Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Alvaro Araujo is active.

Publication


Featured researches published by Alvaro Araujo.


IEEE Transactions on Education | 2006

A project-based learning approach to design electronic systems curricula

Javier Macias-Guarasa; Juan Manuel Montero; Rubén San-Segundo; Alvaro Araujo; Octavio Nieto-Taladriz

This paper presents an approach to design Electronic Systems Curricula for making electronics more appealing to students. Since electronics is an important grounding for other disciplines (computer science, signal processing, and communications), this approach proposes the development of multidisciplinary projects using the project-based learning (PBL) strategy for increasing the attractiveness of the curriculum. The proposed curriculum structure consists of eight courses: four theoretical courses and four PBL courses (including a compulsory Masters thesis). In PBL courses, the students, working together in groups, develop multidisciplinary systems, which become progressively more complex. To address this complexity, the Department of Electronic Engineering has invested in the last five years in many resources for developing software tools and a common hardware. This curriculum has been evaluated successfully for the last four academic years: the students have increased their interest in electronics and have given the courses an average grade of more than 71% for all PBL course evaluations (data extracted from students surveys). The students have also acquired new skills and obtained very good academic results: the average grade was more than 74% for all PBL courses. An important result is that all students have developed more complex and sophisticated electronic systems, while considering that the results are worth the effort invested


IEEE Transactions on Instrumentation and Measurement | 2012

Wireless Measurement System for Structural Health Monitoring With High Time-Synchronization Accuracy

Alvaro Araujo; Jaime H. García-Palacios; Javier Blesa; Francisco Tirado; Elena Romero; Avelino Samartín; Octavio Nieto-Taladriz

Structural health monitoring (SHM) systems have excellent potential to improve the regular operation and maintenance of structures. Wireless networks (WNs) have been used to avoid the high cost of traditional generic wired systems. The most important limitation of SHM wireless systems is time-synchronization accuracy, scalability, and reliability. A complete wireless system for structural identification under environmental load is designed, implemented, deployed, and tested on three different real bridges. Our contribution ranges from the hardware to the graphical front end. System goal is to avoid the main limitations of WNs for SHM particularly in regard to reliability, scalability, and synchronization. We reduce spatial jitter to 125 ns, far below the 120 μs required for high-precision acquisition systems and much better than the 10-μs current solutions, without adding complexity. The system is scalable to a large number of nodes to allow for dense sensor coverage of real-world structures, only limited by a compromise between measurement length and mandatory time to obtain the final result. The system addresses a myriad of problems encountered in a real deployment under difficult conditions, rather than a simulation or laboratory test bed.


Eurasip Journal on Wireless Communications and Networking | 2012

Security in cognitive wireless sensor networks. Challenges and open problems

Alvaro Araujo; Javier Blesa; Elena Romero; Daniel Villanueva

A cognitive wireless sensor network (CWSN) is an emerging technology with great potential to avoid traditional wireless problems such as reliability. One of the major challenges CWSNs face today is security. A CWSN is a special network which has many constraints compared to a traditional wireless network and many different features compared to a traditional wireless sensor network. While security challenges have been widely tackled in traditional networks, this is a novel area in CWSNs. This article discusses a wide variety of attacks on CWSNs, their taxonomy and different security measures available to handle the attacks. Also, future challenges to be faced are proposed.


Sensors | 2009

Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.

José Manuel Moya; Alvaro Araujo; Zorana Bankovic; Juan-Mariano de Goyeneche; Juan Carlos Vallejo; Pedro Malagón; Daniel Villanueva; David Fraga; Elena Romero; Javier Blesa

The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.


Computer-Aided Engineering | 2010

Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps

Zorana Bankovic; José Manuel Moya; Alvaro Araujo; David Fraga; Juan Carlos Vallejo; Juan-Mariano de Goyeneche

Security of sensor networks is a complicated task, mostly due to the limited resources of sensor units. The first line of defense, i.e. encryption and authentication, is useless if an attacker has entered the system, and it is also vulnerable to side-channel attacks. Thus, a second line of defense, known as Intrusion Detection, must be added in order to detect and eliminate attacks. In the recent past, various solutions for detecting intrusions have been proposed. Most of them are able to detect only a limited number of attacks. Further, the solutions that deploy machine learning techniques exhibit higher level of flexibility and adaptability. Yet, these techniques consume significant power and computational resources. In this work we propose a distributed intrusion detection system organized as a reputation system where the reputation of each node is assigned by self-organizing maps (SOM) trained for detecting intrusions. The response of the system consists in assigning low reputation values to the compromised nodes rendering them isolated from the rest of the network. Further, we propose the implementation of SOM algorithm using the energy-efficient SORU (Stream Oriented Reconfigurable Unit) co-processor developed by our research group. Our solution offers many benefits: scalable solution, fast response to adversarial activities, ability to detect unknown attacks, high adaptability and energy efficiency. The testing results demonstrate its high potential.


Journal of Network and Computer Applications | 2011

Improving security in WMNs with reputation systems and self-organizing maps

Zorana Bankovic; David Fraga; José Manuel Moya; Juan Carlos Vallejo; Pedro Malagón; Alvaro Araujo; Juan-Mariano de Goyeneche; Elena Romero; Javier Blesa; Daniel Villanueva; Octavio Nieto-Taladriz

One of the most important problems of WMNs, that is even preventing them from being used in many sensitive applications, is the lack of security. To ensure security of WMNs, two strategies need to be adopted: embedding security mechanisms into the network protocols, and developing efficient intrusion detection and reaction systems. To date, many secure protocols have been proposed, but their role of defending attacks is very limited. We present a framework for intrusion detection in WMNs that is orthogonal to the network protocols. It is based on a reputation system, that allows to isolate ill-behaved nodes by rating their reputation as low, and distributed agents based on unsupervised learning algorithms (self-organizing maps), that are able to detect deviations from the normal behavior. An additional advantage of this approach is that it is quite independent of the attacks, and therefore it can detect and confine new, previously unknown, attacks. Unlike previous approaches, and due to the inherent insecurity of WMN nodes, we assume that confidentiality and integrity cannot be preserved for any single node.


Journal of Sensors | 2016

Forest Monitoring and Wildland Early Fire Detection by a Hierarchical Wireless Sensor Network

Antonio Molina-Picó; David Cuesta-Frau; Alvaro Araujo; Javier Alejandre; Alba Rozas

A wildland fire is an uncontrolled fire that occurs mainly in forest areas, although it can also invade urban or agricultural areas. Among the main causes of wildfires, human factors, either intentional or accidental, are the most usual ones. The number and impact of forest fires are expected to grow as a consequence of the global warming. In order to fight against these disasters, it is necessary to adopt a comprehensive, multifaceted approach that enables a continuous situational awareness and instant responsiveness. This paper describes a hierarchical wireless sensor network aimed at early fire detection in risky areas, integrated with the fire fighting command centres, geographical information systems, and fire simulators. This configuration has been successfully tested in two fire simulations involving all the key players in fire fighting operations: fire brigades, communication systems, and aerial, coordination, and land means.


Sensors | 2009

Using Reputation Systems and Non-Deterministic Routing to Secure Wireless Sensor Networks

José Manuel Moya; Juan Carlos Vallejo; David Fraga; Alvaro Araujo; Daniel Villanueva; Juan-Mariano de Goyeneche

Security in wireless sensor networks is difficult to achieve because of the resource limitations of the sensor nodes. We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad reputation feedback to the network. This approach has been extensively simulated, obtaining good results, even for unrealistically complex attack scenarios.


Iet Communications | 2012

Simulation framework for security threats in cognitive radio networks

Elena Romero; Alexandre Mouradian; Javier Blesa; José Manuel Moya; Alvaro Araujo

Along with the development of cognitive radio networks, designing optimistic security mechanisms is becoming a big challenge. This study proposes a taxonomy of attacks on cognitive radio networks. This will help researches to better understand the security problems and to design more optimistic countermeasures. A new simulation framework for security threats has been developed to check all these attacks and countermeasures. The simulation framework has been tested with a primary user emulation attack. A new testbed for simulations suitable for cognitive radio security is ready.


Information Sciences | 2013

Bio-inspired enhancement of reputation systems for intelligent environments

Zorana Bankovic; David Fraga; José Manuel Moya; Juan Carlos Vallejo; Pedro Malagón; Alvaro Araujo; Juan-Mariano de Goyeneche; Elena Romero; Javier Blesa; Daniel Villanueva; Octavio Nieto-Taladriz

Providing security to the emerging field of ambient intelligence will be difficult if we rely only on existing techniques, given their dynamic and heterogeneous nature. Moreover, security demands of these systems are expected to grow, as many applications will require accurate context modeling. In this work we propose an enhancement to the reputation systems traditionally deployed for securing these systems. Different anomaly detectors are combined using the immunological paradigm to optimize reputation system performance in response to evolving security requirements. As an example, the experiments show how a combination of detectors based on unsupervised techniques (self-organizing maps and genetic algorithms) can help to significantly reduce the global response time of the reputation system. The proposed solution offers many benefits: scalability, fast response to adversarial activities, ability to detect unknown attacks, high adaptability, and high ability in detecting and confining attacks. For these reasons, we believe that our solution is capable of coping with the dynamism of ambient intelligence systems and the growing requirements of security demands.

Collaboration


Dive into the Alvaro Araujo's collaboration.

Top Co-Authors

Avatar

Elena Romero

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Javier Blesa

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

José Manuel Moya

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Octavio Nieto-Taladriz

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Juan Carlos Vallejo

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pedro Malagón

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Daniel Villanueva

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

David Fraga

Technical University of Madrid

View shared research outputs
Researchain Logo
Decentralizing Knowledge