scispace - formally typeset
Search or ask a question
Author

Tiago Gomes

Other affiliations: Asian Institute of Technology
Bio: Tiago Gomes is an academic researcher from University of Minho. The author has contributed to research in topics: Wireless sensor network & Field-programmable gate array. The author has an hindex of 12, co-authored 67 publications receiving 598 citations. Previous affiliations of Tiago Gomes include Asian Institute of Technology.


Papers
More filters
Proceedings ArticleDOI
29 Jul 2013
TL;DR: Three environments (free space, in building and industrial), where wireless sensor nodes are widely deployed, have been chosen in order to evaluate the experimental analysis of path loss exponent and the effect of shadowing.
Abstract: Wireless Sensor Networks are an emerging technology which has been recently adopted in many applications. Due to its wireless nature, the analysis of the radio propagation models plays an important role for performance evaluation in both theoretical and practical aspects. In this regards, path loss exponent is one of the most important parameter which has been considered widely in wireless communications analysis. There are several theoretical evaluations of path loss exponent for wireless sensor networks available in the literature. However there is a lack of experimental evaluation of both path loss exponent and the effect of shadowing. In this paper, three environments (free space, in building and industrial), where wireless sensor nodes are widely deployed, have been chosen in order to evaluate the experimental analysis. Path loss and path loss exponent are measured by means of Received Signal Strength Indicator (RSSI) and based on them, the standard deviation of shadowing effect is also calculated. All the measured parameters are compared with the theoretical analysis available in the literatures.

110 citations

Journal ArticleDOI
TL;DR: In this paper, the authors present a survey on LiDAR sensors for the automotive industry and highlight the current and future challenges, providing insights on how both research and industry can step towards better LiDR solutions.
Abstract: Nowadays, and more than a decade after the first steps towards autonomous driving, we keep heading to achieve fully autonomous vehicles on our roads, with LiDAR sensors being a key instrument for the success of this technology. Such advances trigger the emergence of new players in the automotive industry, and along with car manufacturers, this sector represents a multibillion-dollar market where everyone wants to take a share. To understand recent advances and technologies behind LiDAR, this article presents a survey on LiDAR sensors for the automotive industry. With this work, we show the measurement principles and imaging techniques currently being used, going through a review of commercial systems and development solutions available in the market today. Furthermore, we highlight the current and future challenges, providing insights on how both research and industry can step towards better LiDAR solutions.

107 citations

Journal ArticleDOI
Sandro Pinto1, Tiago Gomes1, Jorge Pereira1, Jorge Cabral1, Adriano Tavares1 
TL;DR: The authors demonstrate why TrustZone is becoming a reference technology for securing IoT edge devices, and how enhanced TEEs can help meet industrial IoT applications real-time requirements.
Abstract: With the advent of the Internet of Things (IoT), security has emerged as a major design goal for smart connected devices. This explosion in connectivity created a larger attack surface area. Software-based approaches have been applied for security purposes; however, these methods must be extended with security-oriented technologies that promote hardware as the root of trust. The ARM TrustZone can enable trusted execution environments (TEEs), but existing solutions disregard real-time needs. Here, the authors demonstrate why TrustZone is becoming a reference technology for securing IoT edge devices, and how enhanced TEEs can help meet industrial IoT applications real-time requirements.

106 citations

Proceedings ArticleDOI
22 Mar 2017
TL;DR: An IoT-ready solution for the elderly living assistance which is able to monitor and register patients vital information as well as to provide mechanisms to trigger alarms in emergency situations is presented, suitable to be used anywhere and by anyone, in a discrete and comfortable wristband.
Abstract: In a world with an accelerated population aging, there is an increasingly interest in developing solutions for the elderly living assistance. The Internet of Things is a new reality that is completely changing our everyday life, and promises to revolutionize modern healthcare by enabling a more personalized, preventive and collaborative form of care. Aiming to combine these two important topics, this work presents an IoT-ready solution for the elderly living assistance which is able to monitor and register patients vital information as well as to provide mechanisms to trigger alarms in emergency situations. Its effective low-power/low-cost and wireless characteristics turns this solution suitable to be used anywhere and by anyone, in a discrete and comfortable wristband. Experiments demonstrated a good system performance for the implemented functionalities, and regarding the autonomy we obtained an average battery lifetime of 306 hours (around 12 days). For the working range, the system have proved to perform well within a range of 60 meters before the out-of-range warning being triggered.

87 citations

Proceedings ArticleDOI
26 Oct 2015
TL;DR: This work in progress paper proposes an FPGA-based edge device for IoT, which uses SoC (System-on-Chip) FPN technology to offload critical features of the communication stack to dedicated hardware, aiming to increase systems performance.
Abstract: With the growing ubiquity of Internet of Things (IoT), myriads of smart devices connect and share important information over the internet. In order to provide connectivity and interoperability of all the existing heterogeneous wireless devices, a full communication stack is proposed by the IoT Architecture Reference Model (IoT-ARM). From the sensor to the cloud, the proposed stack can be implemented on all IoT devices avoiding the battle for the wireless standard that will be adopted. This work in progress paper proposes an FPGA-based edge device for IoT, which uses SoC (System-on-Chip) FPGA technology to offload critical features of the communication stack to dedicated hardware, aiming to increase systems performance.

43 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper tries to bring order on the IoT security panorama providing a taxonomic analysis from the perspective of the three main key layers of the IoT system model: 1) perception; 2) transportation; and 3) application levels.
Abstract: Social Internet of Things (SIoT) is a new paradigm where Internet of Things (IoT) merges with social networks, allowing people and devices to interact, and facilitating information sharing. However, security and privacy issues are a great challenge for IoT but they are also enabling factors to create a “trust ecosystem.” In fact, the intrinsic vulnerabilities of IoT devices, with limited resources and heterogeneous technologies, together with the lack of specifically designed IoT standards, represent a fertile ground for the expansion of specific cyber threats. In this paper, we try to bring order on the IoT security panorama providing a taxonomic analysis from the perspective of the three main key layers of the IoT system model: 1) perception; 2) transportation; and 3) application levels. As a result of the analysis, we will highlight the most critical issues with the aim of guiding future research directions.

524 citations

Journal ArticleDOI
TL;DR: A taxonomy of the security research areas in IoT/IIoT along with their corresponding solutions is designed and several open research directions relevant to the focus of this survey are identified.

476 citations

Journal ArticleDOI
TL;DR: An in-depth review of IoT privacy and security issues, including potential threats, attack types, and security setups from a healthcare viewpoint is conducted and previous well-known security models to deal with security risks are analyzed.
Abstract: The fast development of the Internet of Things (IoT) technology in recent years has supported connections of numerous smart things along with sensors and established seamless data exchange between them, so it leads to a stringy requirement for data analysis and data storage platform such as cloud computing and fog computing. Healthcare is one of the application domains in IoT that draws enormous interest from industry, the research community, and the public sector. The development of IoT and cloud computing is improving patient safety, staff satisfaction, and operational efficiency in the medical industry. This survey is conducted to analyze the latest IoT components, applications, and market trends of IoT in healthcare, as well as study current development in IoT and cloud computing-based healthcare applications since 2015. We also consider how promising technologies such as cloud computing, ambient assisted living, big data, and wearables are being applied in the healthcare industry and discover various IoT, e-health regulations and policies worldwide to determine how they assist the sustainable development of IoT and cloud computing in the healthcare industry. Moreover, an in-depth review of IoT privacy and security issues, including potential threats, attack types, and security setups from a healthcare viewpoint is conducted. Finally, this paper analyzes previous well-known security models to deal with security risks and provides trends, highlighted opportunities, and challenges for the IoT-based healthcare future development.

322 citations

Journal ArticleDOI
Hongzhi Guo1, Jiajia Liu1, Jie Zhang1, Wen Sun1, Nei Kato2 
TL;DR: This paper provides this paper to study the MECO problem in ultradense IoT networks, and proposes a two-tier game-theoretic greedy offloading scheme as the solution.
Abstract: The emergence of massive Internet of Things (IoT) mobile devices (MDs) and the deployment of ultradense 5G cells have promoted the evolution of IoT toward ultradense IoT networks. In order to meet the diverse quality-of-service and quality of experience demands from the ever-increasing IoT applications, the ultradense IoT networks face unprecedented challenges. Among them, a fundamental one is how to address the conflict between the resource-hungry IoT mobile applications and the resource-constrained IoT MDs. By offloading the IoT MDs’ computation tasks to the edge servers deployed at the radio access infrastructures, including macro base station (MBS) and small cells, mobile-edge computation offloading (MECO) provides us a promising solution. However, note that available MECO research mostly focused on single-tier base station scenario and computation offloading between the MDs and the edge server connected to the MBS. Little works can be found on performing MECO in ultradense IoT networks, i.e., a multiuser ultradense edge server scenario. Toward this end, we provide this paper to study the MECO problem in ultradense IoT networks, and propose a two-tier game-theoretic greedy offloading scheme as our solution. Extensive numerical results corroborate the superior performance of conducting computation offloading among multiple edge servers in ultradense IoT networks.

259 citations

Journal ArticleDOI
TL;DR: An in-depth study of TrustZone technology is presented, providing a comprehensive survey of relevant work from academia and industry, presenting existing systems into two main areas, namely, Trusted Execution Environments and hardware-assisted virtualization.
Abstract: The world is undergoing an unprecedented technological transformation, evolving into a state where ubiquitous Internet-enabled “things” will be able to generate and share large amounts of security- and privacy-sensitive data. To cope with the security threats that are thus foreseeable, system designers can find in Arm TrustZone hardware technology a most valuable resource. TrustZone is a System-on-Chip and CPU system-wide security solution, available on today’s Arm application processors and present in the new generation Arm microcontrollers, which are expected to dominate the market of smart “things.” Although this technology has remained relatively underground since its inception in 2004, over the past years, numerous initiatives have significantly advanced the state of the art involving Arm TrustZone. Motivated by this revival of interest, this paper presents an in-depth study of TrustZone technology. We provide a comprehensive survey of relevant work from academia and industry, presenting existing systems into two main areas, namely, Trusted Execution Environments and hardware-assisted virtualization. Furthermore, we analyze the most relevant weaknesses of existing systems and propose new research directions within the realm of tiniest devices and the Internet of Things, which we believe to have potential to yield high-impact contributions in the future.

211 citations