scispace - formally typeset
Search or ask a question
Author

Alvaro Araujo

Bio: Alvaro Araujo is an academic researcher from Technical University of Madrid. The author has contributed to research in topics: Wireless sensor network & Key distribution in wireless sensor networks. The author has an hindex of 13, co-authored 69 publications receiving 826 citations. Previous affiliations of Alvaro Araujo include ETSI & University of California, Berkeley.


Papers
More filters
Journal ArticleDOI
TL;DR: An important result is that all students have developed more complex and sophisticated electronic systems, while considering that the results are worth the effort invested.
Abstract: This paper presents an approach to design Electronic Systems Curricula for making electronics more appealing to students. Since electronics is an important grounding for other disciplines (computer science, signal processing, and communications), this approach proposes the development of multidisciplinary projects using the project-based learning (PBL) strategy for increasing the attractiveness of the curriculum. The proposed curriculum structure consists of eight courses: four theoretical courses and four PBL courses (including a compulsory Master's thesis). In PBL courses, the students, working together in groups, develop multidisciplinary systems, which become progressively more complex. To address this complexity, the Department of Electronic Engineering has invested in the last five years in many resources for developing software tools and a common hardware. This curriculum has been evaluated successfully for the last four academic years: the students have increased their interest in electronics and have given the courses an average grade of more than 71% for all PBL course evaluations (data extracted from students surveys). The students have also acquired new skills and obtained very good academic results: the average grade was more than 74% for all PBL courses. An important result is that all students have developed more complex and sophisticated electronic systems, while considering that the results are worth the effort invested

160 citations

Journal ArticleDOI
TL;DR: A complete wireless system for structural identification under environmental load is designed, implemented, deployed, and tested on three different real bridges, and its contribution ranges from the hardware to the graphical front end to avoid the main limitations of WNs for SHM particularly in regard to reliability, scalability, and synchronization.
Abstract: Structural health monitoring (SHM) systems have excellent potential to improve the regular operation and maintenance of structures. Wireless networks (WNs) have been used to avoid the high cost of traditional generic wired systems. The most important limitation of SHM wireless systems is time-synchronization accuracy, scalability, and reliability. A complete wireless system for structural identification under environmental load is designed, implemented, deployed, and tested on three different real bridges. Our contribution ranges from the hardware to the graphical front end. System goal is to avoid the main limitations of WNs for SHM particularly in regard to reliability, scalability, and synchronization. We reduce spatial jitter to 125 ns, far below the 120 μs required for high-precision acquisition systems and much better than the 10-μs current solutions, without adding complexity. The system is scalable to a large number of nodes to allow for dense sensor coverage of real-world structures, only limited by a compromise between measurement length and mandatory time to obtain the final result. The system addresses a myriad of problems encountered in a real deployment under difficult conditions, rather than a simulation or laboratory test bed.

104 citations

Journal ArticleDOI
TL;DR: A hierarchical wireless sensor network aimed at early fire detection in risky areas, integrated with the fire fighting command centres, geographical information systems, and fire simulators is described.
Abstract: A wildland fire is an uncontrolled fire that occurs mainly in forest areas, although it can also invade urban or agricultural areas. Among the main causes of wildfires, human factors, either intentional or accidental, are the most usual ones. The number and impact of forest fires are expected to grow as a consequence of the global warming. In order to fight against these disasters, it is necessary to adopt a comprehensive, multifaceted approach that enables a continuous situational awareness and instant responsiveness. This paper describes a hierarchical wireless sensor network aimed at early fire detection in risky areas, integrated with the fire fighting command centres, geographical information systems, and fire simulators. This configuration has been successfully tested in two fire simulations involving all the key players in fire fighting operations: fire brigades, communication systems, and aerial, coordination, and land means.

102 citations

Journal ArticleDOI
02 Aug 2019-Sensors
TL;DR: An updated, holistic view of this research on navigation devices capable of guiding the blind through indoor and/or outdoor scenarios is provided, in order to enable developers to exploit the different aspects of its multidisciplinary nature.
Abstract: Over the last decades, the development of navigation devices capable of guiding the blind through indoor and/or outdoor scenarios has remained a challenge. In this context, this paper’s objective is to provide an updated, holistic view of this research, in order to enable developers to exploit the different aspects of its multidisciplinary nature. To that end, previous solutions will be briefly described and analyzed from a historical perspective, from the first “Electronic Travel Aids” and early research on sensory substitution or indoor/outdoor positioning, to recent systems based on artificial vision. Thereafter, user-centered design fundamentals are addressed, including the main points of criticism of previous approaches. Finally, several technological achievements are highlighted as they could underpin future feasible designs. In line with this, smartphones and wearables with built-in cameras will then be indicated as potentially feasible options with which to support state-of-art computer vision solutions, thus allowing for both the positioning and monitoring of the user’s surrounding area. These functionalities could then be further boosted by means of remote resources, leading to cloud computing schemas or even remote sensing via urban infrastructure.

100 citations

Journal ArticleDOI
TL;DR: A wide variety of attacks on CWSNs are discussed, their taxonomy and different security measures available to handle the attacks are proposed and future challenges to be faced are proposed.
Abstract: A cognitive wireless sensor network (CWSN) is an emerging technology with great potential to avoid traditional wireless problems such as reliability. One of the major challenges CWSNs face today is security. A CWSN is a special network which has many constraints compared to a traditional wireless network and many different features compared to a traditional wireless sensor network. While security challenges have been widely tackled in traditional networks, this is a novel area in CWSNs. This article discusses a wide variety of attacks on CWSNs, their taxonomy and different security measures available to handle the attacks. Also, future challenges to be faced are proposed.

67 citations


Cited by
More filters
Journal ArticleDOI
10 May 2016
TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
Abstract: Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial-noise-aided security, security-oriented beamforming, diversity-assisted security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.

948 citations

Journal ArticleDOI
TL;DR: In this article, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer.
Abstract: This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.

632 citations

Journal ArticleDOI
TL;DR: An automated irrigation system developed to optimize water use for agricultural crops has the potential to be useful in water limited geographically isolated areas.
Abstract: An automated irrigation system was developed to optimize water use for agricultural crops. The system has a distributed wireless network of soil-moisture and temperature sensors placed in the root zone of the plants. In addition, a gateway unit handles sensor information, triggers actuators, and transmits data to a web application. An algorithm was developed with threshold values of temperature and soil moisture that was programmed into a microcontroller-based gateway to control water quantity. The system was powered by photovoltaic panels and had a duplex communication link based on a cellular-Internet interface that allowed for data inspection and irrigation scheduling to be programmed through a web page. The automated system was tested in a sage crop field for 136 days and water savings of up to 90% compared with traditional irrigation practices of the agricultural zone were achieved. Three replicas of the automated system have been used successfully in other places for 18 months. Because of its energy autonomy and low cost, the system has the potential to be useful in water limited geographically isolated areas.

591 citations

Journal ArticleDOI
TL;DR: This paper describes both the technology for, and the methodological approach to, course design and development which is aimed at supporting the evolution from traditional teaching to active learning, and raising interest in the topics of e-learning and Web courseware development among IT students.
Abstract: Blended learning has become an increasingly popular form of e-learning, and is particularly suitable to the process of transitioning towards e-learning from traditional forms of learning and teaching. This paper describes the use of the blended e-learning model, which is based on a mixture of collaborative learning, problem-based learning (PBL) and independent learning, in a course ldquoTeaching Methods in Information Science,rdquo given at the University of Rijeka, Rijeka, Croatia. This model is realized as a combination of a face-to-face environment and online learning, using a proprietary learning management system (LMS) named adaptive hypermedia courseware (AHyCo). AHyCo is based on adaptive hypermedia and in addition to supporting learning and testing, introduces completely new constructivist and cognitivist elements to education. By supporting collaborative and project-oriented activities AHyCo promotes students' motivation for learning and establishes learning as an active and interactive process. This paper describes both the technology for, and the methodological approach to, course design and development which is aimed at supporting the evolution from traditional teaching to active learning, and raising interest in the topics of e-learning and Web courseware development among IT students. A survey conducted in the end of the course showed that students were satisfied with the pedagogical approach, and their academic achievements were also better than expected. Particularly important is that the dropout rate was greatly diminished, which could be related to students' satisfaction with the support they received from the instructor and the system.

333 citations

Journal ArticleDOI
TL;DR: A comprehensive survey of SHM using WSNs is presented outlining the algorithms used in damage detection and localization, outlining network design challenges, and future research directions.
Abstract: Structural health monitoring (SHM) using wireless sensor networks (WSNs) has gained research interest due to its ability to reduce the costs associated with the installation and maintenance of SHM systems. SHM systems have been used to monitor critical infrastructure such as bridges, high-rise buildings, and stadiums and has the potential to improve structure lifespan and improve public safety. The high data collection rate of WSNs for SHM pose unique network design challenges. This paper presents a comprehensive survey of SHM using WSNs outlining the algorithms used in damage detection and localization, outlining network design challenges, and future research directions. Solutions to network design problems such as scalability, time synchronization, sensor placement, and data processing are compared and discussed. This survey also provides an overview of testbeds and real-world deployments of WSNs for SH.

319 citations