Skip to content
CYNAMON
Cybersecurity, Network Analysis And Monitoring for the next generation Internet
Comunidad Autónoma de Madrid, European Structural funds
CAM, FSE and FEDER
(Ref. CYNAMON P2018/TCS-4566)
1/ 2019 -- 1/ 2023
Abstract
The project goals are perfectly aligned with the Spanish and European priorities for the development of secure environments, which aim at strengthening citizen’s rights and improving the competitiveness of our industries and our defense capabilities."
Publications

Campo-Vázquez, Celeste; García-Rubio, Carlos; Moure-Garrido, Marta

Real time detection of malicious DoH traffic using statistical analysis Journal Article

In: COMPUTER NETWORKS, vol. 234, iss. 109910, pp. 1-10, 2023, ISSN: 1389-1286.

Abstract | Links | BibTeX

Campo-Vázquez, Celeste; García-Rubio, Carlos; Moure-Garrido, Marta

Detecting Malicious Use of DoH Tunnels Using Statistical Traffic Analysis Conference

PE-WASUN '22: Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ACM, 2022, ISBN: 978-1-4503-9483-3.

Abstract | Links | BibTeX

Rojo-Rivas, MaríaIsabel; Díaz-Sánchez, Daniel; Almenarez, Florina; Marín-Lopez, Andrés

Kriper: A blockchain network with permissioned storage Journal Article

In: Future Generation Computer Systems, vol. 138, pp. 160-171, 2022, ISSN: 0167-739X.

Abstract | Links | BibTeX

Campo-Vázquez, Celeste; García-Rubio, Carlos; Moure-Garrido, Marta

Entropy-Based Anomaly Detection in HouseholdElectricity Consumption Journal Article

In: Energies, vol. 15, 2022, ISSN: 1996-1073.

Abstract | Links | BibTeX

Campo-Vázquez, Celeste; García-Rubio, Carlos; Almenares-Mendoza, Florina; Seoane-Merida, Victor

Performance evaluation of CoAP and MQTT with security support for IoT environments Journal Article

In: COMPUTER NETWORKS, vol. 197, iss. 108338, pp. 1-22, 2021, ISSN: 1389-1286.

Abstract | Links | BibTeX

Campo-Vázquez, Celeste; García-Rubio, Carlos; Almenares-Mendoza, Florina; Seoane-Merida, Victor

Performance Evaluation of the CoAP Protocol with Security Support for IoT Environments Conference

PE-WASUN '20: Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, ASSOCIATION FOR COMPUTING MACHINERY, INC , 2020, ISBN: 978-1-4503-8118-5.

Abstract | Links | BibTeX

Marín-López, Andrés; Chica-Manjarrez, Sergio; Arroyo, David; Almenares-Mendoza, Florina; Díaz-Sánchez, Daniel

Security Information Sharing in Smart Grids: Persisting Security Audits to the Blockchain Journal Article

In: Electronics, vol. 9, pp. 1865, 2020, ISSN: 2079-9292.

Abstract | Links | BibTeX

Campo-Vázquez, Celeste; García-Rubio, Carlos; Moure-Garrido, Marta

Anomalies detection using entropy in household energy consumption data Conference

Intelligent Environments 2020 Workshop Proceedings of the 16th International Conference on Intelligent Environments, 2020, ISBN: 978-1-64368-090-3.

Abstract | Links | BibTeX

Díaz-Sánchez, Daniel; Marín-Lopez, Andrés; Mendoza, Florina Almenárez; Cabarcos, Patricia Arias

DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT † Journal Article

In: Sensors, vol. 19, iss. 15, pp. 3292, 2019, ISSN: 1424-8220.

Abstract | Links | BibTeX

Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenárez-Mendoza, Florina; Arias-Cabarcos, Patricia; Simon-Sherratt, R.

TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications Journal Article

In: IEEE Communications Surveys and Tutorials, vol. 21, iss. 4, pp. 3502-3531, 2019, ISSN: 1553-877X.

Abstract | Links | BibTeX

More Information

CYNAMON

Cyberspace plays nowadays a key role in modern societies and economies, and its protection is a pivotal challenge in national security strategies. Over the last decade, various technological developments have contributed to make our dependency on cyberspace even greater, including the generation and processing of massive amounts of data, the influence of social networks over all activities of our daily lives, or the trend to connect to Internet virtually every real­world device.

The scientific program proposed in this project aims at contributing to a more secure cyberspace in our current and future technological context. Our approach identifies three paradigms, each with a varying degree of maturity, that will reshape cybersecurity in the coming years. These are: the processing of massive amounts of information (big data), including those generated by citizens and devices; the embedding of computers in essentially all real­life objects (cyberphysical systems) and their connection to the Internet (IoT, Internet of Things); and the challenges and opportunities associated with the rise of quantum computing. To address these challenges we propose an interdisciplinary work program involving five research groups with proven expertise in the areas of system and application security, data analysis, next generation communication systems, and cryptography.

The project establishes three general objectives closely linked to the three challenges discussed above. First, we will develop advanced data analysis techniques to deal with massive amount of data, with a focus on two key application domains: social networks and new generation networks. Second, we will propose security mechanisms and tools for connected IoT devices and the network services they access. Finally, we will explore cryptographic techniques providing information security services and protecting users privacy. This will be done by leveraging new techniques such as the applications of the blockchain technology, as well as the threat posed by quantum computers.

Expected results include a significant advance in the research lines sketched above. In addition, harmonization between research and innovation tasks is ensured by the presence in the consortium of relevant industry partners (BBVA, Vicomtech y Unisys) with a keen interest in developing market­fitting technologies, together with various extraordinarily relevant institutional partners (INCIBE, Jefatura de Información de la Guardia Civil y Centro Criptológico Nacional). Thus, it is expected that this project’s results will be transferred and exploited as soon as they develop, contributing to an improved national cybersecurity at all levels. Consequently, our expected results have a very high technological relevance since they will provide tools for a more trustworthy cyberspace for citizens, companies, and Public Administrations.

The project goals are perfectly aligned with the Spanish and European priorities for the development of secure environments, which aim at strengthening citizen’s rights and improving the competitiveness of our industries and our defense capabilities.