SISCOM - Smart Services for Information Systems and Communication Networks
The SISCOM (Smart Services for Information Systems and Communication Networks) research group focuses on technologies that make it possible to provide intelligent services for information services and communication networks. More specifically, the interests of the group are mainly focused on two areas:
1. Communication networks: We work mostly on wireless networks, either with infrastructure or adhoc and mesh. With the aim of improving their performance, telematics engineering techniques are used. Also, routing protocols are designed and evaluated to guarantee the quality of service required to support intelligent services.
2. Security and privacy of the information: We work on the development of information protection techniques, especially on anonymization of databases to protect users' privacy when these data are being analysed by third parties. These techniques allow us to protect communications and personal information in data analysis processes.
Application examples: Anonymization of medical databases, protection of user privacy in Web browsing, electronic voting, communication in wireless networks without infrastructure (vehicle adhoc networks, mesh networks, mobile adhoc networks), design of efficient routing protocols for wireless infrastructureless networks, personal networks.
Social impact: Health sector, administration, electric operators, telecommunications service operators, smart city services, electrical vehicle, autonomous vehicle.
Collections in this community
-
Articles de revista [21]
Recent Submissions
-
Improved selection of the best forwarding candidate in 3MRP for VANETs
(2019)
Conference report
Restricted access - publisher's policyThe design of different metrics in hop-by-hop routing protocols for vehicular ad hoc networks (VANETs) has been investigated with the clear objective to improve the performance of VANETs in terms of packet losses and average ... -
3MRP+: an improved multimetric geographical routing protocol for VANETs
(Association for Computing Machinery (ACM), 2018)
Conference report
Restricted access - publisher's policyThe design of routing protocols in vehicular ad hoc networks (VANETs) is fundamental to achieve a high packets’ delivery ratio. Routing protocols whose operation considers the nodes’ positions use updated routing information ... -
Large-scale simulations manager tool for OMNeT ++: expediting simulations and post-processing analysis
(Institute of Electrical and Electronics Engineers (IEEE), 2020-06-21)
Article
Open AccessUsually, simulations are the first approach to evaluate wireless and mobile networks due to the difficulties involved in deploying real test scenarios. Working with simulations, testing, and validating the target network ... -
A testbed based performance evaluation of smart grid wireless neighborhood area networks routing protocols
(IOS Press, 2020)
Conference report
Open AccessSmart Grid networks have a data communication network associated with the electrical energy distribution infrastructure. This network connects all the sub- scribers’ homes with the data control centers of the supplying ... -
Preserving empirical data utility in k-anonymous microaggregation via linear discriminant analysis
(Elsevier, 2020-09-01)
Article
Restricted access - publisher's policyToday’s countless benefits of exploiting data come with a hefty price in terms of privacy. -Anonymous microaggregation is a powerful technique devoted to revealing useful demographic information of microgroups of people, ... -
Tips and tools to automate OMNeT++ simulations and to facilitate post data management tasks
(2020-10-08)
External research report
Open AccessNowadays, network simulators are frequently used by researchers to work with different kind of communication networks. In this context, the objective of this work is to introduce the user to the main used simulation tools ... -
Measuring online advertising viewability and analyzing its variability across different dimensions
(Association for Computing Machinery (ACM), 2020)
Conference report
Restricted access - publisher's policyMany of the current online business base completely their revenue models in earnings from online advertisement. A problematic fact is that according to Google more than half of display ads are not being seen. The International ... -
INRISCO: INcident monitoRing in Smart COmmunities
(Institute of Electrical and Electronics Engineers (IEEE), 2020-01-01)
Article
Open AccessMajor advances in information and communication technologies (ICTs) make citizens to be considered as sensors in motion. Carrying their mobile devices, moving in their connected vehicles or actively participating in social ... -
A fair and distributed congestion control mechanism for smart grid neighborhood area networks
(Elsevier, 2020-04-29)
Article
Restricted access - publisher's policyThe need for significant improvements in the management and efficient use of electrical energy has led to the evolution from the traditional electrical infrastructures towards modern Smart Grid networks. Taking into account ... -
Analyzing and testing viewability methods in an advertising network
(Institute of Electrical and Electronics Engineers (IEEE), 2020-06-29)
Article
Open AccessMany of the current online businesses base completely their revenue models in earnings from online advertisement. A problematic fact is that according to recent studies more than half of display ads are not being detected ... -
Towards a distributed congestion control mechanism for smart grid neighborhood area networks
(2019)
Conference report
Restricted access - publisher's policyThe need for significant improvements in the management and efficient use of electrical energy has led to the evolution from the traditional electrical infrastructures towards modern Smart Grid networks. Taking into account ... -
A LINDDUN-based framework for privacy threat analysis on identification and authentication processes
(2020)
Article
Restricted access - publisher's policyIdentification and authentication (IA) are security procedures that are ubiquitous in our online life, and that constantly require disclosing personal, sensitive information to non-fully trusted service providers, or to ...