Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Elena Romero is active.

Publication


Featured researches published by Elena Romero.


IEEE Transactions on Instrumentation and Measurement | 2012

Wireless Measurement System for Structural Health Monitoring With High Time-Synchronization Accuracy

Alvaro Araujo; Jaime H. García-Palacios; Javier Blesa; Francisco Tirado; Elena Romero; Avelino Samartín; Octavio Nieto-Taladriz

Structural health monitoring (SHM) systems have excellent potential to improve the regular operation and maintenance of structures. Wireless networks (WNs) have been used to avoid the high cost of traditional generic wired systems. The most important limitation of SHM wireless systems is time-synchronization accuracy, scalability, and reliability. A complete wireless system for structural identification under environmental load is designed, implemented, deployed, and tested on three different real bridges. Our contribution ranges from the hardware to the graphical front end. System goal is to avoid the main limitations of WNs for SHM particularly in regard to reliability, scalability, and synchronization. We reduce spatial jitter to 125 ns, far below the 120 μs required for high-precision acquisition systems and much better than the 10-μs current solutions, without adding complexity. The system is scalable to a large number of nodes to allow for dense sensor coverage of real-world structures, only limited by a compromise between measurement length and mandatory time to obtain the final result. The system addresses a myriad of problems encountered in a real deployment under difficult conditions, rather than a simulation or laboratory test bed.


Eurasip Journal on Wireless Communications and Networking | 2012

Security in cognitive wireless sensor networks. Challenges and open problems

Alvaro Araujo; Javier Blesa; Elena Romero; Daniel Villanueva

A cognitive wireless sensor network (CWSN) is an emerging technology with great potential to avoid traditional wireless problems such as reliability. One of the major challenges CWSNs face today is security. A CWSN is a special network which has many constraints compared to a traditional wireless network and many different features compared to a traditional wireless sensor network. While security challenges have been widely tackled in traditional networks, this is a novel area in CWSNs. This article discusses a wide variety of attacks on CWSNs, their taxonomy and different security measures available to handle the attacks. Also, future challenges to be faced are proposed.


Sensors | 2009

Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.

José Manuel Moya; Alvaro Araujo; Zorana Bankovic; Juan-Mariano de Goyeneche; Juan Carlos Vallejo; Pedro Malagón; Daniel Villanueva; David Fraga; Elena Romero; Javier Blesa

The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.


Journal of Network and Computer Applications | 2011

Improving security in WMNs with reputation systems and self-organizing maps

Zorana Bankovic; David Fraga; José Manuel Moya; Juan Carlos Vallejo; Pedro Malagón; Alvaro Araujo; Juan-Mariano de Goyeneche; Elena Romero; Javier Blesa; Daniel Villanueva; Octavio Nieto-Taladriz

One of the most important problems of WMNs, that is even preventing them from being used in many sensitive applications, is the lack of security. To ensure security of WMNs, two strategies need to be adopted: embedding security mechanisms into the network protocols, and developing efficient intrusion detection and reaction systems. To date, many secure protocols have been proposed, but their role of defending attacks is very limited. We present a framework for intrusion detection in WMNs that is orthogonal to the network protocols. It is based on a reputation system, that allows to isolate ill-behaved nodes by rating their reputation as low, and distributed agents based on unsupervised learning algorithms (self-organizing maps), that are able to detect deviations from the normal behavior. An additional advantage of this approach is that it is quite independent of the attacks, and therefore it can detect and confine new, previously unknown, attacks. Unlike previous approaches, and due to the inherent insecurity of WMN nodes, we assume that confidentiality and integrity cannot be preserved for any single node.


Iet Communications | 2012

Simulation framework for security threats in cognitive radio networks

Elena Romero; Alexandre Mouradian; Javier Blesa; José Manuel Moya; Alvaro Araujo

Along with the development of cognitive radio networks, designing optimistic security mechanisms is becoming a big challenge. This study proposes a taxonomy of attacks on cognitive radio networks. This will help researches to better understand the security problems and to design more optimistic countermeasures. A new simulation framework for security threats has been developed to check all these attacks and countermeasures. The simulation framework has been tested with a primary user emulation attack. A new testbed for simulations suitable for cognitive radio security is ready.


Information Sciences | 2013

Bio-inspired enhancement of reputation systems for intelligent environments

Zorana Bankovic; David Fraga; José Manuel Moya; Juan Carlos Vallejo; Pedro Malagón; Alvaro Araujo; Juan-Mariano de Goyeneche; Elena Romero; Javier Blesa; Daniel Villanueva; Octavio Nieto-Taladriz

Providing security to the emerging field of ambient intelligence will be difficult if we rely only on existing techniques, given their dynamic and heterogeneous nature. Moreover, security demands of these systems are expected to grow, as many applications will require accurate context modeling. In this work we propose an enhancement to the reputation systems traditionally deployed for securing these systems. Different anomaly detectors are combined using the immunological paradigm to optimize reputation system performance in response to evolving security requirements. As an example, the experiments show how a combination of detectors based on unsupervised techniques (self-organizing maps and genetic algorithms) can help to significantly reduce the global response time of the reputation system. The proposed solution offers many benefits: scalability, fast response to adversarial activities, ability to detect unknown attacks, high adaptability, and high ability in detecting and confining attacks. For these reasons, we believe that our solution is capable of coping with the dynamism of ambient intelligence systems and the growing requirements of security demands.


Eurasip Journal on Wireless Communications and Networking | 2013

PUE attack detection in CWSNs using anomaly detection techniques

Javier Blesa; Elena Romero; Alba Rozas; Alvaro Araujo

Cognitive wireless sensor network (CWSN) is a new paradigm, integrating cognitive features in traditional wireless sensor networks (WSNs) to mitigate important problems such as spectrum occupancy. Security in cognitive wireless sensor networks is an important problem since these kinds of networks manage critical applications and data. The specific constraints of WSN make the problem even more critical, and effective solutions have not yet been implemented. Primary user emulation (PUE) attack is the most studied specific attack deriving from new cognitive features. This work discusses a new approach, based on anomaly behavior detection and collaboration, to detect the primary user emulation attack in CWSN scenarios. Two non-parametric algorithms, suitable for low-resource networks like CWSNs, have been used in this work: the cumulative sum and data clustering algorithms. The comparison is based on some characteristics such as detection delay, learning time, scalability, resources, and scenario dependency. The algorithms have been tested using a cognitive simulator that provides important results in this area. Both algorithms have shown to be valid in order to detect PUE attacks, reaching a detection rate of 99% and less than 1% of false positives using collaboration.


applied reconfigurable computing | 2009

SORU: A Reconfigurable Vector Unit for Adaptable Embedded Systems

José Manuel Moya; Javier Rodríguez; Julio Lumbreras Martin; Juan Carlos Vallejo; Pedro Malagón; Alvaro Araujo; Juan-Mariano de Goyeneche; Agustín Rubio; Elena Romero; Daniel Villanueva; Octavio Nieto-Taladriz; Carlos Alberto López Barrio

In this article we describe SORU, a reconfigurable instruction set processor architecture (RISP) specially designed for run-time self-adaptation in environments with tight resource and power restrictions. It allows to accelerate computationally intensive multimedia processing on portable/embedded devices while maintaining a low energy consumption. The experimental results show a mean speedup of 4 with half the energy consumption. The main datapath can be left in a hibernate state during more than 75% of the execution time in our experiments, what leads also to a significant reduction of energy consumption in the I-cache and the main datapath, including the register file.


distributed computing and artificial intelligence | 2009

Image Processing Based Services for Ambient Assistant Scenarios

Elena Romero; Alvaro Araujo; José Manuel Moya; Juan-Mariano de Goyeneche; Juan Carlos Vallejo; Pedro Malagón; Daniel Villanueva; David Fraga

Guaranteeing ubiquity and appropriateness of security and monitoring services provision to the users constitutes a priority issue for the authorities. This paper presents an innovative Wireless Personal Area Network architecture that takes advantage of some of the features provided by Intelligent Environments -large number of devices, heterogeneous networks and mobility enhancement- in order to adapt and personalise ambient conditions to the user profile. This system is based on image processing and its main aim is to provide an AAL solution that is integrated with other control devices for the home to make everyday tasks easier for users.


International Journal of Distributed Sensor Networks | 2014

A Game Theory Based Strategy for Reducing Energy Consumption in Cognitive WSN

Elena Romero; Javier Blesa; Alvaro Araujo; Octavio Nieto-Taladriz

Wireless sensor networks (WSNs) are one of the most important users of wireless communication technologies in the coming years and some challenges in this area must be addressed for their complete development. Energy consumption and spectrum availability are two of the most severe constraints of WSNs due to their intrinsic nature. The introduction of cognitive capabilities into these networks has arisen to face the issue of spectrum scarcity but could be used to face energy challenges too due to their new range of communication possibilities. In this paper a new strategy based on game theory for cognitive WSNs is discussed. The presented strategy improves energy consumption by taking advantage of the new change-communication-channel capability. Based on game theory, the strategy decides when to change the transmission channel depending on the behavior of the rest of the network nodes. The strategy presented is lightweight but still has higher energy saving rates as compared to noncognitive networks and even to other strategies based on scheduled spectrum sensing. Simulations are presented for several scenarios that demonstrate energy saving rates of around 65% as compared to WSNs without cognitive techniques.

Collaboration


Dive into the Elena Romero's collaboration.

Top Co-Authors

Avatar

Alvaro Araujo

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Javier Blesa

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Octavio Nieto-Taladriz

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Daniel Villanueva

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

José Manuel Moya

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Pedro Malagón

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Juan Carlos Vallejo

Technical University of Madrid

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David Fraga

Technical University of Madrid

View shared research outputs
Researchain Logo
Decentralizing Knowledge