Skip to content

Secure Proxy for IoT/M2M

Internet of Things (IoT) applications are expected to generate a huge unforeseen amount of traffic flowing from Consumer Electronics devices to the network. In order to overcome existing interoperability problems, several standardization bodies have joined to bring a new generation of Machine to Machine (M2M) networks as a result of the evolution of wireless sensor/actor networks and mobile cellular networks to converged networks. M2M is expected to enable IoT paradigms and related concepts into a reality at a reasonable cost. As part of the convergence, several technologies preventing new IoT services to interfere with
existing Internet services are flourishing. Responsive, message-driven, resilient and elastic architectures are becoming essential parts of the system. These architectures will control the entire data flow for an IoT system requiring sometimes to store, shape and forward data among nodes of a M2M network to improve network performance. However, IoT generated data have an important personal component since it is generated in personal devices or are the result of the observation of the physical world, so rises significant security concerns. Pervasive Computing Lab team has been working on novel opportunistic flexible secure store and forward proxy for M2M networks and its mapping to asynchronous protocols that guarantees data confidentiality.

Daniel Díaz-Sánchez, R. Simon-Sherratt, Florina Almenarez, Patricia Arias,, Andrés Marín: Secure store and forward proxy for dynamic IoT applications over M2M networks. In: IEEE Transactions on Consumer Electronics, vol. 62, iss. 4, pp. 389-397, 2016, ISSN: 0098-3063.

Password Manager Usability

In our daily lives using IT systems there is an undeniable pattern that is routinely repeated: access to a huge number of password-protected services. In this regard, though deploying and enforcing strong password policies is a mean to increase security against online breaches and data leaks, it also imposes a significant usability burden for users. To alleviate this problem, Password Managers (PMs) are pointed out as user-friendly tools that automate the processes of password generation and login. But how secure and usable are Password Managers?