scispace - formally typeset
Search or ask a question
Author

Cintia Borges Margi

Bio: Cintia Borges Margi is an academic researcher from University of São Paulo. The author has contributed to research in topics: Wireless sensor network & Energy consumption. The author has an hindex of 20, co-authored 81 publications receiving 1354 citations. Previous affiliations of Cintia Borges Margi include University of California, Santa Cruz.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper reviews the state of the art of lightweight key management solutions for WSNs and focuses on pre-distribution schemes well-adapted for homogeneous networks, thus identifying generic features that can improve some of these metrics.

213 citations

Proceedings ArticleDOI
01 Nov 2014
TL;DR: TinySDN is presented, a TinyOS-based SDN framework that enables multiple controllers within the WSN, and results concerning delay and memory footprint are presented.
Abstract: Software-Defined Networking (SDN) has been envisioned as a way to reduce the complexity of network configuration and management, enabling innovation in production networks. While SDN started focusing on wired networks, there were proposals specifically for Wireless Sensor Networks (WSN), but all of them required a single controller to be coupled to the sink. This paper presents TinySDN, a TinyOS-based SDN framework that enables multiple controllers within the WSN. It comprises two main components: the SDN-enabled sensor node, which has an SDN switch and an SDN end device, and the SDN controller node, where the control plane is programmed. TinySDN was designed and implemented to be hardware independent. Experiments were conducted on COOJA simulator, and results concerning delay and memory footprint are presented.

148 citations

Proceedings ArticleDOI
05 Jul 2006
TL;DR: This work characterize the energy consumption of a visual sensor network testbed, namely Crossbow's Stargate, equipped with a wireless network card and a Webcam, and reports both steady-state and transient energy consumption behavior obtained by direct measurements of current with a digital multimeter.
Abstract: In this work we characterize the energy consumption of a visual sensor network testbed. Each node in the testbed consists of a "single-board computer", namely Crossbow's Stargate, equipped with a wireless network card and a Webcam. We assess energy consumption of activities representative of the target application (e.g., perimeter surveillance) using a benchmark that runs (individual and combinations of) "basic" tasks such as processing, flash memory access, image acquisition, and communication over the network. In our characterization, we consider the various hardware states the system switches through as it executes these benchmarks, e.g., different radio modes (sleep, idle, transmission, reception), and Webcam modes (off, on, and acquiring image). We report both steady-state and transient energy consumption behavior obtained by direct measurements of current with a digital multimeter. We validate our measurements against results obtained using the Stargate's on-board energy consumption measuring capabilities.

118 citations

Proceedings ArticleDOI
11 Oct 2004
TL;DR: An analytical model is presented to predict energy consumption in saturated IEEE 802.11 single-hop ad hoc networks under ideal channel conditions, finding that the energy cost to transmit useful data increases almost linearly with the network size; and transmitting large payloads is more energy efficient under saturation conditions.
Abstract: This paper presents an analytical model to predict energy consumption in saturated IEEE 802.11 single-hop ad hoc networks under ideal channel conditions. The model we introduce takes into account the different operational modes of the IEEE 802.11 DCF MAC, and is validated against packet-level simulations. In contrast to previous works that attempted to characterize the energy consumption of IEEE 802.11 cards in isolated, contention-free channels (i.e., single sender/receiver pair), this paper investigates the extreme opposite case, i.e., when nodes need to contend for channel access under saturation conditions. In such scenarios, our main findings include: (1) contrary to what most previous results indicate, the radio's transmit mode has marginal impact on overall energy consumption, while other modes (receive, idle, etc.) are responsible for most of the energy consumed; (2) the energy cost to transmit useful data increases almost linearly with the network size; and (3) transmitting large payloads is more energy efficient under saturation conditions

86 citations

Proceedings ArticleDOI
16 Oct 2014
TL;DR: D-SDN is proposed, a framework that enables not only physical- but also logical distribution of the Software-Defined Networking control plane and incorporates security as an integral part of the framework.
Abstract: Motivated by the internets of the future, which will likely be considerably larger in size as well as highly heterogeneous and decentralized, we propose Decentralize-SDN, D-SDN, a framework that enables not only physical- but also logical distribution of the Software-Defined Networking (SDN) control plane. D-SDN accomplishes network control distribution by defining a hierarchy of controllers that can “match” an internet's organizational- and administrative structure. By delegating control between main controllers and secondary controllers, D-SDN is able to accommodate administrative decentralization and autonomy.It incorporates security as an integral part of the framework. This paper describes D-SDN and presents two use cases, namely network capacity sharing and public safety network services.

68 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Existing solutions and open research issues at the application, transport, network, link, and physical layers of the communication protocol stack are investigated, along with possible cross-layer synergies and optimizations.

2,311 citations

Journal ArticleDOI
TL;DR: A standard model for application in future IoT healthcare systems is proposed, and the state-of-the-art research relating to each area of the model is presented, evaluating their strengths, weaknesses, and overall suitability for a wearable IoT healthcare system.
Abstract: Internet of Things (IoT) technology has attracted much attention in recent years for its potential to alleviate the strain on healthcare systems caused by an aging population and a rise in chronic illness. Standardization is a key issue limiting progress in this area, and thus this paper proposes a standard model for application in future IoT healthcare systems. This survey paper then presents the state-of-the-art research relating to each area of the model, evaluating their strengths, weaknesses, and overall suitability for a wearable IoT healthcare system. Challenges that healthcare IoT faces including security, privacy, wearability, and low-power operation are presented, and recommendations are made for future research directions.

735 citations

Journal ArticleDOI
TL;DR: It is demonstrated that cooperation among stations in a wireless LAN (WLAN) can achieve both higher throughput and lower interference, and a reduction in the signal-to-interference ratio in a dense deployment of 802.11 access points is demonstrated.
Abstract: Due to the broadcast nature of wireless signals, a wireless transmission intended for a particular destination station can be overheard by other neighboring stations. A focus of recent research activities in cooperative communications is to achieve spatial diversity gains by requiring these neighboring stations to retransmit the overheard information to the final destination. In this paper we demonstrate that such cooperation among stations in a wireless LAN (WLAN) can achieve both higher throughput and lower interference. We present the design for a medium access control protocol called CoopMAC, in which high data rate stations assist low data rate stations in their transmission by forwarding their traffic. In our proposed protocol, using the overheard transmissions, each low data rate node maintains a table, called a CoopTable, of potential helper nodes that can assist in its transmissions. During transmission, each low data rate node selects either direct transmission or transmission through a helper node in order to minimize the total transmission time. Using analysis, simulation and testbed experimentation, we quantify the increase in the total network throughput, and the reduction in delay, if such cooperative transmissions are utilized. The CoopMAC protocol is simple and backward compatible with the legacy 802.11 system. In this paper, we also demonstrate a reduction in the signal-to-interference ratio in a dense deployment of 802.11 access points, which in some cases is a more important consequence of cooperation

688 citations

Journal ArticleDOI
01 Sep 2014
TL;DR: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks is proposed, which ensures mutual authentication between the user, sensor node, and the gateway node (GWN), although the GWN is never contacted by the user.
Abstract: The idea of the Internet of Things (IOT) notion is that everything within the global network is accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in such an environment, since they cover a wide application field. Such interconnection can be seen from the aspect of a remote user who can access a single desired sensor node from the WSN without the necessity of firstly connecting with a gateway node (GWN). This paper focuses on such an environment and proposes a novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks. The proposed scheme enables a remote user to securely negotiate a session key with a general sensor node, using a lightweight key agreement protocol. The proposed scheme ensures mutual authentication between the user, sensor node, and the gateway node (GWN), although the GWN is never contacted by the user. The proposed scheme has been adapted to the resource-constrained architecture of the WSN, thus it uses only simple hash and XOR computations. Our proposed scheme tackles these risks and the challenges posed by the IOT, by ensuring high security and performance features.

529 citations