
Juan A. Martinez- Computer Science specialized in Telematics
- University of Murcia
Juan A. Martinez
- Computer Science specialized in Telematics
- University of Murcia
About
42
Publications
11,939
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,103
Citations
Introduction
Current institution
Publications
Publications (42)
As prices on renewable energy electricity generation and storage technologies decrease, previous standard home energy end-users are also becoming producers (prosumers). Together with the increase of Smart Home automation and the need to manage the energy-related interaction between home energy consumers and Smart Grid through different Demand Respo...
The increase in the interconnection of physical devices and the emergence of the 5 G paradigm foster the generation and distribution of massive amounts of data. The complexity associated with the management of these data requires a suitable access control approach that empowers citizens to control how their data are shared, so potential privacy iss...
The digital transformation in agriculture introduces new challenges in terms of data, knowledge and technology adoption due to critical interoperability issues, and also challenges regarding the identification of the most suitable data sources to be exploited and the information models that must be used. DEMETER (Building an Interoperable, Data-Dri...
The European Commission promotes new technologies and data generated by the Copernicus Programme. These technologies are intended to improve the management of the Common Agricultural Policy aid, implement new monitoring controls to replace on-the-spot checks, and apply up to 100% of the applications continuously for an agricultural year. This paper...
The growing availability of mobile devices has lead to an arising development of smart cities services that share a huge amount of (personal) information and data. Without accurate and verified management, they could become severe back-doors for security and privacy. In this paper, we propose a smart city infrastructure able to integrate a distribu...
DNN processing on image streams has opened the possibility for new and innovative applications. Some of those would benefit from performing the computation locally, avoiding incurring into latencies due to data travelling to image processing services in the cloud, and thus allowing for faster response times. New devices like the GPU-accelerated NVI...
The application of new technologies such as the Internet of Things offers the opportunity to improve current agricultural development, facilitate daily tasks, and turn farms into efficient and sustainable production systems. The use of these new technologies enables the digital transformation process demanded by the sector and provides agricultural...
Due to the rapid development of the Internet of Things (IoT) and consequently, the availability of more and more IoT data sources, mechanisms for searching and integrating IoT data sources become essential to leverage all relevant data for improving processes and services. This paper presents the IoT search framework IoTCrawler. The IoTCrawler fram...
The irrigation sector has undergone a remarkable transformation in recent decades due to the application of pressurized water distribution technologies, improving the management of limited water resources. As a result of this transformation, irrigation has become, together with agricultural machinery, the primary consumer of energy within the agri-...
The high number of IoT devices, and also their availability through the Internet, has made the topic of IoT virtualisation an emerging topic, which has gained a lot of interest from both academia and industry points of view. Fed4IoT is an H2020 EU-JPN Research Project, whose aim is precisely this one. Nevertheless, security, and more specifically a...
The digitalization of current urban spaces is realizing the vision of so-called smart cities, where security and privacy concerns could affect citizens’ safety. This work discusses potential solutions derived from European Union research efforts to be considered in the coming years.
We propose a new harvesting approach for Vehicular Sensor Networks based on compressed sensing (CS) technology called Compressed Sensing-based Vehicular Data Harvesting (CS-VDH). This compression technology allows for the reduction of the information volume that nodes must send back to the fusion center and also an accurate recovery of the original...
The continuous evolution of the agricultural sector justifies the incorporation and adaptation of the latest technologies. Nowadays, managing crops is possible through Internet-based technologies. Their application allows for the exploitation of information and the development of isolated applications, which, although powerful, create challenges fo...
Although current estimates depict steady growth in Internet of Things (IoT), many works portray an as yet immature technology in terms of security. Attacks using low performance devices, the application of new technologies and data analysis to infer private data, lack of development in some aspects of security offer a wide field for improvement. Th...
Security and privacy aspects are crucial for the acceptance of IoT environments. Accordingly, this chapter will focus on new approaches to enable end user to better control and protect their privacy and personal data. In particular, it will describe the work carried out in the context of the EU project SMARTIE, which proposed a user-centric platfor...
Precision Agriculture (PA), as the integration of information, communication and control technologies in agriculture, is growing day by day. The Internet of Things (IoT) and cloud computing paradigms offer advances to enhance PA connectivity. Nevertheless, their usage in this field is usually limited to specific scenarios of high cost, and they are...
The chapter presents an overview of the eight that are part of the
European IoT Security and Privacy Projects initiative (IoT-ESP) addressing
advanced concepts for end-to-end security in highly distributed, heteroge-
neous and dynamic IoT environments. The approaches presented are holistic
and include identification and authentication, data prote...
The Internet of Things (IoT) offers an incredible
innovation potential for developing smarter applications and
services. However, today we see solutions in the development of
vertical applications and services reflecting what used to be the
early days of the Web, leading to fragmentation and intra-nets of
Things. To achieve an open IoT ecosystem of...
Water management is a key scenario for the deployment of IoT systems because of the particularities that arise depending on the geographical region as well as its inherent weather conditions. This scenario offers different and challenging problems to the deployment of IoT based applications and services which must rely on a rich technological vocab...
Current worldwide energy challenges require the synergy of multidisciplinary actions and activities affecting different stakeholders, such as governments, utility companies, and citizens. In recent years, these needs are being addressed through the integration of the Smart Grid paradigm with the so-called Internet of Things, in order to make energy...
IoT heterogeneity and diversity have promoted the creation of different and isolated IoT systems. The EU has funded several research projects in order to promote interoperability and quality aspects for IoT platforms. More significantly, the IoT-ARM was conceived as a reference architecture to derive concrete IoT platforms and establish a common un...
Simulation is a key tool for the design and evaluation of Intelligent Transport Systems (ITS) that take advantage of communication-capable vehicles in order to provide valuable safety, traffic management, and infotainment services. It is widely recognized that simulation results are only significant when realistic models are considered within the s...
We address the problem of effective vehicular routing in hostile scenarios where malicious nodes intend to jeopardize the delivery of messages. Compromised vehicles can severely affect the performance of the network by a number of attacks, such as selectively dropping messages, manipulating them on the fly, and the likes. One of the best performing...
Vehicular networks are likely to be the very first deployed large-scale instance of mobile ad hoc networks. This chapter discusses some aspects related to the modeling of roads and traffic. In particular, it reviews different models and tools for the realistic simulation of vehicular networks, including current simulators employed in vehicular ad h...
The emerging research area of vehicular networks has attracted the interest of car manufacturers as well as public authorities and service providers. Connecting a vehicle to the Internet through several elements deployed along the roads like road side units (RSUs) or access points is one of the most promising scenarios. However, it requires the cre...
We study the problem of multihop routing in vehicular ad hoc networks (VANET). IEEE 802.11p and other vehicular network standards advocate vehicles to issue periodic broadcast messages at regular intervals called beacons. Beacons include among other information geographic coordinates of the vehicle, heading, speed, etc. Thus, most VANET routing sol...
We address the problem of efficiently revoking certificates of malicious and compromised nodes in vehicular networks. As in previous work, our focus is making sure that vehicles receive the new list of revoked certificates (CRL) before they can be compromised. Unlike previous solutions, our work revolves around the idea of making use of existing ca...
The possibility of connecting vehicles to fixed IP networks through roadside units (RSUs) or even access gateways is seen as a very interesting alternative to fully infrastructure-less VANETs. However, getting access to those fixed networks must be controlled and only authorized users should be able to use those RSUs or gateways. However, that auth...
Next generation collaborative systems will offer mobile users seamless and natural collaboration amongst a diversity of agents,
within distributed, knowledge-rich and virtualized working environments. This ambitious goal faces numerous challenges from
the underlying communication infrastructure to the high level application services, with the aim t...
In this paper, the authors describe the development of a framework for collaborative spontaneous networks. A spontaneous network is created when a group of users comes together and uses wireless computing devices in order to carry- out a collaborative activity. The target of this framework is to provide efficient communications for groups of users...
During the last years, peer to peer (P2P) networks are becoming more and more popular because of their inherent properties that allow users to exchange information and also to collaborate between them with a tremendous easiness.In parallel to this evolution, the use of MANETs has been increased due to the low effort needed to their deployment.Nowad...
We study the issue of efficient network access control in mobile ad hoc networks (MANETs) with Internet connectivity through static gateways. This research issue is interesting in many scenarios, specially those in which operators deploy the MANET as an access network to their infrastructure.The goal is to provide a mechanism allowing Internet gate...
We analyze the problem of reducing packet losses due to the authentication time which is required when an ad hoc node switches across different gateways in a mobile ad hoc network connected to Internet (hybrid MANET). Our goal is to provide a mechanism allowing Internet gateways to accept only authorized traffic without decreasing the overall perfo...