Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Resultados 1 - 20 de 108
Filtrar
1.
Sensors (Basel) ; 24(6)2024 Mar 11.
Artículo en Inglés | MEDLINE | ID: mdl-38544064

RESUMEN

Vehicular wireless networks are one of the most valuable tools for monitoring platforms in the automotive domain. At the same time, Internet of Things (IoT) solutions are playing a crucial role in the same framework, allowing users to connect to vehicles in order to gather data related to their working cycle. Such tasks can be accomplished by resorting to either cellular or non-cellular wireless technologies. While the former can ensure low latency but require high running costs, the latter can be employed in quasi-real-time applications but definitely reduce costs. To this end, this paper proposes the results of two measurement campaigns aimed at assessing the performance of the long-range wide-area network (LoRaWAN) protocol when it is exploited as an enabling technology to provide vehicles with connectivity. Performances are evaluated in terms of packet loss (PL) and received signal strength indicator (RSSI) in wireless links. The two testing scenarios consisted of a transmitter installed on a motorbike running on an elliptical track and a receiver placed in the centre of the track, and a transmitter installed on the roof of a car and a receiver placed next to a straight road. Several speeds were tested, and all the spreading factors (SFs) foreseen by the protocol were examined, showing that the Doppler effect has a marginal influence on the receiving performance of the technology, and that, on the whole, performance is not significantly affected by the speed. Such results prove the feasibility of LoRaWAN links for vehicular network purposes.

2.
Sensors (Basel) ; 23(17)2023 Aug 25.
Artículo en Inglés | MEDLINE | ID: mdl-37687874

RESUMEN

Several areas of wireless networking, such as wireless sensor networks or the Internet of Things, require application data to be distributed to multiple receivers in an area beyond the transmission range of a single node. This can be achieved by using the wireless medium's broadcast property when retransmitting data. Due to the energy constraints of typical wireless devices, a broadcasting scheme that consumes as little energy as possible is highly desirable. In this article, we present a novel multi-hop data dissemination protocol called BTP. It uses a game-theoretical model to construct a spanning tree in a decentralized manner to minimize the total energy consumption of a network by minimizing the transmission power of each node. Although BTP is based on a game-theoretical model, it neither requires information exchange between distant nodes nor time synchronization during its operation, and it inhibits graph cycles effectively. The protocol is evaluated in Matlab and NS-3 simulations and through real-world implementation on a testbed of 75 Raspberry Pis. The evaluation conducted shows that our proposed protocol can achieve a total energy reduction of up to 90% compared to a simple broadcast protocol in real-world experiments.

3.
Sensors (Basel) ; 23(13)2023 Jun 30.
Artículo en Inglés | MEDLINE | ID: mdl-37447915

RESUMEN

The Internet of Things (IoT) has transformed various domains in our lives by enabling seamless communication and data exchange between interconnected devices, necessitating robust networking infrastructure. This paper presents a comprehensive analysis of code injection attacks in IoT, focusing on the wireless domain. Code injection attacks exploit security weaknesses in applications or software and can have severe consequences, such as data breaches, financial losses, and denial of service. This paper discusses vulnerabilities in IoT systems and examines how wireless frames in state-of-the-art wireless technologies, which serve IoT applications, are exposed to such attacks. To demonstrate the severity of these threats, we introduce a comprehensive framework illustrating code injection attacks in the wireless domain. Several code injection attacks are performed on Wireless Fidelity (Wi-Fi) devices operating on an embedded system commonly used in IoT applications. Our proof of concept reveals that the victims' devices become further exposed to a full range of cyber-attacks following a successful severe code injection attack. We also demonstrate three scenarios where malicious codes had been detected inside the firmware of wireless devices used in IoT applications by performing reverse engineering techniques. Criticality analysis is conducted for the implemented and demonstrated attacks using Intrusion Modes and Criticality Analysis (IMECA). By understanding the vulnerabilities and potential consequences of code injection attacks on IoT networks and devices, researchers and practitioners can develop more secure IoT systems and better protect against these emerging threats.


Asunto(s)
Internet de las Cosas , Humanos , Comunicación , Ingeniería , Investigadores , Programas Informáticos
4.
Sensors (Basel) ; 23(6)2023 Mar 20.
Artículo en Inglés | MEDLINE | ID: mdl-36991994

RESUMEN

In this work, we investigate an energy-aware multi-robot task-allocation (MRTA) problem in a cluster of the robot network that consists of a base station and several clusters of energy-harvesting (EH) robots. It is assumed that there are M+1 robots in the cluster and M tasks exist in each round. In the cluster, a robot is elected as the cluster head, which assigns one task to each robot in that round. Its responsibility (or task) is to collect the resultant data from the remaining M robots to aggregate and transmit directly to the BS. This paper aims to allocate the M tasks to the remaining M robots optimally or near optimally by considering the distance to be traveled by each node, the energy required for executing each task, the battery level at each node, and the energy-harvesting capabilities of the nodes. Then, this work presents three algorithms: Classical MRTA Approach, Task-aware MRTA Approach, EH and Task-aware MRTA Approach. The performances of the proposed MRTA algorithms are evaluated under both independent and identically distributed (i.i.d.) and Markovian energy-harvesting processes for different scenarios with five robots and 10 robots (with the same number of tasks). EH and Task-aware MRTA Approach shows the best performance among all MRTA approaches by keeping up to 100% more energy in the battery than the Classical MRTA Approach and keeping up to 20% more energy in the battery than the Task-aware MRTA Approach.

5.
Sensors (Basel) ; 23(16)2023 Aug 10.
Artículo en Inglés | MEDLINE | ID: mdl-37631620

RESUMEN

Unmanned aerial vehicle (UAV) networks offer a wide range of applications in an overload situation, broadcasting and advertising, public safety, disaster management, etc. Providing robust communication services to mobile users (MUs) is a challenging task because of the dynamic characteristics of MUs. Resource allocation, including subchannels, transmit power, and serving users, is a critical transmission problem; further, it is also crucial to improve the coverage and energy efficacy of UAV-assisted transmission networks. This paper presents an Enhanced Slime Mould Optimization with Deep-Learning-based Resource Allocation Approach (ESMOML-RAA) in UAV-enabled wireless networks. The presented ESMOML-RAA technique aims to efficiently accomplish computationally and energy-effective decisions. In addition, the ESMOML-RAA technique considers a UAV as a learning agent with the formation of a resource assignment decision as an action and designs a reward function with the intention of the minimization of the weighted resource consumption. For resource allocation, the presented ESMOML-RAA technique employs a highly parallelized long short-term memory (HP-LSTM) model with an ESMO algorithm as a hyperparameter optimizer. Using the ESMO algorithm helps properly tune the hyperparameters related to the HP-LSTM model. The performance validation of the ESMOML-RAA technique is tested using a series of simulations. This comparison study reports the enhanced performance of the ESMOML-RAA technique over other ML models.

6.
Sensors (Basel) ; 23(18)2023 Sep 12.
Artículo en Inglés | MEDLINE | ID: mdl-37765883

RESUMEN

Industry 4.0 has significantly improved the industrial manufacturing scenario in recent years. The Industrial Internet of Things (IIoT) enables the creation of globally interconnected smart factories, where constituent elements seamlessly exchange information. Industry 5.0 has further complemented these achievements, as it focuses on a human-centric approach where humans become part of this network of things, leading to a robust human-machine interaction. In this distributed, dynamic, and highly interconnected environment, functional safety is essential for adequately protecting people and machinery. The increasing availability of wireless networks makes it possible to implement distributed and flexible functional safety systems. However, such networks are known for introducing unwanted delays that can lead to safety performance degradation due to their inherent uncertainty. In this context, the Time-Sensitive Networking (TSN) standards present an attractive prospect for enhancing and ensuring acceptable behaviors. The research presented in this paper deals with the introduction of TSN to implement functional safety protocols for wireless networks. Among the available solutions, we selected Wi-Fi since it is a widespread network, often considered and deployed for industrial applications. The introduction of a reference functional safety protocol is detailed, along with an analysis of how TSN can enhance its behavior by evaluating relevant performance indexes. The evaluation pertains to a standard case study of an industrial warehouse, tested through practical simulations. The results demonstrate that TSN provides notable advantages, but it requires meticulous coordination with the Wi-Fi MAC layer protocol to guarantee improved performance.

7.
Sensors (Basel) ; 23(7)2023 Mar 30.
Artículo en Inglés | MEDLINE | ID: mdl-37050663

RESUMEN

The concept of labeling-based recipient identification (LABRID) for bit-interleaved coded modulation with iterative decoding (BICM-ID) is revisited. LABRID allows addressing a message recipient station in a wireless network by using an individual labeling map without compromising error performance. This eliminates the need to use any byte of the data frame to carry the recipient address explicitly. In addition, the destination of the frame can be determined in parallel with a BICM-ID decoding procedure in the receiver's physical layer. Therefore, the MAC layer is not involved in processing the vast majority of frames transmitted in a network. Previously, it was shown that LABRID works fine if there are only LABRID-compatible stations within the network, and every receiver can reject frames destined for other receivers. This paper considers a scenario in which LABRID-compatible BICM-ID stations and legacy BICM stations coexist in the same network. A few experiments show that the LABRID receiver can reject an old-fashioned BICM frame by judging the convergence of the iterative decoding process. It also turns out that the legacy BICM receiver can identify and dismiss the LABRID-type frames thanks to the standard cyclic redundancy check (CRC) procedure.

8.
Sensors (Basel) ; 23(15)2023 Aug 02.
Artículo en Inglés | MEDLINE | ID: mdl-37571656

RESUMEN

Deploying unmanned aerial vehicles (UAVs) as aerial base stations is an exceptional approach to reinforce terrestrial infrastructure owing to their remarkable flexibility and superior agility. However, it is essential to design their flight trajectory effectively to make the most of UAV-assisted wireless communications. This paper presents a novel method for improving wireless connectivity between UAVs and terrestrial users through effective path planning. This is achieved by developing a goal-directed trajectory planning method using active inference. First, we create a global dictionary using traveling salesman problem with profits (TSPWP) instances executed on various training examples. This dictionary represents the world model and contains letters representing available hotspots, tokens representing local paths, and words depicting complete trajectories and hotspot order. By using this world model, the UAV can understand the TSPWP's decision-making grammar and how to use the available letters to form tokens and words at various levels of abstraction and time scales. With this knowledge, the UAV can assess encountered situations and deduce optimal routes based on the belief encoded in the world model. Our proposed method outperforms traditional Q-learning by providing fast, stable, and reliable solutions with good generalization ability.

9.
Sensors (Basel) ; 23(2)2023 Jan 13.
Artículo en Inglés | MEDLINE | ID: mdl-36679718

RESUMEN

Delay-tolerant networks (DTNs) are networks where there is no immediate connection between the source and the destination. Instead, nodes in these networks use a store-carry-forward method to route traffic. However, approaches that rely on flooding the network with unlimited copies of messages may not be effective if network resources are limited. On the other hand, quota-based approaches are more resource-efficient but can have low delivery rates and high delivery delays. This paper introduces the Enhanced Message Replication Technique (EMRT), which dynamically adjusts the number of message replicas based on a node's ability to quickly disseminate the message. This decision is based on factors such as current connections, encounter history, buffer size history, time-to-live values, and energy. The EMRT is applied to three different quota-based protocols: Spray and Wait, Encounter-Based Routing (EBR), and the Destination-Based Routing Protocol (DBRP). The simulation results show that applying the EMRT to these protocols improves the delivery ratio, overhead ratio, and latency average. For example, when combined with Spray and Wait, EBR, and DBRP, the delivery probability is improved by 13%, 8%, and 10%, respectively, while the latency average is reduced by 51%, 14%, and 13%, respectively.


Asunto(s)
Algoritmos , Redes de Comunicación de Computadores , Simulación por Computador , Probabilidad
10.
Sensors (Basel) ; 23(9)2023 Apr 28.
Artículo en Inglés | MEDLINE | ID: mdl-37177555

RESUMEN

Network slicing is considered a key feature of 5G and beyond cellular systems. It opens the door for new business models of mobile operators, enables new services, reduces costs with advanced infrastructure-sharing techniques, and improves heterogeneous traffic service. With slicing, the operators can tailor the network resources to the requirements of specific verticals, applications, and corresponding traffic types. To satisfy the heterogeneous quality of service (QoS) requirements of various slices, efficient virtualization and resource allocation algorithms are required. Such algorithms are especially crucial for the radio access network (RAN) because of the spectrum scarcity. This article develops DeSlice, a novel architecture for RAN slicing. DeSlice enables efficient real-time slicing algorithms that satisfy heterogeneous QoS requirements of the slices and improve the quality of experience for their end users. The article illustrates the advantages of DeSlice by considering the problem of the joint service of cloud VR, video, and web traffic. It develops the algorithms using DeSlice architecture and application-to-network communication. With simulations, it shows that, together, the architecture and the algorithms allow greatly improving the QoE for these traffics significantly.

11.
Sensors (Basel) ; 23(14)2023 Jul 12.
Artículo en Inglés | MEDLINE | ID: mdl-37514641

RESUMEN

Motivated by the recent success of Machine Learning (ML) tools in wireless communications, the idea of semantic communication by Weaver from 1949 has gained attention. It breaks with Shannon's classic design paradigm by aiming to transmit the meaning of a message, i.e., semantics, rather than its exact version and, thus, enables savings in information rate. In this work, we extend the fundamental approach from Basu et al. for modeling semantics to the complete communications Markov chain. Thus, we model semantics by means of hidden random variables and define the semantic communication task as the data-reduced and reliable transmission of messages over a communication channel such that semantics is best preserved. We consider this task as an end-to-end Information Bottleneck problem, enabling compression while preserving relevant information. As a solution approach, we propose the ML-based semantic communication system SINFONY and use it for a distributed multipoint scenario; SINFONY communicates the meaning behind multiple messages that are observed at different senders to a single receiver for semantic recovery. We analyze SINFONY by processing images as message examples. Numerical results reveal a tremendous rate-normalized SNR shift up to 20 dB compared to classically designed communication systems.

12.
Sensors (Basel) ; 23(7)2023 Mar 27.
Artículo en Inglés | MEDLINE | ID: mdl-37050564

RESUMEN

Unmanned aerial vehicles (UAVs) employed as airborne base stations (BSs) are considered the essential components in future sixth-generation wireless networks due to their mobility and line-of-sight communication links. For a UAV-assisted ad hoc network, its total channel capacity is greatly influenced by the deployment of UAV-BSs and the corresponding coverage layouts, where square and hexagonal cells are partitioned to divide the zones individual UAVs should serve. In this paper, the total channel capacities of these two kinds of coverage layouts are evaluated using our proposed novel computationally efficient channel capacity estimation scheme. The mean distance (MD) between a UAV-BS in the network and its served users as well as the MD from these users to the neighboring UAV-BSs are incorporated into the estimation of the achievable total channel capacity. We can significantly reduce the computational complexity by using a new polygon division strategy. The simulation results demonstrate that the square cell coverage layout can always lead to a superior channel capacity (with an average increase of 7.67% to be precise) to the hexagonal cell coverage layout for UAV-assisted ad hoc networks.

13.
Entropy (Basel) ; 25(8)2023 Aug 09.
Artículo en Inglés | MEDLINE | ID: mdl-37628213

RESUMEN

Federated learning (FL) represents a distributed machine learning approach that eliminates the necessity of transmitting privacy-sensitive local training samples. However, within wireless FL networks, resource heterogeneity introduces straggler clients, thereby decelerating the learning process. Additionally, the learning process is further slowed due to the non-independent and identically distributed (non-IID) nature of local training samples. Coupled with resource constraints during the learning process, there arises an imperative need for optimizing client selection and resource allocation strategies to mitigate these challenges. While numerous studies have made strides in this regard, few have considered the joint optimization of client selection and computational power (i.e., CPU frequency) for both clients and the edge server during each global iteration. In this paper, we initially define a cost function encompassing learning latency and non-IID characteristics. Subsequently, we pose a joint client selection and CPU frequency control problem that minimizes the time-averaged cost function subject to long-term power constraints. By utilizing Lyapunov optimization theory, the long-term optimization problem is transformed into a sequence of short-term problems. Finally, an algorithm is proposed to determine the optimal client selection decision and corresponding optimal CPU frequency for both the selected clients and the server. Theoretical analysis provides performance guarantees and our simulation results substantiate that our proposed algorithm outperforms comparative algorithms in terms of test accuracy while maintaining low power consumption.

14.
Sensors (Basel) ; 22(11)2022 May 31.
Artículo en Inglés | MEDLINE | ID: mdl-35684802

RESUMEN

The emerging need for high data rate, low latency, and high network capacity encourages wireless networks (WNs) to build intelligent and dynamic services, such as intelligent transportation systems, smart homes, smart cities, industrial automation, etc. However, the WN is impeded by several security threats, such as data manipulation, denial-of-service, injection, man-in-the-middle, session hijacking attacks, etc., that deteriorate the security performance of the aforementioned WN-based intelligent services. Toward this goal, various security solutions, such as cryptography, artificial intelligence (AI), access control, authentication, etc., are proposed by the scientific community around the world; however, they do not have full potential in tackling the aforementioned security issues. Therefore, it necessitates a technology, i.e., a blockchain, that offers decentralization, immutability, transparency, and security to protect the WN from security threats. Motivated by these facts, this paper presents a WNs survey in the context of security and privacy issues with blockchain-based solutions. First, we analyzed the existing research works and highlighted security requirements, security issues in a different generation of WN (4G, 5G, and 6G), and a comparative analysis of existing security solutions. Then, we showcased the influence of blockchain technology and prepared an exhaustive taxonomy for blockchain-enabled security solutions in WN. Further, we also proposed a blockchain and a 6G-based WN architecture to highlight the importance of blockchain technology in WN. Moreover, the proposed architecture is evaluated against different performance metrics, such as scalability, packet loss ratio, and latency. Finally, we discuss various open issues and research challenges for blockchain-based WNs solutions.


Asunto(s)
Cadena de Bloques , Inteligencia Artificial , Humanos , Motivación , Privacidad , Tecnología
15.
Sensors (Basel) ; 22(5)2022 Feb 25.
Artículo en Inglés | MEDLINE | ID: mdl-35270965

RESUMEN

Wireless information collecting and processing terminals, such as cell phones, sensors and smart wearable devices, are expected to be deployed on a large scale in the future to promote the continuous advancement of the global information revolution. Since most of these terminals connect to each other using long-distance and high-speed networks by multiple routers and eventual access the internet, the application of mobile internet is gradually increasing and data traffic on the mobile internet is growing exponentially, from which arises congestion in wireless networks on multiple routers. This research solves the congestion problem for wireless networks with multiple bottleneck routers. First, the wireless network model is expanded to multi-router networks, which considers the interrelationships between connecting routers. Afterwards, a new Active Queue Management (AQM) method called Congestion Control Based on Adaptive Integral Backstepping (CCAIB) is designed to handle congestion in wireless networks. In CCAIB, an adaptive control method is used to estimate the packet loss ratios of wireless links and a controller is designed based on the estimation results through a backstepping procedure. It can be shown from the simulation results that the performance of CCAIB is better than the H∞ algorithm in queue length stability. Besides, the window size of CCAIB is 100 times that of the H∞ algorithm, and the proportion of packets marked as discarded when using CCAIB is about 0.1% of the H∞ algorithm. Moreover, CCAIB has satisfactory adaptability to network parameters such as wireless link capacity, propagation delay, wireless packet loss ratios, desired queue length and router location.


Asunto(s)
Algoritmos , Dispositivos Electrónicos Vestibles , Simulación por Computador , Programas Informáticos
16.
Sensors (Basel) ; 22(2)2022 Jan 15.
Artículo en Inglés | MEDLINE | ID: mdl-35062622

RESUMEN

As the number of research activities and practical deployments of unmanned vehicles has shown a rapid growth, topics related to their communication with operator and external infrastructure became of high importance. As a result a trend of employing IP communication for this purpose is emerging and can be expected to bring significant advantages. However, its employment can be expected to be most effective using broadband communication technologies such as Wireless Local Area Networks (WLANs). To verify the effectiveness of such an approach in a specific case of surface unmanned vehicles, the paper includes an overview of IP-based MAVLink communication advantages and requirements, followed by a laboratory and field-experiment study of selected WLAN technologies, compared to popular narrowband communication solutions. The conclusions confirm the general applicability of IP/WLAN communication for surface unmanned vehicles, providing an overview of their advantages and pointing out deployment requirements.

17.
Sensors (Basel) ; 22(15)2022 Jul 26.
Artículo en Inglés | MEDLINE | ID: mdl-35898065

RESUMEN

The IEEE 802.11ah is an amendment to the IEEE 802.11 standard to support the growth of the Internet of Things (IoT). One of its main novelties is the restricted access window (RAW), which is a channel access feature designed to reduce channel contention by dividing stations into RAW groups. Each RAW group is further divided into RAW slots, and stations only attempt channel access during the RAW slot they were assigned to. In this paper, we propose a discrete-time Markov chain model to evaluate the average aggregate throughput of IEEE 802.11ah networks using the RAW mechanism under saturated traffic and ideal channel conditions. The proposed analytical model describes the behavior of an active station within its assigned RAW slot. A key aspect of the model is the consideration of the event of RAW slot time completion during a station's backoff operation. We study the average aggregate network throughput for various numbers of RAW slots and stations in the network. The numerical results derived from our analytical model are compared to computer simulations based on an IEEE 802.11ah model developed for the ns-3 simulator by other researchers, and its performance is also compared to two other analytical models proposed in the literature. The presented results indicate that the proposed analytical model reaches the closest agreement with independently-derived computer simulations.

18.
Sensors (Basel) ; 22(19)2022 Oct 09.
Artículo en Inglés | MEDLINE | ID: mdl-36236739

RESUMEN

Despite the widespread use of encryption techniques to provide confidentiality over Internet communications, mobile device users are still susceptible to privacy and security risks. In this paper, a novel Deep Neural Network (DNN) based on a user activity detection framework is proposed to identify fine-grained user activities performed on mobile applications (known as in-app activities) from a sniffed encrypted Internet traffic stream. One of the challenges is that there are countless applications, and it is practically impossible to collect and train a DNN model using all possible data from them. Therefore, in this work, we exploit the probability distribution of a DNN output layer to filter the data from applications that are not considered during the model training (i.e., unknown data). The proposed framework uses a time window-based approach to divide the traffic flow of activity into segments so that in-app activities can be identified just by observing only a fraction of the activity-related traffic. Our tests have shown that the DNN-based framework has demonstrated an accuracy of 90% or above in identifying previously trained in-app activities and an average accuracy of 79% in identifying previously untrained in-app activity traffic as unknown data when this framework is employed.


Asunto(s)
Aprendizaje Profundo , Aplicaciones Móviles , Confidencialidad , Redes Neurales de la Computación , Privacidad
19.
Sensors (Basel) ; 22(14)2022 Jul 20.
Artículo en Inglés | MEDLINE | ID: mdl-35891085

RESUMEN

An intelligent reflecting surface (IRS) is a programmable device that can be used to control electromagnetic waves propagation by changing the electric and magnetic properties of its surface. Therefore, IRS is considered a smart technology for the sixth generation (6G) of communication networks. In addition, machine learning (ML) techniques are now widely adopted in wireless communication as the computation power of devices has increased. As it is an emerging topic, we provide a comprehensive overview of the state-of-the-art on ML, especially on deep learning (DL)-based IRS-enhanced communication. We focus on their operating principles, channel estimation (CE), and the applications of machine learning to IRS-enhanced wireless networks. In addition, we systematically survey existing designs for IRS-enhanced wireless networks. Furthermore, we identify major issues and research opportunities associated with the integration of IRS and other emerging technologies for applications to next-generation wireless communication.


Asunto(s)
Redes de Comunicación de Computadores , Aprendizaje Automático , Tecnología Inalámbrica
20.
Sensors (Basel) ; 22(4)2022 Feb 11.
Artículo en Inglés | MEDLINE | ID: mdl-35214291

RESUMEN

Unmanned aerial vehicles (UAVs), in particular multirotors, are becoming the de facto tool for aerial sensing and remote inspection. In large industrial facilities, a UAV can transmit an online video stream to inspect difficult-to-access structures, such as chimneys, deposits, and towers. However, the communication range is limited, constraining the UAV operation range. This limitation can be overcome with relaying UAVs placed between the source UAV and the control station, creating a line of communication links. In this work, we assume the use of a digital data packet network technology, namely WiFi, and tackle the problem of defining the exact placement for the relaying UAVs that creates an end-to-end channel with maximal delivery of data packets. We consider asymmetric communication links and we show an increase as large as 15% in end-to-end packet delivery ratio when compared to an equidistant placement. We also discuss the deployment of such a network and propose a fully distributed method that converges to the global optimal relay positions taking, on average, 1.4 times the time taken by a centralized method.


Asunto(s)
Dispositivos Aéreos No Tripulados , Recolección de Datos
SELECCIÓN DE REFERENCIAS
Detalles de la búsqueda