Artículos (Ingeniería Telemática)

URI permanente para esta colecciónhttps://hdl.handle.net/11441/11387

Examinar

Envíos recientes

Mostrando 1 - 20 de 41
  • Acceso AbiertoArtículo
    Supporting VoIP communication in IEEE 802.11ax networks: A new admission control and scheduling resource allocation scheme
    (Elsevier, 2024-08) Estepa Alonso, Rafael María; Davis, Mark; Mayor Gallego, Vicente Jesús; Estepa Alonso, Antonio José; Universidad de Sevilla. Departamento de Ingeniería Telemática; Universidad de Sevilla; Universidad de Sevilla. TIC154: Departamento de Ingeniería Telemática.
    The current IEEE 802.11ax standard enhances Wi-Fi networks with a series of new features, such as multi-user (MU) transmission, an Orthogonal Frequency Division Multiple Access (OFDMA) scheme and the ability to multiplex traffic from different access categories (ACs). These features can be utilized to enhance the QoS support for VoIP traffic and optimize the usage of IEEE 802.11ax network resources. This work proposes a new scheme to multiplex VoIP calls in IEEE 802.11ax MU frames and a new scheduler and resource allocation algorithm specifically designed for VoIP data traffic. Our scheduler allocates VoIP packets requiring longer transmission times into the same frame(s), minimizing the channel air-time assigned to VoIP transmission. In addition, unused radio resources in the MU frame are leveraged to transmit best-effort packets along with VoIP packets. For completeness, we also define a call admission control (CAC) algorithm that anticipates channel saturation conditions to ensure VoIP users can maintain a guaranteed level of QoS. Based on simulation results, our scheme is more efficient in reducing channel utilization than other schedulers such as multi-user roundrobin (RR) (implemented by ns-3) or single-user FIFO. For example, for 30 VoIP stations using the G.711 codec under mixed channel conditions, our scheme reduces by 30% the air-time required to transmit VoIP packets. When coupled with the ability to also send best-effort packets along with VoIP packets, this translates into a higher throughput (i.e. 10 Mbit/s vs 4 Mbit/s) and more simultaneous VoIP users with guaranteed QoS (up to 46 VoIP users vs 26 and 28 users for the multi-user RR and single-user FIFO scheduling algorithms, respectively).
  • Acceso AbiertoArtículo
    Smart home anomaly-based IDS: architecture proposal and case study
    (Elsevier, 2023) Lara Romero, Agustín Walabonso; Mayor Gallego, Vicente Jesús; Estepa Alonso, Rafael María; Estepa Alonso, Antonio José; Díaz Verdejo, Jesús; Universidad de Sevilla. Departamento de Ingeniería Telemática; Ministerio de Ciencia e Innovación (MICIN). España; Agencia Estatal de Investigación. España; Fondo Europeo de Desarrollo Regional (FEDER); Consejería de Transformación Económica, Industria, Conocimiento y Universidades. Junta de Andalucía; Universidad de Sevilla. TIC154: Departamento de Ingeniería Telemática
    The complexity and diversity of the technologies involved in the Internet of Things (IoT) challenge the generalization of security solutions based on anomaly detection, which should fit the particularities of each context and deployment and allow for performance comparison. In this work, we provide a flexible architecture based on building blocks suited for detecting anomalies in the network traffic and the application-layer data exchanged by IoT devices in the context of Smart Home. Following this architecture, we have defined a particular Intrusion Detector System (IDS) for a case study that uses a public dataset with the electrical consumption of 21 home devices over one year. In particular, we have defined ten Indicators of Compromise (IoC) to detect network attacks and two anomaly detectors to detect false command or data injection attacks. We have also included a signature-based IDS (Snort) to extend the detection range to known attacks. We have reproduced eight network attacks (e.g., DoS, scanning) and four False Command or Data Injection attacks to test our IDS performance. The results show that all attacks were successfully detected by our IoCs and anomaly detectors with a false positive rate lower than 0.3%. Signature detection was able to detect only 4 out of 12 attacks. Our architecture and the IDS developed can be a reference for developing future IDS suited to different contexts or use cases. Given that we use a public dataset, our contribution can also serve as a baseline for comparison with new techniques that improve detection performance.
  • Acceso AbiertoArtículo
    Blockchain-Based Service-Oriented Architecture for Consent Management, Access Control, and Auditing
    (Institute of Electrical and Electronics Engineers Inc., 2023) Román Martínez, Isabel; Calvillo Arbizu, Jorge; Mayor Gallego, Vicente Jesús; Madinabeitia Luque, Germán; Estepa Alonso, Antonio José; Estepa Alonso, Rafael María; Universidad de Sevilla. Departamento de Ingeniería Telemática; Ministerio de Ciencia e Innovación; Universidad de Sevilla. TIC154: Departamento de Ingeniería Telemática
    Continuity of care requires the exchange of health information among organizations and care teams. The EU General Data Protection Regulation (GDPR) establishes that subject of care should give explicit consent to the treatment of her personal data, and organizations must obey the individual’s will. Nevertheless, few solutions focus on guaranteeing the proper execution of consents. We propose a serviceoriented architecture, backed by blockchain technology, that enables: (1) tamper-proof and immutable storage of subject of care consents; (2) a fine-grained access control for protecting health data according to consents; and (3) auditing tasks for supervisory authorities (or subjects of care themselves) to assess that healthcare organizations comply with GDPR and granted consents. Standards for health information exchange and access control are adopted to guarantee interoperability. Access control events and the subject of care consents are maintained on a blockchain, providing a trusted collaboration between organizations, supervisory authorities, and individuals. A prototype of the architecture has been implemented as a proof of concept to evaluate the performance of critical components. The application of subject of care consent to control the treatment of personal health data in federated and distributed environments is a pressing concern. The experimental results show that blockchain can effectively support sharing consent and audit events among healthcare organizations, supervisory authorities, and individuals.
  • Acceso AbiertoArtículo
    CO-CAC: A new approach to Call Admission Control for VoIP in 5G/WiFi UAV-based relay networks
    (Elsevier, 2023-01) Mayor Gallego, Vicente Jesús; Estepa Alonso, Rafael María; Estepa Alonso, Antonio José; Universidad de Sevilla. Departamento de Ingeniería Telemática; Universidad de Sevilla. TIC154: Ingeniería Telemática.
    Voice over IP (VoIP) requires a Call Admission Control (CAC) mechanism in WiFi networks to preserve VoIP packet flows from excessive network delay or packet loss. Ideally, this mechanism should be integrated with the operational scenario, guarantee the quality of service of active calls, and maximize the number of concurrent calls. This paper presents a novel CAC scheme for VoIP in the context of a WiFi access network deployed with Unmanned Aerial Vehicles (UAVs) that relay to a backhaul 5G network. Our system, named Codec-Optimization CAC (CO-CAC), is integrated into each drone. It intercepts VoIP call control messages and decides on the admission of every new call based on a prediction of the WiFi network’s congestion level and the minimum quality of service desired for VoIP calls. To maximize the number of concurrent calls, CO-CAC proactively optimizes the codec settings of active calls by exchanging signaling with VoIP users. We have simulated CO-CAC in a 50 m 50 m scenario with four UAVs providing VoIP service to up to 200 ground users with IEEE 802.11ac WiFi terminals. Our results show that without CAC, the number of calls that did not meet a minimum quality level during the simulation was 10% and 90%, for 50 and 200 users, respectively. However, when CO-CAC was in place, all calls achieved minimum quality for up to 90 users without rejecting any call. For 200 users, only 25% of call attempts were rejected by the admission control scheme. These results were narrowly worse when the ground users moved randomly in the scenario.
  • Acceso AbiertoArtículo
    Aproximación metodológica al diseño de un sistema de teleasistencia para pacientes en prediálisis y diálisis peritoneal
    (Elsevier, 2014-03) Calvillo Arbizu, Jorge; Roa Romero, Laura María; Milán Martín, Jose Antonio; Aresté Fosalba, Nuria; Tornero Molina, Fernando; Macía Heras, Manuel; Vega Díaz, Nicanor; Universidad de Sevilla. Departamento de Ingeniería de Sistemas y Automática; Universidad de Sevilla. Departamento de Ingeniería Telemática; Instituto de Salud Carlos III; CIBER-BBN; Universidad de Sevilla. TIC203: Ingeniería Biomédica
    Antecedentes: Un importante obstáculo que dificulta el despliegue de soluciones tecnológicas en sanidad es el rechazo que encuentran los sistemas desarrollados por los usuarios que tienen que utilizarlos (ya sean profesionales sanitarios o pacientes), que consideran que no se adaptan a sus necesidades reales. Objetivos: (1) Diseñar una arquitectura tecnológica para la asistencia remota de pacientes nefrológicos aplicando una metodología que prime la implicación de los usuarios (profesionales y pacientes) en todo el diseño y desarrollo; (2) ilustrar cómo las necesidades de los usuarios pueden ser recogidas y respondidas mediante la tecnología, aumentando el nivel de aceptación de los sistemas finales. Métodos: Para obtener las principales necesidades que existen actualmente en Nefrología se implicó a un conjunto de servicios españoles de la especialidad. Se realizó una recogida de necesidades mediante entrevistas semiestructuradas al equipo médico y cuestionarios a profesionales y pacientes. Resultados: Se extrajeron un conjunto de requisitos tanto de profesionales como de pacientes y, paralelamente, el grupo de ingenieros biomédicos identificó requisitos de la asistencia remota de pacientes desde un punto de vista tecnológico. Todos estos requisitos han dado pie al diseño de una arquitectura modular para la asistencia remota de pacientes en diálisis peritoneal y prediálisis. Conclusiones: Este trabajo ilustra cómo es posible implicar a los usuarios en todo el proceso de diseño y desarrollo de un sistema. Fruto de este trabajo es el diseño de una arquitectura modular adaptable para asistencia remota de pacientes nefrológicos respondiendo a las preferencias y necesidades de los usuarios pacientes y profesionales consultados.
  • Acceso AbiertoArtículo
    Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids
    (Institute of Electrical and Electronics Engineers Inc., 2011-03) Calvillo Arbizu, Jorge; Román Martínez, Isabel; Rivas Rivas, Sergio; Roa Romero, Laura María; Universidad de Sevilla. Departamento de Ingeniería de Sistemas y Automática; Universidad de Sevilla. Departamento de Ingeniería Telemática; CIBER-BBN; Instituto de Salud Carlos III; Universidad de Sevilla. TIC203: Ingeniería Biomédica
    This paper is focused on the management of virtual organizations (VO) inside healthcare environments where grid technology is used as middleware for a healthcare services-oriented architecture (HSOA). Some of the main tasks considered for the provision of an efficient VOmanagement aremanagement of users, assignation of roles to users, assignation of privileges to roles, and definition of resources access policies. These tasks are extremely close to privilege management infrastructures (PMI), so we face VOmanagement services as part of the PMI supporting access control to healthcare resources inside the HSOA. In order to achieve a completely open and interoperable PMI, we review and apply standards of security and architectural design. Moreover, semantic technologies are introduced in decision points for access control allowing the management of a high degree of descriptors by means of ontologies and infer the decision making through rules and reasoners.
  • Acceso AbiertoArtículo
    Easing the development of healthcare architectures following RM-ODP principles and healthcare standards
    (Elsevier, 2013-03) Calvillo Arbizu, Jorge; Román Martínez, Isabel; Rivas Rivas, Sergio; Roa Romero, Laura María; Universidad de Sevilla. Departamento de Ingeniería de Sistemas y Automática; Universidad de Sevilla. Departamento de Ingeniería Telemática; CIBER-BBN; Instituto de Salud Carlos III; European Commission (EC). Fondo Europeo de Desarrollo Regional (FEDER); Universidad de Sevilla. TIC203: Ingeniería Biomédica
    RM-ODP has been widely accepted and used in the field of system and software model engineering and of enterprise computing within different environments. One of these specific domains is healthcare, in which the international standard Health Information Services Architecture (HISA) is applied under the directives of RM-ODP. HISA presents a flexible architecture identifying common use cases, actors, information, and services and easing its extension with specific services, systems and information. The HISA standard follows system specification through the RM-ODP viewpoints but it does not consider other features of the reference model, such as the Enterprise language or the UML4ODP specification. In this paper, we introduce the rationale and specification of the three technology-independent viewpoints of an HISA-based architecture conforming to RM-ODP and UML4ODP. Moreover, we evaluate how easy it is to extend this architecture to introduce specific services and elements. As proof of concept we explore security and privacy issues (i.e., requirements, actors, information objects, etc.) and enrich the architecture with suitable objects and services, mainly from access control standardization efforts. In addition, a detailed discussion about the divergences between RM-ODP and HISA is presented. The main contribution of our work is to develop (guided by RM-ODP, HISA, and other standards) a methodology and tools allowing healthcare service developers and designers to build solutions conforming to standards and leveraging the benefits of distribution and interoperability. These tools consist of the specification of three technology-independent viewpoints according to the guidelines of HISA, RM-ODP and UML4ODP for the healthcare domain, and they will be freely available. In parallel, these viewpoints are extended with access control issues, and the adequacy of the HISA extension mechanism is evaluated.
  • Acceso AbiertoArtículo
    Empowering citizens with access control mechanisms to their personal health resources
    (Elsevier, 2013-01) Calvillo Arbizu, Jorge; Román Martínez, Isabel; Roa Romero, Laura María; Universidad de Sevilla. Departamento de Ingeniería de Sistemas y Automática; Universidad de Sevilla. Departamento de Ingeniería Telemática; CIBER-BBN; Instituto de Salud Carlos III; European Commission (EC). Fondo Europeo de Desarrollo Regional (FEDER); Universidad de Sevilla. TIC203: Ingeniería Biomédica
    Background: Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. Purpose: We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen’s health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Methods: Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms are essential keys for this approach and they are accomplished by using semantic technologies (i.e., ontologies, rule languages, and inference engines). Results: The results are mainly focused on the security and access control of the proposed scenario. An ontology has been designed and developed for the POVO covering the terminology of the scenario and easing the automation of administration tasks. Over that ontology, an access control mechanism based on rule languages allows specifying access control policies, and an inference engine performs the decision making process automatically. The usability of solutions to ease administration tasks to the SoC is improved by the Me-As-An-Admin (M3A) application. This guides the SoC through the specification of personal access control policies to his/her distributed resources by using semantic technologies (e.g., metamodeling, model-to-text transformations, etc.). All results are developed as services and included in an architecture in accordance with standards and principles of openness and interoperability. Conclusions: Current technology can bring health, social and well-being care actually centered on citizens, and granting each person the management of his/her health information. However, the application of technology without adopting methodologies or normalized guidelines will reduce the interoperability of solutions developed, failing in the development of advanced services and improved scenarios for health delivery. Standards and reference architectures can be cornerstones for future-proof and powerful developments. Finally, not only technology must follow citizen-centric approaches, but also the gaps needing legislative efforts that support these new paradigms of healthcare delivery must be identified and addressed.
  • Acceso AbiertoArtículo
    Does the Kidney Donor Profile Index (KDPI) predict graft and patient survival in a Spanish population?
    (Elsevier, 2018) Calvillo Arbizu, Jorge; Pérez Valdivia, Miguel Angel; Gentil Govantes, Miguel Ángel; Castro de la Nuez, Pablo; Mazuecos Blanca, Auxiliadora; Rodríguez Benot, Alberto; Gracia Guindo, María; Borrego Utiel, Francisco; Cabello Díaz, Mercedes; Bedoya Pérez, Rafael; Alonso Gil, Manuel; Salgueira Lazo, Mercedes; Roa Romero, Laura María; Universidad de Sevilla. Departamento de Ingeniería de Sistemas y Automática; Universidad de Sevilla. Departamento de Ingeniería Telemática; Fondo de Investigación Sanitaria; Universidad de Sevilla. TIC203: Ingenieria Biomedica
    Background and objective: The Kidney Donor Profile Index (KDPI), together with other donor and recipient variables, can optimise the organ allocation process. This study aims to check the feasibility of the KDPI for a Spanish population and its predictive ability of graft and patient survival. Materials and methods: Data from 2734 kidney transplants carried out in Andalusia between January 2006 and December 2015 were studied. Cases were grouped by recipient age, categorised by KDPI quartile and both graft and patient survival were compared among groups. Results: The KDPI accurately discriminated optimal organs from suboptimal or marginal ones. For adult recipients (aged: 18–59 years) it presents a hazard ratio of 1.013 (P < 0.001) for death-censored graft survival and of 1.013 (P = 0.007) for patient survival. For elderly recipients (aged: 60+ years), KDPI presented a hazard ratio of 1.016 (P = 0.001) for death-censored graft survival and of 1.011 (P = 0.0007) for patient survival. A multivariate analysis identified the KDPI, donor age, donation after circulatory death, recipient age and gender as predictive factors of graft survival. Conclusions: The results obtained show that the KDPI makes it possible to relate the donor’s characteristics with the greater or lesser survival of the graft and the patient in the Spanish population. However, due to certain limitations, a new index for Spain based on Spanish or European data should be created. In this study, some predictive factors of graft survival are identified that may serve as a first step in this path.
  • Acceso AbiertoArtículo
    User-centred design for developing e-Health system for renal patients at home (AppNephro)
    (Elsevier, 2019-05) Calvillo Arbizu, Jorge; Roa Romero, Laura María; Estudillo Valderrama, Miguel Ángel; Salgueira Lazo, Mercedes; Aresté Fosalba, Nuria; del Castillo Rodríguez, Nieves; González Cabrera, Fayna; Marrero Robayna, Silvia; López de la Manzana, Virginia; Román Martínez, Isabel; Universidad de Sevilla. Departamento de Ingeniería de Sistemas y Automática; Universidad de Sevilla. Departamento de Ingeniería Telemática; Universidad de Sevilla. TIC203: Ingeniería Biomédica
    Background Despite the promising benefits of the e-Health approaches (including provide technology-based healthcare services to anyone, anytime, and anywhere), few solutions are adopted in daily practice. User acceptance is one of the major obstacles that hinder the success of technology approaches. End-users often stress misalignments among their problems and the solutions that technology systems aim to solve. In other cases, systems developed are unfriendly or unadjusted to the daily practice of clinicians or patient’s life. To maximize user acceptance, the relevance of adopting user-centred design and development techniques is well-known. However, users are often assumed to be a homogeneous group with the same set of requirements, what leads to an ineffective identification and addressment of user requirements. Furthermore, usability and accessibility issues must be carefully addressed to guarantee also the right alignment of solutions with user needs. Objective to develop an e-Health system for renal patients at home by adopting user-centred design practices, usability and accessibility standards. Material and methods users were categorized in four different groups (i.e., digital patients/caregivers, non-digital patients/caregivers, clinicians and nurses) and a sample was included in the design and development team. Questionnaires and interviews were used to identify user requirements and assess prototypes. Results Requirements were considered for every kind of user, what resulted on a multi-faceted e-Health system implying different technologies and functionalities regarding to each target user. Conclusion Identification and continuous involvement of all kind of users allow their needs to be properly understood and addressed by technology, raising user acceptance of the final product.
  • Acceso AbiertoArtículo
    Comparative Study of the Impact of Human Leukocyte Antigens on Renal Transplant Survival in Andalusia and the United States
    (MDPI, 2023) Talaminos Barroso, Alejandro; Reina Tosina, Luis Javier; Roa Romero, Laura María; Calvillo Arbizu, Jorge; Pérez Valdivia, Miguel Angel; Medina, Rafael; Rocha Castilla, José Luis; Castro de la Nuez, Pablo; Universidad de Sevilla. Departamento de Teoría de la Señal y la Comunicación; Universidad de Sevilla. Departamento de Ingeniería Telemática; Fundación Mutua Madrileña, Proyecto VÍA-RENAL; Junta de Andalucía, Consejería de Conocimiento, Investigación y Universidad; Universidad de Sevilla. TIC203: Ingeniería Biomédica
    Renal transplantation is the treatment of choice for patients suffering from chronic renal disease, one of the leading causes of death worldwide. Among the biological barriers that may increase the risk of acute renal graft rejection is the presence of human leukocyte antigen (HLA) incompatibilities between donor and recipient. This work presents a comparative study of the influence of HLA incompatibilities on renal transplantation survival in the Andalusian (South of Spain) and United States (US) population. The main objective is to analyse the extent to which results about the influence of different factors on renal graft survival can be generalised to different populations. The Kaplan–Meier estimator and the Cox model have been used to identify and quantify the impact on the survival probability of HLA incompatibilities, both in isolation and in conjunction with other factors associated with the donor and recipient. According to the results obtained, HLA incompatibilities considered in isolation have negligible impact on renal survival in the Andalusian population and a moderate impact in the US population. Grouping by HLA score presents some similarities for both populations, while the sum of all HLA scores (aHLA) only has an impact on the US population. Finally, the graft survival probability of the two populations differs when aHLA is considered in conjunction with blood type. The results suggest that the disparities in the renal graft survival probability between the two populations under study are due not only to biological and transplantation-associated factors, but also to social–health factors and ethnic heterogeneity between populations.
  • Acceso AbiertoArtículo
    How technology is empowering patients? A literature review
    (John Wiley & Sons Ltd, 2013) Calvillo Arbizu, Jorge; Román Martínez, Isabel; Roa Romero, Laura María; Universidad de Sevilla. Departamento de Ingeniería de Sistemas y Automática; Universidad de Sevilla. Departamento de Ingeniería Telemática; Universidad de Sevilla. TIC203: Ingeniería Biomédica
    Background The term ‘Patient Empowerment’ (PE) is a growing concept – so in popularity as in application – covering situations where citizens are encouraged to take an active role in the management of their own health. This concept is serving as engine power for increasing the quality of health systems, but a question is still unanswered, ‘how PE will be effectively achieved?’ Beyond psychological implications, empowerment of patients in daily practice relies on technology and the way it is used. Unfortunately, the heterogeneity of approaches and technologies makes difficult to have a global vision of how PE is being performed. Objective To clarify how technology is being applied for enhancing patient empowerment as well as to identify current (and future) trends and milestones in this issue. Search strategy Searches for relevant English language articles using Medline, Scopus, ACM Digital Library, Springer Link, EBSCO host and ScienceDirect databases from the year 2000 until October 2012 were conducted. Among others, a selection criterion was to review articles including terms ‘patient’ and ‘empowerment’ in title, abstract or as keywords. Main results and conclusions Results state that practical approaches to empower patients vary in scope, aim and technology. Health literacy of patients, remote access to health services, and self-care mechanisms are the most valued ways to accomplish PE. Current technology already allows establishing the first steps in the road ahead, but a change of attitude by all stakeholders (i.e. professionals, patients, policy makers, etc.) is required.
  • Acceso AbiertoArtículo
    Improving adult day services through technology: a user-based approach
    (The Institution of Engineering and Technology (IET), 2017-04) Calvillo Arbizu, Jorge; Roa Romero, Laura María; Estudillo Valderrama, Miguel Ángel; Vera Vera, Joaquín; Universidad de Sevilla. Departamento de Ingeniería de Sistemas y Automática; Universidad de Sevilla. Departamento de Ingeniería Telemática; CIBER-BBN; Instituto de Salud Carlos III; European Commission (EC). Fondo Europeo de Desarrollo Regional (FEDER); Universidad de Sevilla. TIC203: Ingeniería Biomédica
    Adult day services (ADS) are receiving increased attention due to shifts in health and social policies encouraging home and community-based services for an aging population. However, some issues hinder ADS effectiveness such as the need of diversification of interventions focused on elderly people (with different needs and dependency levels) or the undertrained staff. This work presents an analysis of current ADS gaps from interviews to Spanish geriatric experts and scientific literature. An innovative user-based technology implementation is approached to address the most relevant missing gaps identified: formal assessment of user's skills and status before joining the ADS, establishment of personalised interventions for each user, user classification on groups according to characteristics of user members etc. This approach allows to assess elderly over time to generate knowledge about his/her psychological and physical conditions and about the general factors that accelerate/delay deterioration caused by age.
  • Acceso AbiertoArtículo
    A Sensor-Based mHealth Platform for Remote Monitoring and Intervention of Frailty Patients at Home
    (MDPI, 2021-11) Calvillo Arbizu, Jorge; Naranjo Hernández, David; Barbarov-Rostán, Gerardo; Talaminos Barroso, Alejandro; Roa Romero, Laura María; Reina Tosina, Luis Javier; Universidad de Sevilla. Departamento de Ingeniería Telemática; Universidad de Sevilla. Departamento de Teoría de la Señal y Comunicaciones; Junta de Andalucía; Universidad de Sevilla. TIC203: Ingeniería Biomédica
    Frailty syndrome is an independent risk factor for serious health episodes, disability, hospitalization, falls, loss of mobility, and cardiovascular disease. Its high reversibility demands personalized interventions among which exercise programs are highly efficient to contribute to its delay. Information technology-based solutions to support frailty have been recently approached, but most of them are focused on assessment and not on intervention. This paper describes a sensor-based mHealth platform integrated in a service-based architecture inside the FRAIL project towards the remote monitoring and intervention of pre-frail and frail patients at home. The aim of this platform is constituting an efficient and scalable system for reducing both the impact of aging and the advance of frailty syndrome. Among the results of this work are: (1) the development of elderly-focused sensors and platform; (2) a technical validation process of the sensor devices and the mHealth platform with young adults; and (3) an assessment of usability and acceptability of the devices with a set of pre-frail and frail patients. After the promising results obtained, future steps of this work involve performing a clinical validation in order to quantify the impact of the platform on health outcomes of frail patients.
  • Acceso AbiertoArtículo
    Deployment of UAV-mounted Access Points for VoWiFi Service with guaranteed QoS
    (Elsevier, 2022-09-01) Mayor Gallego, Vicente Jesús; Estepa Alonso, Rafael María; Estepa Alonso, Antonio José; Madinabeitia Luque, Germán; Universidad de Sevilla. Departamento de Ingeniería Telemática; Universidad de Sevilla. TIC154: Departamento de Ingeniería Telemática
    Unmanned Aerial Vehicle (UAV) networks have emerged as a promising means to provide wireless coverage in open geographical areas. Nevertheless, in wireless networks such as WiFi, signal coverage alone is insufficient to guarantee that network performance meets the quality of service (QoS) requirements of real-time communication services, as it also depends on the traffic load produced by ground users sharing the medium access. We formulate a new problem for UAVs optimal deployment in which the QoS level is guaranteed for real-time voice over WiFi (VoWiFi) communications. More specifically, our goal is to dispatch the minimum number of UAVs possible to provide VoWiFi service to a set of ground users subject to coverage, call-blocking probability, and QoS constraints. Optimal solutions are found using well-known heuristics that include K-means clusterization and genetic algorithms. Via numerical results, we show that the WiFi standard revision (e.g. IEEE 802.11a/b/g/n/ac) in use plays an important role in both coverage and QoS performance and hence, in the number of UAVs required to provide the service.
  • Acceso AbiertoArtículo
    RPL Cross-Layer Scheme for IEEE 802.15.4 IoT Devices With Adjustable Transmit Power
    (Institute of Electrical and Electronics Engineers Inc., 2021) Estepa Alonso, Rafael María; Estepa Alonso, Antonio José; Madinabeitia Luque, Germán; García, Ernesto; Universidad de Sevilla. Departamento de Ingeniería Telemática
    We propose a novel cross-layer scheme to reduce energy consumption in wireless sensor networks composed of IEEE 802.15.4 IoT devices with adjustable transmit power. Our approach is based on the IETF’s Routing Protocol for Low power and lossy networks (RPL). Nodes discover neighbors and keep fresh link statistics for each available transmit power level. Using the product of ETX and local transmit power level as a single metric, each node selects both the parent that minimizes the energy for packet transmission along the path to the root and the optimal local transmit power to be used. We have implemented our cross-layer scheme in NG-Contiki using the Z1 mote and two transmit power levels (55mW and 31mW). Simulations of a network of 15 motes show that (on average) 66% of nodes selected the low-power setting in a 25 m × 25 m area. As a result, we obtained an average reduction of 25% of the energy spent on transmission and reception of packets compared to the standard RPL settings where all nodes use the same transmit power level. In large scenarios (e.g., 150 m × 150 m and 40-100 motes), our approach provides better results in dense networks where reducing the transmit power of nodes does not translate into longer paths to the root nor degraded quality of service.
  • Acceso AbiertoArtículo
    QoS-Aware Multilayer UAV Deployment to Provide VoWiFi Service over 5G Networks
    (WILEY-HINDAWI, 2022-01) Mayor Gallego, Vicente Jesús; Estepa Alonso, Rafael María; Estepa Alonso, Antonio José; Universidad de Sevilla. Departamento de Ingeniería Telemática
    Drones equipped with wireless network cards can provide communication services in open areas. This paper proposes a hierarchical two-layered network architecture with two types of drones according to their communication equipment: Access and Distribution. While access drones provide WiFi access to ground users, distribution drones act as WiFi-to-5G relay forwarding packets into the 5G Core Network. In this context, we formulate a novel optimization problem for the 3-D initial placement of drones to provide Voice over WiFi (VoWiFi) service to ground users. Our optimization problem finds the minimum number of drones (and their type and location) to be deployed constrained to coverage and minimum voice speech quality. We have used a well-known metaheuristic algorithm (Particle Swarm Optimization) to solve our problem, examining the results obtained for different terrain sizes (from 25m x 25m to 100m x 100m ) and ground users (from 10 to 100 ). In the most demanding case, we were able to provide VoWiFi service with four distribution drones and five access drones. Our results show that the overall number of UAVs deployed grows with the terrain size (i.e., with users’ sparsity) and the number of ground users.
  • Acceso AbiertoArtículo
    On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks
    (MDPI, 2022) Díaz Verdejo, Jesús; Muñoz Calle, Francisco Javier; Estepa Alonso, Antonio José; Estepa Alonso, Rafael María; Madinabeitia Luque, Germán; Universidad de Sevilla. Departamento de Ingeniería Telemática; TIC154: Departamento de Ingeniería Telemática
    Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have been pre-established. SIDS include standard packages of detection rulesets, but only those rules suited to the operational environment should be activated for optimal performance. However, some organizations might skip this tuning process and instead activate default off-the-shelf rulesets without understanding its implications and trade-offs. In this work, we help gain insight into the consequences of using predefined rulesets in the performance of SIDS. We experimentally explore the performance of three SIDS in the context of web attacks. In particular, we gauge the detection rate obtained with predefined subsets of rules for Snort, ModSecurity and Nemesida using seven attack datasets. We also determine the precision and rate of alert generated by each detector in a real-life case using a large trace from a public webserver. Results show that the maximum detection rate achieved by the SIDS under test is insufficient to protect systems effectively and is lower than expected for known attacks. Our results also indicate that the choice of predefined settings activated on each detector strongly influences its detection capability and false alarm rate. Snort and ModSecurity scored either a very poor detection rate (activating the less-sensitive predefined ruleset) or a very poor precision (activating the full ruleset). We also found that using various SIDS for a cooperative decision can improve the precision or the detection rate, but not both. Consequently, it is necessary to reflect upon the role of these open-source SIDS with default configurations as core elements for protection in the context of web attacks. Finally, we provide an efficient method for systematically determining which rules deactivate from a ruleset to significantly reduce the false alarm rate for a target operational environment. We tested our approach using Snort’s ruleset in our real-life trace, increasing the precision from 0.015 to 1 in less than 16 h of work. View Full-Text
  • Acceso AbiertoArtículo
    A Robot-Sensor Network Security Architecture for Monitoring Applications
    (Institute of Electrical and Electronics Engineers Inc., 2021) Fernández Jiménez, Francisco José; Martínez de Dios, José Ramiro; Universidad de Sevilla. Departamento de Ingeniería Telemática
    This paper presents SNSR (Sensor Network Security using Robots), a novel, open, and flexible architecture that improves security in static sensor networks by benefiting from robot-sensor network cooperation. In SNSR, the robot performs sensor node authentication and radio-based localization (enabling centralized topology computation and route establishment) and directly interacts with nodes to send them configurations or receive status and anomaly reports without intermediaries. SNSR operation is divided into stages set in a feedback iterative structure, which enables repeating the execution of stages to adapt to changes, respond to attacks, or detect and correct errors. By exploiting the robot capabilities, SNSR provides high security levels and adaptability without requiring complex mechanisms. This paper presents SNSR, analyzes its security against common attacks, and experimentally validates its performance.
  • Acceso AbiertoArtículo
    Internet of things in health: Requirements, issues, and gaps
    (Elsevier, 2021-09) Calvillo Arbizu, Jorge; Román Martínez, Isabel; Reina Tosina, Luis Javier; Universidad de Sevilla. Departamento de Ingeniería Telemática; Universidad de Sevilla. Departamento de Teoría de la Señal y Comunicaciones; Junta de Andalucía
    Background and objectives: The Internet of Things (IoT) paradigm has been extensively applied to several sectors in the last years, ranging from industry to smart cities. In the health domain, IoT makes possible new scenarios of healthcare delivery as well as collecting and processing health data in real time from sensors in order to make informed decisions. However, this domain is complex and presents several tech- nological challenges. Despite the extensive literature about this topic, the application of IoT in healthcare scarcely covers requirements of this sector. Methods: A literature review from January 2010 to February 2021 was performed resulting in 12,108 articles. After filtering by title, abstract, and content, 86 were eligible and examined according to three requirement themes: data lifecycle; trust, security, and privacy; and human-related issues. Results: The analysis of the reviewed literature shows that most approaches consider IoT application in healthcare merely as in any other domain (industry, smart cities…), with no regard of the specific requirements of this domain. Conclusions: Future effort s in this matter should be aligned with the specific requirements and needs of the health domain, so that exploiting the capabilities of the IoT paradigm may represent a meaningful step forward in the application of this technology in healthcare.