Contact information
Name | Carlos García Rubio |
Academic
jobline | Associate Professor |
Contact
Publications
Blanco-Romero, Javier; Lorenzo, Vicente; Almenares, Florina; Díaz-Sánchez, Daniel; and Celeste Campo,; García-Rubio, Carlos
Integrating Post-Quantum Cryptography into CoAP and MQTT-SN Protocols Conference
2024 IEEE Symposium on Computers and Communications (ISCC), IEEE, 2024, ISBN: 979-8-3503-5424-9.
@conference{javierblanco002,
title = {Integrating Post-Quantum Cryptography into CoAP and MQTT-SN Protocols},
author = {Javier Blanco-Romero and Vicente Lorenzo and Florina Almenares and Daniel Díaz-Sánchez and and Celeste Campo and Carlos García-Rubio},
url = {https://ieeexplore.ieee.org/abstract/document/10733716/figures#figures},
doi = {https://doi.org/10.1109/ISCC61673.2024.10733716},
isbn = {979-8-3503-5424-9},
year = {2024},
date = {2024-10-31},
urldate = {2024-10-31},
booktitle = {2024 IEEE Symposium on Computers and Communications (ISCC)},
publisher = {IEEE},
abstract = {Post-Quantum Cryptography (PQC) is a practical and cost-effective solution to defend against emerging quantum computing threats. So, leading worldwide security agencies and standardization bodies strongly advocate for the proactive integration of PQ cryptography into underlying frameworks to support applications, protocols, and services. The current research predominantly addresses the incorporation of PQC in Internet communication protocols such as HTTP and DNS; nevertheless, the focus on embedded devices has been limited to evaluating PQC’s integration within TLS/DTLS in isolation. Hence, there is a notable gap in understanding how PQC impacts IoT-specific communication protocols. This paper presents the integration of PQC into two communication protocols specifically tailored for IoT devices, the Constrained Application Protocol (CoAP) and MQTT for Sensor Networks (MQTT-SN), via the wolfSSL library. These two integrations contribute to the understanding of PQC’s implications for IoT communication protocols.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Blanco-Romero, Javier; Lorenzo, Vicente; Almenares, Florina; Díaz-Sánchez, Daniel; García-Rubio, Carlos; Campo, Celeste; Marín, Andrés
Evaluating integration methods of a quantum random number generator in OpenSSL for TLS Journal Article
In: vol. 255, 2024, ISBN: 1389-1286.
@article{javierblanco003,
title = {Evaluating integration methods of a quantum random number generator in OpenSSL for TLS},
author = {Javier Blanco-Romero and Vicente Lorenzo and Florina Almenares and Daniel Díaz-Sánchez and Carlos García-Rubio and Celeste Campo and Andrés Marín},
url = {https://www.sciencedirect.com/science/article/pii/S1389128624007096?via%3Dihub},
doi = {https://doi.org/10.1016/j.comnet.2024.110877},
isbn = {1389-1286},
year = {2024},
date = {2024-10-25},
urldate = {2024-10-25},
volume = {255},
publisher = {Computer Networks},
abstract = {The rapid advancement of quantum computing poses a significant threat to conventional cryptography. Whilst post-quantum cryptography (PQC) stands as the prevailing trend for fortifying the security of cryptographic systems, the coexistence of quantum and classical computing paradigms presents an opportunity to leverage the strengths of both technologies, for instance, nowadays the use of Quantum Random Number Generators (QRNGs) – considered as True Random Number Generators (TRNGs) – opens up the possibility of discussing hybrid systems. In this paper, we evaluate both aspects, on the one hand, we use hybrid TLS (Transport Layer Security) protocol that leverages the widely used secure protocol on the Internet and integrates PQC algorithms, and, on the other hand, we evaluate two approaches to integrate a QRNG, i.e., Quantis PCIe-240M, in OpenSSL 3.0 to be used by TLS. Both approaches are compared through a Nginx Web server, that uses OpenSSL’s implementation of TLS 1.3 for secure web communication. Our findings highlight the importance of optimizing such integration method, because while direct integration can lead to performance penalties specific to the method and hardware used, alternative methods demonstrate the potential for efficient QRNG deployment in cryptographic systems.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Lorenzo, Vicente; Blanco-Romero, Javier; Almenares, Florina; Díaz-Sánchez, Daniel; García-Rubio, Carlos; Campo, Celeste; Marín, Andrés
Comparing Pseudo, Classical True and Quantum Random Number Generators Using Standard Quality Assessments Conference
XVIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2024), León, 23 al 25 de Octubre, 2024., 2024.
@conference{nokey,
title = {Comparing Pseudo, Classical True and Quantum Random Number Generators Using Standard Quality Assessments},
author = {Vicente Lorenzo and Javier Blanco-Romero and Florina Almenares and Daniel Díaz-Sánchez and Carlos García-Rubio and Celeste Campo and Andrés Marín},
year = {2024},
date = {2024-10-25},
urldate = {2024-10-25},
booktitle = {XVIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2024), León, 23 al 25 de Octubre, 2024.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Moure-Garrido, Marta; Das, Sajal; Campo, Celeste; García-Rubio, Carlos
Real-Time Analysis of Encrypted DNS Traffic for Threat Detection Conference
ICC 2024 - IEEE International Conference on Communications, IEEE, 2024, ISSN: 1550-3607.
@conference{marta003,
title = {Real-Time Analysis of Encrypted DNS Traffic for Threat Detection},
author = {Marta Moure-Garrido and Sajal Das and Celeste Campo and Carlos García-Rubio},
url = {https://ieeexplore.ieee.org/document/10622347},
doi = {https://doi.org/10.1109/ICC51166.2024.10622347},
issn = {1550-3607},
year = {2024},
date = {2024-08-20},
booktitle = {ICC 2024 - IEEE International Conference on Communications},
pages = {3292-3297},
publisher = {IEEE},
abstract = {Domain Name System (DNS) tunneling is a well-known cyber-attack that allows data exfiltration - the attackers exploit this tunnel to extract sensitive information from the system. Advanced Persistent Threat (APT) attackers encapsulate malicious traffic in a DNS connection to elude security mechanisms such as Intrusion Detection System (IDS). Although different techniques have been implemented to detect these targeted attacks, their rise induces a threat to Cyber-Physical Systems (CPS). The DNS over HTTPS (DoH) tunnel detection is a challenge because the encrypted data prevents an analysis of DNS traffic content. In this paper, we present a novel detection system that identifies malicious DoH tunnels in real time. We study the normal traffic pattern and based on that, we define a profile. The objective of this system is to detect malicious activity on the system as early as possible through a lightweight packet by packet analysis based on a real-time IDS classifier. This system is evaluated on three available data sets and the results obtained are compared with a machine learning technique. We demonstrate that the identification of anomalous activity, in particular DoH tunnels, is possible by analyzing different traffic features.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Moure-Garrido, Marta; Das, Sajal; Campo, Celeste; García-Rubio, Carlos
Real-Time Analysis of Encrypted DNS Traffic for Threat Detection Conference
ICC 2024 - IEEE International Conference on Communications, IEEE, 2024, ISSN: 1550-3607.
@conference{marta003b,
title = {Real-Time Analysis of Encrypted DNS Traffic for Threat Detection},
author = {Marta Moure-Garrido and Sajal Das and Celeste Campo and Carlos García-Rubio},
url = {https://ieeexplore.ieee.org/document/10622347},
doi = {https://doi.org/10.1109/ICC51166.2024.10622347},
issn = {1550-3607},
year = {2024},
date = {2024-08-20},
booktitle = {ICC 2024 - IEEE International Conference on Communications},
pages = {3292-3297},
publisher = {IEEE},
abstract = {Domain Name System (DNS) tunneling is a well-known cyber-attack that allows data exfiltration - the attackers exploit this tunnel to extract sensitive information from the system. Advanced Persistent Threat (APT) attackers encapsulate malicious traffic in a DNS connection to elude security mechanisms such as Intrusion Detection System (IDS). Although different techniques have been implemented to detect these targeted attacks, their rise induces a threat to Cyber-Physical Systems (CPS). The DNS over HTTPS (DoH) tunnel detection is a challenge because the encrypted data prevents an analysis of DNS traffic content. In this paper, we present a novel detection system that identifies malicious DoH tunnels in real time. We study the normal traffic pattern and based on that, we define a profile. The objective of this system is to detect malicious activity on the system as early as possible through a lightweight packet by packet analysis based on a real-time IDS classifier. This system is evaluated on three available data sets and the results obtained are compared with a machine learning technique. We demonstrate that the identification of anomalous activity, in particular DoH tunnels, is possible by analyzing different traffic features.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Campo-Vázquez, Celeste; García-Rubio, Carlos; Jimenez-Berenguel, Andrea; Moure-Garrido, Marta; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel
Inferring mobile applications usage from DNS traffic Proceedings Article
In: Ad Hoc Networks, Elsevier B.V., 2024.
@inproceedings{campo012,
title = {Inferring mobile applications usage from DNS traffic},
author = {Celeste Campo-Vázquez and Carlos García-Rubio and Andrea Jimenez-Berenguel and Marta Moure-Garrido and Florina Almenares-Mendoza and Daniel Díaz-Sánchez },
url = {https://www.sciencedirect.com/science/article/pii/S1570870524002129#d1e710},
doi = {https://doi.org/10.1016/j.adhoc.2024.103601},
year = {2024},
date = {2024-07-19},
urldate = {2024-07-19},
booktitle = {Ad Hoc Networks},
publisher = {Elsevier B.V.},
abstract = {In the digital era, our lives are intrinsically linked to the daily use of mobile applications. As a consequence, we generate and transmit a large amount of personal data that puts our privacy in danger. Despite having encrypted communications, the DNS traffic is usually not encrypted, and it is possible to extract valuable information from the traffic generated by mobile applications. This study focuses on the analysis of the DNS traffic behavior found in mobile application traces, developing a methodology capable of identifying mobile applications based on the domains they query. With this methodology, we were able to identify apps with 98% accuracy. Furthermore, we have validated the effectiveness of the characterization obtained with one dataset by identifying traces from other independent datasets. The evaluation showed that the methodology provides successful results in identifying mobile applications.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Moure-Garrido, Marta; Campo, Celeste; García-Rubio, Carlos
Análisis estadístico del tráfico DoH para la detección del uso malicioso de túneles Conference
Investigación en Ciberseguridad Actas de las VII Jornadas Nacionales (7º.2022.Bilbao) , 2024, ISBN: 978-84-88734-13-6.
@conference{marta002,
title = {Análisis estadístico del tráfico DoH para la detección del uso malicioso de túneles},
author = {Marta Moure-Garrido and Celeste Campo and Carlos García-Rubio},
url = {https://dialnet.unirioja.es/servlet/articulo?codigo=9206590},
isbn = {978-84-88734-13-6},
year = {2024},
date = {2024-07-10},
urldate = {2024-07-10},
booktitle = {Investigación en Ciberseguridad Actas de las VII Jornadas Nacionales (7º.2022.Bilbao) },
pages = {38-41},
abstract = {Las primeras versiones de DNS presentaban ciertos problemas de seguridad: integridad, autenticidad y privacidad. Para solventarlos se definió DNSSEC, pero esta versión
seguía sin garantizar privacidad. Por ello, se definieron DNS sobre TLS (DoT) en 2016 y DNS sobre HTTPS (DoH) en 2018. En los ultimos años se ha empleado la tunelización DNS para encapsular trafico maligno. Las versiones DoT y DoH han complicado la detección de estos túneles dado que los datos van encriptados. En trabajos anteriores se emplean técnicas de aprendizaje automático para identificar túneles DoH, pero tienen limitaciones. En este trabajo realizamos un análisis estadístico para aprender el patrón del tráfico DoH y estudiar las diferencias entre el tráfico benigno y el tráfico creado con herramientas de tunelización. El análisis revela que ciertos parámetros estadísticos permiten diferenciar el trafico. El siguiente paso de la investigación es aplicar técnicas más elaboradas basándonos en el análisis realizado.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
seguía sin garantizar privacidad. Por ello, se definieron DNS sobre TLS (DoT) en 2016 y DNS sobre HTTPS (DoH) en 2018. En los ultimos años se ha empleado la tunelización DNS para encapsular trafico maligno. Las versiones DoT y DoH han complicado la detección de estos túneles dado que los datos van encriptados. En trabajos anteriores se emplean técnicas de aprendizaje automático para identificar túneles DoH, pero tienen limitaciones. En este trabajo realizamos un análisis estadístico para aprender el patrón del tráfico DoH y estudiar las diferencias entre el tráfico benigno y el tráfico creado con herramientas de tunelización. El análisis revela que ciertos parámetros estadísticos permiten diferenciar el trafico. El siguiente paso de la investigación es aplicar técnicas más elaboradas basándonos en el análisis realizado.
Jimenez-Berenguel, Andrea; Moure-Garrido, Marta; García-Rubio, Carlos; Campo-Vázquez, Celeste
Caracterización de aplicaciones móviles mediante el análisis del tráfico DNS Proceedings Article
In: IX Jornadas Nacionales de Investigación en Ciberseguridad - JNIC 2024, pp. 506-507, Universidad de Sevilla, 2024, ISBN: 978-84-09-62140-8.
@inproceedings{andrea001,
title = {Caracterización de aplicaciones móviles mediante el análisis del tráfico DNS},
author = {Andrea Jimenez-Berenguel and Marta Moure-Garrido and Carlos García-Rubio and Celeste Campo-Vázquez},
url = {https://idus.us.es/handle/11441/159179
https://dialnet.unirioja.es/servlet/articulo?codigo=9633499
https://idus.us.es/bitstream/handle/11441/159179/ActasJNIC24%20%282%20ed%29.pdf?sequence=4&isAllowed=y},
isbn = {978-84-09-62140-8},
year = {2024},
date = {2024-05-28},
urldate = {2024-05-28},
booktitle = {IX Jornadas Nacionales de Investigación en Ciberseguridad - JNIC 2024},
pages = {506-507},
publisher = {Universidad de Sevilla},
abstract = {La privacidad del usuario sigue siendo vulnerable cuando se utilizan protocolos de comunicación cifrados, como HTTPS, cuando las consultas DNS se envían en texto claro a través del puerto UDP 53 (Do53). En este estudio, demostramos la posibilidad de caracterizar una aplicación móvil que utiliza un usuario basándonos en su tráfico Do53. Mediante el análisis de un conjunto de datos de tráfico, formado por 80 aplicaciones móviles Android, podemos identificar la aplicación que se está utilizando basándonos en sus consultas DNS con una precisión del 88,75 %. Aunque los sistemas operativos modernos, incluido Android desde la versión 9.0, admiten el tráfico DNS cifrado, esta función no está activada por defecto y depende del soporte del proveedor de DNS. Además, incluso cuando el tráfico DNS está cifrado, el proveedor de servicios DNS sigue teniendo acceso a nuestras consultas y podría extraer información de ellas.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Jimenez-Berenguel, Andrea; Moure-Garrido, Marta; Campo-Vázquez, Carlos García-Rubio Celeste
Characterizing Mobile Applications Through Analysis of DNS Traffic Conference
PE-WASUN '23: Proceedings of the Int'l ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor & Ubiquitous Networks., ACM, 2023, ISBN: N 979-8-4007-0370-6.
@conference{campo013,
title = {Characterizing Mobile Applications Through Analysis of DNS Traffic},
author = {Andrea Jimenez-Berenguel and Marta Moure-Garrido and Carlos García-Rubio Celeste Campo-Vázquez},
doi = {https://doi.org/10.1145/3616394.3618268},
isbn = {N 979-8-4007-0370-6},
year = {2023},
date = {2023-10-30},
urldate = {2023-10-30},
booktitle = {PE-WASUN '23: Proceedings of the Int'l ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor & Ubiquitous Networks.},
pages = {69-76},
publisher = {ACM},
abstract = {User privacy may remain vulnerable when using encrypted communication protocols, such as HTTPS, if DNS queries are sent in cleartext over UDP port 53 (Do53). In this study, we demonstrate the possibility of characterizing the mobile application a user is using based on its Do53 traffic. By analyzing a dataset of traffic captured from 80 Android mobile apps, we can identify the app being used based on its DNS queries with an accuracy of 88.75%. While modern operating systems, including Android since version 9.0, support encrypted DNS traffic, this feature is not enabled by default and relies on the DNS provider's support. Moreover, even when DNS traffic is encrypted, the DNS service provider still has access to our queries and could potentially extract information from them.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Moure-Garrido, Marta; Campo-Vázquez, Celeste; García-Rubio, Carlos
Real time detection of malicious DoH traffic using statistical analysis Journal Article
In: COMPUTER NETWORKS, vol. 234, iss. 109910, pp. 1-10, 2023, ISSN: 1389-1286.
@article{campo002,
title = {Real time detection of malicious DoH traffic using statistical analysis },
author = {Marta Moure-Garrido and Celeste Campo-Vázquez and Carlos García-Rubio},
url = {http://hdl.handle.net/10016/38151},
doi = {https://doi.org/10.1016/j.comnet.2023.109910},
issn = {1389-1286},
year = {2023},
date = {2023-10-09},
urldate = {2023-10-09},
journal = {COMPUTER NETWORKS},
volume = {234},
issue = {109910},
pages = {1-10},
abstract = {The DNS protocol plays a fundamental role in the operation of ubiquitous networks. All devices connected to these networks need DNS to work, both for traditional domain name to IP address translation, and for more advanced services such as resource discovery. DNS over HTTPS (DoH) solves certain security problems present in the DNS protocol. However, malicious DNS tunnels, a covert way of encapsulating malicious traffic in a DNS connection, are difficult to detect because the encrypted data prevents performing an analysis of the content of the DNS traffic.
In this study, we introduce a real-time system for detecting malicious DoH tunnels, which is based on analyzing DoH traffic using statistical methods. Our research demonstrates that it is feasible to identify in real-time malicious traffic by analyzing specific parameters extracted from DoH traffic. In addition, we conducted statistical analysis to identify the most significant features that distinguish malicious traffic from benign traffic. Using the selected features, we achieved satisfactory results in classifying DoH traffic as either benign or malicious.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
In this study, we introduce a real-time system for detecting malicious DoH tunnels, which is based on analyzing DoH traffic using statistical methods. Our research demonstrates that it is feasible to identify in real-time malicious traffic by analyzing specific parameters extracted from DoH traffic. In addition, we conducted statistical analysis to identify the most significant features that distinguish malicious traffic from benign traffic. Using the selected features, we achieved satisfactory results in classifying DoH traffic as either benign or malicious.
García-Rubio, Carlos; Campo, Celeste; Moure-Garrido, Marta
Synthetic Generation of Electrical Consumption Traces in Smart Homes Conference
Lecture Notes in Networks and Systems, vol. 594, Springer International Publishing, 2022, ISBN: 978-3-031-21332-8.
@conference{garciarubio008,
title = {Synthetic Generation of Electrical Consumption Traces in Smart Homes},
author = {Carlos García-Rubio and Celeste Campo and Marta Moure-Garrido },
url = {https://link.springer.com/chapter/10.1007/978-3-031-21333-5_68},
doi = {https://doi.org/10.1007/978-3-031-21333-5_68},
isbn = {978-3-031-21332-8},
year = {2022},
date = {2022-11-21},
urldate = {2022-11-21},
booktitle = { Lecture Notes in Networks and Systems},
volume = {594},
pages = {681-692},
publisher = {Springer International Publishing},
abstract = {With the introduction of the smart grid, smart meters and smart plugs, it is possible to know the energy consumption of a smart home, either per appliance or aggregate. Some recent works have used energy consumption traces to detect anomalies, either in the behavior of the inhabitants or in the operation of some device in the smart home. To train and test the algorithms that detect these anomalies, it is necessary to have extensive and well-annotated consumption traces. However, this type of traces is difficult to obtain. In this paper we describe a highly configurable synthetic electrical trace generator, with characteristics similar to real traces, that can be used in this type of study. In order to have a more realistic behavior, the traces are generated by adding the consumption of several simulated appliances, which precisely represent the consumption of different typical electrical devices. Following the behavior of the real traces, variations at different scales of time and anomalies are introduced to the aggregated smart home energy consumption.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Moure-Garrido, Marta; Campo-Vázquez, Celeste; García-Rubio, Carlos
Detecting Malicious Use of DoH Tunnels Using Statistical Traffic Analysis Conference
PE-WASUN '22: Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ACM, 2022, ISBN: 978-1-4503-9483-3.
@conference{campo015,
title = {Detecting Malicious Use of DoH Tunnels Using Statistical Traffic Analysis},
author = {Marta Moure-Garrido and Celeste Campo-Vázquez and Carlos García-Rubio},
url = {https://dl.acm.org/doi/10.1145/3551663.3558605},
doi = {https://doi.org/10.1145/3551663.3558605},
isbn = {978-1-4503-9483-3},
year = {2022},
date = {2022-10-24},
urldate = {2022-10-24},
booktitle = {PE-WASUN '22: Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks},
publisher = {ACM},
abstract = {DNS plays a fundamental role in the operation of ubiquitous networks. All devices connected to these networks need DNS to work, both for traditional domain name to IP address translation, and for more advanced services such as resource discovery. At first, the DNS communication protocol presented certain security problems: integrity, authenticity and confidentiality. DNSSEC provides security but still does not guarantee confidentiality. To solve this problem, DNS over TLS (DoT) and DNS over HTTPS (DoH) were defined. In recent years, DNS tunneling, a covert form of encapsulating data transmission, has been used to encapsulate malicious traffic in a DNS connection. DoT and DoH versions complicate the detection of these tunnels because the encrypted data prevents performing an analysis of the content of the DNS traffic. Previous work has used machine learning techniques to identify DoH tunnels, but these have limitations. In this study, we identify the most significant features that singularize malicious traffic from benign traffic by statistical analysis. Based on the selected features, we obtain satisfactory results in the classification between benign and malicious DoH traffic. The study reveals that it is possible to differentiate traffic based on certain statistical parameters.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Moure-Garrido, Marta; Campo-Vázquez, Celeste; García-Rubio, Carlos
Entropy-Based Anomaly Detection in HouseholdElectricity Consumption Journal Article
In: Energies, vol. 15, 2022, ISSN: 1996-1073.
@article{campo003,
title = {Entropy-Based Anomaly Detection in HouseholdElectricity Consumption},
author = {Marta Moure-Garrido and Celeste Campo-Vázquez and Carlos García-Rubio},
doi = {https://doi.org/10.3390/en15051837},
issn = {1996-1073},
year = {2022},
date = {2022-03-02},
urldate = {2022-03-02},
journal = {Energies},
volume = {15},
abstract = {Energy efficiency is one of the most important current challenges, and its impact at a global level is considerable. To solve current challenges, it is critical that consumers are able to control their energy consumption. In this paper, we propose using a time series of window-based entropy to detect anomalies in the electricity consumption of a household when the pattern of consumption behavior exhibits a change. We compare the accuracy of this approach with two machine learning approaches, random forest and neural networks, and with a statistical approach, the ARIMA model. We study whether these approaches detect the same anomalous periods. These different techniques have been evaluated using a real dataset obtained from different households with different consumption profiles from the Madrid Region. The entropy-based algorithm detects more days classified as anomalous according to context information compared to the other algorithms. This approach has the advantages that it does not require a training period and that it adapts dynamically to changes, except in vacation periods when consumption drops drastically and requires some time for adapting to the new situation.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Seoane-Merida, Victor; García-Rubio, Carlos; Almenares-Mendoza, Florina; Campo-Vázquez, Celeste
Performance evaluation of CoAP and MQTT with security support for IoT environments Journal Article
In: COMPUTER NETWORKS, vol. 197, iss. 108338, pp. 1-22, 2021, ISSN: 1389-1286.
@article{campos004,
title = {Performance evaluation of CoAP and MQTT with security support for IoT environments},
author = {Victor Seoane-Merida and Carlos García-Rubio and Florina Almenares-Mendoza and Celeste Campo-Vázquez},
url = {http://hdl.handle.net/10016/33795},
doi = {https://doi.org/10.1016/j.comnet.2021.108338},
issn = {1389-1286},
year = {2021},
date = {2021-10-04},
urldate = {2021-10-04},
journal = {COMPUTER NETWORKS},
volume = {197},
issue = {108338},
pages = {1-22},
abstract = {World is living an overwhelming explosion of smart devices: electronic gadgets, appliances, meters, cars, sensors, camera and even traffic lights, that are connected to the Internet to extend their capabilities, constituting what is known as Internet of Things (IoT). In these environments, the application layer is decisive for the quality of the connection, which has dependencies to the transport layer, mainly when secure communications are used. This paper analyses the performance offered by these two most popular protocols for the application layer: Constrained Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT). This analysis aims to examine the features and capabilities of the two protocols and to determine their feasibility to operate under constrained devices taking into account security support and diverse network conditions, unlike the previous works. Since IoT devices typically show battery constraints, the analysis is focused on bandwidth and CPU use, using realistic network scenarios, since this use translates to power consumption.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Seoane-Merida, Victor; Almenares-Mendoza, Florina; Campo-Vázquez, Celeste; García-Rubio, Carlos
Performance Evaluation of the CoAP Protocol with Security Support for IoT Environments Conference
PE-WASUN '20: Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ASSOCIATION FOR COMPUTING MACHINERY, INC , 2020, ISBN: 978-1-4503-8118-5.
@conference{campo016b,
title = {Performance Evaluation of the CoAP Protocol with Security Support for IoT Environments},
author = {Victor Seoane-Merida and Florina Almenares-Mendoza and Celeste Campo-Vázquez and Carlos García-Rubio},
doi = {https://doi.org/10.1145/3416011.3424754},
isbn = {978-1-4503-8118-5},
year = {2020},
date = {2020-11-09},
urldate = {2020-11-09},
booktitle = {PE-WASUN '20: Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks},
pages = {41-48},
publisher = {ASSOCIATION FOR COMPUTING MACHINERY, INC },
abstract = {Internet of Things (IoT) can be defined as the interconnection through Internet of an unprecedented number of devices with the purpose of exchanging data. It stands as one of the most popular technologies for the following years and it is requiring substantial changes in the Internet protocols to meet its requirements. As the application layer is decisive for the quality of the connection, this paper analyzes the performance offered by one of the most popular protocols for the application layer in IoT: the Constrained Application Protocol (CoAP). This analysis aims to examine the features and capabilities of this protocol and to determine its feasibility to operate under constrained devices using security support. For this, a realistic network scenario is deployed to run the simulations and to measure bandwidth, consumption of resources (i.e., CPU cycles and bandwidth usage) and communication latency. Additionally, the trade-off between security and performance is discussed measuring the bandwidth overhead and the consumption increase associated to secure the communications. Different ciphering and authentication algorithms are tested, following the recommendations made by the Internet Engineering Task Force (IETF).},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Diaz-Redondo, Rebeca; García-Rubio, Carlos; Campo-Vázquez, Ana Fernandez-Vilas Celeste; Rodriguez-Carrion, Alicia
A hybrid analysis of LBSN data to early detect anomalies in crowd dynamics Journal Article
In: Future generation computer systems, vol. 109, pp. 83-94, 2020, ISSN: 0167-739X.
@article{campo005,
title = {A hybrid analysis of LBSN data to early detect anomalies in crowd dynamics},
author = {Rebeca Diaz-Redondo and Carlos García-Rubio and Ana Fernandez-Vilas Celeste Campo-Vázquez and Alicia Rodriguez-Carrion},
url = {http://hdl.handle.net/10016/33771},
doi = {https://doi.org/10.1016/j.future.2020.03.038},
issn = {0167-739X},
year = {2020},
date = {2020-08-10},
urldate = {2020-08-10},
journal = {Future generation computer systems},
volume = {109},
pages = {83-94},
abstract = {Undoubtedly, Location-based Social Networks (LBSNs) provide an interesting source of geo-located data that we have previously used to obtain patterns of the dynamics of crowds throughout urban areas. According to our previous results, activity in LBSNs reflects the real activity in the city. Therefore, unexpected behaviors in the social media activity are a trustful evidence of unexpected changes of the activity in the city. In this paper we introduce a hybrid solution to early detect these changes based on applying a combination of two approaches, the use of entropy analysis and clustering techniques, on the data gathered from LBSNs. In particular, we have performed our experiments over a data set collected from Instagram for seven months in New York City, obtaining promising results.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Moure-Garrido, Marta; Campo-Vázquez, Celeste; García-Rubio, Carlos
Anomalies detection using entropy in household energy consumption data Conference
Intelligent Environments 2020 Workshop Proceedings of the 16th International Conference on Intelligent Environments, 2020, ISBN: 978-1-64368-090-3.
@conference{campo016,
title = {Anomalies detection using entropy in household energy consumption data },
author = {Marta Moure-Garrido and Celeste Campo-Vázquez and Carlos García-Rubio},
url = {https://ebooks.iospress.nl/publication/54775},
doi = {10.3233/AISE200055},
isbn = {978-1-64368-090-3},
year = {2020},
date = {2020-05-04},
urldate = {2020-05-04},
booktitle = {Intelligent Environments 2020 Workshop Proceedings of the 16th International Conference on Intelligent Environments},
pages = {311-320},
abstract = {The growing boom in smart grids and home automation makes possible
to obtain information of household energy consumption. In this work, we study if
entropy is a good mechanism to detect anomalies in household energy consumption traces. We propose an entropy algorithm based on windowing the temporal
series of energy consumption. We select a trace with a duration of 3 months from
the REFIT project household energy consumption data set, available open access.
Entropy can adapt to changes in consumption in this trace, by learning and forgetting patterns dynamically. Although entropy is a promising technique and it has
many advantages, as the traces in this data set are not sufficiently labeled to check
the correct functioning of the algorithms, we propose to further validate the results
using synthetic traces.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
to obtain information of household energy consumption. In this work, we study if
entropy is a good mechanism to detect anomalies in household energy consumption traces. We propose an entropy algorithm based on windowing the temporal
series of energy consumption. We select a trace with a duration of 3 months from
the REFIT project household energy consumption data set, available open access.
Entropy can adapt to changes in consumption in this trace, by learning and forgetting patterns dynamically. Although entropy is a promising technique and it has
many advantages, as the traces in this data set are not sufficiently labeled to check
the correct functioning of the algorithms, we propose to further validate the results
using synthetic traces.
AGUILAR-IGARTUA, MÓNICA; ALMENARES-MENDOZA, FLORINA; DÍAZ-REDONDO, REBECA; MARTÍN-VICENTE, MANUELA; FORNÉ, JORDI; CAMPO, CELESTE; FERNÁNDEZ-VILAS, ANA; CRUZ-LLOPIS, LUIS; GARCÍA-RUBIO, CARLOS; MARÍN-LÓPEZ, ANDRÉS; MOHAMAD-MEZHER, AHMAD; DÍAZ-SÁNCHEZ, DANIEL; CEREZO-COSTAS, HÉCTOR; REBOLLO-MONEDERO, DAVID; ARIAS-CABARCOS, PATRICIA; RICO-NOVELLA, FRANCISCO JOSÉ
INRISCO: INcident monitoRing in Smart COmmunities Journal Article
In: IEEE Access, vol. 8, pp. 72435 - 72460, 2020, ISSN: 2169-3536.
@article{almenarez006,
title = {INRISCO: INcident monitoRing in Smart COmmunities},
author = {MÓNICA AGUILAR-IGARTUA AND FLORINA ALMENARES-MENDOZA AND REBECA DÍAZ-REDONDO AND MANUELA MARTÍN-VICENTE AND JORDI FORNÉ AND CELESTE CAMPO AND ANA FERNÁNDEZ-VILAS AND LUIS CRUZ-LLOPIS AND CARLOS GARCÍA-RUBIO AND ANDRÉS MARÍN-LÓPEZ AND AHMAD MOHAMAD-MEZHER AND DANIEL DÍAZ-SÁNCHEZ AND HÉCTOR CEREZO-COSTAS AND DAVID REBOLLO-MONEDERO AND PATRICIA ARIAS-CABARCOS AND FRANCISCO JOSÉ RICO-NOVELLA
},
url = {https://ieeexplore.ieee.org/document/9064504
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9064504},
doi = {https://doi.org/10.1109/ACCESS.2020.2987483},
issn = {2169-3536},
year = {2020},
date = {2020-04-13},
urldate = {2020-04-13},
journal = {IEEE Access},
volume = {8},
pages = {72435 - 72460},
abstract = {Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors in motion. Carrying their mobile devices, moving in their connected vehicles or actively participating in social networks, citizens provide a wealth of information that, after properly processing, can support numerous applications for the benefit of the community. In the context of smart communities, the INRISCO [1] proposal intends for (i) the early detection of abnormal situations in cities (i.e., incidents), (ii) the analysis of whether, according to their impact, those incidents are really adverse for the community; and (iii) the automatic actuation by dissemination of appropriate information to citizens and authorities. Thus, INRISCO will identify and report on incidents in traffic (jam, accident) or public infrastructure (e.g., works, street cut), the occurrence of specific events that affect other citizens' life (e.g., demonstrations, concerts), or environmental problems (e.g., pollution, bad weather). It is of particular interest to this proposal the identification of incidents with a social and economic impact, which affects the quality of life of citizens.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Martí, Mónica; García-Rubio, Carlos; Campo-Vázquez, Celeste
Performance Evaluation of CoAP and MQTT_SN in an IoT Environment Conference
Proceedings of 13th International Conference on Ubiquitous Computing and Ambient Intelligence UCAmI 2019, MDPI AG , 2019.
@conference{campo017,
title = {Performance Evaluation of CoAP and MQTT_SN in an IoT Environment},
author = {Mónica Martí and Carlos García-Rubio and Celeste Campo-Vázquez },
doi = {https://doi.org/10.3390/proceedings2019031049},
year = {2019},
date = {2019-11-20},
urldate = {2019-11-20},
booktitle = {Proceedings of 13th International Conference on Ubiquitous Computing and Ambient Intelligence UCAmI 2019},
publisher = {MDPI AG },
abstract = {The fast growth of the Internet of Things (IoT) has made this technology one of the most promising paradigms of recent years. Wireless Sensor Networks (WSNs) are one of the most important challenges of the Internet of things. These networks are made up of devices with limited processing power, memory, and energy. The constrained nature of WSNs makes it necessary to have specific restricted protocols to work in these environments. In this paper, we present an energy consumption and network traffic study of the main IoT application layer protocols, the Constrained Application Protocol (CoAP), and the version of Message Queue Telemetry Transport (MQTT) for sensor networks (MQTT_SN). The simulations presented evaluate the performance of these protocols with different network configurations.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
García-Rubio, Carlos; Diaz-Redondo, Rebeca; Campo-Vázquez, Celeste; Fernandez-Vilas, Ana
Using entropy of social media location data for the detection of crowd dynamics anomalies Journal Article
In: Electronics, vol. 7, iss. 12, pp. 380, 2018, ISSN: 2079-9292.
@article{campo006,
title = {Using entropy of social media location data for the detection of crowd dynamics anomalies},
author = {Carlos García-Rubio and Rebeca Diaz-Redondo and Celeste Campo-Vázquez and Ana Fernandez-Vilas },
url = {http://hdl.handle.net/10016/33760},
doi = {https://doi.org/10.3390/electronics7120380},
issn = {2079-9292},
year = {2018},
date = {2018-12-03},
urldate = {2018-12-03},
journal = {Electronics},
volume = {7},
issue = {12},
pages = {380},
abstract = {Evidence of something unusual happening in urban areas can be collected from different data sources, such as police officers, cameras, or specialized physical infrastructures. In this paper, we propose using geotagged posts on location-based social networks (LBSNs) to detect crowd dynamics anomalies automatically as evidence of a potential unusual event. To this end, we use the Instagram API media/search endpoint to collect the location of the pictures posted by Instagram users in a given area periodically. The collected locations are summarized by their centroid. The novelty of our work relies on using the entropy of the sequence of centroid locations in order to detect abnormal patterns in the city. The proposal is tested on a data set collected from Instagram during seven months in New York City and validated with another data set from Manchester. The results have also been compared with an alternative approach, a training phase plus a ranking of outliers. The main conclusion is that the entropy algorithm succeeds inn finding abnormal events without the need for a training phase, being able to dynamically adapt to changes in crowd behavior.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Rodriguez-Carrion, Alicia; Campo-Vázquez, Celeste; García-Rubio, Carlos
Detecting and reducing biases in cellular-based mobility data sets Journal Article
In: Entropy, vol. 20, iss. 10, 2018, ISSN: 1099-4300.
@article{campo007,
title = {Detecting and reducing biases in cellular-based mobility data sets},
author = {Alicia Rodriguez-Carrion and Celeste Campo-Vázquez and Carlos García-Rubio},
url = {http://hdl.handle.net/10016/28004},
doi = {https://doi.org/10.3390/e20100736},
issn = {1099-4300},
year = {2018},
date = {2018-09-25},
urldate = {2018-09-25},
journal = {Entropy},
volume = {20},
issue = {10},
abstract = {Correctly estimating the features characterizing human mobility from mobile phone traces is a key factor to improve the performance of mobile networks, as well as for mobility model design and urban planning. Most related works found their conclusions on location data based on the cells where each user sends or receives calls or messages, data known as Call Detail Records (CDRs). In this work, we test if such data sets provide enough detail on users’ movements so as to accurately estimate some of the most studied mobility features. We perform the analysis using two different data sets, comparing CDRs with respect to an alternative data collection approach. Furthermore, we propose three filtering techniques to reduce the biases detected in the fraction of visits per cell, entropy and entropy rate distributions, and predictability. The analysis highlights the need for contextualizing mobility results with respect to the data used, since the conclusions are biased by the mobile phone traces collection approach.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
García-Lozano, Estrella; Campo-Vázquez, Celeste; García-Rubio, Carlos; Rodriguez-Carrion, Alicia
A Bandwidth-Efficient Dissemination Scheme of Non-Safety Information in Urban VANETs Journal Article
In: Sensors , vol. 16, iss. 7, 2016, ISSN: 1424-8220.
@article{campos008,
title = {A Bandwidth-Efficient Dissemination Scheme of Non-Safety Information in Urban VANETs},
author = {Estrella García-Lozano and Celeste Campo-Vázquez and Carlos García-Rubio and Alicia Rodriguez-Carrion },
url = {http://hdl.handle.net/10016/27911},
doi = {https://doi.org/10.3390/s16070988},
issn = {1424-8220},
year = {2016},
date = {2016-06-27},
urldate = {2016-06-27},
journal = {Sensors },
volume = {16},
issue = {7},
abstract = {The recent release of standards for vehicular communications will hasten the development of smart cities in the following years. Many applications for vehicular networks, such as blocked road warnings or advertising, will require multi-hop dissemination of information to all vehicles in a region of interest. However, these networks present special features and difficulties that may require special measures. The dissemination of information may cause broadcast storms. Urban scenarios are especially sensitive to broadcast storms because of the high density of vehicles in downtown areas. They also present numerous crossroads and signal blocking due to buildings, which make dissemination more difficult than in open, almost straight interurban roadways. In this article, we discuss several options to avoid the broadcast storm problem while trying to achieve the maximum coverage of the region of interest. Specifically, we evaluate through simulations different ways to detect and take advantage of intersections and a strategy based on store-carry-forward to overcome short disconnections between groups of vehicles. Our conclusions are varied, and we propose two different solutions, depending on the requirements of the application.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Rodriguez-Carrion, Alicia; García-Rubio, Carlos; Campo-Vázquez, Celeste; Das, Sajal
Analysis of a fast LZ-based entropy estimator for mobility data Conference
2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), IEEE Publishing Services , 2015, ISBN: 978-1-4799-8425-1.
@conference{campo017b,
title = {Analysis of a fast LZ-based entropy estimator for mobility data},
author = { Alicia Rodriguez-Carrion and Carlos García-Rubio and Celeste Campo-Vázquez and Sajal Das },
doi = {https://doi.org/10.1109/percomw.2015.7134080},
isbn = {978-1-4799-8425-1},
year = {2015},
date = {2015-06-29},
urldate = {2015-06-29},
booktitle = {2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)},
pages = {451-456},
publisher = {IEEE Publishing Services },
abstract = {Randomness in people's movements might serve to detect behavior anomalies. The concept of entropy can be used for this purpose, but its estimation is computational intensive, particularly when processing long movement histories. Moreover, disclosing such histories to third parties may violate user privacy. With a goal to keep the mobility data in the mobile device itself yet being able to measure randomness, we propose three fast entropy estimators based on Lempel-Ziv (LZ) prediction algorithms. We evaluated them with 95 movement histories of real users tracked during 9 months using GSM-based mobility data. The results show that the entropy tendencies of the approaches proposed in this work and those in the literature are the same as time evolves. Therefore, our proposed approach could potentially detect variations in the mobility patterns of the user with a lower computational cost. This allows to unveil shifts in the users mobility behavior without disclosing their sensible location data.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Rodriguez-Carrion, Alicia; Rebollo-Monedero, David; Forne, Jordi; Campo-Vázquez, Celeste; García-Rubio, Carlos; Parra-Arnau, Javier; Das, Sajal
Entropy-based privacy against profiling of user mobility Journal Article
In: Entropy, vol. 17, iss. 6, pp. 3913-3946, 2015, ISSN: 1099-4300.
@article{campo009,
title = {Entropy-based privacy against profiling of user mobility},
author = {Alicia Rodriguez-Carrion and David Rebollo-Monedero and Jordi Forne and Celeste Campo-Vázquez and Carlos García-Rubio and Javier Parra-Arnau and Sajal Das},
url = {http://hdl.handle.net/10016/27924},
doi = {https://doi.org/10.3390/e17063913},
issn = {1099-4300},
year = {2015},
date = {2015-06-10},
urldate = {2015-06-10},
journal = {Entropy},
volume = {17},
issue = {6},
pages = {3913-3946},
abstract = {Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be exploited by the LBS provider to build the user profile of visited locations, which might disclose sensitive data, such as work or home locations. The classic concept of entropy is widely used to evaluate privacy in these scenarios, where the information is represented as a sequence of independent samples of categorized data. However, since the LBS queries might be sent very frequently, location profiles can be improved by adding temporal dependencies, thus becoming mobility profiles, where location samples are not independent anymore and might disclose the user's mobility patterns. Since the time dimension is factored in, the classic entropy concept falls short of evaluating the real privacy level, which depends also on the time component. Therefore, we propose to extend the entropy-based privacy metric to the use of the entropy rate to evaluate mobility profiles. Then, two perturbative mechanisms are considered to preserve locations and mobility profiles under gradual utility constraints. We further use the proposed privacy metric and compare it to classic ones to evaluate both synthetic and real mobility profiles when the perturbative methods proposed are applied. The results prove the usefulness of the proposed metric for mobility profiles and the need for tailoring the perturbative methods to the features of mobility profiles in order to improve privacy without completely loosing utility.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
García-Lozano, Estrella; Campo-Vázquez, Celeste; García-Rubio, Carlos; Cortés, Alberto
Bandwidth-efficient techniques for information dissemination in urban vehicular networks Conference
PE-WASUN '14: Proceedings of the 11th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks, ASSOCIATION FOR COMPUTING MACHINERY, INC , 2014, ISBN: 978-1-4503-3025-1.
@conference{campo019,
title = {Bandwidth-efficient techniques for information dissemination in urban vehicular networks},
author = {Estrella García-Lozano and Celeste Campo-Vázquez and Carlos García-Rubio and Alberto Cortés},
doi = {https://doi.org/10.1145/2653481.2653483},
isbn = {978-1-4503-3025-1},
year = {2014},
date = {2014-09-21},
urldate = {2014-09-21},
booktitle = {PE-WASUN '14: Proceedings of the 11th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks},
pages = {61-68},
publisher = {ASSOCIATION FOR COMPUTING MACHINERY, INC },
abstract = {Many applications for vehicular networks, such as blocked road warnings or advertising, will require multi-hop dissemination of information to all vehicles in a region of interest. However, this type of communication can cause broadcast storms. Urban scenarios are especially sensitive to broadcast storms because of the high density of vehicles in downtown areas. They also present numerous crossroads and signal blocking due to buildings, that make dissemination more difficult than in open, almost straight interurban roadways. In this article, we study different ways to tackle a multi-hop broadcast of information in an urban area.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Rodriguez-Carrion, Alicia; Das, Sajal; Campo-Vázquez, Celeste; García-Rubio, Carlos
Impact of location history collection schemes on observed human mobility features Conference
2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2014, ISBN: 978-1-4799-2736-4.
@conference{nokey,
title = {Impact of location history collection schemes on observed human mobility features},
author = {Alicia Rodriguez-Carrion and Sajal Das and Celeste Campo-Vázquez and Carlos García-Rubio},
doi = {https://doi.org/10.1109/percomw.2014.6815213},
isbn = {978-1-4799-2736-4},
year = {2014},
date = {2014-05-15},
urldate = {2014-05-15},
booktitle = {2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)},
pages = {254-259},
publisher = {IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC },
abstract = {Human mobility knowledge is key for urban planning or mobility models design. Therefore, estimating reliable mobility parameters is crucial to lay an unbiased foundation. However, most works estimating such features rely on datasets made up of the history of mobile network cells where the user is located when she makes active use of the network, known as Call Data Records (CDRs), or every time the her device connects to a new cell, without taking into account cell changes not caused by movement. Could we accurately characterize human mobility with such datasets? In this work we consider three approaches to collect network-based mobility data, propose three filtering techniques to delete cell changes not caused by movement and compare mobility features extracted from the traces collected with each approach. The analysis unveils the need for a filtering step to avoid important biases, and the negative impact that using CDRs may have in estimating mobility parameters.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Familiar, Miguel; Martínez, Jose; García-Rubio, Carlos
Service architecting and dynamic composition in pervasive smart ecosystems for the internet of things based on sensor network technology Journal Article
In: Journal of Ambient Intelligence and Smart Environments , vol. 6, iss. 3, pp. 331-333, 2014, ISBN: 1876-1364.
@article{garciarubio006,
title = {Service architecting and dynamic composition in pervasive smart ecosystems for the internet of things based on sensor network technology},
author = {Miguel Familiar and Jose Martínez and Carlos García-Rubio },
doi = {https://doi.org/10.3233/ais-140262},
isbn = {1876-1364},
year = {2014},
date = {2014-05-05},
urldate = {2014-05-05},
journal = {Journal of Ambient Intelligence and Smart Environments },
volume = {6},
issue = {3},
pages = {331-333},
publisher = {Journal of Ambient Intelligence and Smart Environments},
abstract = {The present article summarizes the doctoral dissertation of Miguel S. Familiar.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
García-Lozano, Estrella; Campo-Vázquez, Celeste; García-Rubio, Carlos; Cortés, Alberto; Rodriguez-Carrion, Alicia; Noriega-Vivas, Patricia
A Bandwidth-Efficient Service for Local Information Dissemination in Sparse to Dense Roadways Journal Article
In: Sensors , vol. 13, iss. 7, pp. 8612-8639, 2013, ISSN: 1424-3210.
@article{campo014,
title = {A Bandwidth-Efficient Service for Local Information Dissemination in Sparse to Dense Roadways},
author = {Estrella García-Lozano and Celeste Campo-Vázquez and Carlos García-Rubio and Alberto Cortés and Alicia Rodriguez-Carrion and Patricia Noriega-Vivas},
url = {http://hdl.handle.net/10016/27912},
doi = {https://doi.org/10.3390/s130708612},
issn = {1424-3210},
year = {2013},
date = {2013-07-05},
urldate = {2013-07-05},
journal = {Sensors },
volume = {13},
issue = {7},
pages = {8612-8639},
abstract = {Thanks to the research on Vehicular Ad Hoc Networks (VANETs), we will be able to deploy applications on roadways that will contribute to energy efficiency through a better planning of long trips. With this goal in mind, we have designed a gas/charging station advertising system, which takes advantage of the broadcast nature of the network. We have found that reducing the number of total sent packets is important, as it allows for a better use of the available bandwidth. We have designed improvements for a distance-based flooding scheme, so that it can support the advertising application with good results in sparse to dense roadway scenarios.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Rodriguez-Carrion, Alicia; Campo-Vázquez, Celeste; García-Rubio, Carlos; García-Lozano, Estrella; Cortés, Alberto
Ubiquitous Computing and Ambient Intelligence. Context-Awareness and Context-Driven Interaction, Springer International Publishing, 2013, ISSN: 978-3-319-03176-7.
@conference{campo020,
title = {Characterizing Mobile Telephony Signals in Indoor Environments for Their Use in Fingerprinting-Based User Location },
author = {Alicia Rodriguez-Carrion and Celeste Campo-Vázquez and Carlos García-Rubio and Estrella García-Lozano and Alberto Cortés},
doi = {https://doi.org/10.1007/978-3-319-03176-7_29},
issn = {978-3-319-03176-7},
year = {2013},
date = {2013-05-08},
urldate = {2013-05-08},
booktitle = {Ubiquitous Computing and Ambient Intelligence. Context-Awareness and Context-Driven Interaction},
pages = {223-230},
publisher = {Springer International Publishing},
abstract = {Fingerprinting techniques have been applied to locate users in indoor scenarios using WiFi signals. Although mobile telephony network is used for outdoor location, it is widely deployed and their signal more stable, thus being also a candidate to be used for fingerprinting. This paper describes the characterization of GSM/UMTS signals in indoor scenarios to check if their features allow to use them for constructing the radio maps needed for fingerprinting purposes. We have developed an Android application to collect the received signal information, such that makes the measurement process cheaper and easier. Measurements show that changes in location and device orientation can be identified by observing the received signal strength of the connected and neighboring base stations. Besides, detecting this variability is easier by using the GSM network than with UMTS technology. Therefore mobile telephony network seems suitable to perform fingerprinting-based indoor location.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
García-Lozano, Estrella; Campo-Vázquez, Celeste; García-Rubio, Carlos; Cortés, Alberto
Bandwidth Efficient Broadcasting in VANETs Conference
8th International Wireless Communications and Mobile Computing Conference (IWCMC-2012), IEEE, 2012, ISSN: 2376-6492.
@conference{campo022,
title = {Bandwidth Efficient Broadcasting in VANETs },
author = {Estrella García-Lozano and Celeste Campo-Vázquez and Carlos García-Rubio and Alberto Cortés},
url = {https://ieeexplore.ieee.org/abstract/document/6314358#:~:text=10.1109/IWCMC.2012.6314358},
doi = {10.1109/IWCMC.2012.6314358},
issn = {2376-6492},
year = {2012},
date = {2012-09-27},
urldate = {2012-09-27},
booktitle = {8th International Wireless Communications and Mobile Computing Conference (IWCMC-2012)},
pages = {1091-1096},
publisher = {IEEE},
abstract = {Wireless communications amongst vehicles bring the opportunity for a wide range of applications, from safety aid to passenger entertainment. The necessity to broadcast information to several-hop neighbors is common to most of the potential application protocols. Broadcast protocols for VANETs based on diverse techniques have already been proposed. In this article, we compare basic broadcast schemes that are not dependent on neighbor knowledge using ns-2 - simple flooding, probabilistic, counter-based, distance-based and traffic-based broadcast. The objective is to obtain general directions for the design of a bandwidth efficient broadcast. Based on this comparison, we have selected distance-based flooding and proposed a scheme that is easy to adjust to the application's necessities.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Rodriguez-Carrion, Alicia; García-Rubio, Carlos; Campo-Vázquez, Celeste; Cortés, Alberto; García-Lozano, Estrella
Study of LZ-Based Location Prediction and Its Application to Transportation Recommender Systems Journal Article
In: Sensors , vol. 12, iss. 6, pp. 7496-7517, 2012, ISSN: 1424-8220.
@article{campo009b,
title = {Study of LZ-Based Location Prediction and Its Application to Transportation Recommender Systems},
author = {Alicia Rodriguez-Carrion and Carlos García-Rubio and Celeste Campo-Vázquez and Alberto Cortés and Estrella García-Lozano },
url = {http://hdl.handle.net/10016/27902},
doi = {https://doi.org/10.3390/s120607496},
issn = {1424-8220},
year = {2012},
date = {2012-06-04},
urldate = {2012-06-04},
journal = {Sensors },
volume = {12},
issue = {6},
pages = {7496-7517},
abstract = {Predicting users' next location allows to anticipate their future context, thus providing additional time to be ready for that context and react consequently. This work is focused on a set of LZ-based algorithms (LZ, LeZi Update and Active LeZi) capable of learning mobility patterns and estimating the next location with low resource needs, which makes it possible to execute them on mobile devices. The original algorithms have been divided into two phases, thus being possible to mix them and check which combination is the best one to obtain better prediction accuracy or lower resource consumption. To make such comparisons, a set of GSM-based mobility traces of 95 different users is considered. Finally, a prototype for mobile devices that integrates the predictors in a public transportation recommender system is described in order to show an example of how to take advantage of location prediction in an ubiquitous computing environment.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Noriega-Vivas, Patricia; Campo-Vázquez, Celeste; García-Rubio, Carlos; Rodriguez-Carrion, Alicia
MOFETA: A Network Architecture Based on MObile FEmtocells to Enhance Cellular Connectivity on TrAins Conference
Communication Technologies for Vehicles: Proceedings 4th International Workshop, Nets4Cars/Nets4Trains 2012, Springer International Publishing, 2012, ISBN: 978-3-642-29666-6.
@conference{campo023,
title = {MOFETA: A Network Architecture Based on MObile FEmtocells to Enhance Cellular Connectivity on TrAins},
author = {Patricia Noriega-Vivas and Celeste Campo-Vázquez and Carlos García-Rubio and Alicia Rodriguez-Carrion },
doi = {https://doi.org/10.1007/978-3-642-29667-3_15},
isbn = {978-3-642-29666-6},
year = {2012},
date = {2012-05-15},
urldate = {2012-05-15},
booktitle = {Communication Technologies for Vehicles: Proceedings 4th International Workshop, Nets4Cars/Nets4Trains 2012},
pages = {174-185},
publisher = {Springer International Publishing},
abstract = {Nowadays the quality of the indoor coverage on trains is not enough to offer broadband services, mainly due to two factors: the high penetration losses caused by Faraday cage characteristics of the railcars and the high speeds reached. In this paper we aim to enhance the 3G indoor coverage on trains by setting up femtocells inside the railcars and establishing several wireless interfaces along the roof of the train. We design an architecture to connect the train to the fixed network in a transparent manner, so that the end users do not experience service disruptions during the journey. Finally, we deploy a testbed to evaluate the performance of the mobility management system based on test results.
},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
García-Lozano, Estrella; Campo-Vázquez, Celeste; García-Rubio, Carlos; Cortés, Alberto; Rodriguez-Carrion, Alicia; Noriega-Vivas, Patricia
An Efficient, Eco-Friendly Approach for Push-Advertising of Services in VANETs. Conference
VI International Symposium on Ubiquitous Computing and Ambient Intelligence (UCAmI 2012), Springer Berlin Heidelberg, 2012, ISBN: 978-3-642-35376-5.
@conference{campo021,
title = {An Efficient, Eco-Friendly Approach for Push-Advertising of Services in VANETs.},
author = {Estrella García-Lozano and Celeste Campo-Vázquez and Carlos García-Rubio and Alberto Cortés and Alicia Rodriguez-Carrion and Patricia Noriega-Vivas},
doi = {https://doi.org/10.1007/978-3-642-35377-2_7},
isbn = {978-3-642-35376-5},
year = {2012},
date = {2012-05-08},
urldate = {2012-05-08},
booktitle = {VI International Symposium on Ubiquitous Computing and Ambient Intelligence (UCAmI 2012)},
pages = {50-57},
publisher = {Springer Berlin Heidelberg},
abstract = {Thanks to the research on VANETs, we will be able to deploy applications on highways that will contribute to the energy efficiency through a better planning of long trips. With this goal in mind, we have designed a gas/charging station advertising system, that takes advantage of the broadcast nature of the network. We have found that reducing the number of total sent packets is important, as it allows a better use of the available bandwidth. We have optimized a distance-based flooding scheme so that it can support the advertising application with good results in a highway scenario.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
García-Rubio, Carlos; Familiar, Miguel; Martínez, Jose; Corredor, Ivan
Building service-oriented Smart Infrastructures over Wireless Ad Hoc Sensor Networks: A middleware perspective Journal Article
In: COMPUTER NETWORKS, vol. 56, iss. 4, pp. 1303-1328, 2012, ISSN: 1389-1286.
@article{garciarubio005,
title = {Building service-oriented Smart Infrastructures over Wireless Ad Hoc Sensor Networks: A middleware perspective},
author = {Carlos García-Rubio and Miguel Familiar and Jose Martínez and Ivan Corredor},
doi = {https://doi.org/10.1016/j.comnet.2011.12.005},
issn = {1389-1286},
year = {2012},
date = {2012-03-01},
urldate = {2012-03-01},
journal = {COMPUTER NETWORKS},
volume = {56},
issue = {4},
pages = {1303-1328},
publisher = {Computer Network},
abstract = {The increase in physical resources for the next-generation of embedded computing devices, as well as in the efforts carried out by the scientific and research communities, is paving the way for Smart Infrastructures based on Wireless Sensor Networks. In such manner, not only open and formally defined Service-Oriented Frameworks are required, but also efficient middleware technologies that ease the development of new sensor-based services. From the cornerstone analysis of pervasive computing principles applied to Smart Spaces creation, this article presents the μSMS (micro Subscription Management System) middleware. This approach specifies and develops the notion of virtual sensor services created for Smart Environments over sensor networks from tiny in-network services based on agent technology. In the framework of the μSWN European Research Project, this architecture has been validated in a Smart Hospital real-world scenario using a healthcare virtual sensor service. Considering such purpose, medical status monitoring, location tracking and perimeter surveillance agent-based services have been developed. This study is concluded by a comparative analysis of the system considering memory overhead, packet delivery ratio, average end-to-end delay and battery lifetime as evaluation metrics. The results show a lightweight middleware implementation with good overall system and network performance.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Rodriguez-Carrion, Alicia; Campo-Vázquez, Celeste; García-Rubio, Carlos
Recommendations on the Move. In: Recommender Systems for the Social Web Book Chapter
In: pp. 179-193, Springer International Publishing, Recommender Systems for the Social Web, 2012, ISBN: 978-3-642-25693-6.
@inbook{campo012,
title = {Recommendations on the Move. In: Recommender Systems for the Social Web},
author = {Alicia Rodriguez-Carrion and Celeste Campo-Vázquez and Carlos García-Rubio},
url = {https://doi.org/10.1007/978-3-642-25694-3},
doi = {https://doi.org/10.1007/978-3-642-25694-3_9},
isbn = {978-3-642-25693-6},
year = {2012},
date = {2012-01-21},
urldate = {2012-01-21},
pages = {179-193},
publisher = {Springer International Publishing},
edition = {Recommender Systems for the Social Web},
abstract = {Recommender systems can take advantage of the user’s current location in order to improve the recommendations about places the user may be interested in. Taking a step further, these suggestions could be based not only on the user’s current location, but also on the places where the user is supposed to be in the near future, so the recommended locations would be on the path the user is going to follow. In order to do that we need some location prediction algorithms so that we can get those future locations. In this chapter we explain how to use the algorithms belonging to LZ family (LZ, LeZi Update and Active LeZi) as recommender engines, and we propose some ways of using these algorithms in places where the user has not been before or how to take advantage of the social knowledge about certain place so as to make these recommendations richer. Finally we show a prototype implementation of a recommender system for touristic places made up of these LZ predictors.},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
Rodriguez-Carrion, Alicia; García-Rubio, Carlos; Campo-Vázquez, Celeste; Cortés, Alberto; García-Lozano, Estrella; Noriega-Vivas, Patricia
Analysis of Location Prediction Performance of LZ Algorithms using GSM Cell-based Location Data Conference
5th International Symposium on Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), UCAMI, 2011.
@conference{campo024,
title = {Analysis of Location Prediction Performance of LZ Algorithms using GSM Cell-based Location Data},
author = {Alicia Rodriguez-Carrion and Carlos García-Rubio and Celeste Campo-Vázquez and Alberto Cortés and Estrella García-Lozano and Patricia Noriega-Vivas},
url = {https://hdl.handle.net/10016/13103
https://e-archivo.uc3m.es/bitstreams/66c1a251-8ce0-4a0f-b342-86a8b45e60e8/download},
year = {2011},
date = {2011-12-20},
urldate = {2011-12-20},
booktitle = {5th International Symposium on Ubiquitous Computing and Ambient Intelligence (UCAMI 2011)},
publisher = {UCAMI},
abstract = {Predictions about users' next locations allow bringing forward their future context, thus having additional time to react. To make such predictions, algorithms capable of learning mobility patterns and estimating the next location are needed. This work is focused on making the predictions on mobile terminals, thus resource consumption being an important constraint. Among the predictors with low resource consumption, the family of LZ algorithms has been chosen to study their performance, analyzing the results drawn from processing location records of 95 users. The main contribution is to divide the algorithms into two phases, thus being possible to use the best combination to obtain better prediction accuracy or lower resource consumption.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Noriega-Vivas, Patricia; Campo-Vázquez, Celeste; García-Rubio, Carlos; García-Lozano, Estrella
Supporting L3 Femtocell Mobility Using the MOBIKE Protocol Conference
Second International Conference on Access Network (ACCESS 2011), IARIA XPS, 2011, ISBN: 978-1-61208-142-7.
@conference{campo026,
title = {Supporting L3 Femtocell Mobility Using the MOBIKE Protocol },
author = {Patricia Noriega-Vivas and Celeste Campo-Vázquez and Carlos García-Rubio and Estrella García-Lozano},
url = {https://e-archivo.uc3m.es/bitstreams/e15d3ef3-3d4e-4b09-92c0-20319a1bf797/download
https://hdl.handle.net/10016/13811},
isbn = {978-1-61208-142-7},
year = {2011},
date = {2011-06-24},
urldate = {2011-06-24},
booktitle = {Second International Conference on Access Network (ACCESS 2011)},
pages = {30-35},
publisher = {IARIA XPS},
abstract = {Femtocells can be used to improve the indoor coverage and bandwidth of 3G cellular networks in homes and buildings. They are designed to be placed in a fixed location. However, their use would also be interesting in mobile environments such as public transportation systems. This paper studies the mobility limitations at the layer 3 and suggests an approach to support mobility on femtocell networks. This solution employs the protocols already defined in the femtocell architecture, minimizing thus the impact on it.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Cortés, Alberto; García-Rubio, Carlos; Campo-Vázquez, Celeste; García-Lozano, Estrella; Rodriguez-Carrion, Alicia
Selection and Publication of Network Interface Cards in Multihomed Pervasive Computing Devices Conference
International IEEE Workshop on Middleware and System Support for Pervasive Computing (PERWARE 2011), IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2011, ISBN: 978-1-61284-938-6.
@conference{campo025,
title = {Selection and Publication of Network Interface Cards in Multihomed Pervasive Computing Devices},
author = {Alberto Cortés and Carlos García-Rubio and Celeste Campo-Vázquez and Estrella García-Lozano and Alicia Rodriguez-Carrion },
doi = {https://doi.org/10.1109/PERCOMW.2011.5766876},
isbn = {978-1-61284-938-6},
year = {2011},
date = {2011-05-12},
urldate = {2011-05-12},
booktitle = {International IEEE Workshop on Middleware and System Support for Pervasive Computing (PERWARE 2011)},
pages = {239-244},
publisher = {IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC },
abstract = {Many modern devices come with several, heterogeneous, network interface cards (NICs). However, simple operations like transferring data flows to the cheapest NIC or to one with enough Quality of Service (QoS) are awkward tasks on most Operating Systems. In this paper, we discuss the criteria to select the proper NIC for a given data flow. We also present a new Operating System service, called netqos, to publish data and figures of merit for these criteria. The main objective of netqos is providing relevant information to applications and middleware about NIC selection criteria, isolating them from the idiosyncrasies of the many QoS gathering tools and allowing to choose the proper NIC to fit their needs. We have built this new service as a synthetic file system for the Linux kernel. We describe our experiences in using it in a real-world scenario and the practical and inherent limitations of this approach.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Almenárez, Florina; Marín, Andrés; Díaz, Daniel; Cortés, Alberto; Campo, Celeste; García-Rubio, Carlos
Trust management for multimedia P2P applications in autonomic networking Journal Article
In: Ad Hoc Networks, vol. 9, iss. 4, pp. 687-697, 2010, ISSN: 1570-8705.
@article{almenarez001,
title = {Trust management for multimedia P2P applications in autonomic networking},
author = {Florina Almenárez and Andrés Marín and Daniel Díaz and Alberto Cortés and Celeste Campo and Carlos García-Rubio},
url = {https://doi.org/10.1016/j.adhoc.2010.09.005
https://www.sciencedirect.com/science/article/abs/pii/S1570870510001459?via%3Dihub
https://www.sciencedirect.com/science/article/pii/S1570870510001459/pdfft?md5=57c716d20dd2bb1db25f81c4cc063ebb&pid=1-s2.0-S1570870510001459-main.pdf},
doi = {https://doi.org/10.1016/j.adhoc.2010.09.005},
issn = {1570-8705},
year = {2010},
date = {2010-10-01},
urldate = {2010-10-01},
journal = {Ad Hoc Networks},
volume = {9},
issue = {4},
pages = {687-697},
abstract = {In the last years, trust management has become a fundamental basis for facilitating the cooperation between different users in peer-to-peer (P2P) multimedia applications within autonomic networks. In these networks and applications, trust management should fulfill certain requirements (i.e. decentralisation, dynamism, simplicity, interoperability, etc.) for being functional. In this paper, we propose an evolutionary model of trust management that captures dynamic entities’ behaviour over time. Likewise, we explain protection mechanisms against several attacks, which are based on the cooperative behaviour of the entities, trust relationship properties, and trust rules. Finally, we successfully validate our model from several scenarios and compare it with other proposals in this field.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Rodriguez-Carrion, Alicia; García-Rubio, Carlos; Campo-Vázquez, Celeste
Performance Evaluation of LZ-Based Location Prediction Algorithms in Cellular Networks Journal Article
In: IEEE COMMUNICATIONS LETTERS, vol. 14, iss. 8, pp. 707-709, 2010, ISSN: 1089-7798.
@article{campo011,
title = {Performance Evaluation of LZ-Based Location Prediction Algorithms in Cellular Networks},
author = {Alicia Rodriguez-Carrion and Carlos García-Rubio and Celeste Campo-Vázquez},
doi = {https://doi.org/10.1109/lcomm.2010.08.092033},
issn = {1089-7798},
year = {2010},
date = {2010-08-09},
urldate = {2010-08-09},
journal = {IEEE COMMUNICATIONS LETTERS},
volume = {14},
issue = {8},
pages = {707-709},
abstract = {In mobile phones, it is useful to know the most probable next location to make decisions about future actions. In this letter we compare three LZ based prediction algorithms. The originality of our work is that we make it in a cellular network, we separate the algorithms into two independent phases (tree updating and probability calculation), we have included Active LeZi in the study, and we evaluate hit rate and resource consumption, including processing time.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Campo-Vázquez, Celeste; García-Rubio, Carlos; Cortés, Alberto
Performance Evaluation of J2ME and Symbian Applications in Smart Camera Phones Conference
Symposium of Ubiquitous Computing and Ambient Intelligence UCAmI 2008, SPRINGER, 2009, ISBN: 978-3-540-85866-9.
@conference{campo0028,
title = {Performance Evaluation of J2ME and Symbian Applications in Smart Camera Phones},
author = {Celeste Campo-Vázquez and Carlos García-Rubio and Alberto Cortés },
doi = {https://doi.org/10.1007/978-3-540-85867-6_6},
isbn = {978-3-540-85866-9},
year = {2009},
date = {2009-03-10},
urldate = {2009-03-10},
booktitle = {Symposium of Ubiquitous Computing and Ambient Intelligence UCAmI 2008},
pages = {48-56},
publisher = {SPRINGER},
abstract = {Nowadays, many smart phones have a built-in camera that is often used as a conventional digital camera. With some image processing in the mobile phone, new applications can be offered to the user, such as augmented reality games or helper applications for visually impaired people. However, image processing applications may require high processor speed and massive dynamic memory, which are scarce resources in smart phones. Image processing algorithms usually consists of long loops iterating some operations. In this paper we evaluate the performance of smart phones executing these operations. We consider both native and J2ME applications. The results we present can help to decide what we can and we cannot do in a mobile phone, and to quantify the performance penalty when using J2ME.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Cortes, Alberto; Garcia-Rubio, Carlos; Campo, Celeste; Marin, Andres; Almenarez, Florina; Díaz, Daniel
Decoupling path failure detection from congestion control to improve SCTP failovers Journal Article
In: IEEE COMMUNICATIONS LETTERS, vol. 12, no. 11, pp. 858-860, 2008, ISSN: 1089-7798.
@article{cortes001,
title = {Decoupling path failure detection from congestion control to improve SCTP failovers},
author = {Alberto Cortes and Carlos Garcia-Rubio and Celeste Campo and Andres Marin and Florina Almenarez and Daniel Díaz},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4685978},
doi = {https://doi.org/10.1109/LCOMM.2008.080884},
issn = {1089-7798},
year = {2008},
date = {2008-11-11},
urldate = {2008-11-11},
journal = {IEEE COMMUNICATIONS LETTERS},
volume = {12},
number = {11},
pages = {858-860},
abstract = {SCTP handover is too slow to be useful as a mobility solution for most applications. With quicker handovers, SCTP will be an interesting solution to mobility. SCTP uses retransmissions as probes for path failure detection. Congestion control forces slow paced retransmissions but quick failovers need fast paced probes. Our solution is to stop using retransmissions as probes. Instead, we propose active path monitoring using unreliable heartbeats. Applications can tune this algorithm to meet their own requirements. We show data from a simple experiment in a real environment.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
García-Rubio, Carlos; Campo-Vázquez, Celeste
The Role of Service Discovery in Context-Aware, Pervasive Computing Applications. In: Personalization of Interactive Multimedia Services: A Research and Development Perspective Book Chapter
In: pp. 315-332, NOVA SCIENCE PUBLISHERS INC , 2008, ISBN: 978-1-60456-680-2.
@inbook{garciarubio007,
title = {The Role of Service Discovery in Context-Aware, Pervasive Computing Applications. In: Personalization of Interactive Multimedia Services: A Research and Development Perspective },
author = {Carlos García-Rubio and Celeste Campo-Vázquez },
isbn = {978-1-60456-680-2},
year = {2008},
date = {2008-10-01},
urldate = {2008-10-01},
pages = {315-332},
publisher = {NOVA SCIENCE PUBLISHERS INC },
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
Campo-Vázquez, Celeste; García-Rubio, Carlos; Cortés, Alberto
Descubrimiento de servicios en redes MANET con y sin soporte multicast Conference
VII Jornadas de ingeniería telemática (JITEL 2008), 2008.
@conference{campo027,
title = {Descubrimiento de servicios en redes MANET con y sin soporte multicast },
author = {Celeste Campo-Vázquez and Carlos García-Rubio and Alberto Cortés },
year = {2008},
date = {2008-05-13},
urldate = {2008-05-13},
booktitle = {VII Jornadas de ingeniería telemática (JITEL 2008)},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
Almenarez, Florina; Marín, Andrés; Díaz, Daniel; Cortés, Alberto; Campo, Celeste; García-Rubio, Carlos
A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications Proceedings Article
In: 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Institute of Electrical and Electronics Engineers (IEEE), 2008, ISBN: 978-0-7695-3113-7.
@inproceedings{pa042,
title = {A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications},
author = {Florina Almenarez and Andrés Marín and Daniel Díaz and Alberto Cortés and Celeste Campo and Carlos García-Rubio},
url = {https://ieeexplore.ieee.org/document/4517451},
doi = {https://doi.org/10.1109/PERCOM.2008.95},
isbn = {978-0-7695-3113-7},
year = {2008},
date = {2008-05-12},
urldate = {2008-05-12},
booktitle = {2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Trust has emerged as an important facet of inter-domain relationships. Trust management in fixed networks is not functional in ad hoc P2P networks, because these require an autonomous, user-centric and non-static trust management. The trust model is the basis of any security infrastructure. In this paper, we propose a trust-based middleware for secure digital content sharing between pervasive devices. Such middleware allows to enhance security support of pervasive devices. Likewise, we propose a suitable and efficient secure file exchange protocol, WSFEP, for content sharing. Both middleware and file sharing application have been successfuly integrated and tested on PDAs.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Almenarez, Florina; Marín, Andres; Diaz, Daniel; Cortes, Alberto; Campo, Celeste; García-Rubio, Carlos
Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services Proceedings Article
In: 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Institute of Electrical and Electronics Engineers (IEEE), 2008, ISBN: 978-0-7695-3113-7.
@inproceedings{pa043,
title = {Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services},
author = {Florina Almenarez and Andres Marín and Daniel Diaz and Alberto Cortes and Celeste Campo and Carlos García-Rubio},
url = {https://ieeexplore.ieee.org/document/4517456},
doi = {https://doi.org/10.1109/PERCOM.2008.97},
isbn = {978-0-7695-3113-7},
year = {2008},
date = {2008-05-12},
urldate = {2008-05-12},
booktitle = {2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Mobile devices can both consume and provide services. They act indeed as a peer, according to the OMA mobile Web services specification. It is a move from simple data sharing to full deliver of application services down to mobile devices. The use of digital certificates to ensure the provision of services is suitable because devices can belong to different trust domains without having previously an established relationship. Besides, by interoperability issues, the use of PKI continues to grow and move into diverse environments. However, applications making use of such certificates are burdened with the overhead of constructing and validating the certification paths. These processes can become more complex and costly than fixed-infrastructure networks due to the wireless communications and restricted processing and power capabilities. The IETF PKIX WG has specified different mechanisms for delegating the certificate validation and making lighter the status information obtaining. However, these are not supported currently by mobile devices. For these reasons, we propose to develop an open toolkit for X.509 public key certificate validating based on OpenSSL. This toolkit is being developed and tested successfully in PDAs.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Díaz-Sánchez, Daniel; Marín, Andrés; Almenarez, Florina; Campo, Celeste; Cortés, Alberto; García-Rubio, Carlos
Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment Book Chapter
In: IFIP International Federation for Information Processing, vol. 284, pp. 271 - 282, Springer US, 2008, ISBN: 978-0-387-84838-9.
@inbook{bc005,
title = {Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Almenarez and Celeste Campo and Alberto Cortés and Carlos García-Rubio },
url = {https://link.springer.com/chapter/10.1007/978-0-387-84839-6_22
https://link.springer.com/content/pdf/10.1007/978-0-387-84839-6.pdf},
doi = {https://doi.org/10.1007/978-0-387-84839-6_22},
isbn = {978-0-387-84838-9},
year = {2008},
date = {2008-01-09},
urldate = {2008-01-09},
booktitle = {IFIP International Federation for Information Processing},
volume = {284},
pages = {271 - 282},
publisher = {Springer US},
abstract = {User-centric services might enforce requirements difficult to be endorsed by visited networks unless tight coupled trust relations are previously established among providers. Maintaining those fixed trust relations is costly and unmanageable if the number of providers increases. Moreover, it requires providers to use a common security model, credentials, policies…Trust Negotiation can be the solution to this problem since allows to negotiate gradually a security state enabling multiple factor authentication and authorization even for “strangers” by exchanging various credentials. However, there are still two problems to solve, the first one is the delay introduced by the trust negotiation messages if used as bootstrapping in every interaction; the second one is the lack of protocol support. In this article we address those problems by presenting an extension to TLS that enables trust negotiation and credential issuing (to speed-up following interactions) over a secure channel.
},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenárez-Mendoza, Florina; Campo-Vázquez, Celeste; García-Rubio, Carlos
Context awareness in network selection for dynamic environments Journal Article
In: Telecommunication Systems, vol. 36, iss. 1, pp. 49-60, 2007, ISSN: 1572-9451.
@article{diazsanchez003,
title = {Context awareness in network selection for dynamic environments},
author = {Daniel Díaz-Sánchez and Andrés Marín-López and Florina Almenárez-Mendoza and Celeste Campo-Vázquez and Carlos García-Rubio },
url = {https://link.springer.com/article/10.1007/s11235-007-9058-9},
doi = {https://doi.org/10.1007/s11235-007-9058-9},
issn = {1572-9451},
year = {2007},
date = {2007-11-17},
urldate = {2007-11-17},
journal = {Telecommunication Systems},
volume = {36},
issue = {1},
pages = {49-60},
abstract = {Mobile devices of new generation are able to connect to multiple networks and to constitute new infrastructureless networks. These dynamic environments require new security paradigms and automatic mechanisms to minimize user intervention. Our goal is the definition of a new concept of distance that considers the current domain constraints and the user preferences. This paper addresses some of the problems of these complex environments by using Multidimensional Scaling (MDS) techniques. We also propose collaborative mechanisms for automatic environment marking. Based on these ideas we have developed Pervasive Interaction Manager (PervsIM), a decision mechanism that selects the most appropriate network or peer to interact with. Besides we have defined an embedded access control module which ensures that PervsIM decisions are followed by all applications. Furthermore, several simulation results and implementation details outline how these results can be incorporated in today’s mobile devices.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Díaz-Sánchez, Daniel; Marín, Andrés; Alménarez, Florina; Campo, Celeste; García-Rubio, Carlos
Mejorando el control de acceso para dispositivos móviles con un motor de decisión agnóstico para negociación de confianza Proceedings Article
In: pp. 1-8, 2007, ISBN: 978-84-9732-605-6.
@inproceedings{accn003,
title = {Mejorando el control de acceso para dispositivos móviles con un motor de decisión agnóstico para negociación de confianza},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Alménarez and Celeste Campo and Carlos García-Rubio},
isbn = {978-84-9732-605-6},
year = {2007},
date = {2007-09-27},
pages = {1-8},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Marín-López, Andrés; Díaz-Sánchez, Daniel; Almenárez, Florina; García-Rubio, Carlos; Campo, Celeste
Smart card-based agents for fair non-repudiation Journal Article
In: COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, vol. 51, iss. 9, pp. 2288-2298, 2007, ISSN: 0346-251X.
@article{marin003,
title = {Smart card-based agents for fair non-repudiation},
author = {Andrés Marín-López and Daniel Díaz-Sánchez and Florina Almenárez and Carlos García-Rubio and Celeste Campo},
url = {https://www.sciencedirect.com/science/article/pii/S1389128607000278?via%3Dihub
https://www.sciencedirect.com/science/article/pii/S1389128607000278/pdfft?md5=96ecfc2c235f0f03fd85b40c499ffdad&pid=1-s2.0-S1389128607000278-main.pdf},
doi = {https://doi.org/10.1016/j.comnet.2007.01.014},
issn = {0346-251X},
year = {2007},
date = {2007-01-31},
urldate = {2007-01-31},
journal = {COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING},
volume = {51},
issue = {9},
pages = {2288-2298},
abstract = {Non-repudiation protocols are of great importance for electronic interactions. Different protocols have been proposed in this field, progressively relaxing the requirements on the computing power of both parties, and on the load and involvement of a trusted third party (TTP). Besides, there is a need to provide mobile users with a protocol adequate for ad hoc scenarios, where only unreliable channels can be guaranteed, and where the CA may not be reachable. In this paper we propose a new version of the fair non-repudiation protocol proposed by Gürgens et al. in [Sigrid Gürgens, Carsten Rudolph, Holger Vogt, On the security of fair non-repudiation protocols, in: Colin Boyd, Wenbo Mao (Eds.), ISC, Lecture Notes in Computer Science, vol. 2851, Springer, 2003, pp. 193–207]. We show unfair scenarios that can appear if one party controls the communication among the TTP and the other party. We introduce notary agents, which play the TTP role, and run our fair non-repudiation protocol. Notary agents execute inside the smart card, and sign the protocol messages with the user’s private key on his behalf. Our approach enables the protocol to run on unreliable channels, disconnected from the CA.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}