Simon-Sherratt, Robert; Janko, Balazs; Hui, Terence; S.-Harwin, William; Dey, Nilanjan; Díaz-Sánchez, Daniel; Wang, Jin; Shi, Fuqian Task Scheduling to Constrain Peak Current Consumption in Wearable Healthcare Sensors Journal Article In: Electronics, vol. 8, pp. 789, 2019, ISSN: 2079-9292. Abstract | Links | BibTeX | Tags: embedded, health care, joint digital transformation, low-power, task scheduler, wearable Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenárez-Mendoza, Florina; Arias-Cabarcos, Patricia; Simon-Sherratt, R. TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications Journal Article In: IEEE Communications Surveys and Tutorials, vol. 21, iss. 4, pp. 3502-3531, 2019, ISSN: 1553-877X. Abstract | Links | BibTeX | Tags: authentication, certificate pinning, cynamon, DTLS, Internet of Things, Machine to Machine, magos, PKI, Protocols, TLS, Trusted Third Party, Tutorials Seiler-Hwang, Sunyoung; Arias-Cabarcos, Patricia; Marín, Andrés; Almenares, Florina; Díaz-Sánchez, Daniel; Becker, Christian I Don'T See Why I Would Ever Want to Use It: Analyzing the Usability of Popular Smartphone Password Managers Proceedings Article In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1937–1953, The 26th ACM Conference on Computer and Communications Security ACM, London, United Kingdom, 2019, ISBN: 978-1-4503-6747-9. Abstract | Links | BibTeX | Tags: authentication, password managers, usable security, user study García-Rubio, Carlos; Diaz-Redondo, Rebeca; Campo-Vázquez, Celeste; Fernandez-Vilas, Ana Using entropy of social media location data for the detection of crowd dynamics anomalies Journal Article In: Electronics, vol. 7, iss. 12, pp. 380, 2018, ISSN: 2079-9292. Abstract | Links | BibTeX | Tags: anomaly detection, city behavior, data mining algorithms, location-based social network Almenarez, Florina; Alonso, Lucía; Marín, Andrés; Díaz-Sánchez, Daniel; Arias, Patricia Assessment of fitness tracker security: a case of study Proceedings Article In: 2018, ISSN: 2504-3900. Abstract | Links | BibTeX | Tags: fitness tracker, inteligenciafuentesabiertas, security vulnerabilities, wereable devices Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenares-Mendoza, Florina; Arias-Cabarcos, Patricia DNS-Based Dynamic Authentication for Microservices in IoT Proceedings Article In: pp. 1-11, 2018, ISSN: 2504-3900. Abstract | Links | BibTeX | Tags: chameleon signatures, DANE, DNSSEC, inteligenciafuentesabiertas, IoT, microservices Rodriguez-Carrion, Alicia; Campo-Vázquez, Celeste; García-Rubio, Carlos Detecting and reducing biases in cellular-based mobility data sets Journal Article In: Entropy, vol. 20, iss. 10, 2018, ISSN: 1099-4300. Abstract | Links | BibTeX | Tags: cell-based location, human mobility, inrisco, mobility data sets entropy, mobility data sets predictability, ping-pong effect Alario-Hoyos, Carlos; Estevez-Ayres, Iria; Gallego-Romero, Jesus; Delgado-Kloss, Carlos; Fernandez-Panadero, Carmen; Crespo-Garcia, Raquel; Almenares-Mendoza, Florina; Ibañez-Espiga, Blanca; Villena-Roman, Julio; Ruiz-Magaña, Jorge; Blasco-Alis, Jorge In: JOURNAL OF UNIVERSAL COMPUTER SCIENCE , vol. 24, iss. 8, pp. 1015-1033, 2018, ISSN: 0948-695X. Abstract | Links | BibTeX | Tags: codeboard, emadrid, instructor-paced, Moocs, programming tools, self-paced Hinajeros, Francisca; Almenares-Mendoza, Florina; Gomila, Patricia Arias-Cabarcos Josep-Lluis Ferrer; Marín-López, Andrés RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security. Journal Article In: IEEE Transactions on Information Forensics and Security , vol. 13, iss. 8, pp. 1975-1988, 2018, ISSN: 1556-6013. Abstract | Links | BibTeX | Tags: certificate validation, mobile applications, risk assessment, trust validation Rubio-Drosdov, E; Díaz-Sánchez, D; Almenárez, F; Arias-Cabarcos, P; Marín, A Seamless human-device interaction in the internet of things Journal Article In: IEEE Transactions on Consumer Electronics, vol. 63, iss. 4, pp. 490-498, 2017, ISSN: 1558-4127. Abstract | Links | BibTeX | Tags: Human-Device Interaction, inrisco, Internet of Things, Natural Language Processing Sánchez-Guerrero, Rosa; Almenárez-Mendoza, Florina; Díaz-Sánchez, Daniel; Arias-Cabarcos, Patricia; Marín-López, Andrés Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management Journal Article In: IEEE Journal of Biomedical and Health Informatics, vol. 21, iss. 6, pp. 1741-1749, 2017, ISSN: 2168-2194 . Abstract | Links | BibTeX | Tags: EHR, emadrid2, Merkle Tree, Minimal Disclosure, privacy, Profile Management Pescador, Fernando; Lee, Jong-Hyouk; Díaz-Sánchez, Daniel (Ed.) Proceedings of the 2017 IEEE International Conference on Consumer Electronics (ICCE), Book IEEE, 2017, ISBN: 978-1-5090-5544-9. Abstract | Links | BibTeX | Tags: Simon-Sherratt, R.; Janko, Balazs; Hui, Terence; Harwin, William; Diaz-Sanchez, Daniel Dictionary memory based software architecture for distributed Bluetooth Low Energy host controllers enabling high coverage in consumer residential healthcare environments Proceedings Article In: 2017, ISBN: 978-1-5090-5545-6. Abstract | Links | BibTeX | Tags: home network, software architecture, system-on-chip Díaz-Sánchez, Daniel; Simon-Sherratt, R.; Almenarez, Florina; Arias, Patricia; Marín, Andrés Secure store and forward proxy for dynamic IoT applications over M2M networks Journal Article In: IEEE Transactions on Consumer Electronics, vol. 62, iss. 4, pp. 389-397, 2016, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: encryption, Internet of Things, Machine to Machine, privacy K-L-Hui, Terence; R-Sherratt, Simon; Díaz-Sánchez, Daniel Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies Journal Article In: Future Generation Computer Systems, vol. 76, pp. 358 - 369, 2016, ISSN: 0167-739X. Abstract | Links | BibTeX | Tags: Ambient intelligence, Home Automation, Internet of Things, Smart Cities, Smart Home requirements Arias-Cabarcos, Patricia; Marín, Andrés; Palacios, Diego; Almenárez, Florina; Díaz-Sánchez, Daniel Comparing Password Management Software: Toward Usable and Secure Enterprise Authentication Journal Article In: IT Professional, vol. 18, iss. 5, pp. 34-40, 2016, ISSN: 1941-045X. Abstract | Links | BibTeX | Tags: cybersecurity, emadrid2, inrisco, password managers, Security, usability Marín-López, Andrés; Almenáres-Mendoza, Florina; Arias-Cabarcos, Patricia; Díaz-Sánchez, Daniel Wi-Fi Direct: Lessons learned Proceedings Article In: 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Institute of Electrical and Electronics Engineers (IEEE), 2016, ISBN: 978-1-5090-1984-7. Abstract | Links | BibTeX | Tags: Protocols, Security, usability García-Lozano, Estrella; Campo-Vázquez, Celeste; García-Rubio, Carlos; Rodriguez-Carrion, Alicia A Bandwidth-Efficient Dissemination Scheme of Non-Safety Information in Urban VANETs Journal Article In: Sensors , vol. 16, iss. 7, 2016, ISSN: 1424-8220. Abstract | Links | BibTeX | Tags: broadcast suppression scheme, dissemination, inrisco, store-carry-forward, urban scenarios, VANETs Khaled, Omar; Marín, Andrés; Almenares, Florina; Arias, Patricia; Díaz, Daniel Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids Journal Article In: International Journal of Distributed Sensor Networks, vol. 12, iss. 4, pp. 1-11, 2016, ISSN: 1550-1477. Abstract | Links | BibTeX | Tags: inrisco, smart grids Bellido, Francisco; Vun, Nicholas; Dolar, Carsten; Díaz-Sánchez, Daniel; Ling, Wing-Kuen (Ed.) Proceedings of the 2016 IEEE International Conference on Consumer Electronics (ICCE) Book IEEE, 2016, ISBN: 978-1-4673-8364-6. Díaz-Sánchez, Daniel; Sherratt, Simon; Arias, Patricia; Almenares, Florina; Marín-López, Andrés Proxy re-encryption schemes for IoT and crowd sensing Proceedings Article In: IEEE, 2016, ISSN: 2158-4001. Abstract | Links | BibTeX | Tags: encryption, Protocols, secret key Díaz-Sánchez, Daniel; Sherratt, Simon; Almenares, Florina; Arias, Patricia; López, Andrés Marín- Distributed access control and privacy for the internet of me Proceedings Article In: 2016 IEEE International Conference on Consumer Electronics (ICCE), IEEE, 2016, ISSN: 2158-4001. Abstract | Links | BibTeX | Tags: information flow control, Security Almenarez, Florina; Hinarejos, M. Francisca; Marín, Andrés; Ferrer-Gomila, Josep Lluís; Sánchez, Daniel Díaz PECEVA: An adaptable and energy-saving credential validation solution for pervasive networks Journal Article In: INFORMATION SCIENCES, vol. 354, pp. 41-59, 2016, ISSN: 0020-0255. Abstract | Links | BibTeX | Tags: Certificate validation efficiency, Decision engine, inrisco, Pervasive networks, PKIX, Trust management Diaz-Sánchez, Daniel; Sherratt, Simon; Arias, Patricia; Almenarez, Florina; Marín, Andrés Enabling actor model for crowd sensing and IoT Proceedings Article In: IEEE, 2015, ISSN: 0747-668X. Abstract | Links | BibTeX | Tags: Cloud computing, emrisco, IoT, Wireless communication Rubio-Drosdov, Eugenio; Díaz-Sánchez, Daniel; Arias-Cabarcos, Patricia; Almenárez, Florina; Marín, Andrés Towards a seamless human interaction in IoT Proceedings Article In: IEEE, 2015, ISSN: 0747-668X. Abstract | Links | BibTeX | Tags: Internet of Things, natural language Vara, Isabel; Campo-Vázquez, Celeste Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks Journal Article In: Sensors , vol. 15, iss. 7, pp. 17621-17648, 2015, ISSN: 1424-8220. Abstract | Links | BibTeX | Tags: inrisco, manet, olsrv2, service discovery Rodriguez-Carrion, Alicia; García-Rubio, Carlos; Campo-Vázquez, Celeste; Das, Sajal Analysis of a fast LZ-based entropy estimator for mobility data Conference 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), IEEE Publishing Services , 2015, ISBN: 978-1-4799-8425-1. Abstract | Links | BibTeX | Tags: emrisco, entropy, lz, mobility data Rodriguez-Carrion, Alicia; Rebollo-Monedero, David; Forne, Jordi; Campo-Vázquez, Celeste; García-Rubio, Carlos; Parra-Arnau, Javier; Das, Sajal Entropy-based privacy against profiling of user mobility Journal Article In: Entropy, vol. 17, iss. 6, pp. 3913-3946, 2015, ISSN: 1099-4300. Abstract | Links | BibTeX | Tags: emrisco, entropy, location history, location-based services, perturbative methods, privacy Arias-Cabarcos, Patricia; Almenárez, Florina; Trapero, Rubén; Díaz-Sánchez, Daniel; Marín, Andrés Blended Identity: Pervasive IdM for Continuous Authentication Journal Article In: IEEE Xplore, vol. 13, iss. 3, pp. 32-39, 2015, ISSN: 1540-7993. Abstract | Links | BibTeX | Tags: blended identity, emrisco, identity management, IdM, Pervasive computing, Protocols, risk assessment, Security Pescador, F.; Sanz, C.; Jaureguizar, F.; Groba, Ángel; Díaz-Sánchez, Daniel Proceedings of the 2015 International Symposium on Consumer Electronics Book IEEE, 2015. BibTeX | Tags: Díaz-Sanchez, Daniel; Arias-Cabarcos, Patricia; Almenarez, Florina; Marín-López, Andrés P2P-based data layer for mobile Media Cloud Proceedings Article In: IEEE, 2015, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: Cloud computing, emrisco, Protocols Díaz-Sánchez, Daniel; Sánchez-Guerrero, Rosa; Arias, Patricia; Almenarez, Florina; Marín, Andrés A distributed transcoding and content protection system: Enabling pay per quality using the cloud Journal Article In: Telecommunication Systems, vol. 61, iss. 1, pp. 59 - 76, 2015, ISSN: 1572-9451. Abstract | Links | BibTeX | Tags: Cloud computing, content protection keyword, raudo2, transcoding García-Lozano, Estrella; Campo-Vázquez, Celeste; García-Rubio, Carlos; Cortés, Alberto Bandwidth-efficient techniques for information dissemination in urban vehicular networks Conference PE-WASUN '14: Proceedings of the 11th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks, ASSOCIATION FOR COMPUTING MACHINERY, INC , 2014, ISBN: 978-1-4503-3025-1. Abstract | Links | BibTeX | Tags: Bandwidth usage, Multi-hop dissemination, urban vehicular networks, V2V communication Rodriguez-Carrion, Alicia; Das, Sajal; Campo-Vázquez, Celeste; García-Rubio, Carlos Impact of location history collection schemes on observed human mobility features Conference 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2014, ISBN: 978-1-4799-2736-4. Abstract | Links | BibTeX | Tags: data collection, location history, Mobile computing Familiar, Miguel; Martínez, Jose; García-Rubio, Carlos Service architecting and dynamic composition in pervasive smart ecosystems for the internet of things based on sensor network technology Journal Article In: Journal of Ambient Intelligence and Smart Environments , vol. 6, iss. 3, pp. 331-333, 2014, ISBN: 1876-1364. Abstract | Links | BibTeX | Tags: IoT, pervasive smart ecosystems Díaz-Sanchez, Daniel; Arias-Cabarcos, Patricia; Sánchez-Guerrero, Rosa; Almenarez, Florina; Marín-Lopez, Andrés Elastic participatory sensing systems enabling cooperative meta sensors with consumer devices Proceedings Article In: 2014 IEEE International Conference on Consumer Electronics (ICCE), IEEE, 2014, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: Consumer electronics, sensor hardware, smartphone García-Lozano, Estrella; Woerndl, Wolfgang; Campo-Vázquez, Celeste A new traffic information service for smart consumer devices Conference 2014 IEEE International Conference on Consumer Electronics (ICCE). Proceedings, IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2014, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: information, smart consumer devices, traffic information Díaz-Sánchez, Daniel; Almenarez, Florina; Marín, Andrés; Sánchez-Guerrero, Rosa; Arias, Patricia Media Gateway: bringing privacy to Private Multimedia Clouds connections Journal Article In: Telecommunication Systems, vol. 55, iss. 2, pp. 315-330, 2014, ISSN: 1572-9451. Abstract | Links | BibTeX | Tags: Cloud computing, multimedia, privacy, streaming García-Lozano, Estrella; Tripp-Barba, Carolina; Aguilar-Igartua, Mónica; Campo-Vázquez, Celeste A distributed, bandwidth-efficient accident prevention system for interurban VANETs. Conference 2013 International Conference on Smart Communications in Network Technologies (SaCoNeT), IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2013, ISBN: 978-1-4799-0694-9. Abstract | Links | BibTeX | Tags: broadcast mechanisms, ITS, road safety, VANETs Arias-Cabarcos, Patricia; Almenares-Mendoza, Florina; Gómez-Mármol, Felix; López, Andrés Marín- To Federate or Not To Federate: A Reputation-Based Mechanism to Dynamize Cooperation in Identity Management Journal Article In: Wireless Personal Communications, vol. 75, iss. 3, pp. 1769-1786, 2013, ISSN: 0929-6212. Abstract | Links | BibTeX | Tags: cooperative systems, identity federation, identity management, trust and reputation management García-Lozano, Estrella; Campo-Vázquez, Celeste; García-Rubio, Carlos; Cortés, Alberto; Rodriguez-Carrion, Alicia; Noriega-Vivas, Patricia A Bandwidth-Efficient Service for Local Information Dissemination in Sparse to Dense Roadways Journal Article In: Sensors , vol. 13, iss. 7, pp. 8612-8639, 2013, ISSN: 1424-3210. Abstract | Links | BibTeX | Tags: bandwidth efficiency, multi-hop broadcast, service discovery, store-carry-forward, VANETs Rodriguez-Carrion, Alicia; Campo-Vázquez, Celeste; García-Rubio, Carlos; García-Lozano, Estrella; Cortés, Alberto Ubiquitous Computing and Ambient Intelligence. Context-Awareness and Context-Driven Interaction, Springer International Publishing, 2013, ISSN: 978-3-319-03176-7. Abstract | Links | BibTeX | Tags: fingerprinting, gsm-based location, indoor location, mobile device-based location, UMTS Almenares, Florina; Arias, Patricia; Marín, Andrés; Díaz-Sánchez, Daniel; Sánchez, Rosa Overhead of using Secure Wireless Communications in Mobile Computing Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 59, iss. 2, pp. 335-342, 2013, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: Browsers, Ciphers, Energy and time performance, Energy consumption, Handheld devices, Secure wireless communications, servicioseguridad, SSL/TLS, Wireless communication Bernabé-Sánchez, Iván; Díaz-Sánchez, Daniel; Muñoz-Organero, Mario Optimizing OSGi Services on Gateways Proceedings Article In: Ambient Intelligence - Software and Applications, pp. 155-162, Springer International Publishing, 2013, ISBN: 978-3-319-00565-2. Abstract | Links | BibTeX | Tags: devices, gateways, personalmediacloud Díaz-Sánchez, Daniel; Marín-López, Andres; Almenares, Florina; Sánchez, Rosa; Arias, Patricia Flexible Computing for personal electronic devices Proceedings Article In: 2013 IEEE International Conference on Consumer Electronics (ICCE), IEEE, 2013, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: availability, data center, local network, social networks Almenares, Florina; Arias, Patricia; Marín-López, Andrés; Díaz-Sánchez, Daniel; Sánchez, Rosa How costly are secure transactions on handheld devices? Proceedings Article In: IEEE, 2013, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: Ciphers, Security, security protocols Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenarez, Florina; Sánchez-Guerrero, Rosa; Arias, Patricia A distributed transcoding system for mobile video delivery Proceedings Article In: Institute of Electrical and Electronics Engineers (IEEE), 2013, ISBN: 978-1-4673-2993-4. Abstract | Links | BibTeX | Tags: Cloud computing, software as a service Sánchez-Guerrero, Rosa; Almenárez, Florina; Díaz-Sánchez, Daniel; Arias, Patricia; Marín, Andrés A model for dimensioning a secure event-driven health care system Proceedings Article In: 2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC), Institute of Electrical and Electronics Engineers (IEEE), 2013, ISBN: 978-1-4673-2993-4. Abstract | Links | BibTeX | Tags: privacy, Protocols, Security Arias-Cabarcos, Patricia; Almenárez-Mendoza, Florina; Sánchez-Guerrero, Rosa; Marín-López, Andrés; Díaz-Sánchez, Daniel SuSSo: Seamless and Ubiquitous Single Sign-on for Cloud Service Continuity across devices Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 58, iss. 4, pp. 1425-1433, 2012, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: Cloud computing, Computer architecture, context, middleware, Performance evaluation, personal multimedia devices, raudo2, Security, service continuity, sessionhandoff, xml Marín-López, Andrés; Díaz-Sánchez, Daniel; Almenárez-Mendoza, Florina; Arias-Cabarcos, Patricia; Sánchez-Guerrero, Rosa; Sanvido, Fabio Private cloud and media privacy in social networks Proceedings Article In: 2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), IEEE, 2012, ISSN: 2166-6814. Abstract | Links | BibTeX | Tags: Cloud computing, privacy, Security2019
@article{diazsanchez011,
title = {Task Scheduling to Constrain Peak Current Consumption in Wearable Healthcare Sensors},
author = {Robert Simon-Sherratt and Balazs Janko and Terence Hui and William S.-Harwin and Nilanjan Dey and Daniel Díaz-Sánchez and Jin Wang and Fuqian Shi},
url = {https://doi.org/10.3390/electronics8070789
https://www.mdpi.com/2079-9292/8/7/789
https://www.mdpi.com/2079-9292/8/7/789/pdf?version=1563172692},
doi = {https://doi.org/10.3390/electronics8070789},
issn = {2079-9292},
year = {2019},
date = {2019-07-15},
urldate = {2019-07-15},
journal = {Electronics},
volume = {8},
pages = {789},
abstract = {Small embedded systems, in our case wearable healthcare devices, have significant engineering challenges to reduce their power consumption for longer battery life, while at the same time supporting ever-increasing processing requirements for more intelligent applications. Research has primarily focused on achieving lower power operation through hardware designs and intelligent methods of scheduling software tasks, all with the objective of minimizing the overall consumed electrical power. However, such an approach inevitably creates points in time where software tasks and peripherals coincide to draw large peaks of electrical current, creating short-term electrical stress for the battery and power regulators, and adding to electromagnetic interference emissions. This position paper proposes that the power profile of an embedded device using a real-time operating system (RTOS) will significantly benefit if the task scheduler is modified to be informed of the electrical current profile required for each task. This enables the task scheduler to schedule tasks that require large amounts of current to be spread over time, thus constraining the peak current that the system will draw. We propose a solution to inform the task scheduler of a tasks’ power profile, and we discuss our application scenario, which clearly benefited from the proposal.},
keywords = {embedded, health care, joint digital transformation, low-power, task scheduler, wearable},
pubstate = {published},
tppubtype = {article}
}
@article{8704893,
title = {TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications},
author = {Daniel Díaz-Sánchez and Andrés Marín-López and Florina Almenárez-Mendoza and Patricia Arias-Cabarcos and R. Simon-Sherratt},
url = {https://doi.org/10.1109/COMST.2019.2914453
https://ieeexplore.ieee.org/document/8704893
https://phpmyadmin.pervasive.it.uc3m.es/download/TLC-PKI-challenges-certificate-pinning.pdf},
doi = {10.1109/COMST.2019.2914453},
issn = {1553-877X},
year = {2019},
date = {2019-05-02},
urldate = {2019-05-02},
journal = {IEEE Communications Surveys and Tutorials},
volume = {21},
issue = {4},
pages = {3502-3531},
abstract = {Transport layer security (TLS) is becoming the de facto standard to provide end-to-end security in the current Internet. IoT and M2M scenarios are not an exception since TLS is also being adopted there. The ability of TLS for negotiating any security parameter, its flexibility and extensibility are responsible for its wide adoption but also for several attacks. Moreover, as it relies on public key infrastructure (PKI) for authentication, it is also affected by PKI problems. Considering the advent of IoT/M2M scenarios and their particularities, it is necessary to have a closer look at TLS history to evaluate the potential challenges of using TLS and PKI in these scenarios. According to this, this paper provides a deep revision of several security aspects of TLS and PKI, with a particular focus on current certificate pinning solutions in order to illustrate the potential problems that should be addressed.},
keywords = {authentication, certificate pinning, cynamon, DTLS, Internet of Things, Machine to Machine, magos, PKI, Protocols, TLS, Trusted Third Party, Tutorials},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{Seiler-Hwang:2019:DSW:3319535.3354192,
title = {I Don'T See Why I Would Ever Want to Use It: Analyzing the Usability of Popular Smartphone Password Managers},
author = {Sunyoung Seiler-Hwang and Patricia Arias-Cabarcos and Andrés Marín and Florina Almenares and Daniel Díaz-Sánchez and Christian Becker},
url = {http://doi.acm.org/10.1145/3319535.3354192},
doi = {10.1145/3319535.3354192},
isbn = {978-1-4503-6747-9},
year = {2019},
date = {2019-01-01},
urldate = {2019-01-01},
booktitle = {Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security},
pages = {1937--1953},
publisher = {ACM},
address = {London, United Kingdom},
organization = {The 26th ACM Conference on Computer and Communications Security},
series = {CCS '19},
abstract = {Passwords are an often unavoidable authentication mechanism, despite the availability of additional alternative means. In the case of smartphones, usability problems are aggravated because interaction happens through small screens and multilayer keyboards. While password managers (PMs) can improve this situation and contribute to hardening security, their adoption is far from widespread. To understand the underlying reasons, we conducted the first empirical usability study of mobile PMs, covering both quantitative and qualitative evaluations. Our findings show that popular PMs are barely acceptable according to the standard System Usability Scale, and that there are three key areas for improvement: integration with external applications, security, and user guidance and interaction. We build on the collected evidence to suggest recommendations that can fill this gap.},
keywords = {authentication, password managers, usable security, user study},
pubstate = {published},
tppubtype = {inproceedings}
}
2018
@article{campo006,
title = {Using entropy of social media location data for the detection of crowd dynamics anomalies},
author = {Carlos García-Rubio and Rebeca Diaz-Redondo and Celeste Campo-Vázquez and Ana Fernandez-Vilas },
url = {http://hdl.handle.net/10016/33760},
doi = {https://doi.org/10.3390/electronics7120380},
issn = {2079-9292},
year = {2018},
date = {2018-12-03},
urldate = {2018-12-03},
journal = {Electronics},
volume = {7},
issue = {12},
pages = {380},
abstract = {Evidence of something unusual happening in urban areas can be collected from different data sources, such as police officers, cameras, or specialized physical infrastructures. In this paper, we propose using geotagged posts on location-based social networks (LBSNs) to detect crowd dynamics anomalies automatically as evidence of a potential unusual event. To this end, we use the Instagram API media/search endpoint to collect the location of the pictures posted by Instagram users in a given area periodically. The collected locations are summarized by their centroid. The novelty of our work relies on using the entropy of the sequence of centroid locations in order to detect abnormal patterns in the city. The proposal is tested on a data set collected from Instagram during seven months in New York City and validated with another data set from Manchester. The results have also been compared with an alternative approach, a training phase plus a ranking of outliers. The main conclusion is that the entropy algorithm succeeds inn finding abnormal events without the need for a training phase, being able to dynamically adapt to changes in crowd behavior.},
keywords = {anomaly detection, city behavior, data mining algorithms, location-based social network},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa058,
title = {Assessment of fitness tracker security: a case of study},
author = {Florina Almenarez and Lucía Alonso and Andrés Marín and Daniel Díaz-Sánchez and Patricia Arias},
url = {https://www.mdpi.com/2504-3900/2/19/1235},
doi = {https://doi.org/10.3390/proceedings2191235},
issn = {2504-3900},
year = {2018},
date = {2018-10-26},
abstract = {The wearable industry has experienced a notable growth over the last decade, especially in fitness or e-health trackers. These trackers bring new functionalities that require collecting a great amount of sensitive information about the user. This fact has made fitness trackers the target of deliberate attacks, e.g., eavesdropping, unauthorized account access, fake firmware update, and so on. For this reason, this paper describes a vulnerability study on one of the most popular fitness trackers in 2017, together with the mobile application associated to the tracker. The study results show what vulnerabilities of the communications among agents (i.e., wearable device, mobile application and server) could put at risk users sensitive information and privacy.},
keywords = {fitness tracker, inteligenciafuentesabiertas, security vulnerabilities, wereable devices},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa055,
title = {DNS-Based Dynamic Authentication for Microservices in IoT},
author = {Daniel Díaz-Sánchez and Andrés Marín-López and Florina Almenares-Mendoza and Patricia Arias-Cabarcos},
url = {https://www.mdpi.com/2504-3900/2/19/1233},
doi = {https://doi.org/10.3390/proceedings2191233},
issn = {2504-3900},
year = {2018},
date = {2018-10-25},
pages = {1-11},
abstract = {IoT devices provide with real-time data to a rich ecosystems of services and applications that will be of uttermost importance for ubiquitous computing. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core netkworks. Designers may opt for microservice architectures and fog computing to address this challenge while offering the required flexibility for the main players of ubiquitous computing: nomadic users. Microservices require strong security support for Fog computing, to rely on nodes in the boundary of the network for secure data collection and processing. IoT low cost devices face outdated certificates and security support, due to the elapsed time from manufacture to deployment. In this paper we propose a solution based on microservice architectures and DNSSEC, DANE and chameleon signatures to overcome these difficulties. We will show how trap doors included in the certificates allow a secure and flexible delegation for off-loading data collection and processing to the fog. The main result is showing this requires minimal manufacture device configuration, thanks to DNSSEC support.},
keywords = {chameleon signatures, DANE, DNSSEC, inteligenciafuentesabiertas, IoT, microservices},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{campo007,
title = {Detecting and reducing biases in cellular-based mobility data sets},
author = {Alicia Rodriguez-Carrion and Celeste Campo-Vázquez and Carlos García-Rubio},
url = {http://hdl.handle.net/10016/28004},
doi = {https://doi.org/10.3390/e20100736},
issn = {1099-4300},
year = {2018},
date = {2018-09-25},
urldate = {2018-09-25},
journal = {Entropy},
volume = {20},
issue = {10},
abstract = {Correctly estimating the features characterizing human mobility from mobile phone traces is a key factor to improve the performance of mobile networks, as well as for mobility model design and urban planning. Most related works found their conclusions on location data based on the cells where each user sends or receives calls or messages, data known as Call Detail Records (CDRs). In this work, we test if such data sets provide enough detail on users’ movements so as to accurately estimate some of the most studied mobility features. We perform the analysis using two different data sets, comparing CDRs with respect to an alternative data collection approach. Furthermore, we propose three filtering techniques to reduce the biases detected in the fraction of visits per cell, entropy and entropy rate distributions, and predictability. The analysis highlights the need for contextualizing mobility results with respect to the data used, since the conclusions are biased by the mobile phone traces collection approach.},
keywords = {cell-based location, human mobility, inrisco, mobility data sets entropy, mobility data sets predictability, ping-pong effect},
pubstate = {published},
tppubtype = {article}
}
@article{almenarez009,
title = {A study of learning-by-doing in MOOCs through the integration of third-party external tools: comparison of synchronous and asynchronous running modes },
author = {Carlos Alario-Hoyos and Iria Estevez-Ayres and Jesus Gallego-Romero and Carlos Delgado-Kloss and Carmen Fernandez-Panadero and Raquel Crespo-Garcia and Florina Almenares-Mendoza and Blanca Ibañez-Espiga and Julio Villena-Roman and Jorge Ruiz-Magaña and Jorge Blasco-Alis},
url = {http://hdl.handle.net/10016/29864},
doi = {https://doi.org/10.3217/jucs-024-08-1015},
issn = {0948-695X},
year = {2018},
date = {2018-08-28},
urldate = {2018-08-28},
journal = {JOURNAL OF UNIVERSAL COMPUTER SCIENCE },
volume = {24},
issue = {8},
pages = {1015-1033},
abstract = {Many MOOCs are being designed replicating traditional passive teaching approaches but using video lectures as the means of transmitting information. However, it is well known that learning-by-doing increases retention rates and, thus, allows achieving a more effective learning. To this end, it is worth exploring which tools fit best in the context of each MOOC to enrich learners' experience, including built-in tools already available in the MOOC platform, and third-party external tools which can be integrated in the MOOC platform. This paper presents an example of the integration of a software development tool, called Codeboard, in three MOOCs which serve as an introduction to programming with Java. We analyze the effect this tool has on learners' interaction and engagement when running the MOOCs in synchronous (instructor-paced) or asynchronous (self-paced) modes. Results show that the overall use of the tool is similar, regardless of the course running mode, although in the case of the synchronous mode the use of the tool is concentrated in a shorter period of time. Results also show that in the synchronous mode there is a higher percentage of accesses to the tool from registered learners (who can save their advances and continue the work later); this finding suggests that learners in the synchronous running mode are more engaged with the MOOC.},
keywords = {codeboard, emadrid, instructor-paced, Moocs, programming tools, self-paced},
pubstate = {published},
tppubtype = {article}
}
@article{almenarez009b,
title = {RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security. },
author = {Francisca Hinajeros and Florina Almenares-Mendoza and Patricia Arias-Cabarcos Josep-Lluis Ferrer Gomila and Andrés Marín-López},
doi = {https://doi.org/10.1109/tifs.2018.2807788},
issn = {1556-6013},
year = {2018},
date = {2018-02-19},
urldate = {2018-02-19},
journal = {IEEE Transactions on Information Forensics and Security },
volume = {13},
issue = {8},
pages = {1975-1988},
abstract = {Digital certificates, based on X.509 PKI standard, are located at the core of many security mechanisms implemented in services and applications. However, the usage of certificates has revealed flaws in the certificate validation process (e.g., possibility of unavailable or non-updated data). This fact implies security risks that are not assessed. In order to address these issues that such flaws entail, we propose a novel probabilistic approach for quantitative risk assessment in X.509 PKI, together with trust management when there is uncertainty. We have evaluated our risk assessment approach and demonstrated its usage, considering as a use case the secure installation of mobile applications. The results show that our approach provides more granularity, appropriate values according to the impact, and relevant information in the risk calculation than other approaches.},
keywords = {certificate validation, mobile applications, risk assessment, trust validation},
pubstate = {published},
tppubtype = {article}
}
2017
@article{8246828,
title = {Seamless human-device interaction in the internet of things},
author = {E Rubio-Drosdov and D Díaz-Sánchez and F Almenárez and P Arias-Cabarcos and A Marín},
url = {/download/Seamless_Human-Device_Interaction_in_the_Internet_of_Things.pdf
https://ieeexplore.ieee.org/document/8246828},
doi = {10.1109/TCE.2017.015076},
issn = {1558-4127},
year = {2017},
date = {2017-11-01},
urldate = {2017-11-01},
journal = {IEEE Transactions on Consumer Electronics},
volume = {63},
issue = {4},
pages = {490-498},
abstract = {The Internet of Things will bring a scenario in which interaction between humans and devices will be critical to allow people to use, monitor or configure Internet of Things devices. Interactions in such applications are based on traditional graphical interfaces. Devices that accept interaction based on Natural Language, e.g., through voice commands, can understand basic human orders or answering questions whenever user expressions fit into a known language pattern. Some devices can understand natural language voice commands but require sophisticated voice assistants located in the cloud, which raises significant privacy concerns. Others devices which handle voice-processing locally can perform a very limited local recognition system, requiring users to be familiar with words the system can process. The purpose of this work is to diminish the complexity of Natural Language processing in the context of IoT. The solution posited in this article allows Internet of Things devices to offload Natural Language processing to a system that improves the use of Natural Language and alleviates the need to learn or remember specific words or terms intended for triggering device actions. We have evaluated the feasibility of the design with a proof-of-concept implemented in a home environment and it was tested by real users.},
keywords = {Human-Device Interaction, inrisco, Internet of Things, Natural Language Processing},
pubstate = {published},
tppubtype = {article}
}
@article{8003467,
title = {Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management},
author = {Rosa Sánchez-Guerrero and Florina Almenárez-Mendoza and Daniel Díaz-Sánchez and Patricia Arias-Cabarcos and Andrés Marín-López},
url = {/download/Collaborative_eHealth_meets_Security_Privacy-Enhancing_Patient_Profile_Management.pdf
https://ieeexplore.ieee.org/document/8003467},
doi = {10.1109/JBHI.2017.2655419},
issn = {2168-2194 },
year = {2017},
date = {2017-11-01},
urldate = {2017-11-01},
journal = {IEEE Journal of Biomedical and Health Informatics},
volume = {21},
issue = {6},
pages = {1741-1749},
abstract = {Collaborative healthcare environments offer potential benefits, including enhancing the healthcare quality delivered to patients and reducing costs. As a direct consequence, sharing of electronic health records (EHRs) among healthcare providers has experienced a noteworthy growth in the last years, since it enables physicians to remotely monitor patients' health and enables individuals to manage their own health data more easily. However, these scenarios face significant challenges regarding security and privacy of the extremely sensitive information contained in EHRs. Thus, a flexible, efficient, and standards-based solution is indispensable to guarantee selective identity information disclosure and preserve patient's privacy. We propose a privacy-aware profile management approach that empowers the patient role, enabling him to bring together various healthcare providers as well as user-generated claims into an unique credential. User profiles are represented through an adaptive Merkle Tree, for which we formalize the underlying mathematical model. Furthermore, performance of the proposed solution is empirically validated through simulation experiments.},
keywords = {EHR, emadrid2, Merkle Tree, Minimal Disclosure, privacy, Profile Management},
pubstate = {published},
tppubtype = {article}
}
@book{book003,
title = {Proceedings of the 2017 IEEE International Conference on Consumer Electronics (ICCE), },
editor = {Fernando Pescador and Jong-Hyouk Lee and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/xpl/conhome/7886213/proceeding},
doi = {10.1109/ICCE39120.2017},
isbn = {978-1-5090-5544-9},
year = {2017},
date = {2017-04-04},
publisher = {IEEE},
abstract = {2017 IEEE International Conference on Consumer Electronics (ICCE) took place January 8-10, 2017 in Las Vegas, NV, USA.},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
@inproceedings{pa001,
title = {Dictionary memory based software architecture for distributed Bluetooth Low Energy host controllers enabling high coverage in consumer residential healthcare environments},
author = {R. Simon-Sherratt and Balazs Janko and Terence Hui and William Harwin and Daniel Diaz-Sanchez},
url = {https://ieeexplore.ieee.org/document/7889373
},
doi = {https://ieeexplore.ieee.org/document/7889373},
isbn = {978-1-5090-5545-6},
year = {2017},
date = {2017-01-10},
abstract = {Technology has been seen as a possible solution to the increasing costs of healthcare and the globally aging population. It is known that many elderly people prefer to stay in their homes for as long as possible and remote monitoring can be a solution, but often such systems lack useful information or are prohibitive due to cost, ease of use/deployment and wireless coverage. This work presents a novel gateway software architecture based on threads being managed by dictionary memory. The architecture has been deployed in a distributed interconnected set of low-cost consumer grade gateway devices using Bluetooth Low Energy (BLE) that are positioned around the home. The gateway devices can then be used to listen, monitor or connect to BLE based healthcare sensors to continually reveal information about the user with full residential coverage. A further novelty of this work is the ability to maintain handover connections between many sensors and many gateways as a user moves throughout their home, thus the gateways can route information to/from sensors across the consumer's home network. The system has been tested in an experimental house and is now poised to be initially deployed to 100 homes for residential healthcare monitoring before any public mass consumer deployment.},
keywords = {home network, software architecture, system-on-chip},
pubstate = {published},
tppubtype = {inproceedings}
}
2016
@article{7838091,
title = {Secure store and forward proxy for dynamic IoT applications over M2M networks},
author = {Daniel Díaz-Sánchez and R. Simon-Sherratt and Florina Almenarez and Patricia Arias and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/7838091
https://phpmyadmin.pervasive.it.uc3m.es/download/Secure__Store_and_Forward_Proxy_for_Dynamic_IoT_Applications_over_M2M_Networks.pdf},
doi = {10.1109/TCE.2016.7838091},
issn = {0098-3063},
year = {2016},
date = {2016-11-01},
urldate = {2016-11-01},
journal = {IEEE Transactions on Consumer Electronics},
volume = {62},
issue = {4},
pages = {389-397},
abstract = {Internet of Things (IoT) applications are expected to generate a huge unforeseen amount of traffic flowing from Consumer Electronics devices to the network. In order to overcome existing interoperability problems, several standardization bodies have joined to bring a new generation of Machine to Machine (M2M) networks as a result of the evolution of wireless sensor/actor networks and mobile cellular networks to converged networks. M2M is expected to enable IoT paradigms and related concepts into a reality at a reasonable cost. As part of the convergence, several technologies preventing new IoT services to interfere with existing Internet services are flourishing. Responsive, message-driven, resilient and elastic architectures are becoming essential parts of the system. These architectures will control the entire data flow for an IoT system requiring sometimes to store, shape and forward data among nodes of a M2M network to improve network performance. However, IoT generated data have an important personal component since it is generated in personal devices or are the result of the observation of the physical world, so rises significant security concerns. This article proposes a novel opportunistic flexible secure store and forward proxy for M2M networks and its mapping to asynchronous protocols that guarantees data confidentiality.},
keywords = {encryption, Internet of Things, Machine to Machine, privacy},
pubstate = {published},
tppubtype = {article}
}
@article{HUI2017358,
title = {Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies},
author = {Terence K-L-Hui and Simon R-Sherratt and Daniel Díaz-Sánchez},
url = {http://www.sciencedirect.com/science/article/pii/S0167739X16304721
/download/Major_requirements_for_building_Smart_Homes_in_Smart_Cities_based.pdf},
doi = {https://doi.org/10.1016/j.future.2016.10.026},
issn = {0167-739X},
year = {2016},
date = {2016-11-01},
urldate = {2016-11-01},
journal = {Future Generation Computer Systems},
volume = {76},
pages = {358 - 369},
abstract = {The recent boom in the Internet of Things (IoT) will turn Smart Cities and Smart Homes (SH) from hype to reality. SH is the major building block for Smart Cities and have long been a dream for decades, hobbyists in the late 1970s made Home Automation (HA) possible when personal computers started invading home spaces. While SH can share most of the IoT technologies, there are unique characteristics that make SH special. From the result of a recent research survey on SH and IoT technologies, this paper defines the major requirements for building SH. Seven unique requirement recommendations are defined and classified according to the specific quality of the SH building blocks.},
keywords = {Ambient intelligence, Home Automation, Internet of Things, Smart Cities, Smart Home requirements},
pubstate = {published},
tppubtype = {article}
}
@article{7579116,
title = {Comparing Password Management Software: Toward Usable and Secure Enterprise Authentication},
author = {Patricia Arias-Cabarcos and Andrés Marín and Diego Palacios and Florina Almenárez and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/7579116
https://doi.org/10.1109/MITP.2016.81
/download/ComparingPasswordManagementSoftware.pdf},
doi = {10.1109/MITP.2016.81},
issn = {1941-045X},
year = {2016},
date = {2016-09-01},
urldate = {2016-09-01},
journal = {IT Professional},
volume = {18},
issue = {5},
pages = {34-40},
abstract = {In today's corporate IT systems, employees routinely repeat an undeniable pattern: accessing a huge number of password-protected services. In this regard, although deploying a strong enterprise password policy can increase security against online breaches and data leaks, it also imposes a significant usability burden on users. To alleviate this problem, password managers (PMs) are considered user-friendly tools that automate password generation and login processes. But how secure and usable are these tools? The authors analyze the four most popular PMs with free versions from both security and usability perspectives. The comparison leads to recommendations on enterprise PM selection, as well as to the identification of new lines of research and development on usable authentication.},
keywords = {cybersecurity, emadrid2, inrisco, password managers, Security, usability},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa002,
title = {Wi-Fi Direct: Lessons learned},
author = {Andrés Marín-López and Florina Almenáres-Mendoza and Patricia Arias-Cabarcos and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/7528493
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7528493},
doi = {10.1109/MedHocNet.2016.7528493},
isbn = {978-1-5090-1984-7},
year = {2016},
date = {2016-08-04},
urldate = {2016-08-04},
booktitle = {2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Adhoc networking was initially designed for military application area. But adhoc networks have been found also appealing for autonomous computing. The adhoc mode of IEEE 802.11 (Independent Basic Service Set (IBSS) has not been successful due to several reasons. Within this article we explore and compare two alternatives for adhoc network formation in heterogeneous environments: Wi-Fi P2P also known as Wi-Fi Direct, and Wi-Fi Hotspot. The comparison shows that there are usability, security and performance reasons to favor Hotspot for application development.},
keywords = {Protocols, Security, usability},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{campos008,
title = {A Bandwidth-Efficient Dissemination Scheme of Non-Safety Information in Urban VANETs},
author = {Estrella García-Lozano and Celeste Campo-Vázquez and Carlos García-Rubio and Alicia Rodriguez-Carrion },
url = {http://hdl.handle.net/10016/27911},
doi = {https://doi.org/10.3390/s16070988},
issn = {1424-8220},
year = {2016},
date = {2016-06-27},
urldate = {2016-06-27},
journal = {Sensors },
volume = {16},
issue = {7},
abstract = {The recent release of standards for vehicular communications will hasten the development of smart cities in the following years. Many applications for vehicular networks, such as blocked road warnings or advertising, will require multi-hop dissemination of information to all vehicles in a region of interest. However, these networks present special features and difficulties that may require special measures. The dissemination of information may cause broadcast storms. Urban scenarios are especially sensitive to broadcast storms because of the high density of vehicles in downtown areas. They also present numerous crossroads and signal blocking due to buildings, which make dissemination more difficult than in open, almost straight interurban roadways. In this article, we discuss several options to avoid the broadcast storm problem while trying to achieve the maximum coverage of the region of interest. Specifically, we evaluate through simulations different ways to detect and take advantage of intersections and a strategy based on store-carry-forward to overcome short disconnections between groups of vehicles. Our conclusions are varied, and we propose two different solutions, depending on the requirements of the application.},
keywords = {broadcast suppression scheme, dissemination, inrisco, store-carry-forward, urban scenarios, VANETs},
pubstate = {published},
tppubtype = {article}
}
@article{khaled001,
title = {Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids},
author = {Omar Khaled and Andrés Marín and Florina Almenares and Patricia Arias and Daniel Díaz},
url = {https://journals.sagepub.com/doi/10.1155/2016/5793183},
doi = {https://doi.org/10.1155/2016/5793183},
issn = {1550-1477},
year = {2016},
date = {2016-04-18},
urldate = {2016-04-18},
journal = {International Journal of Distributed Sensor Networks},
volume = {12},
issue = {4},
pages = {1-11},
abstract = {Smart grid is the term used to describe modern power grids. It aims at achieving efficient, sustainable, economic, and secure delivery of electricity supplies. In order to achieve these goals, communication between different components within the grid and control centers is required. In a rapidly growing world, the demands for substation automation are increasing. Recently, two trends have been changing Substation Automation Systems: IEC 61850 and the need for cybersecurity. IEC 61850 specifies very strict performance requirements for message transfer time. The security for the smart grid must be designed to satisfy both performance and reliability requirements. In this paper, we address a study about secure communication in the substation real-time environment, complying with the IEC 61850 specifications. We mainly focus on analyzing the proposed Secure TCP/IP profile for MMS, testing different cipher suite combinations and examining whether by applying TLS we can still achieve the strict performance requirements of IEC 61850 or not. As a result of the study, we propose a list of cipher suite combinations that should be used. The importance of this study lies mainly on future scenarios, because IEC 61850 is thought to support smart metering communications.},
keywords = {inrisco, smart grids},
pubstate = {published},
tppubtype = {article}
}
@book{book002,
title = {Proceedings of the 2016 IEEE International Conference on Consumer Electronics (ICCE)},
editor = {Francisco Bellido and Nicholas Vun and Carsten Dolar and Daniel Díaz-Sánchez and Wing-Kuen Ling},
isbn = {978-1-4673-8364-6},
year = {2016},
date = {2016-04-13},
urldate = {2016-04-13},
publisher = {IEEE},
abstract = {2016 IEEE International Conference on Consumer Electronics (ICCE) took place January 7-11, 2016 in Las Vegas, NV, USA.},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
@inproceedings{pa004,
title = {Proxy re-encryption schemes for IoT and crowd sensing},
author = {Daniel Díaz-Sánchez and Simon Sherratt and Patricia Arias and Florina Almenares and Andrés Marín-López},
url = {https://ieeexplore.ieee.org/document/7430505},
doi = {https://doi.org/10.1109/ICCE.2016.7430505},
issn = {2158-4001},
year = {2016},
date = {2016-04-01},
urldate = {2016-04-01},
publisher = {IEEE},
abstract = {IoT, crowd sensing and smart cities will be a traffic challenge. New communication paradigms as asynchronous messaging carry and forward, scheduled delivery and temporary storage will be needed to manage network resources dynamically. Since traditional end to end security will require keeping security associations among devices for a long time draining valuable resources, we propose and evaluate the use of proxy re-encryption protocols in these scenarios as a solution for reliable and flexible security.},
keywords = {encryption, Protocols, secret key},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa003,
title = {Distributed access control and privacy for the internet of me},
author = {Daniel Díaz-Sánchez and Simon Sherratt and Florina Almenares and Patricia Arias and Andrés Marín- López},
url = {https://ieeexplore.ieee.org/document/7430506},
doi = {10.1109/ICCE.2016.7430506},
issn = {2158-4001},
year = {2016},
date = {2016-03-14},
booktitle = {2016 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {IEEE},
abstract = {This article presents an experimental scalable message driven IoT and its security architecture based on Decentralized Information Flow Control. The system uses a gateway that exports SoA (REST) interfaces to the internet simplifying external applications whereas uses DIFC and asynchronous messaging within the home environment.},
keywords = {information flow control, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{almenarez005,
title = {PECEVA: An adaptable and energy-saving credential validation solution for pervasive networks},
author = {Florina Almenarez and M. Francisca Hinarejos and Andrés Marín and Josep Lluís Ferrer-Gomila and Daniel Díaz Sánchez},
url = {https://www.sciencedirect.com/science/article/abs/pii/S0020025516301578?via%3Dihub},
doi = {https://doi.org/10.1016/j.ins.2016.03.010},
issn = {0020-0255},
year = {2016},
date = {2016-03-12},
urldate = {2016-03-12},
journal = {INFORMATION SCIENCES},
volume = {354},
pages = {41-59},
abstract = {Wireless, mobile, and context-awareness applications are considered to be the epitome of pervasive computing, but they bring with them the inherent security challenges of mobile ad-hoc networking. Mobile ad-hoc networks are mainly formed by mobile users, which can belong to different trust domains, in order to leverage the wealth of pervasive resources and available capabilities. The use of digital certificates is suitable for pervasive networking because of its decentralized and dynamic nature. Nevertheless, the validation of such certificates can become a more complex and costly process than it is in fixed-infrastructure networks. This is because pervasive networks face challenges such as environments that change with a certain degree of randomness, ad-hoc interactions with foreign devices, temporal disconnections that make it difficult to access updated and required information, and limited devices running costly processes. For these reasons, we propose a user-centric architecture that extends the validation of digital certificates in an adaptive way. The main contribution consists of a decision engine that takes advantage of the specific local and external resources in an opportunistic fashion. The solution preserves the security level required for each application and the resource consumption of the user device.
},
keywords = {Certificate validation efficiency, Decision engine, inrisco, Pervasive networks, PKIX, Trust management},
pubstate = {published},
tppubtype = {article}
}
2015
@inproceedings{pa006,
title = {Enabling actor model for crowd sensing and IoT},
author = {Daniel Diaz-Sánchez and Simon Sherratt and Patricia Arias and Florina Almenarez and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/7177779},
doi = {https://doi.org/10.1109/ISCE.2015.7177779},
issn = {0747-668X},
year = {2015},
date = {2015-08-06},
urldate = {2015-08-06},
publisher = {IEEE},
abstract = {The cloud is playing a very important role in wireless sensor network, crowd sensing and IoT data collection and processing. However, current cloud solutions lack of some features that hamper the innovation a number of other new services. We propose a cloud solution that provides these missing features as multi-cloud and device multi-tenancy relying in a whole different fully distributed paradigm, the actor model.},
keywords = {Cloud computing, emrisco, IoT, Wireless communication},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa016,
title = {Towards a seamless human interaction in IoT},
author = {Eugenio Rubio-Drosdov and Daniel Díaz-Sánchez and Patricia Arias-Cabarcos and Florina Almenárez and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/7177781},
doi = {https://doi.org/10.1109/ISCE.2015.7177781},
issn = {0747-668X},
year = {2015},
date = {2015-08-06},
urldate = {2015-08-06},
publisher = {IEEE},
abstract = {This article describes our approach for facilitating the interaction among devices in IoT environments. Our solution provides mechanisms to complement current IoT ontologies with device language annotations to facilitate device communication. This is our first step towards comprehensive user to environment communication that would bring the Internet of Me concept.},
keywords = {Internet of Things, natural language},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{campo008,
title = {Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks},
author = {Isabel Vara and Celeste Campo-Vázquez},
url = {http://hdl.handle.net/10016/28110},
doi = {https://doi.org/10.3390/s150717621},
issn = {1424-8220},
year = {2015},
date = {2015-07-20},
urldate = {2015-07-20},
journal = {Sensors },
volume = {15},
issue = {7},
pages = {17621-17648},
abstract = {Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.},
keywords = {inrisco, manet, olsrv2, service discovery},
pubstate = {published},
tppubtype = {article}
}
@conference{campo017b,
title = {Analysis of a fast LZ-based entropy estimator for mobility data},
author = { Alicia Rodriguez-Carrion and Carlos García-Rubio and Celeste Campo-Vázquez and Sajal Das },
doi = {https://doi.org/10.1109/percomw.2015.7134080},
isbn = {978-1-4799-8425-1},
year = {2015},
date = {2015-06-29},
urldate = {2015-06-29},
booktitle = {2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)},
pages = {451-456},
publisher = {IEEE Publishing Services },
abstract = {Randomness in people's movements might serve to detect behavior anomalies. The concept of entropy can be used for this purpose, but its estimation is computational intensive, particularly when processing long movement histories. Moreover, disclosing such histories to third parties may violate user privacy. With a goal to keep the mobility data in the mobile device itself yet being able to measure randomness, we propose three fast entropy estimators based on Lempel-Ziv (LZ) prediction algorithms. We evaluated them with 95 movement histories of real users tracked during 9 months using GSM-based mobility data. The results show that the entropy tendencies of the approaches proposed in this work and those in the literature are the same as time evolves. Therefore, our proposed approach could potentially detect variations in the mobility patterns of the user with a lower computational cost. This allows to unveil shifts in the users mobility behavior without disclosing their sensible location data.},
keywords = {emrisco, entropy, lz, mobility data},
pubstate = {published},
tppubtype = {conference}
}
@article{campo009,
title = {Entropy-based privacy against profiling of user mobility},
author = {Alicia Rodriguez-Carrion and David Rebollo-Monedero and Jordi Forne and Celeste Campo-Vázquez and Carlos García-Rubio and Javier Parra-Arnau and Sajal Das},
url = {http://hdl.handle.net/10016/27924},
doi = {https://doi.org/10.3390/e17063913},
issn = {1099-4300},
year = {2015},
date = {2015-06-10},
urldate = {2015-06-10},
journal = {Entropy},
volume = {17},
issue = {6},
pages = {3913-3946},
abstract = {Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be exploited by the LBS provider to build the user profile of visited locations, which might disclose sensitive data, such as work or home locations. The classic concept of entropy is widely used to evaluate privacy in these scenarios, where the information is represented as a sequence of independent samples of categorized data. However, since the LBS queries might be sent very frequently, location profiles can be improved by adding temporal dependencies, thus becoming mobility profiles, where location samples are not independent anymore and might disclose the user's mobility patterns. Since the time dimension is factored in, the classic entropy concept falls short of evaluating the real privacy level, which depends also on the time component. Therefore, we propose to extend the entropy-based privacy metric to the use of the entropy rate to evaluate mobility profiles. Then, two perturbative mechanisms are considered to preserve locations and mobility profiles under gradual utility constraints. We further use the proposed privacy metric and compare it to classic ones to evaluate both synthetic and real mobility profiles when the perturbative methods proposed are applied. The results prove the usefulness of the proposed metric for mobility profiles and the need for tailoring the perturbative methods to the features of mobility profiles in order to improve privacy without completely loosing utility.},
keywords = {emrisco, entropy, location history, location-based services, perturbative methods, privacy},
pubstate = {published},
tppubtype = {article}
}
@article{ariascabarcos002,
title = {Blended Identity: Pervasive IdM for Continuous Authentication},
author = {Patricia Arias-Cabarcos and Florina Almenárez and Rubén Trapero and Daniel Díaz-Sánchez and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/7118079},
doi = {https://doi.org/10.1109/MSP.2015.62},
issn = {1540-7993},
year = {2015},
date = {2015-06-04},
urldate = {2015-06-04},
journal = {IEEE Xplore},
volume = {13},
issue = {3},
pages = {32-39},
abstract = {A proper identity management approach is necessary for pervasive computing to be invisible to users. Federated identity management is key to achieving efficient identity blending and natural integration in the physical and online layers where users, devices, and services are present.},
keywords = {blended identity, emrisco, identity management, IdM, Pervasive computing, Protocols, risk assessment, Security},
pubstate = {published},
tppubtype = {article}
}
@book{book001,
title = {Proceedings of the 2015 International Symposium on Consumer Electronics},
author = {F. Pescador and C. Sanz and F. Jaureguizar and Ángel Groba and Daniel Díaz-Sánchez},
year = {2015},
date = {2015-06-01},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
@inproceedings{pa005,
title = {P2P-based data layer for mobile Media Cloud},
author = {Daniel Díaz-Sanchez and Patricia Arias-Cabarcos and Florina Almenarez and Andrés Marín-López},
url = {https://ieeexplore.ieee.org/document/7066362},
doi = {https://doi.org/10.1109/ICCE.2015.7066362},
issn = {2158-3994},
year = {2015},
date = {2015-03-26},
urldate = {2015-03-26},
publisher = {IEEE},
abstract = {This paper focus in an emerging concept called Elastic Personal Computing that is the ability to distribute data processing among multiple personal devices that constitute a mobile cloud. Among the most complex challenges is to provide data layer for the system to exchange input data transparently among nodes considering the data partitioning is application specific. Implementing data layers with replication and load distribution strategies is not feasible due to mobility, intermittent availability and the distributed character of mobile cloud systems. This article reasons about the problem and presents a P2P based data layer for distributed computing using personal devices.},
keywords = {Cloud computing, emrisco, Protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{diazsanchez002,
title = {A distributed transcoding and content protection system: Enabling pay per quality using the cloud},
author = {Daniel Díaz-Sánchez and Rosa Sánchez-Guerrero and Patricia Arias and Florina Almenarez and Andrés Marín },
url = {https://link.springer.com/article/10.1007/s11235-014-9952-x},
doi = {https://doi.org/10.1007/s11235-014-9952-x},
issn = {1572-9451},
year = {2015},
date = {2015-01-01},
urldate = {2015-01-01},
journal = {Telecommunication Systems},
volume = {61},
issue = {1},
pages = {59 - 76},
abstract = {Video coding is a process for adapting media content to the constraints of transmission networks delivery and terminal device visualization. Moreover, content protection is also necessary. Nowadays the heterogeneity of client devices is increasing leading to different resolutions, qualities and form factors. Due to this, transcoding and protection are essential processes to be conducted in modern video distribution networks to adapt video to devices and network constraints and to enable pay per quality schemas enforcing content licenses. Unfortunately, transcoding and protection can be no longer considered linear since every single content should be transcoded in several formats and sometimes protected, so it would require a long time to finish. Modern scalable coding techniques, as H264 SVC, can help to save processing power and bandwidth providing in a single stream several video versions. However, if the enhancements of a SVC encoded content are protected separately, it would possible to enable pay-per-quality providing an additional degree of freedom to content delivery industry. Unfortunatelly, transcoding and protection entail huge doses of processing power at provider side and should be distributed. Moreover, processing key streams to decrypt enhancements that were encrypted separately can increase the complexity at receiver side. Cloud computing emerges as a potential solution for coping with large population of users with heterogeneous visualization devices. The elastic nature of cloud computing can be an advantage given the difficulty to predict the computing resources video content would require to be distributed during the entire content life. This article describes a system that distributes and parallelizes the video transcoding process as well as the content encryption, following the SaaS approach in cloud computing. Moreover, the article describes an experimental approach for generating and processing a flexible key stream that would help to simplify key management at receiver side and would allow legacy receivers to consume SVC content with separate enhancement protection.},
keywords = {Cloud computing, content protection keyword, raudo2, transcoding},
pubstate = {published},
tppubtype = {article}
}
2014
@conference{campo019,
title = {Bandwidth-efficient techniques for information dissemination in urban vehicular networks},
author = {Estrella García-Lozano and Celeste Campo-Vázquez and Carlos García-Rubio and Alberto Cortés},
doi = {https://doi.org/10.1145/2653481.2653483},
isbn = {978-1-4503-3025-1},
year = {2014},
date = {2014-09-21},
urldate = {2014-09-21},
booktitle = {PE-WASUN '14: Proceedings of the 11th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks},
pages = {61-68},
publisher = {ASSOCIATION FOR COMPUTING MACHINERY, INC },
abstract = {Many applications for vehicular networks, such as blocked road warnings or advertising, will require multi-hop dissemination of information to all vehicles in a region of interest. However, this type of communication can cause broadcast storms. Urban scenarios are especially sensitive to broadcast storms because of the high density of vehicles in downtown areas. They also present numerous crossroads and signal blocking due to buildings, that make dissemination more difficult than in open, almost straight interurban roadways. In this article, we study different ways to tackle a multi-hop broadcast of information in an urban area.},
keywords = {Bandwidth usage, Multi-hop dissemination, urban vehicular networks, V2V communication},
pubstate = {published},
tppubtype = {conference}
}
@conference{nokey,
title = {Impact of location history collection schemes on observed human mobility features},
author = {Alicia Rodriguez-Carrion and Sajal Das and Celeste Campo-Vázquez and Carlos García-Rubio},
doi = {https://doi.org/10.1109/percomw.2014.6815213},
isbn = {978-1-4799-2736-4},
year = {2014},
date = {2014-05-15},
urldate = {2014-05-15},
booktitle = {2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)},
pages = {254-259},
publisher = {IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC },
abstract = {Human mobility knowledge is key for urban planning or mobility models design. Therefore, estimating reliable mobility parameters is crucial to lay an unbiased foundation. However, most works estimating such features rely on datasets made up of the history of mobile network cells where the user is located when she makes active use of the network, known as Call Data Records (CDRs), or every time the her device connects to a new cell, without taking into account cell changes not caused by movement. Could we accurately characterize human mobility with such datasets? In this work we consider three approaches to collect network-based mobility data, propose three filtering techniques to delete cell changes not caused by movement and compare mobility features extracted from the traces collected with each approach. The analysis unveils the need for a filtering step to avoid important biases, and the negative impact that using CDRs may have in estimating mobility parameters.},
keywords = {data collection, location history, Mobile computing},
pubstate = {published},
tppubtype = {conference}
}
@article{garciarubio006,
title = {Service architecting and dynamic composition in pervasive smart ecosystems for the internet of things based on sensor network technology},
author = {Miguel Familiar and Jose Martínez and Carlos García-Rubio },
doi = {https://doi.org/10.3233/ais-140262},
isbn = {1876-1364},
year = {2014},
date = {2014-05-05},
urldate = {2014-05-05},
journal = {Journal of Ambient Intelligence and Smart Environments },
volume = {6},
issue = {3},
pages = {331-333},
publisher = {Journal of Ambient Intelligence and Smart Environments},
abstract = {The present article summarizes the doctoral dissertation of Miguel S. Familiar.},
keywords = {IoT, pervasive smart ecosystems},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa007,
title = {Elastic participatory sensing systems enabling cooperative meta sensors with consumer devices},
author = {Daniel Díaz-Sanchez and Patricia Arias-Cabarcos and Rosa Sánchez-Guerrero and Florina Almenarez and Andrés Marín-Lopez},
url = {https://ieeexplore.ieee.org/document/6776058},
doi = {https://doi.org/10.1109/ICCE.2014.6776058},
issn = {2158-3994},
year = {2014},
date = {2014-03-20},
booktitle = {2014 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {IEEE},
abstract = {Participatory Sensing systems can take benefit of the distributed processing personal consumer devices can provide since sensors can be grouped in meta-sensors and measures can be processed in a distributed fashion saving costs and improving the coverage. This abstract presents a solution introducing the concept of personal meta-sensor and provides a lightweight framework to consume and process measures.},
keywords = {Consumer electronics, sensor hardware, smartphone},
pubstate = {published},
tppubtype = {inproceedings}
}
@conference{campo018,
title = {A new traffic information service for smart consumer devices},
author = {Estrella García-Lozano and Wolfgang Woerndl and Celeste Campo-Vázquez},
doi = {https://doi.org/10.1109/icce.2014.6775957},
issn = {2158-3994},
year = {2014},
date = {2014-03-20},
urldate = {2014-03-20},
booktitle = {2014 IEEE International Conference on Consumer Electronics (ICCE). Proceedings},
pages = {169-170},
publisher = {IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC },
abstract = {Consumer devices are a key tool for assisting people with their everyday tasks, such as driving. We have developed a traffic information service for consumer devices. It is able to minimize the consumed bandwidth, and works in either sparse or very dense roadways without any infrastructure.},
keywords = {information, smart consumer devices, traffic information},
pubstate = {published},
tppubtype = {conference}
}
@article{diazsanchez001,
title = {Media Gateway: bringing privacy to Private Multimedia Clouds connections},
author = {Daniel Díaz-Sánchez and Florina Almenarez and Andrés Marín and Rosa Sánchez-Guerrero and Patricia Arias },
url = {https://link.springer.com/article/10.1007/s11235-013-9783-1},
doi = {https://doi.org/10.1007/s11235-013-9783-1},
issn = {1572-9451},
year = {2014},
date = {2014-02-01},
urldate = {2014-02-01},
journal = {Telecommunication Systems},
volume = {55},
issue = {2},
pages = {315-330},
abstract = {The growing interest in media sharing combined with the explosion of social applications have opened an opportunity window for cloud based applications for media management as Media Cloud, described in this article, that has brought the concept of Cloud Computing to home environments. Media Cloud provides a comprehensive and efficient solution for managing content among federated home environments. As part of the purpose of empowering the user role as well as to improve user experience, we placed significant efforts on interoperability and privacy protection when it comes to accessing cloud resources from other networks. This article describes a solution that enables limited devices to access contents located in private clouds, as Media Cloud, with the cooperation of network providers.},
keywords = {Cloud computing, multimedia, privacy, streaming},
pubstate = {published},
tppubtype = {article}
}
2013
@conference{campo019b,
title = {A distributed, bandwidth-efficient accident prevention system for interurban VANETs.},
author = {Estrella García-Lozano and Carolina Tripp-Barba and Mónica Aguilar-Igartua and Celeste Campo-Vázquez},
doi = {https://doi.org/10.1109/saconet.2013.6654564},
isbn = {978-1-4799-0694-9},
year = {2013},
date = {2013-11-07},
urldate = {2013-11-07},
booktitle = {2013 International Conference on Smart Communications in Network Technologies (SaCoNeT)},
pages = {1-5},
publisher = {IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC },
abstract = {Road safety has become a main issue for governments and car manufacturers in the last twenty years. The concept of Intelligent Transportation Systems (ITS) is used when talking about communication technologies between vehicles and infrastructure to improve, among others, road safety. In this paper, we propose a warning service to prevent accidents by alerting drivers about accidents and dangerous road conditions. This service includes the definition of a new broadcast dissemination mechanism. A VANET highway scenario is simulated to evaluate how the use of safety schemes decreases the driver's reaction time when an unexpected situation occurs.},
keywords = {broadcast mechanisms, ITS, road safety, VANETs},
pubstate = {published},
tppubtype = {conference}
}
@article{almenarez010,
title = {To Federate or Not To Federate: A Reputation-Based Mechanism to Dynamize Cooperation in Identity Management },
author = {Patricia Arias-Cabarcos and Florina Almenares-Mendoza and Felix Gómez-Mármol and Andrés Marín- López },
doi = {https://doi.org/10.1007/s11277-013-1338-y},
issn = {0929-6212},
year = {2013},
date = {2013-08-01},
urldate = {2013-08-01},
journal = {Wireless Personal Communications},
volume = {75},
issue = {3},
pages = {1769-1786},
abstract = {Identity Management systems cannot be centralized anymore. Nowadays, users have multiple accounts, profiles and personal data distributed throughout the web and hosted by different providers. However, the online world is currently divided into identity silos forcing users to deal with repetitive authentication and registration processes and hindering a faster development of large scale e-business. Federation has been proposed as a technology to bridge different trust domains, allowing user identity information to be shared in order to improve usability. But further research is required to shift from the current static model, where manual bilateral agreements must be pre-configured to enable cooperation between unknown parties, to a more dynamic one, where trust relationships are established on demand in a fully automated fashion. This paper presents IdMRep, the first completely decentralized reputation-based mechanism which makes dynamic federation a reality. Initial experiments demonstrate its accuracy as well as an assumable overhead in scenarios with and without malicious nodes.},
keywords = {cooperative systems, identity federation, identity management, trust and reputation management},
pubstate = {published},
tppubtype = {article}
}
@article{campo014,
title = {A Bandwidth-Efficient Service for Local Information Dissemination in Sparse to Dense Roadways},
author = {Estrella García-Lozano and Celeste Campo-Vázquez and Carlos García-Rubio and Alberto Cortés and Alicia Rodriguez-Carrion and Patricia Noriega-Vivas},
url = {http://hdl.handle.net/10016/27912},
doi = {https://doi.org/10.3390/s130708612},
issn = {1424-3210},
year = {2013},
date = {2013-07-05},
urldate = {2013-07-05},
journal = {Sensors },
volume = {13},
issue = {7},
pages = {8612-8639},
abstract = {Thanks to the research on Vehicular Ad Hoc Networks (VANETs), we will be able to deploy applications on roadways that will contribute to energy efficiency through a better planning of long trips. With this goal in mind, we have designed a gas/charging station advertising system, which takes advantage of the broadcast nature of the network. We have found that reducing the number of total sent packets is important, as it allows for a better use of the available bandwidth. We have designed improvements for a distance-based flooding scheme, so that it can support the advertising application with good results in sparse to dense roadway scenarios.},
keywords = {bandwidth efficiency, multi-hop broadcast, service discovery, store-carry-forward, VANETs},
pubstate = {published},
tppubtype = {article}
}
@conference{campo020,
title = {Characterizing Mobile Telephony Signals in Indoor Environments for Their Use in Fingerprinting-Based User Location },
author = {Alicia Rodriguez-Carrion and Celeste Campo-Vázquez and Carlos García-Rubio and Estrella García-Lozano and Alberto Cortés},
doi = {https://doi.org/10.1007/978-3-319-03176-7_29},
issn = {978-3-319-03176-7},
year = {2013},
date = {2013-05-08},
urldate = {2013-05-08},
booktitle = {Ubiquitous Computing and Ambient Intelligence. Context-Awareness and Context-Driven Interaction},
pages = {223-230},
publisher = {Springer International Publishing},
abstract = {Fingerprinting techniques have been applied to locate users in indoor scenarios using WiFi signals. Although mobile telephony network is used for outdoor location, it is widely deployed and their signal more stable, thus being also a candidate to be used for fingerprinting. This paper describes the characterization of GSM/UMTS signals in indoor scenarios to check if their features allow to use them for constructing the radio maps needed for fingerprinting purposes. We have developed an Android application to collect the received signal information, such that makes the measurement process cheaper and easier. Measurements show that changes in location and device orientation can be identified by observing the received signal strength of the connected and neighboring base stations. Besides, detecting this variability is easier by using the GSM network than with UMTS technology. Therefore mobile telephony network seems suitable to perform fingerprinting-based indoor location.},
keywords = {fingerprinting, gsm-based location, indoor location, mobile device-based location, UMTS},
pubstate = {published},
tppubtype = {conference}
}
@article{almenarez004,
title = {Overhead of using Secure Wireless Communications in Mobile Computing},
author = {Florina Almenares and Patricia Arias and Andrés Marín and Daniel Díaz-Sánchez and Rosa Sánchez
},
url = {https://ieeexplore.ieee.org/document/6531115
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6531115},
doi = {https://doi.org/10.1109/TCE.2013.6531115},
issn = {0098-3063},
year = {2013},
date = {2013-05-06},
urldate = {2013-05-06},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {59},
issue = {2},
pages = {335-342},
abstract = {Secure wireless communications are fundamental in any interaction in order to avoid security and privacy breaches, especially from mobile devices. The use of this kind of communications is far more frequent and the number of users increases day after day. This paper shows and analyzes the support, performance and consumption of cryptographic algorithms and cipher suites in terms of time and energy when secure communications (i.e., using SSL) are established according to different security levels. This study has been performed in distinct operating systems, and using different browsers and libraries.},
keywords = {Browsers, Ciphers, Energy and time performance, Energy consumption, Handheld devices, Secure wireless communications, servicioseguridad, SSL/TLS, Wireless communication},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa009,
title = {Optimizing OSGi Services on Gateways},
author = {Iván Bernabé-Sánchez and Daniel Díaz-Sánchez and Mario Muñoz-Organero },
url = {https://link.springer.com/chapter/10.1007/978-3-319-00566-9_20},
doi = {https://doi.org/10.1007/978-3-319-00566-9_20},
isbn = {978-3-319-00565-2},
year = {2013},
date = {2013-04-03},
urldate = {2013-04-03},
booktitle = {Ambient Intelligence - Software and Applications},
volume = {219},
pages = {155-162},
publisher = {Springer International Publishing},
abstract = {Currently, the number of devices and services contained in the user’s home has considerably grown. Sometimes these devices are provided and managed remotely by service providers by facilitating installation or uninstallation of services. In a typical situation service providers install their services in the user’s home gateway from their remote repositories, regardless of the rest of the software installed on it. However, when various service providers work on a given gateway, the number of services and components installed on it increases. Therefore it is possible that this fact may lead to duplication or replacement of components necessary for other installed services, causing performance problems or service interruptions. This paper presents a system for analyzing and automatically optimizing the OSGi components deployed on a home gateway.},
keywords = {devices, gateways, personalmediacloud},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa008,
title = {Flexible Computing for personal electronic devices},
author = {Daniel Díaz-Sánchez and Andres Marín-López and Florina Almenares and Rosa Sánchez and Patricia Arias},
url = {https://ieeexplore.ieee.org/document/6486863},
doi = {https://doi.org/10.1109/ICCE.2013.6486863},
issn = {2158-3994},
year = {2013},
date = {2013-03-28},
booktitle = {2013 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {IEEE},
abstract = {This article describes an experimental framework for Android called Light Weight Map Reduce that pursues enabling Elastic Personal Computing, a refinement of the Elastic Computing concept that allows personal electronics to automatically distribute the load among devices constituting a computing fabric seamlessly.},
keywords = {availability, data center, local network, social networks},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa010,
title = {How costly are secure transactions on handheld devices?},
author = {Florina Almenares and Patricia Arias and Andrés Marín-López and Daniel Díaz-Sánchez and Rosa Sánchez},
url = {https://ieeexplore.ieee.org/document/6486865},
doi = {https://doi.org/10.1109/ICCE.2013.6486865},
issn = {2158-3994},
year = {2013},
date = {2013-03-08},
publisher = {IEEE},
abstract = {Handheld devices are more and more powerful allowing to do most things people do on a desktop. Nevertheless, mobile device security follows being an open issue. We have performed the first study of the security support between native and OpenSSL-based libraries, in terms of energy consumption and time, about secure communication performance.},
keywords = {Ciphers, Security, security protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa019,
title = {A distributed transcoding system for mobile video delivery},
author = {Daniel Díaz-Sánchez and Andrés Marín-López and Florina Almenarez and Rosa Sánchez-Guerrero and Patricia Arias},
url = {https://ieeexplore.ieee.org/document/6416151},
doi = {https://doi.org/10.1109/WMNC.2012.6416151},
isbn = {978-1-4673-2993-4},
year = {2013},
date = {2013-01-24},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {The heterogeneity of client devices is increasing leading to different resolutions, qualities and form factors. Due to the amount of multimedia to be processed, transcoding and protection can be no longer performed linearly. For that reason, this article describes a solution to distribute and parallelize the transcoding process as well as the content encryption relying on cloud computing. Moreover, this article shows the benefits of this approach showing several experimental results.},
keywords = {Cloud computing, software as a service},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa020,
title = {A model for dimensioning a secure event-driven health care system},
author = {Rosa Sánchez-Guerrero and Florina Almenárez and Daniel Díaz-Sánchez and Patricia Arias and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/6416152},
doi = {https://doi.org/10.1109/WMNC.2012.6416152},
isbn = {978-1-4673-2993-4},
year = {2013},
date = {2013-01-24},
urldate = {2013-01-24},
booktitle = {2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Privacy is close to the user information and thus, present in any ubiquitous computing scenario. In this sense, privacy in identity management is gaining more importance, since IdM systems deal with services that requires sharing attributes belonging to users' identity with different entities across security domains. However, the effective revocation consent -considered as a privacy rule in sensitive scenarios- has not been fully addressed. This article builds on the flexible event-based user consent-revocation mechanism defined in [4] for health care scenarios. In this article we analyze the network dimensioning to calculate the overhead of activating/deactivating attributes and privileges, as subscription and notification event messages exchanged. We consider two main simulation scenarios: a large hospital, and a small-medium hospital.},
keywords = {privacy, Protocols, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
2012
@article{ariascabarcos004,
title = {SuSSo: Seamless and Ubiquitous Single Sign-on for Cloud Service Continuity across devices},
author = {Patricia Arias-Cabarcos and Florina Almenárez-Mendoza and Rosa Sánchez-Guerrero and Andrés Marín-López and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/6415016
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6415016},
doi = {https://doi.org/10.1109/TCE.2012.6415016},
issn = {0098-3063},
year = {2012},
date = {2012-11-01},
urldate = {2012-11-01},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {58},
issue = {4},
pages = {1425-1433},
abstract = {The great variety of consumer electronic devices with support of wireless communications combined with the emerging Cloud Computing paradigm is paving the way to real anytime/anywhere computing. In this context, many services, such as music or video streaming, are delivered to the clients using Cloud-based providers. However, service continuity when moving across different terminals is still a major challenge. This paper proposes SuSSo, a novel middleware architecture that allows sessions initiated from one device to be seamlessly transferred to a second one, as might be desirable in the enjoyment of long running media.},
keywords = {Cloud computing, Computer architecture, context, middleware, Performance evaluation, personal multimedia devices, raudo2, Security, service continuity, sessionhandoff, xml},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa011,
title = {Private cloud and media privacy in social networks},
author = {Andrés Marín-López and Daniel Díaz-Sánchez and Florina Almenárez-Mendoza and Patricia Arias-Cabarcos and Rosa Sánchez-Guerrero and Fabio Sanvido},
url = {https://ieeexplore.ieee.org/document/6336476},
doi = {https://doi.org/10.1109/ICCE-Berlin.2012.6336476},
issn = {2166-6814},
year = {2012},
date = {2012-10-22},
booktitle = {2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin)},
publisher = {IEEE},
abstract = {Privacy rules imposed by social networks (SNs) impose several restrictions to user privacy. Though they usually offer the user some control to limit access to his own data, the social network may share uploaded data with other partners and marketing companies. Pictures and videos may have a second life, even after being deleted by the user, and consequently storage and access must take place in the user home domain or facilities managed by the user, following an end to end approach. We propose to combine the usage of private clouds, specialized in media contents, in cooperation with SNs, offering the user complete control over his data, while benefiting from the SNs visibility to announce and spread the data. To achieve transparency, we propose a plug-in system to embed links as annotations in reduced media replacement uploaded in the SN. These links point to the real resource stored in the private cloud, now under complete user control. We perform validation tests which show important improvements in uploading time and user experience.},
keywords = {Cloud computing, privacy, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Publications
Task Scheduling to Constrain Peak Current Consumption in Wearable Healthcare Sensors Journal Article In: Electronics, vol. 8, pp. 789, 2019, ISSN: 2079-9292. TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications Journal Article In: IEEE Communications Surveys and Tutorials, vol. 21, iss. 4, pp. 3502-3531, 2019, ISSN: 1553-877X. I Don'T See Why I Would Ever Want to Use It: Analyzing the Usability of Popular Smartphone Password Managers Proceedings Article In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1937–1953, The 26th ACM Conference on Computer and Communications Security ACM, London, United Kingdom, 2019, ISBN: 978-1-4503-6747-9. Using entropy of social media location data for the detection of crowd dynamics anomalies Journal Article In: Electronics, vol. 7, iss. 12, pp. 380, 2018, ISSN: 2079-9292. Assessment of fitness tracker security: a case of study Proceedings Article In: 2018, ISSN: 2504-3900. DNS-Based Dynamic Authentication for Microservices in IoT Proceedings Article In: pp. 1-11, 2018, ISSN: 2504-3900. Detecting and reducing biases in cellular-based mobility data sets Journal Article In: Entropy, vol. 20, iss. 10, 2018, ISSN: 1099-4300. In: JOURNAL OF UNIVERSAL COMPUTER SCIENCE , vol. 24, iss. 8, pp. 1015-1033, 2018, ISSN: 0948-695X. RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security. Journal Article In: IEEE Transactions on Information Forensics and Security , vol. 13, iss. 8, pp. 1975-1988, 2018, ISSN: 1556-6013. Seamless human-device interaction in the internet of things Journal Article In: IEEE Transactions on Consumer Electronics, vol. 63, iss. 4, pp. 490-498, 2017, ISSN: 1558-4127. Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management Journal Article In: IEEE Journal of Biomedical and Health Informatics, vol. 21, iss. 6, pp. 1741-1749, 2017, ISSN: 2168-2194 . Proceedings of the 2017 IEEE International Conference on Consumer Electronics (ICCE), Book IEEE, 2017, ISBN: 978-1-5090-5544-9. Dictionary memory based software architecture for distributed Bluetooth Low Energy host controllers enabling high coverage in consumer residential healthcare environments Proceedings Article In: 2017, ISBN: 978-1-5090-5545-6. Secure store and forward proxy for dynamic IoT applications over M2M networks Journal Article In: IEEE Transactions on Consumer Electronics, vol. 62, iss. 4, pp. 389-397, 2016, ISSN: 0098-3063. Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies Journal Article In: Future Generation Computer Systems, vol. 76, pp. 358 - 369, 2016, ISSN: 0167-739X. Comparing Password Management Software: Toward Usable and Secure Enterprise Authentication Journal Article In: IT Professional, vol. 18, iss. 5, pp. 34-40, 2016, ISSN: 1941-045X. Wi-Fi Direct: Lessons learned Proceedings Article In: 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Institute of Electrical and Electronics Engineers (IEEE), 2016, ISBN: 978-1-5090-1984-7. A Bandwidth-Efficient Dissemination Scheme of Non-Safety Information in Urban VANETs Journal Article In: Sensors , vol. 16, iss. 7, 2016, ISSN: 1424-8220. Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids Journal Article In: International Journal of Distributed Sensor Networks, vol. 12, iss. 4, pp. 1-11, 2016, ISSN: 1550-1477. Proceedings of the 2016 IEEE International Conference on Consumer Electronics (ICCE) Book IEEE, 2016, ISBN: 978-1-4673-8364-6. Proxy re-encryption schemes for IoT and crowd sensing Proceedings Article In: IEEE, 2016, ISSN: 2158-4001. Distributed access control and privacy for the internet of me Proceedings Article In: 2016 IEEE International Conference on Consumer Electronics (ICCE), IEEE, 2016, ISSN: 2158-4001. PECEVA: An adaptable and energy-saving credential validation solution for pervasive networks Journal Article In: INFORMATION SCIENCES, vol. 354, pp. 41-59, 2016, ISSN: 0020-0255. Enabling actor model for crowd sensing and IoT Proceedings Article In: IEEE, 2015, ISSN: 0747-668X. Towards a seamless human interaction in IoT Proceedings Article In: IEEE, 2015, ISSN: 0747-668X. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks Journal Article In: Sensors , vol. 15, iss. 7, pp. 17621-17648, 2015, ISSN: 1424-8220. Analysis of a fast LZ-based entropy estimator for mobility data Conference 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), IEEE Publishing Services , 2015, ISBN: 978-1-4799-8425-1. Entropy-based privacy against profiling of user mobility Journal Article In: Entropy, vol. 17, iss. 6, pp. 3913-3946, 2015, ISSN: 1099-4300. Blended Identity: Pervasive IdM for Continuous Authentication Journal Article In: IEEE Xplore, vol. 13, iss. 3, pp. 32-39, 2015, ISSN: 1540-7993. Proceedings of the 2015 International Symposium on Consumer Electronics Book IEEE, 2015. P2P-based data layer for mobile Media Cloud Proceedings Article In: IEEE, 2015, ISSN: 2158-3994. A distributed transcoding and content protection system: Enabling pay per quality using the cloud Journal Article In: Telecommunication Systems, vol. 61, iss. 1, pp. 59 - 76, 2015, ISSN: 1572-9451. Bandwidth-efficient techniques for information dissemination in urban vehicular networks Conference PE-WASUN '14: Proceedings of the 11th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks, ASSOCIATION FOR COMPUTING MACHINERY, INC , 2014, ISBN: 978-1-4503-3025-1. Impact of location history collection schemes on observed human mobility features Conference 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2014, ISBN: 978-1-4799-2736-4. Service architecting and dynamic composition in pervasive smart ecosystems for the internet of things based on sensor network technology Journal Article In: Journal of Ambient Intelligence and Smart Environments , vol. 6, iss. 3, pp. 331-333, 2014, ISBN: 1876-1364. Elastic participatory sensing systems enabling cooperative meta sensors with consumer devices Proceedings Article In: 2014 IEEE International Conference on Consumer Electronics (ICCE), IEEE, 2014, ISSN: 2158-3994. A new traffic information service for smart consumer devices Conference 2014 IEEE International Conference on Consumer Electronics (ICCE). Proceedings, IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2014, ISSN: 2158-3994. Media Gateway: bringing privacy to Private Multimedia Clouds connections Journal Article In: Telecommunication Systems, vol. 55, iss. 2, pp. 315-330, 2014, ISSN: 1572-9451. A distributed, bandwidth-efficient accident prevention system for interurban VANETs. Conference 2013 International Conference on Smart Communications in Network Technologies (SaCoNeT), IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2013, ISBN: 978-1-4799-0694-9. To Federate or Not To Federate: A Reputation-Based Mechanism to Dynamize Cooperation in Identity Management Journal Article In: Wireless Personal Communications, vol. 75, iss. 3, pp. 1769-1786, 2013, ISSN: 0929-6212. A Bandwidth-Efficient Service for Local Information Dissemination in Sparse to Dense Roadways Journal Article In: Sensors , vol. 13, iss. 7, pp. 8612-8639, 2013, ISSN: 1424-3210. Ubiquitous Computing and Ambient Intelligence. Context-Awareness and Context-Driven Interaction, Springer International Publishing, 2013, ISSN: 978-3-319-03176-7. Overhead of using Secure Wireless Communications in Mobile Computing Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 59, iss. 2, pp. 335-342, 2013, ISSN: 0098-3063. Optimizing OSGi Services on Gateways Proceedings Article In: Ambient Intelligence - Software and Applications, pp. 155-162, Springer International Publishing, 2013, ISBN: 978-3-319-00565-2. Flexible Computing for personal electronic devices Proceedings Article In: 2013 IEEE International Conference on Consumer Electronics (ICCE), IEEE, 2013, ISSN: 2158-3994. How costly are secure transactions on handheld devices? Proceedings Article In: IEEE, 2013, ISSN: 2158-3994. A distributed transcoding system for mobile video delivery Proceedings Article In: Institute of Electrical and Electronics Engineers (IEEE), 2013, ISBN: 978-1-4673-2993-4. A model for dimensioning a secure event-driven health care system Proceedings Article In: 2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC), Institute of Electrical and Electronics Engineers (IEEE), 2013, ISBN: 978-1-4673-2993-4. SuSSo: Seamless and Ubiquitous Single Sign-on for Cloud Service Continuity across devices Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 58, iss. 4, pp. 1425-1433, 2012, ISSN: 0098-3063. Private cloud and media privacy in social networks Proceedings Article In: 2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), IEEE, 2012, ISSN: 2166-6814.2019
2018
2017
2016
2015
2014
2013
2012
