Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by Nuno Alexandre Pereira

2015

System Level Simulation and Radio Resource Management for Distributed Antenna Systems with Cognitive Radio and Multi-Cell Cooperation

Authors
Samano Robles, R; Gameiro, A; Pereira, N;

Publication
2015 FOURTH INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT)

Abstract
The performance of wireless networks will experience a considerable improvement by the use of novel technologies such as distributed antenna systems (DASs), multi-cell cooperation (MCC), and cognitive radio (CR). These solutions have shown considerable gains at the physical-layer (PHY). However, several issues remain open in the system-level evaluation, radio resource management (RRM), and particularly in the design of billing/licensing schemes for this type of system. This paper proposes a system-level simulator (SLS) that will help in addressing these issues. The paper focuses on the description of the modules of a generic SLS that need a modification to cope with the new transtnission/econotnic paradigms. An advanced RRM solution is proposed for a multi-cell DAS with two levels of cooperation: inside the cell (intra-cell) to coordinate the transmission of distributed nodes within the cell, and between cells (inter-cell or MCC) to adapt cell transmissions according to the collected inter-cell interference measurements. The RRM solution blends network and financial metrics using the theory of multi objective portfolio optimization. The core of the RRM solution is an iterative weighted least squares (WLS) optimization algorithm that aims to schedule in a fair manner as many terminals as possible across all the radio resources of the available frequency bands (licensed and non-licensed), while considering different economic metrics. The RRM algorithm includes joint terminal scheduling, link adaptation, space division multiplexing, spectrtun selection, and resource allocation.

2015

Wireless Sensor Networks

Authors
Abdelzaher, T; Pereira, N; Tovar, E;

Publication
Lecture Notes in Computer Science

Abstract

2015

Wireless sensor networks: 12th European conference, EWSN 2015 porto, portugal, february 9-11, 2015 proceedings

Authors
Abdelzaher, TF; Pereira, N; Tovar, E;

Publication
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Abstract

2015

Distributed Forest Fire Monitoring Using Wireless Sensor Networks

Authors
Serna, MA; Casado, R; Bermudez, A; Pereira, N; Tennina, S;

Publication
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS

Abstract
Disaster management is one of the most relevant application fields of wireless sensor networks. In this application, the role of the sensor network usually consists of obtaining a representation or a model of a physical phenomenon spreading through the affected area. In this work we focus on forest firefighting operations, proposing three fully distributed ways for approximating the actual shape of the fire. In the simplest approach, a circular burnt area is assumed around each node that has detected the fire and the union of these circles gives the overall fire's shape. However, as this approach makes an intensive use of the wireless sensor network resources, we have proposed to incorporate two in-network aggregation techniques, which do not require considering the complete set of fire detections. The first technique models the fire by means of a complex shape composed of multiple convex hulls representing different burning areas, while the second technique uses a set of arbitrary polygons. Performance evaluation of realistic fire models on computer simulations reveals that the method based on arbitrary polygons obtains an improvement of 20% in terms of accuracy of the fire shape approximation, reducing the overhead in-network resources to 10% in the best case.

2018

Enhancing Indoor Smartphone Location Acquisition using Floor Plans

Authors
Rajagopal, N; Lazik, P; Pereira, N; Chayapathy, S; Sinopoli, B; Rowe, A;

Publication
2018 17TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN)

Abstract
Indoor localization systems typically determine a position using either ranging measurements, inertial sensors, environmental-specific signatures or some combination of all of these methods. Given a floor plan, inertial and signature-based systems can converge on accurate locations by slowly pruning away inconsistent states as a user walks through the space. In contrast, range-based systems are capable of instantly acquiring locations, but they rely on densely deployed beacons and suffer from inaccurate range measurements given non-line-of-sight (NLOS) signals. In order to get the best of both worlds, we present an approach that systematically exploits the geometry information derived from building floor plans to directly improve location acquisition in range-based systems. Our solving approach can disambiguate multiple feasible locations taking into account a mix of LOS and NLOS hypotheses to accurately localize with significantly fewer beacons. We demonstrate our geometry-aware solving approach using a new ultrasonic beacon platform that is able to perform direct time-of-flight ranges on commodity smartphones. The platform uses Bluetooth Low Energy (BLE) for time synchronization and ultrasound for measuring propagation distance. We evaluate our system's accuracy with multiple deployments in a university campus and show that our approach shifts the 80% accuracy point from 4-8m to 1m as compared to solvers that do not use the floor plan information. We are able to detect and remove NLOS signals with 91.5% accuracy.

2019

Formal security analysis of LoRaWAN

Authors
Eldefrawy, M; Butun, I; Pereira, N; Gidlund, M;

Publication
COMPUTER NETWORKS

Abstract
Recent Low Power Wide Area Networks (LPWAN) protocols are receiving increased attention from industry and academia to offer accessibility for Internet of Things (IoT) connected remote sensors and actuators. In this work, we present a formal study of LoRaWAN security, an increasingly popular technology, which defines the structure and operation of LPWAN networks based on the LoRa physical layer. There are previously known security vulnerabilities in LoRaWAN that lead to the proposal of several improvements, some already incorporated into the latest protocol specification. Our analysis of LoRaWAN security uses Scyther, a formal security analysis tool and focuses on the key exchange portion of versions 1.0 (released in 2015) and 1.1 (the latest, released in 2017). For version 1.0, which is still the most widely deployed version of LoRaWAN, we show that our formal model allowed to uncover weaknesses that can be related to previously reported vulnerabilities. Our model did not find weaknesses in the latest version of the protocol (v1.1), and we discuss what this means in practice for the security of LoRaWAN as well as important aspects of our model and tools employed that should be considered. The Scyther model developed provides realistic models for LoRaWAN v1.0 and v1.1 that can be used and extended to formally analyze, inspect, and explore the security features of the protocols. This, in turn, can clarify the methodology for achieving secrecy, integrity, and authentication for designers and developers interested in these LPWAN standards. We believe that our model and discussion of the protocols security properties are beneficial for both researchers and practitioners. To the best of our knowledge, this is the first work that presents a formal security analysis of LoRaWAN.

  • 2
  • 11