Match!
Rafaela Villalpando-Hernandez
Monterrey Institute of Technology and Higher Education
8Publications
1H-index
3Citations
Publications 8
Newest
Fast development in hardware miniaturization and massive production of sensors make them cost efficient and vastly available to be used in various applications in our daily life more specially in environment monitoring applications. However, energy consumption is still one of the barriers slowing down the development of several applications. Slow development in battery technology, makes energy harvesting (EH) as a prime candidate to eliminate the sensor’s energy barrier. EH sensors can be the so...
#1Jaime Zuniga-Mejia (Tec: Monterrey Institute of Technology and Higher Education)
#2Rafaela Villalpando-Hernandez (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 1
Last.Andreas Spanias (ASU: Arizona State University)H-Index: 26
view all 4 authors...
Reconfigurable wireless networks, such as ad hoc or wireless sensor networks, do not rely on fixed infrastructure. Nodes must cooperate in the multi-hop routing process. This dynamic and open nature make reconfigurable networks vulnerable to routing attacks that could degrade significantly network performance. Intrusion detection systems consist of a set of techniques designed to identify hostile behavior. In this paper, there are several approaches for intrusion detection in reconfigurable netw...
#1Cesar Vargas-Rosales (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 7
#2Rafaela Villalpando-Hernandez (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 1
Last.Jose V. Cuan (Tec: Monterrey Institute of Technology and Higher Education)
view all 3 authors...
In wireless communication systems, it is important to have estimates of the channel in order to achieve high data rates and deliver services with the quality expected by the users. There are several channel estimation techniques used in OFDM systems, some of them based on training sequences and others on blind estimation techniques. In this paper we introduce a data aided channel estimation technique using the Vandermonde Matrix (VM)for the estimation and an interpolation through Frequency Domai...
#1Mahdi Zareei (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 8
#2Cesar Vargas-Rosales (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 7
Last.Mubashir Husain Rehmani (WIT: Waterford Institute of Technology)H-Index: 19
view all 6 authors...
The design of routing protocols for wireless sensor networks (WSNs) has been traditionally tackled by assuming battery-powered sensors, in which minimizing the power consumption was the main objective. Advances in technology and the ability to harvest energy from the environment has enabled self-sustaining systems and thus diminish the significance of network lifetime considerations in the design of WSNs. Although WSNs operated by energy-harvesting sensors are not limited by network lifetime, th...
#1Gowtham Muniraju (ASU: Arizona State University)H-Index: 1
#2Sai Zhang (ASU: Arizona State University)H-Index: 4
view all 7 authors...
A distributed spectral clustering algorithm to group sensors based on their location in a wireless sensor network (WSN) is proposed. For machine learning and data mining applications in WSN's, gathering data at a fusion center is vulnerable to attacks and creates data congestion. To avoid this, we propose a robust distributed clustering method without a fusion center. The algorithm combines distributed eigenvector computation and distributed K-means clustering. A distributed power iteration meth...
Position location information (PLI) has become a crucial requirement for the provision of multiple location-based services in cellular and wireless ad hoc networks. As sensor networks and Internet of Things scenarios proliferate, 3-D position location becomes more relevant as a solution enabler for location-based services and applications. Nevertheless, PLI acquisition techniques in 3-D ad hoc and sensor networks present several challenges. For instance, conventional triangulation algorithms may...
#1Rafaela Villalpando-Hernandez (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 1
#2Cesar Vargas-Rosales (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 7
Last.Fernando Ruiz-Trejo (Tec: Monterrey Institute of Technology and Higher Education)
view all 4 authors...
Wireless Reconfigurable Networks (WRN) adapt rapidly and flexibly to network variations, providing advantages to establish efficient communication for emergency operations, disaster relief efforts, and military networks. Security is a necessity where data integrity and confidentiality are exposed to attacks. Security schemes are based on cryptography, providing an expensive and partial defense, since high processing needs are inconvenient for WRN. Hence, the design of a distributed, low cost det...
We present a network coding security method capable of detecting several routing attacks in wireless reconfigurable networks. Routing security attacks include selective forwarding, black holes, and wormholes. The proposed method performs linear network coding over intermediate nodes composing a given route, not only to distribute content, but also to provide data confidentiality by cooperation as a mechanism of detection. The method presents a robust, accurate and fast response under security at...
1