Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pedro M. Wightman is active.

Publication


Featured researches published by Pedro M. Wightman.


wireless communications and networking conference | 2011

A multiobjective approach to the relay placement problem in WSNs

Alfredo Pérez; Miguel A. Labrador; Pedro M. Wightman

This paper presents a multiobjective model for the simultaneous optimization of the number of relays and the energy dissipation when deploying a wireless sensor networks to monitor specific locations in an area. In order to solve the model, a hybrid evolutionary algorithm with two local searches is proposed an implemented. As the algorithm returns a set of efficient solutions, the tradeoff among placements in their number of relays with their energy dissipation is explored. The evaluation shows that the energy can be diminished greatly by choosing not the most efficient placement in terms of number of relays but other placement with more relays. In our experiments, it was found that the solution with one or two more relay sensors than the efficient placement helped greatly in diminishing the energy. The proposed algorithm also showed better approximations than an approximation problem in the literature to the minimal number of relays.


Journal of Network and Computer Applications | 2011

A family of simple distributed minimum connected dominating set-based topology construction algorithms

Pedro M. Wightman; Miguel A. Labrador

This paper considers the problem of topology construction to save energy in wireless sensor networks. The proposed topology construction mechanisms build reduced topologies using the Connected Dominating Set approach in a distributed, efficient, and simple manner. This problem is very challenging because the solution must provide a connected network with complete coverage of the area of interest using the minimum number of nodes possible. Further, the algorithms need to be computationally inexpensive and the protocols simple enough in terms of their message and computation complexity, so they do not consume more energy creating the reduced topology than the energy that they are supposed to save. In addition, it is desirable to reduce or completely eliminate the need of localization mechanisms since they introduce additional costs and energy consumption. To this end, we present the family of A3 distributed topology construction algorithms, four simple algorithms that build reduced topologies with very low computational and message complexity without the need of localization information: A3, A3Cov, A3Lite and A3CovLite. The algorithms are compared in sparse and dense networks versus optimal theoretical bounds for connected-coverage topologies and two distributed heuristics found in the literature using the number of active nodes and the ratio of coverage as the main performance metrics. The results demonstrate that there is no clear winner, and rather, trade offs exist. If coverage is not as critical as energy (network lifetime), it would be better to use A3Lite, as it needs fewer number of nodes and messages. If coverage is very important for the application, then the A3CovLite is the best option mostly because of the lower message complexity.


wireless communications and networking conference | 2011

A3Cov: A new topology construction protocol for connected area coverage in WSN

Pedro M. Wightman; Miguel A. Labrador

Topology control is a well-known strategy to save energy and extend the lifetime of wireless sensor networks. It consists of topology construction and topology maintenance algorithms. While topology construction builds a reduced topology, topology maintenance changes the reduced topology when the current one is no longer optimal. The selection of an appropriate topology maintenance technique is rarely included in the evaluation of topology control solutions, even though the impact of such decision in the lifetime of the network (in terms of number of nodes or coverage) has been shown before. This paper makes two important contributions. First, it introduces a new topology construction algorithm called A3Cov, based on the A3 protocol, which increases the coverage ratio considerably compared to the original version. Second, the A3Cov protocol is evaluated jointly with four topology maintenance techniques to determine the influence of the different maintenance schemes on the area coverage and the network lifetime. The results show that the dynamic global topology maintenance techniques with A3Cov provide the best coverage and network lifetime for a substantially longer period of time compared to the ACOS protocol.


Climate and Development | 2015

Information and communication technologies and climate change adaptation in Latin America and the Caribbean: a framework for action

Hallie Eakin; Pedro M. Wightman; David H. Hsu; Vladimir R. Gil Ramón; Eduardo Fuentes-Contreras; Megan P. Cox; Tracy Ann N Hyman; Carlos Pacas; Fernando Borraz; Claudia N. Gonzalez-Brambila; Diego Ponce de Leon Barido; Daniel M. Kammen

Despite ongoing interest in deploying information and communication technologies (ICTs) for sustainable development, their use in climate change adaptation remains understudied. Based on the integration of adaptation theory and the existing literature on the use of ICTs in development, we present an analytical model for conceptualizing the contribution of existing ICTs to adaptation, and a framework for evaluating ICT success. We apply the framework to four case studies of ICTs in use for early warning systems and managing extreme events in the Latin American and the Caribbean countries. We propose that existing ICTs can support adaptation through enabling access to critical information for decision-making, coordinating actors and building social capital. ICTs also allow actors to communicate and disseminate their decision experience, thus enhancing opportunities for collective learning and continual improvements in adaptation processes. In this way, ICTs can both communicate the current and potential impacts of climate change, as well as engage populations in the development of viable adaptation strategies.


international carnahan conference on security technology | 2013

High variability geographical obfuscation for location privacy

Pedro M. Wightman; Mayra Zurbarán; A. Santander

In the last few years, the number of applications that use the location of the users in order to provide a more personalized service have been increasing, mainly due to easy access to low cost smartphones, geographical positioning systems and other factors, like social networking. The concern of protecting this information is also increasing due to the capabilities than an eventual attacker could have if the location information is obtained. Some protection techniques have been proposed in the literature; for example, location obfuscation which slightly alters the location to hide the real one. However, this technique could be filtered out with time series-based mechanisms. In this work, the Pinwheel obfuscation technique is proposed in order to reduce the possibility of EMA-based filtering based on high variability and asymmetry of the induced noise. The results show that the level of filtered noise is reduced from 35% in N-RAND and 30% in θ-Rand obfuscation techniques, to 15% in Pinwheel, with asymmetric scenarios, while preserving a long final average distance from the original path after a filtering attack.


ieee latin-american conference on communications | 2010

An optimal solution to the MCDS problem for topology construction in wireless sensor networks

Pedro M. Wightman; Aldo Fabregasy; Miguel A. Labradorz

Topology Construction (TC) is a very well-known technique to save energy and extend the lifetime of wireless sensor networks. One common approach to implement TC is to select a small subset of nodes that can accomplish the global objective of the network and put the rest of the nodes in a low energy consumption mode to use their energy in the future. One way to select this subset of nodes is by solving the Minimum Connected Dominating Set problem (MCDS). This paper presents a Mixed Integer Programming (MIP) formulation that finds the optimal solution to this problem. The formulation is proposed as a benchmarking tool to compare the performance of existing and new heuristics that approximate the solution to the same problem. In fact, the paper compares the performance of three well-known CDS-based topology construction protocols versus the MIP-MCDS formulation. The results show that, in terms of the size of the CDS, the distance between the optimal and the approximate solutions increases with the communication radius and the number of nodes. In terms of the solution time, for low density and high node degree topologies the mathematical programming formulation is comparable, and sometimes better, to that of the heuristics. However, in topologies with low node degree and high node density the heuristic solutions outperform the mathematical programming solution.


IEEE Latin America Transactions | 2010

LatinCon16 - Topology Maintenance: Extending the Lifetime of Wireless Sensor Networks

Pedro M. Wightman; Miguel A. Labrador

Topology Maintenance is the part of Topology Control dedicated to the periodical restoration of the network topology, in order to guarantee characteristics like connectivity and coverage. This article presents one of the first efforts to formalize this concept by presenting a taxonomy for different strategies to perform topology maintenance in wireless sensor networks, including static, dynamic and hybrid techniques, with global and local scope, and using different triggering criteria. In addition, a comparison is included to evaluate, in sparse and dense networks, the performance of global static, dynamic and hybrid techniques, with triggering criteria based on time and energy, and working jointly with the two well-known topology construction protocols A3 and CDS-Rule-K. The results show that the dynamic techniques always produce benefits in terms of extending the network lifetime, while static and hybrid techniques produce mixed results (worst and best), depending mainly on the nature of the construction protocols used.


ieee latin american conference on communications | 2014

Near-Rand: Noise-based location obfuscation based on random neighboring points

Mayra Zurbarán; K. Avila; Pedro M. Wightman; M. Fernandez

In recent years Location-Based Information Systems have increased its popularity in the market of mobile applications, however, due to the ability of smartphones and similar devices to estimate location in real time using GPS or through network providers; it is critical to implement techniques to protect such sensitive information while still make it available to the service provider. This paper presents Near-Rand, a new random noise-based location obfuscation technique. This algorithm generates random points around the real location of the user within a neighbor-size squared area and calculates the n nearest points average to the users location giving as result an obfuscated point. Compared to Pinwheel, another noise-based obfuscation mechanism, it shows a similar performance against Exponentially Moving Average-based filtering attacks, while being able to use non-uniformly distributions for random points.


ad hoc mobile and wireless networks | 2011

Empirical approach to network sizing for connectivity in wireless sensor networks with realistic radio propagation models

Pedro M. Wightman; Miguel Jimeno; Daladier Jabba; Miguel A. Labrador; Mayra Zurbarán; César Córdoba; Armando Guerrero

Choosing the appropriate network size to guarantee connectivity in a WSN deployment is a challenging and important question. Classic techniques to answer this question are not up to the challenge because they rarely consider realistic radio models. This work proposes a methodology to evaluate the performance of network size estimation techniques in terms of connectivity efficiency under realistic radio scenarios. This study is carried out using Atarraya, a simulation tool for wireless sensor networks, considering three classical estimation techniques and a radio model based on the specifications of the ZigBee radio from off-the-shelf WaspMote nodes from Libelium. The results show that the hexagon-based optimal grid technique provides the most efficient estimate, offering a high connectivity level with the lowest estimated number of nodes for a given proximity radius parameter, followed by the circle packing and the triangle-based grid distribution. In addition, the results show that packet error rates of 10% could still produce highly connected topologies.


Archive | 2019

An Initial Evaluation of the Impact of Location Obfuscation Mechanisms on Geospatial Analysis

Pedro M. Wightman; Mayra Zurbarán

Since the emergence of GPS capable mobile devices and the increasing demand of contextual services such as location-based services (LBSs), there has been a rising concern for location privacy. This led to the creation of manifold location privacy protection mechanisms (LPPMs) in the scientific community. The authors propose the use of geospatial analyses as an evaluation tool of the impact of noise-based algorithms on location data. For this, the Pinwheel mechanism is tested, using different noise settings, to identify a threshold where privacy is provided, and geostatistical inferences are not affected greatly. Results show that 500 m of random noise introduce a small level of change that does not change the general trend in both heatmap and hotspot analysis but still can provide a minimum level of protection to individuals.

Collaboration


Dive into the Pedro M. Wightman's collaboration.

Top Co-Authors

Avatar

Miguel A. Labrador

University of South Florida

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David H. Hsu

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Hallie Eakin

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Vladimir R. Gil Ramón

Pontifical Catholic University of Peru

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Megan P. Cox

Caribbean Meteorological Institute

View shared research outputs
Top Co-Authors

Avatar

Aldo Fabregasy

University of South Florida

View shared research outputs
Top Co-Authors

Avatar

Alfredo Pérez

University of South Florida

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge