
Mario Eduardo Rivero-AngelesInstituto Politécnico Nacional | IPN · Centro de Investigación en Computación (CIC)
Mario Eduardo Rivero-Angeles
Ph.D
About
117
Publications
53,785
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
582
Citations
Citations since 2017
Introduction
Additional affiliations
January 2014 - present
October 2007 - July 2010
INRIA Bretagne
Position
- PostDoc Position
February 2002 - December 2013
Publications
Publications (117)
Crowdsensing systems are developed in order to use the computational and communication capabilities of registered users to monitor specific variables and phenomena in an opportunistic manner. As such, the Quality of Experience is not easily attained since these systems heavily rely on the user’s behavior and willingness to cooperate whenever an eve...
Many surveilling applications that use Wireless Sensor Networks (WSNs) are based on image transmissions to monitor relevant events like intruder detection. However, the continuous transmission of such images promptly drains the energy supply of nodes due to the large size of packets compared to other WSN-based applications such as temperature, gas...
Cellular systems are typically designed to provide high coverage in a certain region with low blocking probability (0.02 or lower) in order to provide an adequate Quality of Service (QoS). However, when traffic peaks occur, this blocking probability increases beyond this acceptable value and the system offers an unacceptable QoS. In order to avoid...
Peer-to-Peer (P2P) networks, as well as vehicular networks, have been extensively studied in the literature. However, the statistical characteristics of connection times among vehicles on the performance of a P2P network to allow Vehicle-to-Vehicle (V2V) communications have been largely overlooked. Specifically, the periods that vehicles remain con...
Adaptive medium access control (MAC) protocols are essential in the context of Vehicular AdHoc Networks (Vanets) because of the rapid changes in topology caused by the high mobility of nodes. In this work, we propose an adaptive version of the Slotted-ALOHA (S-ALOHA) protocol, where the transmission probability is constantly adjusted based on estim...
Linear topologies arise naturally in the context of Internet-of-Things (IoT) applications for smart cities, where the infrastructure itself commonly has a linear or semi-linear structure. This is the case of buildings, public transportation systems, road infrastructure, and utility distribution networks. Given the prevalence of this type of topolog...
In Wireless Sensor Networks (WSNs), a clustered architecture is generally used to reduce energy consumption irrespectively of the application of the system. We prove in this work that, a clustered network only reduces energy consumption if aggregation or compression functions are enabled. Furthermore, a clustered network would consume much more ene...
This article presents a medium access control mechanism based on the very well-known Slotted ALOHA, using Adaptive Traffic Load (ATL) to stabilize the throughput and access delay under long range dependent traffic and Poisson traffic. We consider a system in which users request a data channel for packet data transmission, where arrivals follow a Po...
Applications of quantum computing are growing at a very fast pace, for example, from quantum computers to quantum algorithms and even to the development of the quantum Internet. However, the use of quantum technology in wireless sensor networks has not been thoroughly investigated just yet. This is in part due to the complexity of using big, costly...
Nowadays, the use of nodes with different sensing capabilities is pervasive. This leads to many environments capable of monitoring human activity for security, comfort, and connectivity applications among others. However, this also leads to many opportunities for security breaches in personal mobile devices when they are in such environments. In th...
We address the problem of detecting the invasion of an intruder into a region of interest (ROI) which is monitored by a distributed bandwidth-constrained wireless mobile sensor network (WMSN). We design periodic trajectories for the mobile sensor nodes (MSNs) such that high detection probabilities are obtained while maintaining the MSNs' energy con...
We address the problem of detecting the invasion of
an intruder into a region of interest (ROI) which is monitored by a distributed bandwidth-constrained wireless mobile sensor network (WMSN). We design periodic trajectories for the mobile sensor nodes (MSNs) such that high detection probabilities are obtained while maintaining the MSNs’ energy con...
In the context of smart cities, there is a general benefit from monitoring close encounters among pedestrians. For instance, for the access control to office buildings, subway, commercial malls, etc., where a high amount of users may be present simultaneously, and keeping a strict record on each individual may be challenging. GPS tracking may not b...
Nowadays, the use of sensor nodes for the IoT is widespread; nodes that compose these networks must possess self-organizing capabilities and communication protocols that require less energy consumption during communication procedures. In this work, we propose the design and analysis of an energy harvesting system using bioelectricity harvested from...
Ticket Election Multiple Access (TEMA) is introduced for local machine-to-machine communication that is energy and bandwidth-efficient. TEMA is based on distributed elections held among nodes to gain interference-free access to the channel in either unicast or broadcast mode. Non-transmitting nodes can infer whether or not they are the intended rec...
El enrutamiento de tráfico conámbito espacio-temporal para redes vehiculares episódicamen-te conectadas es un patrón de comunicación en el cual los nodos destino son un conjunto de vehículos que transitan en una región destino durante un intervalo de tiempo predefinido. El enrutamiento deámbito espacio-temporal es apropiado para dar soporte a aplic...
WSNs are a set of autonomous and tiny nodes deployed on a specific area to collect data from the environment. These nodes are limited in energy and processing resources, therefore a correctness planning in the transmission schemes of the nodes improves the WSN performance. Since WSNs are commonly deploy in non-ideal environments, the nodes usually...
Time-Stable Geocast is a group communication pattern where the destination is composed of a set of nodes that, at any time during a predefined time interval, have been located within a given geographic destination region. Time-Stable Geocast is well suited to supporting Smart City and Intelligent Transportation Systems (ITS) applications such as ro...
Video on Demand services generate the largest amount of traffic in networks nowadays. Previous works have proposed integrating Content Delivery Networks (CDN) and Peer-to-Peer (P2P) networks to satisfy this demand. However, their analytical methods do not consider all the factors that affect the performance of these systems. Hence, we present a nov...
Wireless sensor networks (WSNs) and unmanned aerial vehicles (UAVs) have been used for monitoring animals but when their habitats have difficult access and are areas of a large expanse, remote monitoring by classic techniques becomes a difficult task. The use of traditional WSNs requires a restrictive number of hops in a multi-hoping routing scheme...
In this work, we present the results of a stud} where we monitored the physiological response of a se of fifty high-school students during their participation in an online course. For each of the subjects, we recollected time-series obtained from sensors o physiological signals such as electrical cerebral activity heart rate, galvanic skin response...
Data gathering through wireless sensor networks (WSNs) has been used for the monitoring of endangered species. However, when it comes to animals that live in difficult access environments with large areas, where human access is extremely difficult, such as in polar regions, remote monitoring by traditional methods becomes complicated and even ineff...
Wireless sensor networks (WSNs) have been extensively studied in the literature. However, in hostile environments where node connectivity is severely compromised, the system performance can be greatly affected. In this work, we consider such a hostile environment where sensor nodes cannot directly communicate to some neighboring nodes. Building on...
Currently, new advances in the automotive industry are focused on implementing autonomous cars, since they are the future to avoid accidents and protect users. Even if safety is the main goal, many opportunities for technological developers are possible. Among them, Smart Cities is a major player in future communication networks. In a smart city co...
Vehicular networks is a key technology for efficiently communicating both user’s devices and cars for timely information regarding safe driving conditions and entertaining applications like social media, video streaming, and gaming services, among others. In view of this, mobile communications making use of cellular resources may not be an efficien...
Wireless sensor networks have recently been used to monitor bioelectric signals generated by the human body. However, since the dimensions and capabilities of the network nodes are small and limited, a problem is generated inherently by the energy consumption and radioelectric interference. In view of this, we propose two priority schemes to improv...
Nowadays, the use of sensor nodes for the IoT is widespread. At the same time, cyberattacks on these systems have become a relevant design consideration in the practical deployment of wireless sensor networks (WSNs). However, there are some types of attacks that have to be prevented or detected as fast as possible, like, for example, attacks that p...
We present GOAL-CR, a greedy algorithm that solves a variant of the standard contention resolution problem where a set of nodes want to access a shared resource only once, and the objective is to minimize the time it takes for all the nodes to access the resource successfully. These assumptions hold, for instance, in event reporting applications or...
Given the pervasive use of wireless systems, based on the IEEE 802.11 and LTE standards, Peer-to-Peer (P2P) networks take relevance due to their inherent flexibility and scalability. In a mobile environment, users experience different channel conditions. This has a major impact on the system’s performance as it is perceived by users in different co...
In this paper we describe a novel scheme that efficiently distributes the resources provided by seeders in a P2P network for Video on Demand (VoD) services. In the proposed scheme, that we have called Prioritized-Windows Distribution (PWD), the amount of seeders’ resources assigned to a peer depends on its current progress in the process of downloa...
This paper presents the design and a theoretical performance analysis of a Segmented Wireless Sensor Network which is implemented by means of a sink node equipped with a switched beam smart antenna. We compare the performance of the proposed segmented system against that of a conventional WSN where all the nodes contend against each other to access...
Cognitive radio wireless networks is an emerging communication paradigm to effectively address spectrum scarcity challenge, where spectrum sharing enables the secondary unlicensed system to dynamically access the licensed frequency bands in the primary system. Given the pervasive use of wireless networks, and the increasing use of video services an...
In this work, we consider the design and simulation of three different WiFi antennas, namely: PCB-Yagi, disc-Yagi, and biquad, and present the results of their simulations and their performance as possible elements for energy harvesting systems in the 2.45 GHz band. We use CST Studio Suite® to analyze these antennas and to determine their main para...
div class="page" title="Page 1">
En este artículo presentamos un nuevo enfoque de acceso al medio de capa cruzada que utiliza información topológica de la red para seleccionar la probabilidad de transmisión de cada nodo. En el esquema propuesto, la probabilidad de acceder al canal es asignada en función tanto de la entropía topológica de la red, c...
In Wireless Sensor Networks (WSNs), each node typically transmits several control and data packets in a contention fashion to the sink. In this work, we mathematically analyze and study three unscheduled transmission schemes for control packets in a cluster-based architecture named Fixed Scheme (FS), Adaptive by Estimation Scheme (AES) and Adaptive...
Abstract In this paper, dynamic and anticipated resource leasing strategies to address the problem of leased resource availability are investigated. Then, network performance analysis is developed, and the performance evaluations of different leasing strategies (namely permanent, dynamic, and anticipated leasing strategies) are provided for some ne...
In this work, a TDMA-based system is studied for VoIP services with and without mobility. The system is considered to be dedicated for voice-only services such as a WLAN environment under the PCF mode or a cellular system. In such environments, mobiles usually have mobility. This introduces the need to study the system when a handoff procedure is e...
In Peer-to-Peer (P2P) networks it is not uncommon to find users that have initiated a file transfer and decide to leave the system before the end of the download. This is a particularly harmful behavior due to the resources (bandwidth or energy) wasted in such an aborted process. This negative effect is amplified when the system's conditions are su...
We introduce the Selective-Awakening MAC (SA-MAC) protocol which is a synchronized duty-cycled protocol with pipelined scheduling for Linear Sensor Networks (LSNs). In the proposed protocol, nodes selectively awake depending on node density and traffic load conditions and on the state of the buffers of the receiving nodes. In order to characterize...
This article studies the performance of a wireless sensor network with cognitive radio capabilities to gather information about structural health monitoring of buildings in case of seismic activity. Since the use of the local area network is intensive in office and home environments, we propose the use of empty cellular channels (primary system). A...
Epilepsy is considered a disorder in which a person has episodes of disturbed brain activity characterized by increased and abnormal synchronization of electrical neuronal activity and this electrical behavior is manifested with physical changes in the overall behavior of the body. As such, epilepsy can be diagnosed analyzing the electroencephalogr...
In this paper, the Erlang capacity achieved by the separate or joint use of several resource management mechanisms commonly considered in the literature (spectrum aggregation, spectrum adaptation, call buffering, channel reservation, selective interruption, and preemptive prioritization) to mitigate the effects of secondary call interruptions in co...
Clustered-based wireless sensor networks have been extensively used in the literature in order to achieve considerable energy consumption reductions. However, two aspects of such systems have been largely overlooked. Namely, the transmission probability used during the cluster formation phase and the way in which cluster heads are selected. Both of...
In this paper, teletraffic performance and channel holding time characterization in mobile cognitive radio cellular networks (CRCNs) under fixed-rate traffic with hard-delay constraints are investigated. To this end, a mathematical model to capture the effect of interruption of ongoing calls of secondary users (SUs) due to the arrival of primary us...
In this paper we introduce the Energy-Efficient Multiple Access (EE-MA) protocol for wireless networks where nodes participate in a distributed election to gain interference-free access to the wireless channel. By taking advantage of the information used in the distributed elections, nodes can infer if they are not the intended receiver of a transm...
We describe a Peer-to-Peer (P2P) network that is designed to support Video on Demand (VoD) services. This network is based on a video-file sharing mechanism that classifies peers according to the window (segment of the file) that they are downloading. This classification easily allows identifying peers that are able to share windows among them, so...
Evolution in electronics has led to the development of complex applications in wireless sensor networks (WSNs), where efficient and swift event reporting is needed. In time-critical applications, achieving an adequate report latency is particularly relevant as it allows a proper reaction from the network to the occurring phenomena. It is evident th...
In this work we study the capabilities and efficiency of a wireless sensor network (WSN) used to gather information concerning the structural health monitoring (SHM) of buildings in case of wind or seismic activity. This information is then relayed to a disaster management center in order to analyze it and detect possible structural damage. To this...
Wireless sensor networks are composed by a big number of autonomous nodes surveying a certain environmental parameter, such as temperature, humidity or even mobile targets. In this work, we focus on mobile target detection in wide area systems such as tracking animals in a forest or vehicle detection in security missions. Specifically, a low energy...
WSNs are complex systems that are mainly limited by the battery life of the nodes in order to have an adequate performance. During the operation of the system, it is not uncommon to have a portion of nodes with low energy levels while other nodes have high energy levels. Nodes with very low residual energy must reduce their energy consumption since...
Major applications of Wireless Sensor Networks (WSNs) are related to safety applications like emergency warnings, rescue operations, and surveillance operations in military among others. In these systems, efficient data dissemination among nodes is of primary importance for the acceptable performance of the network. In this work, the transmission o...
This paper studies the performance of a wireless sensor network (WSN) with cognitive radio (CR) capabilities to gather information about structural health monitoring (SHM) of buildings in case of seismic activity. The system performance is evaluated in terms of average packet delay and average energy consumption. In order to efficiently use the res...