a probabilistic approach to address the aforementioned problems. In our approach we use local binary patterns to describe the texture around each pixel. In addition, the smoothness of the boundary is handled by using a new probability model. Experimental results show that the proposed method reaches 38% and 50% improvement with respect to the results obtained by the active contour model and threshold-based methods respectively, and it increases the stability of the boundary extraction process up to 86%.

Peio Lopez-Iturri, Fran Casino, Erik Aguirre, Leire Azpilicueta, Francisco Falcone, Agusti Solanas

Journal Of Sensors,

Description: This paper presents a novel hybrid simulation method based on the combination of an in-house developed 3D ray launching algorithm and a collaborative filtering (CF) technique, which will be used to analyze the performance of ZigBee-based wireless sensor networks (WSNs) to enable ambient assisted living (AAL). The combination of Low Definition results obtained by means of a deterministic ray launching method and the application of a CF technique leads to a drastic reduction of the time and computational cost required to obtain accurate simulation results. The paper also reports that this kind of AAL indoor complex scenario with multiple wireless devices needs a thorough and personalized radioplanning analysis as radiopropagation has a strong dependence on the network topology and the specific morphology of the scenario. The wireless channel analysis performed by our hybrid method provides valuable insight into network design phases of complex wireless systems, typical in AAL-oriented environments. Thus, it results in optimizing network deployment, reducing overall interference levels, and increasing the overall system performance in terms of cost reduction, transmission rates, and energy efficiency.

Page 7 of 43

Av. Països Catalans, 26, 43470 Tarragona, Catalonia, Spain

Av. Països Catalans, 26, 43470 Tarragona, Catalonia, Spain
Latest from our Blog