Contact information
Name | Carlos García Rubio |
Academic
jobline | Associate Professor |
Contact
Publications
AGUILAR-IGARTUA, MÓNICA; ALMENARES-MENDOZA, FLORINA; DÍAZ-REDONDO, REBECA; MARTÍN-VICENTE, MANUELA; FORNÉ, JORDI; CAMPO, CELESTE; FERNÁNDEZ-VILAS, ANA; CRUZ-LLOPIS, LUIS; GARCÍA-RUBIO, CARLOS; MARÍN-LÓPEZ, ANDRÉS; MOHAMAD-MEZHER, AHMAD; DÍAZ-SÁNCHEZ, DANIEL; CEREZO-COSTAS, HÉCTOR; REBOLLO-MONEDERO, DAVID; ARIAS-CABARCOS, PATRICIA; RICO-NOVELLA, FRANCISCO JOSÉ
INRISCO: INcident monitoRing in Smart COmmunities Journal Article
In: IEEE Access, vol. 8, pp. 72435 - 72460, 2020, ISSN: 2169-3536.
@article{almenarez006,
title = {INRISCO: INcident monitoRing in Smart COmmunities},
author = {MÓNICA AGUILAR-IGARTUA AND FLORINA ALMENARES-MENDOZA AND REBECA DÍAZ-REDONDO AND MANUELA MARTÍN-VICENTE AND JORDI FORNÉ AND CELESTE CAMPO AND ANA FERNÁNDEZ-VILAS AND LUIS CRUZ-LLOPIS AND CARLOS GARCÍA-RUBIO AND ANDRÉS MARÍN-LÓPEZ AND AHMAD MOHAMAD-MEZHER AND DANIEL DÍAZ-SÁNCHEZ AND HÉCTOR CEREZO-COSTAS AND DAVID REBOLLO-MONEDERO AND PATRICIA ARIAS-CABARCOS AND FRANCISCO JOSÉ RICO-NOVELLA
},
url = {https://ieeexplore.ieee.org/document/9064504
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9064504},
doi = {https://doi.org/10.1109/ACCESS.2020.2987483},
issn = {2169-3536},
year = {2020},
date = {2020-04-13},
urldate = {2020-04-13},
journal = {IEEE Access},
volume = {8},
pages = {72435 - 72460},
abstract = {Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors in motion. Carrying their mobile devices, moving in their connected vehicles or actively participating in social networks, citizens provide a wealth of information that, after properly processing, can support numerous applications for the benefit of the community. In the context of smart communities, the INRISCO [1] proposal intends for (i) the early detection of abnormal situations in cities (i.e., incidents), (ii) the analysis of whether, according to their impact, those incidents are really adverse for the community; and (iii) the automatic actuation by dissemination of appropriate information to citizens and authorities. Thus, INRISCO will identify and report on incidents in traffic (jam, accident) or public infrastructure (e.g., works, street cut), the occurrence of specific events that affect other citizens' life (e.g., demonstrations, concerts), or environmental problems (e.g., pollution, bad weather). It is of particular interest to this proposal the identification of incidents with a social and economic impact, which affects the quality of life of citizens.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Almenárez, Florina; Marín, Andrés; Díaz, Daniel; Cortés, Alberto; Campo, Celeste; García-Rubio, Carlos
Trust management for multimedia P2P applications in autonomic networking Journal Article
In: Ad Hoc Networks, vol. 9, iss. 4, pp. 687-697, 2010, ISSN: 1570-8705.
@article{almenarez001,
title = {Trust management for multimedia P2P applications in autonomic networking},
author = {Florina Almenárez and Andrés Marín and Daniel Díaz and Alberto Cortés and Celeste Campo and Carlos García-Rubio},
url = {https://doi.org/10.1016/j.adhoc.2010.09.005
https://www.sciencedirect.com/science/article/abs/pii/S1570870510001459?via%3Dihub
https://www.sciencedirect.com/science/article/pii/S1570870510001459/pdfft?md5=57c716d20dd2bb1db25f81c4cc063ebb&pid=1-s2.0-S1570870510001459-main.pdf},
doi = {https://doi.org/10.1016/j.adhoc.2010.09.005},
issn = {1570-8705},
year = {2010},
date = {2010-10-01},
urldate = {2010-10-01},
journal = {Ad Hoc Networks},
volume = {9},
issue = {4},
pages = {687-697},
abstract = {In the last years, trust management has become a fundamental basis for facilitating the cooperation between different users in peer-to-peer (P2P) multimedia applications within autonomic networks. In these networks and applications, trust management should fulfill certain requirements (i.e. decentralisation, dynamism, simplicity, interoperability, etc.) for being functional. In this paper, we propose an evolutionary model of trust management that captures dynamic entities’ behaviour over time. Likewise, we explain protection mechanisms against several attacks, which are based on the cooperative behaviour of the entities, trust relationship properties, and trust rules. Finally, we successfully validate our model from several scenarios and compare it with other proposals in this field.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Cortes, Alberto; Garcia-Rubio, Carlos; Campo, Celeste; Marin, Andres; Almenarez, Florina; Díaz, Daniel
Decoupling path failure detection from congestion control to improve SCTP failovers Journal Article
In: IEEE COMMUNICATIONS LETTERS, vol. 12, no. 11, pp. 858-860, 2008, ISSN: 1089-7798.
@article{cortes001,
title = {Decoupling path failure detection from congestion control to improve SCTP failovers},
author = {Alberto Cortes and Carlos Garcia-Rubio and Celeste Campo and Andres Marin and Florina Almenarez and Daniel Díaz},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4685978},
doi = {https://doi.org/10.1109/LCOMM.2008.080884},
issn = {1089-7798},
year = {2008},
date = {2008-11-11},
urldate = {2008-11-11},
journal = {IEEE COMMUNICATIONS LETTERS},
volume = {12},
number = {11},
pages = {858-860},
abstract = {SCTP handover is too slow to be useful as a mobility solution for most applications. With quicker handovers, SCTP will be an interesting solution to mobility. SCTP uses retransmissions as probes for path failure detection. Congestion control forces slow paced retransmissions but quick failovers need fast paced probes. Our solution is to stop using retransmissions as probes. Instead, we propose active path monitoring using unreliable heartbeats. Applications can tune this algorithm to meet their own requirements. We show data from a simple experiment in a real environment.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Almenarez, Florina; Marín, Andrés; Díaz, Daniel; Cortés, Alberto; Campo, Celeste; García-Rubio, Carlos
A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications Proceedings Article
In: 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Institute of Electrical and Electronics Engineers (IEEE), 2008, ISBN: 978-0-7695-3113-7.
@inproceedings{pa042,
title = {A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications},
author = {Florina Almenarez and Andrés Marín and Daniel Díaz and Alberto Cortés and Celeste Campo and Carlos García-Rubio},
url = {https://ieeexplore.ieee.org/document/4517451},
doi = {https://doi.org/10.1109/PERCOM.2008.95},
isbn = {978-0-7695-3113-7},
year = {2008},
date = {2008-05-12},
urldate = {2008-05-12},
booktitle = {2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Trust has emerged as an important facet of inter-domain relationships. Trust management in fixed networks is not functional in ad hoc P2P networks, because these require an autonomous, user-centric and non-static trust management. The trust model is the basis of any security infrastructure. In this paper, we propose a trust-based middleware for secure digital content sharing between pervasive devices. Such middleware allows to enhance security support of pervasive devices. Likewise, we propose a suitable and efficient secure file exchange protocol, WSFEP, for content sharing. Both middleware and file sharing application have been successfuly integrated and tested on PDAs.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Almenarez, Florina; Marín, Andres; Diaz, Daniel; Cortes, Alberto; Campo, Celeste; García-Rubio, Carlos
Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services Proceedings Article
In: 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Institute of Electrical and Electronics Engineers (IEEE), 2008, ISBN: 978-0-7695-3113-7.
@inproceedings{pa043,
title = {Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services},
author = {Florina Almenarez and Andres Marín and Daniel Diaz and Alberto Cortes and Celeste Campo and Carlos García-Rubio},
url = {https://ieeexplore.ieee.org/document/4517456},
doi = {https://doi.org/10.1109/PERCOM.2008.97},
isbn = {978-0-7695-3113-7},
year = {2008},
date = {2008-05-12},
urldate = {2008-05-12},
booktitle = {2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Mobile devices can both consume and provide services. They act indeed as a peer, according to the OMA mobile Web services specification. It is a move from simple data sharing to full deliver of application services down to mobile devices. The use of digital certificates to ensure the provision of services is suitable because devices can belong to different trust domains without having previously an established relationship. Besides, by interoperability issues, the use of PKI continues to grow and move into diverse environments. However, applications making use of such certificates are burdened with the overhead of constructing and validating the certification paths. These processes can become more complex and costly than fixed-infrastructure networks due to the wireless communications and restricted processing and power capabilities. The IETF PKIX WG has specified different mechanisms for delegating the certificate validation and making lighter the status information obtaining. However, these are not supported currently by mobile devices. For these reasons, we propose to develop an open toolkit for X.509 public key certificate validating based on OpenSSL. This toolkit is being developed and tested successfully in PDAs.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Díaz-Sánchez, Daniel; Marín, Andrés; Almenarez, Florina; Campo, Celeste; Cortés, Alberto; García-Rubio, Carlos
Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment Book Chapter
In: IFIP International Federation for Information Processing, vol. 284, pp. 271 - 282, Springer US, 2008, ISBN: 978-0-387-84838-9.
@inbook{bc005,
title = {Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Almenarez and Celeste Campo and Alberto Cortés and Carlos García-Rubio },
url = {https://link.springer.com/chapter/10.1007/978-0-387-84839-6_22
https://link.springer.com/content/pdf/10.1007/978-0-387-84839-6.pdf},
doi = {https://doi.org/10.1007/978-0-387-84839-6_22},
isbn = {978-0-387-84838-9},
year = {2008},
date = {2008-01-09},
urldate = {2008-01-09},
booktitle = {IFIP International Federation for Information Processing},
volume = {284},
pages = {271 - 282},
publisher = {Springer US},
abstract = {User-centric services might enforce requirements difficult to be endorsed by visited networks unless tight coupled trust relations are previously established among providers. Maintaining those fixed trust relations is costly and unmanageable if the number of providers increases. Moreover, it requires providers to use a common security model, credentials, policies…Trust Negotiation can be the solution to this problem since allows to negotiate gradually a security state enabling multiple factor authentication and authorization even for “strangers” by exchanging various credentials. However, there are still two problems to solve, the first one is the delay introduced by the trust negotiation messages if used as bootstrapping in every interaction; the second one is the lack of protocol support. In this article we address those problems by presenting an extension to TLS that enables trust negotiation and credential issuing (to speed-up following interactions) over a secure channel.
},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenárez-Mendoza, Florina; Campo-Vázquez, Celeste; García-Rubio, Carlos
Context awareness in network selection for dynamic environments Journal Article
In: Telecommunication Systems, vol. 36, iss. 1, pp. 49-60, 2007, ISSN: 1572-9451.
@article{diazsanchez003,
title = {Context awareness in network selection for dynamic environments},
author = {Daniel Díaz-Sánchez and Andrés Marín-López and Florina Almenárez-Mendoza and Celeste Campo-Vázquez and Carlos García-Rubio },
url = {https://link.springer.com/article/10.1007/s11235-007-9058-9},
doi = {https://doi.org/10.1007/s11235-007-9058-9},
issn = {1572-9451},
year = {2007},
date = {2007-11-17},
urldate = {2007-11-17},
journal = {Telecommunication Systems},
volume = {36},
issue = {1},
pages = {49-60},
abstract = {Mobile devices of new generation are able to connect to multiple networks and to constitute new infrastructureless networks. These dynamic environments require new security paradigms and automatic mechanisms to minimize user intervention. Our goal is the definition of a new concept of distance that considers the current domain constraints and the user preferences. This paper addresses some of the problems of these complex environments by using Multidimensional Scaling (MDS) techniques. We also propose collaborative mechanisms for automatic environment marking. Based on these ideas we have developed Pervasive Interaction Manager (PervsIM), a decision mechanism that selects the most appropriate network or peer to interact with. Besides we have defined an embedded access control module which ensures that PervsIM decisions are followed by all applications. Furthermore, several simulation results and implementation details outline how these results can be incorporated in today’s mobile devices.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Díaz-Sánchez, Daniel; Marín, Andrés; Alménarez, Florina; Campo, Celeste; García-Rubio, Carlos
Mejorando el control de acceso para dispositivos móviles con un motor de decisión agnóstico para negociación de confianza Proceedings Article
In: pp. 1-8, 2007, ISBN: 978-84-9732-605-6.
@inproceedings{accn003,
title = {Mejorando el control de acceso para dispositivos móviles con un motor de decisión agnóstico para negociación de confianza},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Alménarez and Celeste Campo and Carlos García-Rubio},
isbn = {978-84-9732-605-6},
year = {2007},
date = {2007-09-27},
pages = {1-8},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Marín-López, Andrés; Díaz-Sánchez, Daniel; Almenárez, Florina; García-Rubio, Carlos; Campo, Celeste
Smart card-based agents for fair non-repudiation Journal Article
In: COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, vol. 51, iss. 9, pp. 2288-2298, 2007, ISSN: 0346-251X.
@article{marin003,
title = {Smart card-based agents for fair non-repudiation},
author = {Andrés Marín-López and Daniel Díaz-Sánchez and Florina Almenárez and Carlos García-Rubio and Celeste Campo},
url = {https://www.sciencedirect.com/science/article/pii/S1389128607000278?via%3Dihub
https://www.sciencedirect.com/science/article/pii/S1389128607000278/pdfft?md5=96ecfc2c235f0f03fd85b40c499ffdad&pid=1-s2.0-S1389128607000278-main.pdf},
doi = {https://doi.org/10.1016/j.comnet.2007.01.014},
issn = {0346-251X},
year = {2007},
date = {2007-01-31},
urldate = {2007-01-31},
journal = {COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING},
volume = {51},
issue = {9},
pages = {2288-2298},
abstract = {Non-repudiation protocols are of great importance for electronic interactions. Different protocols have been proposed in this field, progressively relaxing the requirements on the computing power of both parties, and on the load and involvement of a trusted third party (TTP). Besides, there is a need to provide mobile users with a protocol adequate for ad hoc scenarios, where only unreliable channels can be guaranteed, and where the CA may not be reachable. In this paper we propose a new version of the fair non-repudiation protocol proposed by Gürgens et al. in [Sigrid Gürgens, Carsten Rudolph, Holger Vogt, On the security of fair non-repudiation protocols, in: Colin Boyd, Wenbo Mao (Eds.), ISC, Lecture Notes in Computer Science, vol. 2851, Springer, 2003, pp. 193–207]. We show unfair scenarios that can appear if one party controls the communication among the TTP and the other party. We introduce notary agents, which play the TTP role, and run our fair non-repudiation protocol. Notary agents execute inside the smart card, and sign the protocol messages with the user’s private key on his behalf. Our approach enables the protocol to run on unreliable channels, disconnected from the CA.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Díaz-Sánchez, Daniel; Marín, Andrés; Almenarez, Florina; García-Rubio, Carlos; Campo, Celeste
Interaction Distance determination with PervsIM Proceedings Article
In: 15th IST Mobile And Wireless Communication Summit, pp. 1-8, 2006.
@inproceedings{pa051,
title = {Interaction Distance determination with PervsIM},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Almenarez and Carlos García-Rubio and Celeste Campo},
year = {2006},
date = {2006-06-30},
urldate = {2006-06-30},
booktitle = {15th IST Mobile And Wireless Communication Summit},
pages = {1-8},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Campo, Celeste; Almenárez, Florina; Díaz, Daniel; García-Rubio, Carlos; López, Andrés Marín
Secure Service Discovery based on Trust Management for ad-hoc Networks Journal Article
In: Journal of Universal Computer Science, vol. 12, no. 3, pp. 340-356, 2006, ISSN: 0948-695X.
@article{campo001,
title = {Secure Service Discovery based on Trust Management for ad-hoc Networks},
author = {Celeste Campo and Florina Almenárez and Daniel Díaz and Carlos García-Rubio and Andrés Marín López},
url = {https://www.jucs.org/jucs_12_3/secure_service_discovery_based.html
https://lib.jucs.org/article/28594/},
doi = {http://dx.doi.org/10.3217/jucs-012-03-0340},
issn = {0948-695X},
year = {2006},
date = {2006-03-28},
urldate = {2006-03-28},
journal = {Journal of Universal Computer Science},
volume = {12},
number = {3},
pages = {340-356},
abstract = {In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to
discover services dynamically and share them safely, taking into account ad-hoc networks requirements such as limited processing and communication power, decentralised
management, and dynamic network topology, among others. Legacy solutions fail in
addressing these requirements.
In this paper, we propose a service discovery protocol with security features, the Secure
Pervasive Discovery Protocol. SPDP is a fully distributed protocol in which services
offered by devices can be discovered by others, without a central server. It is based on an
anarchy trust model, which provides location of trusted services, as well as protection
of confidential information, secure communications, or access control.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
discover services dynamically and share them safely, taking into account ad-hoc networks requirements such as limited processing and communication power, decentralised
management, and dynamic network topology, among others. Legacy solutions fail in
addressing these requirements.
In this paper, we propose a service discovery protocol with security features, the Secure
Pervasive Discovery Protocol. SPDP is a fully distributed protocol in which services
offered by devices can be discovered by others, without a central server. It is based on an
anarchy trust model, which provides location of trusted services, as well as protection
of confidential information, secure communications, or access control.
Díaz, Daniel; Marín, Andrés; Almenárez, Florina; García-Rubio, Carlos; Campo, Celeste
Context Awareness in Network Selection for Dynamic Environments Book Chapter
In: Personal Wireless Communications, vol. 4217, pp. 216 - 227, Springer Berlin Heidelberg, 2006, ISBN: 978-3-540-45174-7.
@inbook{bc009,
title = {Context Awareness in Network Selection for Dynamic Environments},
author = {Daniel Díaz and Andrés Marín and Florina Almenárez and Carlos García-Rubio and Celeste Campo },
url = {https://link.springer.com/chapter/10.1007/11872153_19
https://link.springer.com/content/pdf/10.1007/11872153.pdf},
doi = {https://doi.org/10.1007/11872153_19},
isbn = {978-3-540-45174-7},
year = {2006},
date = {2006-01-11},
urldate = {2006-01-11},
booktitle = {Personal Wireless Communications},
volume = {4217},
pages = {216 - 227},
publisher = {Springer Berlin Heidelberg},
abstract = {Mobile devices of new generation are able to connect to multiple networks and to constitute new infrastructureless networks. These dynamic environments require new security paradigms and automatic mechanisms to minimize user intervention. Our goal is the definition of a new concept of distance that considers the current domain constraints and the user preferences. This paper addresses some of the problems of these complex environments by using Multidimensional Scaling (MDS) techniques. We also propose collaborative mechanisms for automatic environment marking. Based on these ideas we have developed PervsIM, a decision mechanism that selects the most appropriate network or peer to interact with. Besides we have defined an embedded access control module which ensures that PervsIM decisions are followed by all applications. Furthermore, several simulation results and implementation details outline how these results can be incorporated in today’s mobile devices.
},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}