H
Homero Toral-Cruz
Researcher at University of Quintana Roo
Publications - 33
Citations - 432
Homero Toral-Cruz is an academic researcher from University of Quintana Roo. The author has contributed to research in topics: Wireless sensor network & Voice over IP. The author has an hindex of 10, co-authored 33 publications receiving 349 citations. Previous affiliations of Homero Toral-Cruz include CINVESTAV.
Papers
More filters
Journal ArticleDOI
Big Data Challenges and Data Aggregation Strategies in Wireless Sensor Networks
TL;DR: The big data paradigm, its main dimensions that represent one of the most challenging concepts, and its principle analytic tools which are more and more introduced in the WSNs technology are introduced.
Book ChapterDOI
A Survey on Wireless Sensor Networks
Homero Toral-Cruz,Faouzi Hidoussi,Djallel Eddine Boubiche,Romeli Barbosa,Miroslav Voznak,Kamaljit I. Lakhtaria +5 more
Journal ArticleDOI
An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances.
Rafael Martínez-Peláez,Homero Toral-Cruz,Jorge R. Parra-Michel,Vicente García,Luis J. Mena,Vanessa G. Felix,Alberto M. Ochoa-Brust +6 more
TL;DR: The performance evaluation demonstrates that the new scheme requires less communication-cost than previous authentication protocols during the registration and login phases, and achieves the security requirements and resists very well-known attacks, improving previous works.
Journal ArticleDOI
Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov models
TL;DR: This paper analyze the jitter and packet loss behavior of Voice over Internet Protocol (VoIP) traffic by means of network measurements and simulations results and provides a detailed characterization and accurate modeling of these Quality of Service (QoS) parameters.
Journal ArticleDOI
Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and Solutions
TL;DR: The most leading protocols for wireless sensor networks are reviewed and classify them based the addressed security issue and the main security constraints and challenges are outlined and the future research directions based on the emerged application fields are presented.