Octavio Nieto-Taladriz

Octavio Nieto-Taladriz
Universidad Politécnica de Madrid | UPM · Departmento de Ingeniería Electrónica

About

90
Publications
17,394
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
906
Citations
Citations since 2017
0 Research Items
263 Citations
201720182019202020212022202301020304050
201720182019202020212022202301020304050
201720182019202020212022202301020304050
201720182019202020212022202301020304050

Publications

Publications (90)
Article
Full-text available
Electronic devices are complex circuits, consisting of analog, switching, and digital subsystems that require direct current (DC) for polarization. Since they are connected to the mains delivering alternating current (AC), however, AC-to-DC converters are to be introduced between the mains and the electronics to be fed. A converter is an electric c...
Article
Full-text available
Cognitive Wireless Sensor Network (CWSN) is a new paradigm which integrates cognitive features in traditional Wireless Sensor Networks (WSNs) to mitigate important problems such as spectrum occupancy. Security in Cognitive Wireless Sensor Networks is an important problem because these kinds of networks manage critical applications and data. Moreove...
Article
Full-text available
This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor Networks (CWSNs). These techniques introduce noise into the spectrum in order to hide real information. Nevertheless, they directly affect two im...
Article
Providing security to the emerging field of ambient intelligence will be difficult if we rely only on existing techniques, given their dynamic and heterogeneous nature. Moreover, security demands of these systems are expected to grow, as many applications will require accurate context modeling. In this work we propose an enhancement to the reputati...
Article
Full-text available
An attempt is made in this paper to summarise the state of the art in the interaction between the Information Communication Technologies (ICT) that becomes ubiquitous and the electrical power production and distribution. Both are considered to have a difficult task to fulfil enormous rise of demand that is becoming above all expectations. In the sa...
Conference Paper
This paper presents an artificial noise strategy to increase physical-layer security in Cognitive Wireless Sensor Networks (CWSN). Spectrum sensing, information sharing and collaborative cognitive features are used to avoid eavesdropping attacks. Artificial noise generation is proposed to conceal the secret message to be transmitted. One important...
Article
Smart Grids are amongst the most promising future developments to manage and control the energy consumption in the next decades. However, the integration and interdependencies that will evolve between the electricity power grid, telecommunication networks and ICT enable new threats and vulnerabilities to this critical infrastructure which must be a...
Article
Full-text available
The area of Human–Machine Interface is growing fast due to its high importance in all technological systems. The basic idea behind designing human–machine interfaces is to enrich the communication with the technology in a natural and easy way. Gesture interfaces are a good example of transparent interfaces. Such interfaces must identify properly th...
Article
Structural health monitoring (SHM) systems have excellent potential to improve the regular operation and maintenance of structures. Wireless networks (WNs) have been used to avoid the high cost of traditional generic wired systems. The most important limitation of SHM wireless systems is time-synchronization accuracy, scalability, and reliability....
Conference Paper
This paper considers the problem of secure communication in Wireless Sensor Networks in the presence of non-colluding passive eavesdroppers. Cognitive networks capabilities such as spectrum sensing, share information and collaboration to optimize the communications can be used to avoid attacks. A collaborative jamming technique is proposed to incre...
Article
Infrared (IR) interferometry is a method for measuring the line-electron density of fusion plasmas. The significant performance achieved by FPGAs in solving digital signal processing tasks advocates the use of this type of technology in two-color IR interferometers of modern stellarators, such as the TJ-II (Madrid, Spain) and the future W7-X (Greif...
Conference Paper
Two modern forecasting methods based on short time series are compared. Results obtained by use of artificial neural nets (ANNs), are contrasted to the ones produced by use of the so called grey theory or Grey Model (GM). Specifically, the Feed-Forward Accommodated for Prediction (FFAP) and the Time Controlled Recurrent (TCR) ANNs are used along wi...
Article
One of the most important problems of WMNs, that is even preventing them from being used in many sensitive applications, is the lack of security. To ensure security of WMNs, two strategies need to be adopted: embedding security mechanisms into the network protocols, and developing efficient intrusion detection and reaction systems. To date, many se...
Conference Paper
Full-text available
This paper presents the system-level simulation platform we have implemented to design and evaluate the SORU reconfigurable vector coprocessor, aimed at enhancing the security of embedded systems. The simulator interfaces a low-level virtual machine (LLVM) with a SystemC TLM 2.0 model of the rest of the system, and a low-level SystemC model of the...
Conference Paper
Full-text available
In this paper, we suggest handling security in embedded systems with reconfigurability. We propose the use of a reconfigurable coprocessor, called SORU2, to generate non-determinism in the execution of cipher algorithms. This makes side-channel attacks based on statistical analysis much more difficult. The experimental results show at least three o...
Article
This work presents the behavioral simulation in an FPGA of a novel processing system for measuring line average electronic density in the TJ-II stellarator diagnostic, Infra-Red Two-Color Interferometer. Line average electronic density is proportional to phase difference between probing and reference signals of the interferometer, as the Appleton–H...
Article
Full-text available
Interferometry is used for measuring line average electronic densities in fusion plasmas. The W7-X stellarator will employ a two-color CO2 (10.591 pm) and CO (5.295 pm) heterodyne-infrared interferometer as an electronic density measurement diagnostic. The frequency displacement is 40 MHz for the CO2 wavelength and 25 MHz for the CO, so these value...
Conference Paper
The area of Human-Machine Interface is growing fast due to its high importance in all technological systems. The basic idea behind designing Human-Machine interfaces is to enrich the communication with the technology in a natural and easy way. Gesture interfaces are a good example of transparent interfaces. Such interfaces must perform the action t...
Conference Paper
Infrared (IR) interferometry is a method for measuring integrated electronic density in fusion plasmas. The great performance achieved by FPGAs in resolving digital signal processing tasks has suggested to use this type of technology in the two-color IR interferometers of the modern stellarators, such as TJ-II and the future interferometer of W7-X....
Conference Paper
Abstract - Binary Decision Diagram (BDD) is binary variant of the data structure called Decision diagram that is aimed to discrete function representation. BDDs algorithms are used as an effective way to represent Boolean functions and are very efficient in terms of space and time complexity. They raised a lot of interest in cryptanalysis of L...
Article
Full-text available
We address the automatic synthesis of DSP algorithms using FPGAs. Optimized fixed-point implementations are obtained by means of considering (i) a multiple wordlength approach; (ii) a complete datapath formed of wordlength-wise resources (i.e., functional units, multiplexers, and registers); (iii) an FPGA-wise resource usage metric that enables...
Conference Paper
Full-text available
In this paper we present the design of a low cost system which automatically controls the air conditioning equipments of a home. The sensors and controllers distributed use Zigbee, a protocol for wireless personal area networks, to communicate themselves. The aim of our design is to facilitate the development of complex smart homes applications, em...
Conference Paper
Full-text available
Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a s...
Conference Paper
In this article we describe SORU, a reconfigurable instruction set processor architecture (RISP) specially designed for run-time self-adaptation in environments with tight resource and power restrictions. It allows to accelerate computationally intensive multimedia processing on portable/embedded devices while maintaining a low energy consumption....
Article
Full-text available
Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a s...
Article
Full-text available
In this work we have presented a genetic algorithm approach for classifying normal connections and intrusions. We have created a serial combination of two light-weight genetic algorithm-based intrusion detection systems where each of the systems exhibits certain deficiency. In this way we have managed to mitigate the deficiencies of both of them. T...
Article
Full-text available
In this paper we address the time-constrained architectural synthesis of fixed-point DSP algorithms using FPGA devices. Optimized fixed-point implementations are obtained by means of considering: (i) a multiple wordlength approach; (ii) a complete datapath formed of wordlength-wise resources (i.e. functional units, multiplexers and registers); and,...
Chapter
The paper presents a serial combination of two genetic algorithm-based intrusion detection systems. Feature extraction techniques are deployed in order to reduce the amount of data that the system needs to process. The designed system is simple enough not to introduce significant computational overhead, but at the same time is accurate, adaptive an...
Conference Paper
Full-text available
This paper represents the first step in an on-going work for designing an unsupervised method based on genetic algorithm for intrusion detection. Its main role in a broader system is to notify of an unusual traffic and in that way provide the possibility of detecting unknown attacks. Most of the machine-learning techniques deployed for intrusion de...
Article
Full-text available
From its introduction in the last decade, affine arithmetic (AA) has shown beneficial properties to speed up the time of computation procedures in a wide variety of areas. In the determination of the optimum set of finite word-lengths of the digital signal processing systems, the use of AA has been recently suggested by several authors, but the exi...
Conference Paper
Full-text available
The long computation times required to simulate complete aircraft configurations re-main as the main bottleneck in the design flow of new structures for the aeronautics in-dustry. In this paper, the novel application of specific hardware (FPGAs) in conjunction with conventional processors to accelerate CFD is explored in detail. First, some general...
Article
From its introduction in the last decade, affine arithmetic (AA) has shown beneficial properties to speed up the time of computation procedures in a wide variety of areas. In the determination of the optimum set of finite word-lengths of the digital signal processing systems, the use of AA has been recently suggested by several authors, but the exi...
Article
Full-text available
Guaranteeing ubiquity and appropriateness of health services provision to the users constitutes a priority issue for the Public Health Authorities. This paper presents an innovative Wireless Personal Area Network architecture that takes advantage of some of the features provided by Intelligent Environments -large number of devices, heterogeneous ne...
Article
Full-text available
The long computation times required to simulate complete aircraft con¯gurations re- main as the main bottleneck in the design °ow of new structures for the aeronautics in- dustry. In this paper, the novel application of speci¯c hardware (FPGAs) in conjunction with conventional processors to accelerate CFD is explored in detail. First, some general...
Article
Full-text available
The care of patients suffering from chronic diseases is a growing source of expense for healthcare services around the world. The implementation of new models for patients’ treatment and follow-up needs to be faced in order to increase patients’ quality of life and to reduce the costs associated. In this paper we propose a point-of-care for home ca...
Article
Traditional approaches for fixed-point characterization are based on long simulations or additive noise models that do not show the nonlinear behavior of the quantization operations in reasonable time. In this paper, a novel interval-based approach that provides both tighter and faster results than the existing approaches is presented. It is based...
Conference Paper
An extensive set of machine learning and pattern classification techniques trained and tested on KDD dataset failed in detecting most of the user-to-root attacks. This paper aims to provide an approach for mitigating negative aspects of the mentioned dataset, which led to low detection rates. Genetic algorithm is employed to implement rules for det...
Conference Paper
A honeypot apparatus, as a perspective security technology has proven itself worth deploying by various malicious records made. The next step in deploying the technology can be an independent hardware device with the incorporated honeypot behaviour. Such a solution would bring an ease in deployment together with a high throughput it would be able t...
Conference Paper
This paper evaluates the cost of encrypted communications for wireless sensor networks with tight resource constraints. We demonstrate that software encryption (3DES, AES, and Blowfish are evaluated) is not generally affordable, and therefore the whole system architecture should take into account that sensor data is not to be trusted. We propose a...
Article
With the expansion of Internet and its importance, the types and number of the attacks have also grown making intrusion detection an increasingly important technique. In this work we have realized a misuse detection system based on genetic algorithm (GA) approach. For evolving and testing new rules for intrusion detection the KDD99Cup training and...
Article
In this paper, we present two new hardware architectures that implement the Smith–Waterman algorithm for DNA sequence alignment. Previous low-cost approaches based on Field Programmable Gate Array (FPGA) technology are reviewed in detail and then improved with the goal of increased performance at the same cost (i.e., area). This goal is achieved th...
Article
The RC4 is a stream cipher widely deployed in software applications due to its simplicity and efficiency. The paper presents a cryptanalytic attack that employs the tree representation of this cipher and introduces an abstraction in the form of general conditions for managing the information about its internal state. In order to find the initial st...
Article
In this paper we address the synthesis of digital signal processing cores, aiming at FPGAs with heterogeneous resources. A novel synthesis procedure able to distribute the usage of logic-based and embedded resources is presented. A multiple word-length approach is taken since it has proven to provide significant area saving when compared to the tra...
Conference Paper
In this paper we address the high-level synthesis of multiple word-length DSP algorithms over programmable devices (FPGAs). Previous approaches tend to simplify the set of resources, thus alleviating the complexity of the high-level synthesis, but leading to non-optimal solutions. Here, we present a high-level synthesis framework that overcomes the...
Article
Full-text available
This paper presents an approach to design Electronic Systems Curricula for making electronics more appealing to students. Since electronics is an important grounding for other disciplines (computer science, signal processing, and communications), this approach proposes the development of multidisciplinary projects using the project-based learning (...
Article
Full-text available
In this brief, we address the combined application of word-length allocation and architectural synthesis of linear time-invariant digital signal processing systems. These two design tasks are traditionally performed sequentially, thus lessening the overall design complexity, but ignoring forward and backward dependencies that may lead to cost reduc...
Article
FPGAs have been successfully applied for cryptanalytic purposes, particularly in exhaustive key search that is a highly parallelizable task. In this work, we consider a pseudorandom generator scheme that consists of a number of subgenerators, the first of which is a linear feedback shift register (LFSR). LFSR is often used in cipher systems because...
Article
Full-text available
This paper presents a system based on ambient intelligence (AmI) to foster home care monitoring of senior citizens and chronically ill patients. The most important fact addressed in this research is the development of non intrusive and easy to use sensing devices. According to this, medical tests do not need user collaboration to perform them, neit...
Article
Masquerading attack is one of the most dangerous system intrusions. It is very hard to detect this attack, especially in real time for actual network speed rates. In this work the software and hardware approaches for the detection of attacker are analyzed. It is observed that the software solution could not easily reach the necessary rates and the...
Article
The paper describes FPGA architectures that are designed for intrusion detection systems (IDS). It is demonstrated that the application of genetic programming and bioinformatics algorithms can substantially increase the performances of IDS. The parallelisation of algorithms leads to Gigabit data processing rates that are necessary today. Each proce...
Article
Full-text available
Division is one of the basic operations of arithmetic algorithms, but the cost associated to its hardware implementation exceeds the reasonable limits for most dedicated architectures. This paper provides a systematic algorithm that (a) transforms the constant coefficient division into a constant coefficient multiplication, selectable under some gi...
Article
Information text data retrieval requires a tremendous amount of processing time because of the size of the data and the complexity of information retrieval algorithms. In this paper the solution to this problem is proposed via hardware supported information retrieval algorithms. Reconfigurable computing may adopt frequent hardware modifications thr...
Article
Constant coefficient division is a linear operation widely used in digital signal processing algorithms, but the cost associated to its hardware implementation exceeds the reasonable limits for most dedicated architectures. This paper proposes a novel algorithm that compensates the effects of the quantization operations, inherent to the implemented...
Article
Full-text available
In this paper we present novel approaches in hardware deployment for intrusion detection systems (IDS). As far as we know there are no published FPGA implementations of genetic programming and bioinformatics algorithms used for IDS. It is shown in the paper that the use of hardware can efficiently exploit the inherent parallelism of algorithms and...
Conference Paper
The amount of biological information is exponentially increasing, and is exceeding the rate at which computer software can facilitate making sense of the data. Our intention is to enable the use of sensitive algorithms in computational biology exploiting in hardware the inherent parallelism that dynamic programming offers. In this work besides the...
Conference Paper
Hardware implementation of arithmetic modules is a time-consuming task. Consequently, there is a demand for CAD tools that help the designer in reducing design times. This paper presents a floating-point module generator that allows user specification of the mantissa, exponent bit-width and clock period. This tool generates synthesizable VHDL code...
Conference Paper
Full-text available
One of the main challenges in bioinformatics nowadays is to create a framework to compare efficiently new DNA sequence information to large existing sequence and structure databases. Optimal methods, such as the Smith-Waterman algorithm, provide more sensitive results than heuristic algorithms such as the Dot matrix plot, FASTA and BLAST, with the...
Conference Paper
Full-text available
Modern analysis of the finite word-length properties of DSP algorithms is typically carried out using CAD tools. The objectives of this paper are threefold: (i) to show that affine arithmetic is specially well-suited for quantization analysis of digital filters; (ii) to present a new tool based on multiple- precision affine arithmetic elements that...
Conference Paper
One of the main challenges in bioinformatics nowadays is to create a framework to compare efficiently new DNA sequence information to large existing databases. Optimal methods, such as the Smith-Waterman algorithm, provides more sensitive results than heuristic algorithms such as FASTA and BLAST, with the drawback of increased computational complex...
Conference Paper
This work describes a domotic system (VESTA) oriented to low to medium rate domotic wireless applications, multi-interface communication gateway, low power and low cost, open code based software, micro Web server implemented and with distributed intelligence between its two types of components: the processing platform, Antares and the remote module...
Article
Full-text available
The RC4 stream cipher, widely used in telecommunication systems, is analysed by a new cryptanalytic algorithm, which exploits the combinatorial nature of the RC4 to reduce the search space over the exhaustive search. This algorithm finds the initial state of the RC4 using a small segment of output stream by collecting the information available at g...
Article
Pseudorandom generator schemes containing irregularly clocked linear feedback shift-registers (LFSRs) are widely used because of long period and large linear complexity of their output sequences. A cryptanalytic attack on such schemes that utilizes the divide-and-conquer paradigm can be based on the solution of the edit-distance problem. In this wo...
Chapter
In this paper we propose a method to develop low-cost training FPGA-based boards for fast prototyping of digital circuits aiming ease of use. This method allows the implementation of prototyping boards targeting all Xilinx FPGA families including SPARTAN-III and VIRTEX-II PRO. The board configuration is carried out in serial mode (master and slave)...
Conference Paper
This paper presents a novel approach for the evaluation of the finite word-length performance of DSP structures. Realizations are simulated using interval arithmetic with support for feedback loops, thus allowing fast characterization of the overflow behavior and the quantization effects. When this technique is applied to unquantized and quantized...
Conference Paper
This paper presents a new method for computing the absolute noise bounds caused by quantization of coefficients and signals in fixed-point implementation of digital filters. A tool based on refined interval-based computations has been enhanced to calculate with reduced computational cost the implications of both effects in the finite wordlength beh...
Article
Full-text available
In this paper, distributed services over heterogeneous networks targeted to increasing mobile populations are analyzed from the basis of a new conceptual model. This model considers that the intelligence of the service should reside in the elements connected to the network rather than in the network access facilities provided by the telecommunicati...