Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hugo Marques is active.

Publication


Featured researches published by Hugo Marques.


IEEE Communications Surveys and Tutorials | 2013

Network Coding Theory: A Survey

Riccardo Bassoli; Hugo Marques; Jonathan Rodriguez; Kenneth W. Shum; Rahim Tafazolli

This article surveys all known fields of network coding theory and leads the reader through the antecedents of the network coding theory to the most recent results, considering also information theory and matroid theory. By focusing on providing ideas and not formulas, this survey is both fitted for the taste of readers who are mathematically oriented and newcomers to the area. Additionally, this survey also includes an innovative and clear graph representation of the most prominent literature on network coding theory, its relevance and evolution from the very beginning till today.


Journal of Computer Networks and Communications | 2010

Simulation of 802.21 handovers using ns-2

Hugo Marques; José Carlos Ribeiro; Paulo Marques; Jonathan Rodriguez

The new IEEE 802.21 standard specifies link layer intelligence and other related network information to upper layers in order to optimize handovers between networks of different types, such as WiMAX, Wi-Fi, and 3GPP. This paper makes a short description of 802.21 standard, how it is implemented in ns-2, and the signaling used in a handover between WiMAX and Wi-Fi. The paper also proposes a novel and very simple approach to determine the expected number of handovers in an ns-2 simulation and also evaluates the reliability and scalability of ns-2 when simulating 802.21 scenarios with multiple nodes.


IEEE Communications Letters | 2013

On the Trade-Off Between Security and Energy Efficiency in Cooperative Spectrum Sensing for Cognitive Radio

Saud Althunibat; Victor Sucasas; Hugo Marques; Jonathan Rodriguez; Rahim Tafazolli; Fabrizio Granelli

Cooperative spectrum sensing is envisaged to increase reliability in cognitive radio networks. Several users cooperate to detect the availability of a wireless channel. In this framework, some malicious users may affect the decisions taken by the cognitive users by providing false information, introducing spectrum sensing data falsification (SSDF). In this paper, the effect of multiple malicious users on the energy efficiency of a cognitive radio network is given. A low-overhead security protocol is proposed to address SSDF attacks under a trade-off between energy efficiency and security. An analytical study is provided to set the optimal number of security bits required to maximize energy efficiency. Simulation results show a considerable improvement on the achievable energy efficiency, and the optimal number of bits explicitly depends on the selected fusion rule, the number of malicious users and the number of legitimate users.


ad hoc networks | 2016

A survey on clustering techniques for cooperative wireless networks

Victor Sucasas; Ayman Radwan; Hugo Marques; Jonathan Rodriguez; Seiamak Vahid; Rahim Tafazolli

Clustering became relevant in the past as a solution for the scalability problems of ad hoc networking, but, the unsuccessful application of ad hoc solutions to real scenarios, such as the projects SURAN and PRNet, decreased the interest of research community on ad hoc communications, and subsequently, on clustering algorithms. Recently, however, clustering techniques have gained renewed interest due to the emergence of cooperative communications for cellular networking. Clustering is envisaged, in this scenario, as a technique to team up nodes to support efficient data aggregation for energy saving, scalability and privacy among other benefits. Moreover, research on 5G networks also envisages a connected society, where everything and everyone will be connected under the umbrella of Internet of Everything (IoE). This novel communication paradigm has fostered new research on clustering, which has yielded novel and more advanced algorithms and applications. This article surveys the State-of-the-Art in clustering techniques and provides detailed descriptions of the basics of clustering and the latest novel ideas. Open issues, technical challenges and directions for future research are also outlined.


Computer Networks | 2015

Security concerns and countermeasures in network coding based communication systems

Vahid Nazari Talooki; Riccardo Bassoli; Daniel E. Lucani; Jonathan Rodriguez; Frank H. P. Fitzek; Hugo Marques; Rahim Tafazolli

This survey paper shows the state of the art in security mechanisms, where a deep review of the current research and the status of this topic is carried out. We start by introducing network coding and its variety of applications in enhancing current traditional networks. In particular, we analyze two key protocol types, namely, state-aware and stateless protocols, specifying the benefits and disadvantages of each one of them. We also present the key security assumptions of network coding (NC) systems as well as a detailed analysis of the security goals and threats, both passive and active. Current proposed security mechanisms and schemes for NC in the literature are classified too. This paper also presents a detailed taxonomy of the different NC security mechanisms and schemes reported in the literature.


International Journal of Distributed Sensor Networks | 2014

Energy Efficient and Load Balanced Routing for Wireless Multihop Network Applications

Vahid Nazari Talooki; Jonathan Rodriguez; Hugo Marques

Wireless Sensor Networks (WSNs) can benefit from ad hoc networking technology characterized by multihop wireless connectivity and infrastructure less framework. These features make them suitable for next-generation networks to support several applications such M2M applications for smart cities and public safety scenarios. Pivotal design requirements for these scenarios are energy efficiency, since many of these devices will be battery powered placing a fundamental limit on network, and specifically node lifetime. Moreover, the way in which traffic is managed also influences network lifetime, since there is a high probability for some nodes to become overloaded by packet forwarding operations in order to support neighbour data exchange. These issues imply the need for energy efficient and load balanced routing approaches that can manage the network load and not only provide reduced energy consumption on the network but also prolong the network lifetime providing robust and continuous. This work proposes a new energy efficient and traffic balancing routing approach that can provide a weighted and flexible trade-off between energy consumption and load dispersion. Simulation results show that the proposed protocol achieves high energy efficiency, decreases the percentage of failed nodes due to lack of battery power, and extends the lifespan of the network.


Iet Communications | 2012

Smart interface switching for energy efficient vertical handovers in ns-2

Joaquim Bastos; Michele Albano; Hugo Marques; José Carlos Ribeiro; Jonathan Rodriguez; Christos V. Verikoukis

The growing presence of concurrent heterogeneous wireless access networks, together with the increasing service demands from the end-users, require re-thinking of current access selection polices and appropriate management mechanisms, namely concerning quality of service, energy efficiency, etc. The recent IEEE 802.21 standard introduces link layer intelligence as well as related network information to upper layers in order to optimise handovers between networks of different technologies, such as WiMAX, Wi-Fi and 3GPP. With the massification of mobile terminals with multiple wireless interfaces it is important to efficiently manage those interfaces not only to appropriately provide the requested services to the user, but also to do that in an energy efficient way in order to allow higher mobility to the user by extending the battery life of its terminal. The study the IEEE 802.21 standard is briefly introduced, presented in the signalling in a handover between WiMAX and Wi-Fi, and exploited through an implementation in ns-2 introducing a simple, but effective, energy-saving approach.


world of wireless mobile and multimedia networks | 2013

Energy efficient dynamic MANET on-demand (E2DYMO) routing protocol

Vahid Nazari Talooki; Hugo Marques; Jonathan Rodriguez

In Mobile Ad hoc NETworks (MANETs), where cooperative behaviour is mandatory, there is a high probability for some nodes to become overloaded with packet forwarding operations, in order to support neighbour data exchange. This altruistic behaviour leads to an unbalanced load in terms of traffic and energy consumption. In such scenarios, mobile nodes can benefit from the use of an energy efficient and traffic fitting routing protocol, that better complies with their limited battery capacity and throughput. This paper presents E2DYMO, an improvement to the well-known DYMO protocol that offers energy efficiency and fairness in routing for mobile wireless ad hoc networks. With this proposed improvement, nodes are able to find several routes per each pair of source and destination nodes and select the best route according to energy and traffic parameters, effectively extending the lifespan of the network.


Security and Communication Networks | 2015

Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks

Victor Sucasas; Saud Althunibat; Ayman Radwan; Hugo Marques; Jonathan Rodriguez; Seiamak Vahid; Rahim Tafazolli; Fabrizio Granelli

Cognitive radio is envisaged as a promising solution to cope with the problem of spectrum scarcity. In cognitive radio networks, users can sense the medium and opportunistically use available frequency bands. Users can cooperate in order to increase the reliability of the sensing process, which is called cooperative spectrum sensing CSS. However, cooperative paradigms are threatened by the behavior of malicious users. Two types of attacks represent the main threats for CSS network operation, namely, spectrum sensing data falsification SSDF and incumbent emulation IE. These two types of attacks have received a considerable amount of attention in the literature, but they have always been studied separately. In this paper, we propose a novel mechanism based on lightweight cryptography that considers both SSDF and IE attacks combined in a CSS network for the first time. Lightweight cryptography, in contrast to previous techniques used such as intrusion detection or reputation systems, provides higher resilience to such attacks when a high number of mobile malicious users exist, providing better energy efficiency. Analytical and simulation results show the outperformance of the proposed algorithm compared with previous mechanisms, in terms of lower false alarm probability i.e., higher chance of using the free frequency bands and hence better energy ratings. Copyright


international conference on communications | 2014

A cognitive approach for stable cooperative group formation in mobile environments

Victor Sucasas; Ayman Radwan; Hugo Marques; Jonathan Rodriguez; Seiamak Vahid; Rahim Tafazolli

Cooperative communications have been gaining huge attention lately, due to the increase in the number of mobile devices and the advancement in their capabilities. In this framework, a commonly suggested approach to benefit from cooperation is the formation of virtual groups of mobile terminals. Mobility-aware algorithms are commonly proposed, where nodes form cooperative clusters according their basic mobile characteristics. However, more detailed mobility pattern information is not used to improve the performance of these systems. The reason is the complexity of current mobility pattern recognition algorithms that require previous set up and advanced knowledge on the scenario. This paper presents a novel cognitive algorithm for the identification of mobility patterns that can be used for mobile group formation and that requires no configuration. The proposed algorithm, based on data mining techniques and cooperative optimization, can evaluate the number of mobility patterns in the scenario and classify nodes according these patterns in a distributive fashion. The algorithm is mathematically presented and tested with extended simulations in both Matlab and ns-2.

Collaboration


Dive into the Hugo Marques's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

José Carlos Ribeiro

Instituto Politécnico Nacional

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

A. Ramos

University of Aveiro

View shared research outputs
Researchain Logo
Decentralizing Knowledge