Mario Eduardo Rivero-Angeles

Mario Eduardo Rivero-Angeles
Instituto Politécnico Nacional | IPN · Centro de Investigación en Computación (CIC)

Ph.D

About

117
Publications
53,785
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
582
Citations
Citations since 2017
53 Research Items
342 Citations
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
Additional affiliations
January 2014 - present
Instituto Politécnico Nacional
Position
  • Professor (Full)
October 2007 - July 2010
INRIA Bretagne
Position
  • PostDoc Position
February 2002 - December 2013
Instituto Politécnico Nacional
Position
  • Professor (Full)
Education
November 2000 - December 2006
August 1998 - October 2000
September 1994 - July 1998
Metropolitan Autonomous University
Field of study
  • Digital Electronic Engenieer

Publications

Publications (117)
Article
Full-text available
Crowdsensing systems are developed in order to use the computational and communication capabilities of registered users to monitor specific variables and phenomena in an opportunistic manner. As such, the Quality of Experience is not easily attained since these systems heavily rely on the user’s behavior and willingness to cooperate whenever an eve...
Article
Many surveilling applications that use Wireless Sensor Networks (WSNs) are based on image transmissions to monitor relevant events like intruder detection. However, the continuous transmission of such images promptly drains the energy supply of nodes due to the large size of packets compared to other WSN-based applications such as temperature, gas...
Chapter
Cellular systems are typically designed to provide high coverage in a certain region with low blocking probability (0.02 or lower) in order to provide an adequate Quality of Service (QoS). However, when traffic peaks occur, this blocking probability increases beyond this acceptable value and the system offers an unacceptable QoS. In order to avoid...
Article
Full-text available
Peer-to-Peer (P2P) networks, as well as vehicular networks, have been extensively studied in the literature. However, the statistical characteristics of connection times among vehicles on the performance of a P2P network to allow Vehicle-to-Vehicle (V2V) communications have been largely overlooked. Specifically, the periods that vehicles remain con...
Article
Adaptive medium access control (MAC) protocols are essential in the context of Vehicular AdHoc Networks (Vanets) because of the rapid changes in topology caused by the high mobility of nodes. In this work, we propose an adaptive version of the Slotted-ALOHA (S-ALOHA) protocol, where the transmission probability is constantly adjusted based on estim...
Article
Full-text available
Linear topologies arise naturally in the context of Internet-of-Things (IoT) applications for smart cities, where the infrastructure itself commonly has a linear or semi-linear structure. This is the case of buildings, public transportation systems, road infrastructure, and utility distribution networks. Given the prevalence of this type of topolog...
Article
Full-text available
In Wireless Sensor Networks (WSNs), a clustered architecture is generally used to reduce energy consumption irrespectively of the application of the system. We prove in this work that, a clustered network only reduces energy consumption if aggregation or compression functions are enabled. Furthermore, a clustered network would consume much more ene...
Chapter
This article presents a medium access control mechanism based on the very well-known Slotted ALOHA, using Adaptive Traffic Load (ATL) to stabilize the throughput and access delay under long range dependent traffic and Poisson traffic. We consider a system in which users request a data channel for packet data transmission, where arrivals follow a Po...
Article
Full-text available
Applications of quantum computing are growing at a very fast pace, for example, from quantum computers to quantum algorithms and even to the development of the quantum Internet. However, the use of quantum technology in wireless sensor networks has not been thoroughly investigated just yet. This is in part due to the complexity of using big, costly...
Article
Full-text available
Nowadays, the use of nodes with different sensing capabilities is pervasive. This leads to many environments capable of monitoring human activity for security, comfort, and connectivity applications among others. However, this also leads to many opportunities for security breaches in personal mobile devices when they are in such environments. In th...
Article
Full-text available
We address the problem of detecting the invasion of an intruder into a region of interest (ROI) which is monitored by a distributed bandwidth-constrained wireless mobile sensor network (WMSN). We design periodic trajectories for the mobile sensor nodes (MSNs) such that high detection probabilities are obtained while maintaining the MSNs' energy con...
Article
Full-text available
We address the problem of detecting the invasion of an intruder into a region of interest (ROI) which is monitored by a distributed bandwidth-constrained wireless mobile sensor network (WMSN). We design periodic trajectories for the mobile sensor nodes (MSNs) such that high detection probabilities are obtained while maintaining the MSNs’ energy con...
Article
Full-text available
In the context of smart cities, there is a general benefit from monitoring close encounters among pedestrians. For instance, for the access control to office buildings, subway, commercial malls, etc., where a high amount of users may be present simultaneously, and keeping a strict record on each individual may be challenging. GPS tracking may not b...
Article
Full-text available
Nowadays, the use of sensor nodes for the IoT is widespread; nodes that compose these networks must possess self-organizing capabilities and communication protocols that require less energy consumption during communication procedures. In this work, we propose the design and analysis of an energy harvesting system using bioelectricity harvested from...
Article
Full-text available
Ticket Election Multiple Access (TEMA) is introduced for local machine-to-machine communication that is energy and bandwidth-efficient. TEMA is based on distributed elections held among nodes to gain interference-free access to the channel in either unicast or broadcast mode. Non-transmitting nodes can infer whether or not they are the intended rec...
Article
Full-text available
El enrutamiento de tráfico conámbito espacio-temporal para redes vehiculares episódicamen-te conectadas es un patrón de comunicación en el cual los nodos destino son un conjunto de vehículos que transitan en una región destino durante un intervalo de tiempo predefinido. El enrutamiento deámbito espacio-temporal es apropiado para dar soporte a aplic...
Chapter
WSNs are a set of autonomous and tiny nodes deployed on a specific area to collect data from the environment. These nodes are limited in energy and processing resources, therefore a correctness planning in the transmission schemes of the nodes improves the WSN performance. Since WSNs are commonly deploy in non-ideal environments, the nodes usually...
Article
Full-text available
Time-Stable Geocast is a group communication pattern where the destination is composed of a set of nodes that, at any time during a predefined time interval, have been located within a given geographic destination region. Time-Stable Geocast is well suited to supporting Smart City and Intelligent Transportation Systems (ITS) applications such as ro...
Article
Video on Demand services generate the largest amount of traffic in networks nowadays. Previous works have proposed integrating Content Delivery Networks (CDN) and Peer-to-Peer (P2P) networks to satisfy this demand. However, their analytical methods do not consider all the factors that affect the performance of these systems. Hence, we present a nov...
Article
Full-text available
Wireless sensor networks (WSNs) and unmanned aerial vehicles (UAVs) have been used for monitoring animals but when their habitats have difficult access and are areas of a large expanse, remote monitoring by classic techniques becomes a difficult task. The use of traditional WSNs requires a restrictive number of hops in a multi-hoping routing scheme...
Article
Full-text available
In this work, we present the results of a stud} where we monitored the physiological response of a se of fifty high-school students during their participation in an online course. For each of the subjects, we recollected time-series obtained from sensors o physiological signals such as electrical cerebral activity heart rate, galvanic skin response...
Article
Full-text available
Data gathering through wireless sensor networks (WSNs) has been used for the monitoring of endangered species. However, when it comes to animals that live in difficult access environments with large areas, where human access is extremely difficult, such as in polar regions, remote monitoring by traditional methods becomes complicated and even ineff...
Article
Full-text available
Wireless sensor networks (WSNs) have been extensively studied in the literature. However, in hostile environments where node connectivity is severely compromised, the system performance can be greatly affected. In this work, we consider such a hostile environment where sensor nodes cannot directly communicate to some neighboring nodes. Building on...
Chapter
Currently, new advances in the automotive industry are focused on implementing autonomous cars, since they are the future to avoid accidents and protect users. Even if safety is the main goal, many opportunities for technological developers are possible. Among them, Smart Cities is a major player in future communication networks. In a smart city co...
Article
Full-text available
Vehicular networks is a key technology for efficiently communicating both user’s devices and cars for timely information regarding safe driving conditions and entertaining applications like social media, video streaming, and gaming services, among others. In view of this, mobile communications making use of cellular resources may not be an efficien...
Article
Full-text available
Wireless sensor networks have recently been used to monitor bioelectric signals generated by the human body. However, since the dimensions and capabilities of the network nodes are small and limited, a problem is generated inherently by the energy consumption and radioelectric interference. In view of this, we propose two priority schemes to improv...
Article
Full-text available
Nowadays, the use of sensor nodes for the IoT is widespread. At the same time, cyberattacks on these systems have become a relevant design consideration in the practical deployment of wireless sensor networks (WSNs). However, there are some types of attacks that have to be prevented or detected as fast as possible, like, for example, attacks that p...
Article
Full-text available
We present GOAL-CR, a greedy algorithm that solves a variant of the standard contention resolution problem where a set of nodes want to access a shared resource only once, and the objective is to minimize the time it takes for all the nodes to access the resource successfully. These assumptions hold, for instance, in event reporting applications or...
Article
Full-text available
Given the pervasive use of wireless systems, based on the IEEE 802.11 and LTE standards, Peer-to-Peer (P2P) networks take relevance due to their inherent flexibility and scalability. In a mobile environment, users experience different channel conditions. This has a major impact on the system’s performance as it is perceived by users in different co...
Article
Full-text available
In this paper we describe a novel scheme that efficiently distributes the resources provided by seeders in a P2P network for Video on Demand (VoD) services. In the proposed scheme, that we have called Prioritized-Windows Distribution (PWD), the amount of seeders’ resources assigned to a peer depends on its current progress in the process of downloa...
Article
Full-text available
This paper presents the design and a theoretical performance analysis of a Segmented Wireless Sensor Network which is implemented by means of a sink node equipped with a switched beam smart antenna. We compare the performance of the proposed segmented system against that of a conventional WSN where all the nodes contend against each other to access...
Chapter
Cognitive radio wireless networks is an emerging communication paradigm to effectively address spectrum scarcity challenge, where spectrum sharing enables the secondary unlicensed system to dynamically access the licensed frequency bands in the primary system. Given the pervasive use of wireless networks, and the increasing use of video services an...
Chapter
Full-text available
In this work, we consider the design and simulation of three different WiFi antennas, namely: PCB-Yagi, disc-Yagi, and biquad, and present the results of their simulations and their performance as possible elements for energy harvesting systems in the 2.45 GHz band. We use CST Studio Suite® to analyze these antennas and to determine their main para...
Article
Full-text available
div class="page" title="Page 1"> En este artículo presentamos un nuevo enfoque de acceso al medio de capa cruzada que utiliza información topológica de la red para seleccionar la probabilidad de transmisión de cada nodo. En el esquema propuesto, la probabilidad de acceder al canal es asignada en función tanto de la entropía topológica de la red, c...
Conference Paper
In Wireless Sensor Networks (WSNs), each node typically transmits several control and data packets in a contention fashion to the sink. In this work, we mathematically analyze and study three unscheduled transmission schemes for control packets in a cluster-based architecture named Fixed Scheme (FS), Adaptive by Estimation Scheme (AES) and Adaptive...
Article
Full-text available
Abstract In this paper, dynamic and anticipated resource leasing strategies to address the problem of leased resource availability are investigated. Then, network performance analysis is developed, and the performance evaluations of different leasing strategies (namely permanent, dynamic, and anticipated leasing strategies) are provided for some ne...
Article
Full-text available
In this work, a TDMA-based system is studied for VoIP services with and without mobility. The system is considered to be dedicated for voice-only services such as a WLAN environment under the PCF mode or a cellular system. In such environments, mobiles usually have mobility. This introduces the need to study the system when a handoff procedure is e...
Article
Full-text available
In Peer-to-Peer (P2P) networks it is not uncommon to find users that have initiated a file transfer and decide to leave the system before the end of the download. This is a particularly harmful behavior due to the resources (bandwidth or energy) wasted in such an aborted process. This negative effect is amplified when the system's conditions are su...
Article
Full-text available
We introduce the Selective-Awakening MAC (SA-MAC) protocol which is a synchronized duty-cycled protocol with pipelined scheduling for Linear Sensor Networks (LSNs). In the proposed protocol, nodes selectively awake depending on node density and traffic load conditions and on the state of the buffers of the receiving nodes. In order to characterize...
Article
Full-text available
This article studies the performance of a wireless sensor network with cognitive radio capabilities to gather information about structural health monitoring of buildings in case of seismic activity. Since the use of the local area network is intensive in office and home environments, we propose the use of empty cellular channels (primary system). A...
Article
Epilepsy is considered a disorder in which a person has episodes of disturbed brain activity characterized by increased and abnormal synchronization of electrical neuronal activity and this electrical behavior is manifested with physical changes in the overall behavior of the body. As such, epilepsy can be diagnosed analyzing the electroencephalogr...
Article
Full-text available
In this paper, the Erlang capacity achieved by the separate or joint use of several resource management mechanisms commonly considered in the literature (spectrum aggregation, spectrum adaptation, call buffering, channel reservation, selective interruption, and preemptive prioritization) to mitigate the effects of secondary call interruptions in co...
Article
Full-text available
Clustered-based wireless sensor networks have been extensively used in the literature in order to achieve considerable energy consumption reductions. However, two aspects of such systems have been largely overlooked. Namely, the transmission probability used during the cluster formation phase and the way in which cluster heads are selected. Both of...
Article
Full-text available
In this paper, teletraffic performance and channel holding time characterization in mobile cognitive radio cellular networks (CRCNs) under fixed-rate traffic with hard-delay constraints are investigated. To this end, a mathematical model to capture the effect of interruption of ongoing calls of secondary users (SUs) due to the arrival of primary us...
Article
Full-text available
In this paper we introduce the Energy-Efficient Multiple Access (EE-MA) protocol for wireless networks where nodes participate in a distributed election to gain interference-free access to the wireless channel. By taking advantage of the information used in the distributed elections, nodes can infer if they are not the intended receiver of a transm...
Article
Full-text available
We describe a Peer-to-Peer (P2P) network that is designed to support Video on Demand (VoD) services. This network is based on a video-file sharing mechanism that classifies peers according to the window (segment of the file) that they are downloading. This classification easily allows identifying peers that are able to share windows among them, so...
Article
Evolution in electronics has led to the development of complex applications in wireless sensor networks (WSNs), where efficient and swift event reporting is needed. In time-critical applications, achieving an adequate report latency is particularly relevant as it allows a proper reaction from the network to the occurring phenomena. It is evident th...
Article
In this work we study the capabilities and efficiency of a wireless sensor network (WSN) used to gather information concerning the structural health monitoring (SHM) of buildings in case of wind or seismic activity. This information is then relayed to a disaster management center in order to analyze it and detect possible structural damage. To this...
Article
Full-text available
Wireless sensor networks are composed by a big number of autonomous nodes surveying a certain environmental parameter, such as temperature, humidity or even mobile targets. In this work, we focus on mobile target detection in wide area systems such as tracking animals in a forest or vehicle detection in security missions. Specifically, a low energy...
Article
Full-text available
WSNs are complex systems that are mainly limited by the battery life of the nodes in order to have an adequate performance. During the operation of the system, it is not uncommon to have a portion of nodes with low energy levels while other nodes have high energy levels. Nodes with very low residual energy must reduce their energy consumption since...
Article
Major applications of Wireless Sensor Networks (WSNs) are related to safety applications like emergency warnings, rescue operations, and surveillance operations in military among others. In these systems, efficient data dissemination among nodes is of primary importance for the acceptable performance of the network. In this work, the transmission o...
Conference Paper
This paper studies the performance of a wireless sensor network (WSN) with cognitive radio (CR) capabilities to gather information about structural health monitoring (SHM) of buildings in case of seismic activity. The system performance is evaluated in terms of average packet delay and average energy consumption. In order to efficiently use the res...