AGUILAR-IGARTUA, MÓNICA; ALMENARES-MENDOZA, FLORINA; DÍAZ-REDONDO, REBECA; MARTÍN-VICENTE, MANUELA; FORNÉ, JORDI; CAMPO, CELESTE; FERNÁNDEZ-VILAS, ANA; CRUZ-LLOPIS, LUIS; GARCÍA-RUBIO, CARLOS; MARÍN-LÓPEZ, ANDRÉS; MOHAMAD-MEZHER, AHMAD; DÍAZ-SÁNCHEZ, DANIEL; CEREZO-COSTAS, HÉCTOR; REBOLLO-MONEDERO, DAVID; ARIAS-CABARCOS, PATRICIA; RICO-NOVELLA, FRANCISCO JOSÉ INRISCO: INcident monitoRing in Smart COmmunities Journal Article In: IEEE Access, vol. 8, pp. 72435 - 72460, 2020, ISSN: 2169-3536. Abstract | Links | BibTeX | Tags: big data analysis, citizen sensor, early detection of incidents, inrisco, Smart Cities, social networks, vehicular communications Martí, Mónica; García-Rubio, Carlos; Campo-Vázquez, Celeste Performance Evaluation of CoAP and MQTT_SN in an IoT Environment Conference Proceedings of 13th International Conference on Ubiquitous Computing and Ambient Intelligence UCAmI 2019, MDPI AG , 2019. Abstract | Links | BibTeX | Tags: coap, Energy consumption, inrisco, IoT, magos, MQTT_SN, wsn Rodriguez-Carrion, Alicia; Campo-Vázquez, Celeste; García-Rubio, Carlos Detecting and reducing biases in cellular-based mobility data sets Journal Article In: Entropy, vol. 20, iss. 10, 2018, ISSN: 1099-4300. Abstract | Links | BibTeX | Tags: cell-based location, human mobility, inrisco, mobility data sets entropy, mobility data sets predictability, ping-pong effect Rubio-Drosdov, E; Díaz-Sánchez, D; Almenárez, F; Arias-Cabarcos, P; Marín, A Seamless human-device interaction in the internet of things Journal Article In: IEEE Transactions on Consumer Electronics, vol. 63, iss. 4, pp. 490-498, 2017, ISSN: 1558-4127. Abstract | Links | BibTeX | Tags: Human-Device Interaction, inrisco, Internet of Things, Natural Language Processing Arias-Cabarcos, Patricia; Marín, Andrés; Palacios, Diego; Almenárez, Florina; Díaz-Sánchez, Daniel Comparing Password Management Software: Toward Usable and Secure Enterprise Authentication Journal Article In: IT Professional, vol. 18, iss. 5, pp. 34-40, 2016, ISSN: 1941-045X. Abstract | Links | BibTeX | Tags: cybersecurity, emadrid2, inrisco, password managers, Security, usability García-Lozano, Estrella; Campo-Vázquez, Celeste; García-Rubio, Carlos; Rodriguez-Carrion, Alicia A Bandwidth-Efficient Dissemination Scheme of Non-Safety Information in Urban VANETs Journal Article In: Sensors , vol. 16, iss. 7, 2016, ISSN: 1424-8220. Abstract | Links | BibTeX | Tags: broadcast suppression scheme, dissemination, inrisco, store-carry-forward, urban scenarios, VANETs Khaled, Omar; Marín, Andrés; Almenares, Florina; Arias, Patricia; Díaz, Daniel Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids Journal Article In: International Journal of Distributed Sensor Networks, vol. 12, iss. 4, pp. 1-11, 2016, ISSN: 1550-1477. Abstract | Links | BibTeX | Tags: inrisco, smart grids Almenarez, Florina; Hinarejos, M. Francisca; Marín, Andrés; Ferrer-Gomila, Josep Lluís; Sánchez, Daniel Díaz PECEVA: An adaptable and energy-saving credential validation solution for pervasive networks Journal Article In: INFORMATION SCIENCES, vol. 354, pp. 41-59, 2016, ISSN: 0020-0255. Abstract | Links | BibTeX | Tags: Certificate validation efficiency, Decision engine, inrisco, Pervasive networks, PKIX, Trust management Vara, Isabel; Campo-Vázquez, Celeste Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks Journal Article In: Sensors , vol. 15, iss. 7, pp. 17621-17648, 2015, ISSN: 1424-8220. Abstract | Links | BibTeX | Tags: inrisco, manet, olsrv2, service discovery2020
@article{almenarez006,
title = {INRISCO: INcident monitoRing in Smart COmmunities},
author = {MÓNICA AGUILAR-IGARTUA AND FLORINA ALMENARES-MENDOZA AND REBECA DÍAZ-REDONDO AND MANUELA MARTÍN-VICENTE AND JORDI FORNÉ AND CELESTE CAMPO AND ANA FERNÁNDEZ-VILAS AND LUIS CRUZ-LLOPIS AND CARLOS GARCÍA-RUBIO AND ANDRÉS MARÍN-LÓPEZ AND AHMAD MOHAMAD-MEZHER AND DANIEL DÍAZ-SÁNCHEZ AND HÉCTOR CEREZO-COSTAS AND DAVID REBOLLO-MONEDERO AND PATRICIA ARIAS-CABARCOS AND FRANCISCO JOSÉ RICO-NOVELLA
},
url = {https://ieeexplore.ieee.org/document/9064504
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9064504},
doi = {https://doi.org/10.1109/ACCESS.2020.2987483},
issn = {2169-3536},
year = {2020},
date = {2020-04-13},
urldate = {2020-04-13},
journal = {IEEE Access},
volume = {8},
pages = {72435 - 72460},
abstract = {Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors in motion. Carrying their mobile devices, moving in their connected vehicles or actively participating in social networks, citizens provide a wealth of information that, after properly processing, can support numerous applications for the benefit of the community. In the context of smart communities, the INRISCO [1] proposal intends for (i) the early detection of abnormal situations in cities (i.e., incidents), (ii) the analysis of whether, according to their impact, those incidents are really adverse for the community; and (iii) the automatic actuation by dissemination of appropriate information to citizens and authorities. Thus, INRISCO will identify and report on incidents in traffic (jam, accident) or public infrastructure (e.g., works, street cut), the occurrence of specific events that affect other citizens' life (e.g., demonstrations, concerts), or environmental problems (e.g., pollution, bad weather). It is of particular interest to this proposal the identification of incidents with a social and economic impact, which affects the quality of life of citizens.},
keywords = {big data analysis, citizen sensor, early detection of incidents, inrisco, Smart Cities, social networks, vehicular communications},
pubstate = {published},
tppubtype = {article}
}
2019
@conference{campo017,
title = {Performance Evaluation of CoAP and MQTT_SN in an IoT Environment},
author = {Mónica Martí and Carlos García-Rubio and Celeste Campo-Vázquez },
doi = {https://doi.org/10.3390/proceedings2019031049},
year = {2019},
date = {2019-11-20},
urldate = {2019-11-20},
booktitle = {Proceedings of 13th International Conference on Ubiquitous Computing and Ambient Intelligence UCAmI 2019},
publisher = {MDPI AG },
abstract = {The fast growth of the Internet of Things (IoT) has made this technology one of the most promising paradigms of recent years. Wireless Sensor Networks (WSNs) are one of the most important challenges of the Internet of things. These networks are made up of devices with limited processing power, memory, and energy. The constrained nature of WSNs makes it necessary to have specific restricted protocols to work in these environments. In this paper, we present an energy consumption and network traffic study of the main IoT application layer protocols, the Constrained Application Protocol (CoAP), and the version of Message Queue Telemetry Transport (MQTT) for sensor networks (MQTT_SN). The simulations presented evaluate the performance of these protocols with different network configurations.},
keywords = {coap, Energy consumption, inrisco, IoT, magos, MQTT_SN, wsn},
pubstate = {published},
tppubtype = {conference}
}
2018
@article{campo007,
title = {Detecting and reducing biases in cellular-based mobility data sets},
author = {Alicia Rodriguez-Carrion and Celeste Campo-Vázquez and Carlos García-Rubio},
url = {http://hdl.handle.net/10016/28004},
doi = {https://doi.org/10.3390/e20100736},
issn = {1099-4300},
year = {2018},
date = {2018-09-25},
urldate = {2018-09-25},
journal = {Entropy},
volume = {20},
issue = {10},
abstract = {Correctly estimating the features characterizing human mobility from mobile phone traces is a key factor to improve the performance of mobile networks, as well as for mobility model design and urban planning. Most related works found their conclusions on location data based on the cells where each user sends or receives calls or messages, data known as Call Detail Records (CDRs). In this work, we test if such data sets provide enough detail on users’ movements so as to accurately estimate some of the most studied mobility features. We perform the analysis using two different data sets, comparing CDRs with respect to an alternative data collection approach. Furthermore, we propose three filtering techniques to reduce the biases detected in the fraction of visits per cell, entropy and entropy rate distributions, and predictability. The analysis highlights the need for contextualizing mobility results with respect to the data used, since the conclusions are biased by the mobile phone traces collection approach.},
keywords = {cell-based location, human mobility, inrisco, mobility data sets entropy, mobility data sets predictability, ping-pong effect},
pubstate = {published},
tppubtype = {article}
}
2017
@article{8246828,
title = {Seamless human-device interaction in the internet of things},
author = {E Rubio-Drosdov and D Díaz-Sánchez and F Almenárez and P Arias-Cabarcos and A Marín},
url = {/download/Seamless_Human-Device_Interaction_in_the_Internet_of_Things.pdf
https://ieeexplore.ieee.org/document/8246828},
doi = {10.1109/TCE.2017.015076},
issn = {1558-4127},
year = {2017},
date = {2017-11-01},
urldate = {2017-11-01},
journal = {IEEE Transactions on Consumer Electronics},
volume = {63},
issue = {4},
pages = {490-498},
abstract = {The Internet of Things will bring a scenario in which interaction between humans and devices will be critical to allow people to use, monitor or configure Internet of Things devices. Interactions in such applications are based on traditional graphical interfaces. Devices that accept interaction based on Natural Language, e.g., through voice commands, can understand basic human orders or answering questions whenever user expressions fit into a known language pattern. Some devices can understand natural language voice commands but require sophisticated voice assistants located in the cloud, which raises significant privacy concerns. Others devices which handle voice-processing locally can perform a very limited local recognition system, requiring users to be familiar with words the system can process. The purpose of this work is to diminish the complexity of Natural Language processing in the context of IoT. The solution posited in this article allows Internet of Things devices to offload Natural Language processing to a system that improves the use of Natural Language and alleviates the need to learn or remember specific words or terms intended for triggering device actions. We have evaluated the feasibility of the design with a proof-of-concept implemented in a home environment and it was tested by real users.},
keywords = {Human-Device Interaction, inrisco, Internet of Things, Natural Language Processing},
pubstate = {published},
tppubtype = {article}
}
2016
@article{7579116,
title = {Comparing Password Management Software: Toward Usable and Secure Enterprise Authentication},
author = {Patricia Arias-Cabarcos and Andrés Marín and Diego Palacios and Florina Almenárez and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/7579116
https://doi.org/10.1109/MITP.2016.81
/download/ComparingPasswordManagementSoftware.pdf},
doi = {10.1109/MITP.2016.81},
issn = {1941-045X},
year = {2016},
date = {2016-09-01},
urldate = {2016-09-01},
journal = {IT Professional},
volume = {18},
issue = {5},
pages = {34-40},
abstract = {In today's corporate IT systems, employees routinely repeat an undeniable pattern: accessing a huge number of password-protected services. In this regard, although deploying a strong enterprise password policy can increase security against online breaches and data leaks, it also imposes a significant usability burden on users. To alleviate this problem, password managers (PMs) are considered user-friendly tools that automate password generation and login processes. But how secure and usable are these tools? The authors analyze the four most popular PMs with free versions from both security and usability perspectives. The comparison leads to recommendations on enterprise PM selection, as well as to the identification of new lines of research and development on usable authentication.},
keywords = {cybersecurity, emadrid2, inrisco, password managers, Security, usability},
pubstate = {published},
tppubtype = {article}
}
@article{campos008,
title = {A Bandwidth-Efficient Dissemination Scheme of Non-Safety Information in Urban VANETs},
author = {Estrella García-Lozano and Celeste Campo-Vázquez and Carlos García-Rubio and Alicia Rodriguez-Carrion },
url = {http://hdl.handle.net/10016/27911},
doi = {https://doi.org/10.3390/s16070988},
issn = {1424-8220},
year = {2016},
date = {2016-06-27},
urldate = {2016-06-27},
journal = {Sensors },
volume = {16},
issue = {7},
abstract = {The recent release of standards for vehicular communications will hasten the development of smart cities in the following years. Many applications for vehicular networks, such as blocked road warnings or advertising, will require multi-hop dissemination of information to all vehicles in a region of interest. However, these networks present special features and difficulties that may require special measures. The dissemination of information may cause broadcast storms. Urban scenarios are especially sensitive to broadcast storms because of the high density of vehicles in downtown areas. They also present numerous crossroads and signal blocking due to buildings, which make dissemination more difficult than in open, almost straight interurban roadways. In this article, we discuss several options to avoid the broadcast storm problem while trying to achieve the maximum coverage of the region of interest. Specifically, we evaluate through simulations different ways to detect and take advantage of intersections and a strategy based on store-carry-forward to overcome short disconnections between groups of vehicles. Our conclusions are varied, and we propose two different solutions, depending on the requirements of the application.},
keywords = {broadcast suppression scheme, dissemination, inrisco, store-carry-forward, urban scenarios, VANETs},
pubstate = {published},
tppubtype = {article}
}
@article{khaled001,
title = {Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids},
author = {Omar Khaled and Andrés Marín and Florina Almenares and Patricia Arias and Daniel Díaz},
url = {https://journals.sagepub.com/doi/10.1155/2016/5793183},
doi = {https://doi.org/10.1155/2016/5793183},
issn = {1550-1477},
year = {2016},
date = {2016-04-18},
urldate = {2016-04-18},
journal = {International Journal of Distributed Sensor Networks},
volume = {12},
issue = {4},
pages = {1-11},
abstract = {Smart grid is the term used to describe modern power grids. It aims at achieving efficient, sustainable, economic, and secure delivery of electricity supplies. In order to achieve these goals, communication between different components within the grid and control centers is required. In a rapidly growing world, the demands for substation automation are increasing. Recently, two trends have been changing Substation Automation Systems: IEC 61850 and the need for cybersecurity. IEC 61850 specifies very strict performance requirements for message transfer time. The security for the smart grid must be designed to satisfy both performance and reliability requirements. In this paper, we address a study about secure communication in the substation real-time environment, complying with the IEC 61850 specifications. We mainly focus on analyzing the proposed Secure TCP/IP profile for MMS, testing different cipher suite combinations and examining whether by applying TLS we can still achieve the strict performance requirements of IEC 61850 or not. As a result of the study, we propose a list of cipher suite combinations that should be used. The importance of this study lies mainly on future scenarios, because IEC 61850 is thought to support smart metering communications.},
keywords = {inrisco, smart grids},
pubstate = {published},
tppubtype = {article}
}
@article{almenarez005,
title = {PECEVA: An adaptable and energy-saving credential validation solution for pervasive networks},
author = {Florina Almenarez and M. Francisca Hinarejos and Andrés Marín and Josep Lluís Ferrer-Gomila and Daniel Díaz Sánchez},
url = {https://www.sciencedirect.com/science/article/abs/pii/S0020025516301578?via%3Dihub},
doi = {https://doi.org/10.1016/j.ins.2016.03.010},
issn = {0020-0255},
year = {2016},
date = {2016-03-12},
urldate = {2016-03-12},
journal = {INFORMATION SCIENCES},
volume = {354},
pages = {41-59},
abstract = {Wireless, mobile, and context-awareness applications are considered to be the epitome of pervasive computing, but they bring with them the inherent security challenges of mobile ad-hoc networking. Mobile ad-hoc networks are mainly formed by mobile users, which can belong to different trust domains, in order to leverage the wealth of pervasive resources and available capabilities. The use of digital certificates is suitable for pervasive networking because of its decentralized and dynamic nature. Nevertheless, the validation of such certificates can become a more complex and costly process than it is in fixed-infrastructure networks. This is because pervasive networks face challenges such as environments that change with a certain degree of randomness, ad-hoc interactions with foreign devices, temporal disconnections that make it difficult to access updated and required information, and limited devices running costly processes. For these reasons, we propose a user-centric architecture that extends the validation of digital certificates in an adaptive way. The main contribution consists of a decision engine that takes advantage of the specific local and external resources in an opportunistic fashion. The solution preserves the security level required for each application and the resource consumption of the user device.
},
keywords = {Certificate validation efficiency, Decision engine, inrisco, Pervasive networks, PKIX, Trust management},
pubstate = {published},
tppubtype = {article}
}
2015
@article{campo008,
title = {Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks},
author = {Isabel Vara and Celeste Campo-Vázquez},
url = {http://hdl.handle.net/10016/28110},
doi = {https://doi.org/10.3390/s150717621},
issn = {1424-8220},
year = {2015},
date = {2015-07-20},
urldate = {2015-07-20},
journal = {Sensors },
volume = {15},
issue = {7},
pages = {17621-17648},
abstract = {Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.},
keywords = {inrisco, manet, olsrv2, service discovery},
pubstate = {published},
tppubtype = {article}
}
Publications
INRISCO: INcident monitoRing in Smart COmmunities Journal Article In: IEEE Access, vol. 8, pp. 72435 - 72460, 2020, ISSN: 2169-3536. Performance Evaluation of CoAP and MQTT_SN in an IoT Environment Conference Proceedings of 13th International Conference on Ubiquitous Computing and Ambient Intelligence UCAmI 2019, MDPI AG , 2019. Detecting and reducing biases in cellular-based mobility data sets Journal Article In: Entropy, vol. 20, iss. 10, 2018, ISSN: 1099-4300. Seamless human-device interaction in the internet of things Journal Article In: IEEE Transactions on Consumer Electronics, vol. 63, iss. 4, pp. 490-498, 2017, ISSN: 1558-4127. Comparing Password Management Software: Toward Usable and Secure Enterprise Authentication Journal Article In: IT Professional, vol. 18, iss. 5, pp. 34-40, 2016, ISSN: 1941-045X. A Bandwidth-Efficient Dissemination Scheme of Non-Safety Information in Urban VANETs Journal Article In: Sensors , vol. 16, iss. 7, 2016, ISSN: 1424-8220. Analysis of Secure TCP/IP Profile in 61850 Based Substation Automation System for Smart Grids Journal Article In: International Journal of Distributed Sensor Networks, vol. 12, iss. 4, pp. 1-11, 2016, ISSN: 1550-1477. PECEVA: An adaptable and energy-saving credential validation solution for pervasive networks Journal Article In: INFORMATION SCIENCES, vol. 354, pp. 41-59, 2016, ISSN: 0020-0255. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks Journal Article In: Sensors , vol. 15, iss. 7, pp. 17621-17648, 2015, ISSN: 1424-8220.2020
2019
2018
2017
2016
2015