Hugo Marques
Instituto Politécnico Nacional
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hugo Marques.
IEEE Communications Surveys and Tutorials | 2013
Riccardo Bassoli; Hugo Marques; Jonathan Rodriguez; Kenneth W. Shum; Rahim Tafazolli
This article surveys all known fields of network coding theory and leads the reader through the antecedents of the network coding theory to the most recent results, considering also information theory and matroid theory. By focusing on providing ideas and not formulas, this survey is both fitted for the taste of readers who are mathematically oriented and newcomers to the area. Additionally, this survey also includes an innovative and clear graph representation of the most prominent literature on network coding theory, its relevance and evolution from the very beginning till today.
Journal of Computer Networks and Communications | 2010
Hugo Marques; José Carlos Ribeiro; Paulo Marques; Jonathan Rodriguez
The new IEEE 802.21 standard specifies link layer intelligence and other related network information to upper layers in order to optimize handovers between networks of different types, such as WiMAX, Wi-Fi, and 3GPP. This paper makes a short description of 802.21 standard, how it is implemented in ns-2, and the signaling used in a handover between WiMAX and Wi-Fi. The paper also proposes a novel and very simple approach to determine the expected number of handovers in an ns-2 simulation and also evaluates the reliability and scalability of ns-2 when simulating 802.21 scenarios with multiple nodes.
IEEE Communications Letters | 2013
Saud Althunibat; Victor Sucasas; Hugo Marques; Jonathan Rodriguez; Rahim Tafazolli; Fabrizio Granelli
Cooperative spectrum sensing is envisaged to increase reliability in cognitive radio networks. Several users cooperate to detect the availability of a wireless channel. In this framework, some malicious users may affect the decisions taken by the cognitive users by providing false information, introducing spectrum sensing data falsification (SSDF). In this paper, the effect of multiple malicious users on the energy efficiency of a cognitive radio network is given. A low-overhead security protocol is proposed to address SSDF attacks under a trade-off between energy efficiency and security. An analytical study is provided to set the optimal number of security bits required to maximize energy efficiency. Simulation results show a considerable improvement on the achievable energy efficiency, and the optimal number of bits explicitly depends on the selected fusion rule, the number of malicious users and the number of legitimate users.
ad hoc networks | 2016
Victor Sucasas; Ayman Radwan; Hugo Marques; Jonathan Rodriguez; Seiamak Vahid; Rahim Tafazolli
Clustering became relevant in the past as a solution for the scalability problems of ad hoc networking, but, the unsuccessful application of ad hoc solutions to real scenarios, such as the projects SURAN and PRNet, decreased the interest of research community on ad hoc communications, and subsequently, on clustering algorithms. Recently, however, clustering techniques have gained renewed interest due to the emergence of cooperative communications for cellular networking. Clustering is envisaged, in this scenario, as a technique to team up nodes to support efficient data aggregation for energy saving, scalability and privacy among other benefits. Moreover, research on 5G networks also envisages a connected society, where everything and everyone will be connected under the umbrella of Internet of Everything (IoE). This novel communication paradigm has fostered new research on clustering, which has yielded novel and more advanced algorithms and applications. This article surveys the State-of-the-Art in clustering techniques and provides detailed descriptions of the basics of clustering and the latest novel ideas. Open issues, technical challenges and directions for future research are also outlined.
Computer Networks | 2015
Vahid Nazari Talooki; Riccardo Bassoli; Daniel E. Lucani; Jonathan Rodriguez; Frank H. P. Fitzek; Hugo Marques; Rahim Tafazolli
This survey paper shows the state of the art in security mechanisms, where a deep review of the current research and the status of this topic is carried out. We start by introducing network coding and its variety of applications in enhancing current traditional networks. In particular, we analyze two key protocol types, namely, state-aware and stateless protocols, specifying the benefits and disadvantages of each one of them. We also present the key security assumptions of network coding (NC) systems as well as a detailed analysis of the security goals and threats, both passive and active. Current proposed security mechanisms and schemes for NC in the literature are classified too. This paper also presents a detailed taxonomy of the different NC security mechanisms and schemes reported in the literature.
International Journal of Distributed Sensor Networks | 2014
Vahid Nazari Talooki; Jonathan Rodriguez; Hugo Marques
Wireless Sensor Networks (WSNs) can benefit from ad hoc networking technology characterized by multihop wireless connectivity and infrastructure less framework. These features make them suitable for next-generation networks to support several applications such M2M applications for smart cities and public safety scenarios. Pivotal design requirements for these scenarios are energy efficiency, since many of these devices will be battery powered placing a fundamental limit on network, and specifically node lifetime. Moreover, the way in which traffic is managed also influences network lifetime, since there is a high probability for some nodes to become overloaded by packet forwarding operations in order to support neighbour data exchange. These issues imply the need for energy efficient and load balanced routing approaches that can manage the network load and not only provide reduced energy consumption on the network but also prolong the network lifetime providing robust and continuous. This work proposes a new energy efficient and traffic balancing routing approach that can provide a weighted and flexible trade-off between energy consumption and load dispersion. Simulation results show that the proposed protocol achieves high energy efficiency, decreases the percentage of failed nodes due to lack of battery power, and extends the lifespan of the network.
Iet Communications | 2012
Joaquim Bastos; Michele Albano; Hugo Marques; José Carlos Ribeiro; Jonathan Rodriguez; Christos V. Verikoukis
The growing presence of concurrent heterogeneous wireless access networks, together with the increasing service demands from the end-users, require re-thinking of current access selection polices and appropriate management mechanisms, namely concerning quality of service, energy efficiency, etc. The recent IEEE 802.21 standard introduces link layer intelligence as well as related network information to upper layers in order to optimise handovers between networks of different technologies, such as WiMAX, Wi-Fi and 3GPP. With the massification of mobile terminals with multiple wireless interfaces it is important to efficiently manage those interfaces not only to appropriately provide the requested services to the user, but also to do that in an energy efficient way in order to allow higher mobility to the user by extending the battery life of its terminal. The study the IEEE 802.21 standard is briefly introduced, presented in the signalling in a handover between WiMAX and Wi-Fi, and exploited through an implementation in ns-2 introducing a simple, but effective, energy-saving approach.
world of wireless mobile and multimedia networks | 2013
Vahid Nazari Talooki; Hugo Marques; Jonathan Rodriguez
In Mobile Ad hoc NETworks (MANETs), where cooperative behaviour is mandatory, there is a high probability for some nodes to become overloaded with packet forwarding operations, in order to support neighbour data exchange. This altruistic behaviour leads to an unbalanced load in terms of traffic and energy consumption. In such scenarios, mobile nodes can benefit from the use of an energy efficient and traffic fitting routing protocol, that better complies with their limited battery capacity and throughput. This paper presents E2DYMO, an improvement to the well-known DYMO protocol that offers energy efficiency and fairness in routing for mobile wireless ad hoc networks. With this proposed improvement, nodes are able to find several routes per each pair of source and destination nodes and select the best route according to energy and traffic parameters, effectively extending the lifespan of the network.
Security and Communication Networks | 2015
Victor Sucasas; Saud Althunibat; Ayman Radwan; Hugo Marques; Jonathan Rodriguez; Seiamak Vahid; Rahim Tafazolli; Fabrizio Granelli
Cognitive radio is envisaged as a promising solution to cope with the problem of spectrum scarcity. In cognitive radio networks, users can sense the medium and opportunistically use available frequency bands. Users can cooperate in order to increase the reliability of the sensing process, which is called cooperative spectrum sensing CSS. However, cooperative paradigms are threatened by the behavior of malicious users. Two types of attacks represent the main threats for CSS network operation, namely, spectrum sensing data falsification SSDF and incumbent emulation IE. These two types of attacks have received a considerable amount of attention in the literature, but they have always been studied separately. In this paper, we propose a novel mechanism based on lightweight cryptography that considers both SSDF and IE attacks combined in a CSS network for the first time. Lightweight cryptography, in contrast to previous techniques used such as intrusion detection or reputation systems, provides higher resilience to such attacks when a high number of mobile malicious users exist, providing better energy efficiency. Analytical and simulation results show the outperformance of the proposed algorithm compared with previous mechanisms, in terms of lower false alarm probability i.e., higher chance of using the free frequency bands and hence better energy ratings. Copyright
international conference on communications | 2014
Victor Sucasas; Ayman Radwan; Hugo Marques; Jonathan Rodriguez; Seiamak Vahid; Rahim Tafazolli
Cooperative communications have been gaining huge attention lately, due to the increase in the number of mobile devices and the advancement in their capabilities. In this framework, a commonly suggested approach to benefit from cooperation is the formation of virtual groups of mobile terminals. Mobility-aware algorithms are commonly proposed, where nodes form cooperative clusters according their basic mobile characteristics. However, more detailed mobility pattern information is not used to improve the performance of these systems. The reason is the complexity of current mobility pattern recognition algorithms that require previous set up and advanced knowledge on the scenario. This paper presents a novel cognitive algorithm for the identification of mobility patterns that can be used for mobile group formation and that requires no configuration. The proposed algorithm, based on data mining techniques and cooperative optimization, can evaluate the number of mobility patterns in the scenario and classify nodes according these patterns in a distributive fashion. The algorithm is mathematically presented and tested with extended simulations in both Matlab and ns-2.