TST Sistemas


TST Sistemas

Time filter
Source Type

Leveil S.,Thales Alenia | Le Martret C.J.,Thales Alenia | Anouar H.,Thales Alenia | Arshad K.,University of Greenwich | And 6 more authors.
2012 Future Network and Mobile Summit, FutureNetw 2012 | Year: 2012

The realization of cognitive radio networks is a key solution to meet the raising expectations for high data rates and quality of service in mobile communications. This implies the design of a two-fold cognitive manager for resource management (CM-RM), to manage an opportunistic use of the whitespaces as introduced in this paper, and for Spectrum Management (CM-SM). The proposed CM-RM has been designed to be applicable to all kinds of control topologies (centralised/distributed). This paper presents the study of CM-RM functionalities for several scenarios based on a centralized management of the resources. The scenarios that have been selected are: cognitive ad hoc networks, cognitive femtocells, and cellular extension in TV white spaces. Each of them is introduced, specific mechanisms implemented in the CM-RM are proposed, and performance results are presented for validation purpose. © 2012 IIMC Ltd.

Arshad K.,University of Greenwich | Mackenzie R.,BT Technology | Celentano U.,University of Oulu | Drozdy A.,Budapest University of Technology and Economics | And 5 more authors.
IEEE Communications Magazine | Year: 2014

Cognitive radio technology is a key enabler to reuse a finite, scarce, and expensive resource: the radio spectrum. Guaranteeing required levels of QoS to cognitive users and ensuring necessary protection to incumbent users are the two main challenges in opportunistic spectrum access. This article identifies the main requirements and challenges for QoS support in cognitive radio networks. A framework for a twofold cognitive manager is presented; one part managing spectrum availability on longer timescales and the other handling resource management on shorter timescales. This article gives particular focus to the functionalities of the latter cognitive manager related to resource management. Finally, we present a few key scenarios and describe how QoS can be managed with the proposed approach without disturbing the communications of incumbent users. © 2014 IEEE.

Gomez D.,University of Cantabria | Aguero R.,University of Cantabria | Herrero J.,TST Sistemas | Cendon B.,TST Sistemas | Munoz L.,University of Cantabria
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | Year: 2011

In this paper we present an fully empirical assessment of the possibilities which are brought about by an architecture able to handle multiple wireless access technologies. Heterogeneity is believed to play a key role in forthcoming communication scenarios and therefore some entities able to appropriately tackle the new challenges are deemed necessary. Although reaching the Always Best Connected paradigm has gathered the interest of the scientific community, many of the existing works are descriptive (architectural papers) or based on simulation and/or emulation. In this paper we go a step beyond this and starting from the architecture proposed in the Mobilia Celtic project, we deploy a real platform to showcase two illustrative handover examples, triggered either by the end-user and the network. Additionally, we use the same platform to quantitatively analyze the enhancement which the use of multi-RAT devices may provide, in terms of the handover latency reduction. © 2011 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.

Diaz A.,University of Cantabria | Penil P.,University of Cantabria | Sanchez P.,University of Cantabria | Sancho J.,TST Sistemas | Rico J.,TST Sistemas
Forum on Specification and Design Languages | Year: 2012

In this paper we present a methodology to model and simulate jamming attack in Wireless Sensor Networks. The Wireless Sensor Network is described using the MARTE profile. In the UML/MARTE models Wireless Sensor Network is specified, defining the nodes that composed the network and characterizing the communication established among these nodes in the network. © 2012 ECSI.

Diaz A.,University of Cantabria | Sanchez P.,University of Cantabria | Sancho J.,TST Sistemas | Rico J.,TST Sistemas
Proceedings -Design, Automation and Test in Europe, DATE | Year: 2013

During the last years, Wireless Sensor Networks (WSN) have been deployed at an accelerated rate. The complexity and low-power requirements of these networks have also been growing. Therefore, WSN developers are beginning to require efficient methodologies for network simulation and embedded SW performance analysis. These tools should also include security analysis. This security analysis has to evaluate the vulnerability of a WSN to the wide variety of attacks that these networks could suffer. WSN attacks could also affect power consumption and performance of the node's software, thus security analysis has to be integrated into a complete performance analysis framework. This work proposes a methodology to simulate the most common and dangerous attacks that a WSN can suffer nowadays. The impact of these attacks on power consumption and software execution time are also analyzed. This provides developers with important information about the effects that one or multiple attacks could have on the WSN, helping them to develop more secure software. © 2013 EDAA.

Medela A.,TST Sistemas | Cendon B.,TST Sistemas | Gonzalez L.,Edenway | Crespo R.,University of Valladolid | Nevares I.,University of Valladolid
2013 Future Network and Mobile Summit, FutureNetworkSummit 2013 | Year: 2013

Winemaking was born more than two thousand years ago and from that moment on a wine culture has flourished and reached almost all corners around the world. Over the years, winemaking techniques have evolved, paving the way to discover varietal characteristics unknown to the most traditional wines, and enabling the coexistence of traditional techniques and the more innovative ones. However, in recent times changes produced in climatic conditions have led to significant variations in the grape ripening process, which implies severe trouble for the wineries which are not able to properly track the evolution of the fruit. In order to give a solution to these issues, this paper provides an innovative architecture based on the concept of Internet of Things, combining wireless and distributed specific sensor devices. Integrating different wireless sensor technologies with advanced analysis, remarkable information from the environment such as soil condition, vines growth or fermentation status can be retrieved and further allowing interaction, personalization and management of different devices deployed over the scenario. This system, replicated in the real world on land, covering crops and a winery in Zamora, Spain, produces a better understanding of all operating parameters and provides a predictive system to carry out precision farming, while easing the management of the vineyard and the winery, as well as improving traceability of the entire winemaking process, complying with all relevant sustainability requirements nowadays © 2013 Authors.

Celentano U.,University of Oulu | Bochow B.,Fraunhofer Gesellschaft | Herrero J.,TST Sistemas | Cendon B.,TST Sistemas | And 5 more authors.
2011 the 14th International Symposium on Wireless Personal Multimedia Communications: Communications, Networking and Applications for the Internet of Things, WPMC'11 | Year: 2011

Spectrum resources unused in the spatio-temporal domain, so-called whitespace, can be utilised by opportunistic devices during the absence of their incumbent users. The possibility to opportunistically use whitespace implies the knowledge of diverse constraints: knowledge about whitespace utilisation, which can be obtained by spectrum sensing or from a data repository and constraints internal to the opportunistic system, such as quality of service (QoS) levels and mobility targets. The use of whitespace requires therefore a multi-faced management of the above constraints. In this paper, an architecture for use of whitespaces under QoS and mobility constraints is proposed. The proposed architecture flexibly adapts to different operating scenarios also described in this paper. Examples show how different realisations of the same architecture are derived. The interactions of constituent blocks are illustrated also with the help of charts, showing the management of context information and its use. © 2011 National Institute of Inform.

Loading TST Sistemas collaborators
Loading TST Sistemas collaborators