Graphic summary
  • Show / hide key
  • Information


Scientific and technological production
  •  

1 to 50 of 113 results
  • Security analysis of a protocol based on multiagents systems for clinical data exchange

     Brugues de la Torre, Albert; LLuch Ariet, Magi; Pegueroles Valles, Josep Rafel
    International Conference on Complex, Intelligent and Software Intensive Systems
    Presentation's date: 2013-07
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    This work describes the security architecture of MOSAIC, a protocol for clinical data exchange with multilateral agreement support. The blocks of the architecture are derived from a series of common attacks that can be done to the protocol. The fair exchange problem of the protocol is analyzed introducing the management messages that the agents must exchange in order to authorize or not the use of data. Due to multilateral agreements, loops can appear in the negotiation stage of the protocol. We describe the mechanisms to manage this loops, and we propose a solution to avoid that malicious agents can take advantage when there is a loop in the negotiation stage of the protocol.

  • The TAMESIS project: enabling technologies for the health status monitoring and secure exchange of clinical record

     Pegueroles Valles, Josep Rafel; Cruz Llopis, Luis Javier de La; Vera Del Campo, Juan Victoriano; Hernández Serrano, Juan Bautista; León Abarca, Olga
    International Conference on Complex, Intelligent and Software Intensive Systems
    Presentation's date: 2013-07
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Personal Health Systems (PHS) allow to move the point of care from hospitals to the patient's home. Moreover, a PHS usually handles much more information and provides more appropriate diagnostic and personalized treatments to individuals. In this paper, we present the objectives, structure and expected innovations of the TAMESIS project. TAMESIS aims to contribute in advancing the state of the art of some of the technologies needed for the development of Personal Health Systems. Specifically, we propose techniques for preventing denial of service, sensor node malfunctioning and traffic injection. In addition, we explore a protocol that makes use of mobile agents for the exchange of medical records between networked databases. As a novel aspect, the protocol will not only support bilateral agreements, already existing in the literature, but multilateral agreements. In reference to clinical data, is critical to preserve the privacy and intimacy of patients. Thus, the data, at the time of being collected as for when it is exchanged, should be processed so as to avoid leakage of information that is not strictly necessary for the parties to fulfill their task correctly. A privacy metric suitable for PHS, and the incorporation of mechanisms needed for privacy and intimacy are also key objectives of this project. Finally, usability aspects of all the system interfaces will be considered.

  • Access to the full text
    Designing CDIO capstone projects: a systems thinking approach  Open access

     Alarcon Cot, Eduardo Jose; Bou Balust, Elisenda; Camps Carmona, Adriano Jose; Bragos Bardia, Ramon; Oliveras Verges, Albert; Pegueroles Valles, Josep Rafel; Sayrol Clols, Elisa; Marques Acosta, Fernando
    International CDIO Conference
    Presentation's date: 2013-06-10
    Presentation of work at congresses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    Given the all-pervasiveness of Systems thinking -which consists of thinking about things as systems- as a way of reasoning, in this work we will describe its application to make an interpretation of how to conceive and design a final year CDIO capstone course. Both the student teamwork structure as well as the complex engineering system itself addressed in the project are described in terms of entities, links, form and function, thereby pointing out their formal and functional interaction. The ultimate goal of the Systems thinking perspective is, given the necessary ingredients, to try maximizing the chances of the emergence of a fruitful capstone course, namely a culminating project that yields a set of students qualified to CDIO complex engineering systems.

    Given the all-pervasiveness of Systems thinking -which consists of thinking about things as systemsas a way of reasoning, in this work we will describe its application to make an interpretation of how to conceive and design a final year CDIO capstone course. Both the student teamwork structure as well as the complex engineering system itself addressed in the project are described in terms of entities, links, form and function, thereby pointing out their formal and functional interaction. The ultimate goal of the Systems thinking perspective is, given the necessary ingredients, to try maximizing the chances of the emergence of a fruitful capstone course, namely a culminating project that yields a set of students qualified to CDIO complex engineering systems.

  • Security Protocols Suite for Machine-to-Machine Systems  Open access

     Bartoli, Andrea
    Defense's date: 2013-06-18
    Department of Telematics Engineering, Universitat Politècnica de Catalunya
    Theses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on next-generation communication systems to face today’s concerns on economic and social fields. The reason for this sociological change is represented by the fact that the technologies have been open to all users, even if the latter do not necessarily have a specific knowledge in this field, and therefore the introduction of new user-friendly applications has now appeared as a business opportunity and a key factor to increase the general cohesion among all citizens. Within the actors of this technological evolution, wireless machine-to-machine (M2M) networks are becoming of great importance. These wireless networks are made up of interconnected low-power devices that are able to provide a great variety of services with little or even no user intervention. Examples of these services can be fleet management, fire detection, utilities consumption (water and energy distribution, etc.) or patients monitoring. However, since any arising technology goes together with its security threats, which have to be faced, further studies are necessary to secure wireless M2M technology. In this context, main threats are those related to attacks to the services availability and to the privacy of both the subscribers’ and the services providers’ data. Taking into account the often limited resources of the M2M devices at the hardware level, ensuring the availability and privacy requirements in the range of M2M applications while minimizing the waste of valuable resources is even more challenging. Based on the above facts, this Ph. D. thesis is aimed at providing efficient security solutions for wireless M2M networks that effectively reduce energy consumption of the network while not affecting the overall security services of the system. With this goal, we first propose a coherent taxonomy of M2M network that allows us to identify which security topics deserve special attention and which entities or specific services are particularly threatened. Second, we define an efficient, secure-data aggregation scheme that is able to increase the network lifetime by optimizing the energy consumption of the devices. Third, we propose a novel physical authenticator or frame checker that minimizes the communication costs in wireless channels and that successfully faces exhaustion attacks. Fourth, we study specific aspects of typical key management schemes to provide a novel protocol which ensures the distribution of secret keys for all the cryptographic methods used in this system. Fifth, we describe the collaboration with the WAVE2M community in order to define a proper frame format actually able to support the necessary security services, including the ones that we have already proposed; WAVE2M was funded to promote the global use of an emerging wireless communication technology for ultra-low and long-range services. And finally sixth, we provide with an accurate analysis of privacy solutions that actually fit M2M-networks services’ requirements. All the analyses along this thesis are corroborated by simulations that confirm significant improvements in terms of efficiency while supporting the necessary security requirements for M2M networks.

  • A context-based surveillance framework for large infrastructures

     Ripolles, O.; Silla, J.; Pegueroles Valles, Josep Rafel; Saenz, J.; Simó, J.; Sandoval, Cristina; Viktorov, M.; Gómez Muro, Ana
    International Symposium on Ambient Intelligence
    Presentation's date: 2012
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    In this paper we present the control and surveillance platform that is currently being developed within the ViCoMo project. This project is aimed at developing a context modeling system which can reconstruct the events that happen in a large infrastructure. The data is presented through a 3D visualization where all the information collected from the different cameras can be displayed at the same time. The 3D environment has been modeled with high accuracy to assure a correct simulation of the scenario. A special emphasis has been put on the development of a fast and secure network to manage the data that is generated. We present some initial results obtained from seven cameras located in a Port Terminal in Spain.

  • Design of a P2P content recommendation system using affinity networks

     Vera Del Campo, Juan Victoriano; Pegueroles Valles, Josep Rafel; Hernández Serrano, Juan Bautista; Soriano Ibáñez, Miguel
    Computer communications
    Date of publication: 2012-08
    Journal article

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    The success and intensive use of social networks makes strategies for efficient document location a hot topic of research. In this paper, we propose a common vector space to describe documents and users to create a social network based on affinities, and explore epidemic routing to recommend documents according to the user’s interests. Furthermore, we propose the creation of a SoftDHT structure to improve the recommendation results. Using these mechanisms, an efficient document recommender system with a fast organization of clusters of users based on their affinity can be provided, preventing the creation of unlinked communities. We show through simulations that the proposed system has a short convergence time and presents a high recall ratio.

  • Contributions to security and privacy protection in recommendation systems  Open access

     Vera Del Campo, Juan Victoriano
    Defense's date: 2012-10-29
    Department of Telematics Engineering, Universitat Politècnica de Catalunya
    Theses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    A recommender system is an automatic system that, given a customer model and a set of available documents, is able to select and offer those documents that are more interesting to the customer. From the point of view of security, there are two main issues that recommender systems must face: protection of the users' privacy and protection of other participants of the recommendation process. Recommenders issue personalized recommendations taking into account not only the profile of the documents, but also the private information that customers send to the recommender. Hence, the users' profiles include personal and highly sensitive information, such as their likes and dislikes. In order to have a really useful recommender system and improve its efficiency, we believe that users shouldn't be afraid of stating their preferences. The second challenge from the point of view of security involves the protection against a new kind of attack. Copyright holders have shifted their targets to attack the document providers and any other participant that aids in the process of distributing documents, even unknowingly. In addition, new legislation trends such as ACTA or the ¿Sinde-Wert law¿ in Spain show the interest of states all over the world to control and prosecute these intermediate nodes. we proposed the next contributions: 1.A social model that captures user's interests into the users' profiles, and a metric function that calculates the similarity between users, queries and documents. This model represents profiles as vectors of a social space. Document profiles are created by means of the inspection of the contents of the document. Then, user profiles are calculated as an aggregation of the profiles of the documents that the user owns. Finally, queries are a constrained view of a user profile. This way, all profiles are contained in the same social space, and the similarity metric can be used on any pair of them. 2.Two mechanisms to protect the personal information that the user profiles contain. The first mechanism takes advantage of the Johnson-Lindestrauss and Undecomposability of random matrices theorems to project profiles into social spaces of less dimensions. Even if the information about the user is reduced in the projected social space, under certain circumstances the distances between the original profiles are maintained. The second approach uses a zero-knowledge protocol to answer the question of whether or not two profiles are affine without leaking any information in case of that they are not. 3.A distributed system on a cloud that protects merchants, customers and indexers against legal attacks, by means of providing plausible deniability and oblivious routing to all the participants of the system. We use the term DocCloud to refer to this system. DocCloud organizes databases in a tree-shape structure over a cloud system and provide a Private Information Retrieval protocol to avoid that any participant or observer of the process can identify the recommender. This way, customers, intermediate nodes and even databases are not aware of the specific database that answered the query. 4.A social, P2P network where users link together according to their similarity, and provide recommendations to other users in their neighborhood. We defined an epidemic protocol were links are established based on the neighbors similarity, clustering and randomness. Additionally, we proposed some mechanisms such as the use SoftDHT to aid in the identification of affine users, and speed up the process of creation of clusters of similar users. 5.A document distribution system that provides the recommended documents at the end of the process. In our view of a recommender system, the recommendation is a complete process that ends when the customer receives the recommended document. We proposed SCFS, a distributed and secure filesystem where merchants, documents and users are protected

    Este documento explora c omo localizar documentos interesantes para el usuario en grandes redes distribuidas mediante el uso de sistemas de recomendaci on. Se de fine un sistema de recomendaci on como un sistema autom atico que, dado un modelo de cliente y un conjunto de documentos disponibles, es capaz de seleccionar y ofrecer los documentos que son m as interesantes para el cliente. Las caracter sticas deseables de un sistema de recomendaci on son: (i) ser r apido, (ii) distribuido y (iii) seguro. Un sistema de recomendaci on r apido mejora la experiencia de compra del cliente, ya que una recomendaci on no es util si es que llega demasiado tarde. Un sistema de recomendaci on distribuido evita la creaci on de bases de datos centralizadas con informaci on sensible y mejora la disponibilidad de los documentos. Por ultimo, un sistema de recomendaci on seguro protege a todos los participantes del sistema: usuarios, proveedores de contenido, recomendadores y nodos intermedios. Desde el punto de vista de la seguridad, existen dos problemas principales a los que se deben enfrentar los sistemas de recomendaci on: (i) la protecci on de la intimidad de los usuarios y (ii) la protecci on de los dem as participantes del proceso de recomendaci on. Los recomendadores son capaces de emitir recomendaciones personalizadas teniendo en cuenta no s olo el per l de los documentos, sino tambi en a la informaci on privada que los clientes env an al recomendador. Por tanto, los per les de usuario incluyen informaci on personal y altamente sensible, como sus gustos y fobias. Con el n de desarrollar un sistema de recomendaci on util y mejorar su e cacia, creemos que los usuarios no deben tener miedo a la hora de expresar sus preferencias. Para ello, la informaci on personal que est a incluida en los per les de usuario debe ser protegida y la privacidad del usuario garantizada. El segundo desafi o desde el punto de vista de la seguridad implica un nuevo tipo de ataque. Dado que la prevenci on de la distribuci on ilegal de documentos con derechos de autor por medio de soluciones t ecnicas no ha sido efi caz, los titulares de derechos de autor cambiaron sus objetivos para atacar a los proveedores de documentos y cualquier otro participante que ayude en el proceso de distribuci on de documentos. Adem as, tratados y leyes como ACTA, la ley SOPA de EEUU o la ley "Sinde-Wert" en España ponen de manfi esto el inter es de los estados de todo el mundo para controlar y procesar a estos nodos intermedios. Los juicios recientes como MegaUpload, PirateBay o el caso contra el Sr. Pablo Soto en España muestran que estas amenazas son una realidad.

  • Contributions to the Security of Cognitive Radio Networks

     León Abarca, Olga
    Defense's date: 2012-01-31
    Department of Telematics Engineering, Universitat Politècnica de Catalunya
    Theses

     Share Reference managers Reference managers Open in new window

  • Tecnologías de apoyo para la monitorización del estado de salud e intercambio seguro de registros médicos

     Cruz Llopis, Luis Javier de La; León Abarca, Olga; Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel
    Participation in a competitive project

     Share

  • Low-cost group rekeying for unattended wireless sensor networks

     Hernández Serrano, Juan Bautista; Vera Del Campo, Juan Victoriano; Pegueroles Valles, Josep Rafel; Hernández Gañan, Carlos
    Wireless networks
    Date of publication: 2012
    Journal article

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Wireless sensor networks (WSNs) are made up of large groups of nodes that perform distributed monitoring services. Since sensor measurements are often sensitive data acquired in hostile environments, securing WSN becomes mandatory. However, WSNs consists of low-end devices and frequently preclude the presence of a centralized security manager. Therefore, achieving security is even more challenging. State-of-the-art proposals rely on: (1) attended and centralized security systems; or (2) establishing initial keys without taking into account how to efficiently manage rekeying. In this paper we present a scalable group key management proposal for unattended WSNs that is designed to reduce the rekeying cost when the group membership changes.

  • Implementación y primeros resultados de la asignatura de introducción a la ingeniería en los nuevos grados de la ETSETB-UPC

     Bragos Bardia, Ramon; Pegueroles Valles, Josep Rafel; Alarcon Cot, Eduardo Jose; Camps Carmona, Adriano Jose; Sarda Ferrer, Joan; Consolacion Segura, Carolina Maria; Mussons Selles, Jaume; Pons Peregort, Olga; Oliveras Verges, Albert; Garcia Hernandez, Miguel Jesus; Onrubia Ibañez, Raul; Sayrol Clols, Elisa
    Conferencia Internacional de Fomento e Innovación con Nuevas Tecnologías en la Docencia de la Ingeniería
    Presentation's date: 2011-05-05
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    En este trabajo se describe la asignatura "Introducción a la Ingeniería de las TIC" que, basándose en restricciones y especificaciones iniciales, ha sido concebida, diseñada e implementada en la ETSETB de la UPC. Es la primera de una serie de cuatro asignaturas de proyectos distribuidas a lo largo de los grados. Está organizada en tres itinerarios paralelos que cubren la visión de sistema TIC complejo, los conceptos básicos de economía, empresa y gestión de proyectos y la realización física de un proyecto. En los primeros 5 años este proyecto se lleva a cabo sobre la plataforma SeaPerch, un pequeño robot subacuático desarrollado en el MIT Sea Grant, sobre el que se diseñan y construyen sistemas de medida y comunicaciones. Después de probarla con grupos pequeños durante dos cuatrimestres, se acomete su explotación con una previsión de 250 estudiantes en el cuatrimestre de primavera de este año.

  • WoO : Web of Objetcs

     Soriano Ibáñez, Miguel; Pegueroles Valles, Josep Rafel
    Participation in a competitive project

     Share

  • Mixed integration of CDIO skills into telecommunication engineering curricula

     Sayrol Clols, Elisa; Bragos Bardia, Ramon; Alarcon Cot, Eduardo Jose; Cabrera Bean, Margarita Asuncion; Calveras Auge, Ana M.; Comellas Colome, Jaume; O'callaghan Castella, Juan Manuel; Pegueroles Valles, Josep Rafel; Pla, E; Prat Viñas, Luis; Saez Moreno, German; Sardà ., J; Tallon Montoro, Carme
    Elektronika ir elektrotechnika
    Date of publication: 2010
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Proceso de inversión de competencias genéricas en los nuevos planes de estudios de grado de la ETSETB de acuerdo con el modelo CDIO

     Bragos Bardia, Ramon; Alarcon Cot, Eduardo Jose; Cabrera Bean, Margarita Asuncion; Calveras Auge, Ana M.; Comellas Colome, Jaume; O'callaghan Castella, Juan Manuel; Pegueroles Valles, Josep Rafel; Prat Viñas, Luis; Saez Moreno, German; Sardà ., J; Sayrol Clols, Elisa
    Congreso de Tecnologías Aplicadas a la Enseñanza de la Electrónica
    Presentation's date: 2010-04-13
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Comparación de afinidades privada mediante isomorfismo de grafos

     Vera Del Campo, Juan Victoriano; Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel
    Reunión Española sobre Criptología y Seguridad de la Información
    Presentation's date: 2010-09-08
    Presentation of work at congresses

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Profile-based searches on P2P social networks

     Vera Del Campo, Juan Victoriano; Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel
    International Conference on Networks
    Presentation's date: 2010-04-13
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Genetic algorithms for designing network security protocols

     Zarza, Luis; Forné, Jordi; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    Date of publication: 2010
    Book chapter

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    The design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile ad-hoc networks where thousands of nodes can be involved. In such cases, the aid of an automated tool generating protocols for a predefined problem can be of great utility. This work uses the genetic algorithms (GA) techniques for the automatic design of security networked protocols. When using GA for optimizing protocols two aspects are critical: the genome definition and the evaluation function. We discuss how security protocols can be represented as binary strings and can be interpreted as security protocols; moreover we define several basic criteria for evaluating security protocols. Finally, we present the software we developed for generating secure communications protocols and show some examples and obtained results.

  • Distributed group security for wireless sensor networks

     Hernández Serrano, Juan Bautista; Vera Del Campo, Juan Victoriano; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    Date of publication: 2010
    Book chapter

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • 12th International Conference on Information and Comunications Security

     Forné, Jordi; Fernandez Muñoz, Marcel; Muñoz Tapia, Jose Luis; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    Participation in a competitive project

     Share

  • NEURON CONNECT - A personal Health System for the management of Multiple Scierosis

     Pegueroles Valles, Josep Rafel
    Participation in a competitive project

     Share

  • VICOMO: MODELADO DE CONTECTO VISUAL

     Soriano Ibáñez, Miguel; Pegueroles Valles, Josep Rafel
    Participation in a competitive project

     Share

  • GRUP SEGURETAT DE LA INFORMACIÓ (ISG)

     Pallares Segarra, Esteve; Fernandez Muñoz, Marcel; León Abarca, Olga; Hernández Serrano, Juan Bautista; Forné, Jordi; Pegueroles Valles, Josep Rafel; Esparza Martin, Oscar; Muñoz Tapia, Jose Luis; Parra Arnau, Javier; Soriano Ibáñez, Miguel
    Participation in a competitive project

     Share

  • PROVISION SEGURA DE SERVICIOS SOBRE EL P2P (P2PSEC)

     Pegueroles Valles, Josep Rafel; Fernandez Muñoz, Marcel; Mata Diaz, Jorge; Martin Faus, Isabel Victoria; León Abarca, Olga; Esparza Martin, Oscar; Forga Alberich, Jordi; Hernández Serrano, Juan Bautista; Rico Novella, Francisco Jose; Cruz Llopis, Luis Javier de La; Alins Delgado, Juan Jose; Muñoz Tapia, Jose Luis; Soriano Ibáñez, Miguel
    Participation in a competitive project

     Share

  • Shared self-organized GKM protocol for MANETs

     Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    Journal of information science and engineering
    Date of publication: 2008-11
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Contribución a la seguridad de grupo en redes inalámbricas avanzadas

     Hernández Serrano, Juan Bautista
    Defense's date: 2008-06-26
    Department of Telematics Engineering, Universitat Politècnica de Catalunya
    Theses

     Share Reference managers Reference managers Open in new window

  • Análisis de seguridad de un sistema de archivos distribuido

     Vera Del Campo, Juan Victoriano; Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel
    Reunión Española sobre Criptología y Seguridad de la Información
    Presentation's date: 2008-09-04
    Presentation of work at congresses

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • SCFS: towards design and implementation of a secure distributed filesystem

     Vera Del Campo, Juan Victoriano; Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel
    International Conference on Security and Cryptography
    Presentation's date: 2008-07
    Presentation of work at congresses

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm

     Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    Lecture notes in computer science
    Date of publication: 2007-08
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Providing Security Services in a Resource Discovery System

     Vera Del Campo, Juan Victoriano; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    Journal of networks
    Date of publication: 2007-02
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • MSD: A middleware for secure service discovery in pervasive and mobile computing environments

     Vera Del Campo, Juan Victoriano; Pegueroles Valles, Josep Rafel; Soriano, M
    Journal of networks
    Date of publication: 2007-01
    Journal article

     Share Reference managers Reference managers Open in new window

  • Supporting mobility in GKM over ad-hoc network using a decentralized and spontaneous algorithm

     Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    International Conference on Computational Science and its Applications
    Presentation's date: 2007
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Recently there have been a noticeable growth of ad-hoc environments with peer-to-peer relations. Such environments decentralize the services in order to share their cost between their members. As a result, a decentralized security scheme for the group members must be also provided. Group Key Management (GKM) deals with the responsibility of providing privacy and group authentication in group communications, but until now it is based either in centralized solutions, useless for peer-to-peer groups, or in contributory key schemes, that require a known group size. We propose a GKM algorithm targeted to ad-hoc environments that it is decentralized and allows members to only know their one-hop neighbors. Moreover our presented algorithm can deal with the potential mobility of the ad-hoc devices.

  • Supporting mobility in GKM over ad-hoc network using a spontaneous and decentralized algorithm

     Hernández-Serrano, J; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    International Conference on Computational Science and its Applications
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms

     Zarza, L; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    18th International Conference on Database and Expert Systems Applications. DEXA 2007.
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Sistema móvil de Búsqueda y Localización de Personas Basado en Perfiles con Intermediación de Operador

     Pegueroles Valles, Josep Rafel; Cruz Llopis, Luis Javier de La
    Participation in a competitive project

     Share

  • Encuentram-e

     Pegueroles Valles, Josep Rafel; Cruz Llopis, Luis Javier de La
    Participation in a competitive project

     Share

  • Ares. team for Advanced REsearch on information Security and privacy

     Soriano Ibáñez, Miguel; Domingo Ferrer, Josep; Muñoz Tapia, Jose Luis; Forné, Jordi; Pegueroles Valles, Josep Rafel; Hernández Serrano, Juan Bautista; Pallares Segarra, Esteve; Fernandez Muñoz, Marcel
    Participation in a competitive project

     Share

  • Premio al mejor artículo de las VI Jornadas de Ingeniería Telemática - JITEL 2007

     Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel; Soriano, Miguel
    Award or recognition

     Share

  • Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms

     Zarza, Luis; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    The 2nd International Conference on Availability, Reliability and Security
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Mantenimiento autónomo y distribuido de la Group Key Management sobre Wireless Sensor Networks

     Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    Jornadas de Ingeniería Telemática
    Presentation's date: 2007-09
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks

     Satizabal, C; Hernández Serrano, Juan Bautista; Forné, Jordi; Pegueroles Valles, Josep Rafel
    Computer communications
    Date of publication: 2007-05
    Journal article

     Share Reference managers Reference managers Open in new window

  • Multicast Copyright Protection System Based on a Trusted Soft-Engine

     Pegueroles Valles, Josep Rafel; Fernandez Muñoz, Marcel; Rico Novella, Francisco Jose; Soriano Ibáñez, Miguel
    International journal of business data communications and networking
    Date of publication: 2006-04
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • A practical solution for distribution rights protection in multicast environments

     Pegueroles Valles, Josep Rafel; Fernandez Muñoz, Marcel; Rico Novella, Francisco Jose; Soriano Ibáñez, Miguel
    Lecture notes in computer science
    Date of publication: 2006-05
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Adapting GKM to many-to-many communications over MANET

     Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    Lecture notes in computer science
    Date of publication: 2006-05
    Journal article

     Share Reference managers Reference managers Open in new window

  • Building hierarchical public key infrastructures in mobile ad-hoc networks

     Satizábal Echavarría, Isabel Cristina; Forné, Jordi; Hernández Serrano, Juan Bautista; Pegueroles Valles, Josep Rafel
    Mobile Ad-hoc and Sensor Networks
    Presentation's date: 2006-12
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can be established using peer-to-peer PKIs. Here, certification paths can be built although part of the infrastructure is temporarily unreachable because there can be multiple paths between two entities but certification path discovery is difficult since all the options do not lead to the target entity. On the contrary, in hierarchical PKIs, there is only one path between two entities and certification paths are easy to find. For that reason, we propose a protocol that establishes a virtual hierarchy in a peer-to-peer PKI. The results show that this protocol can be executed in a short time. In addition, our protocol does not require to issue new certificates among PKI entities, facilitates the certification path discovery process and the maximum path length can be adapted to the characteristics of users with limited processing and storage capacity.

  • Seguridad en Protocolos de Descubrimiento de Servicios de Redes Heterogéneas

     Vera Del Campo, Juan Victoriano; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    IX Reunion Española sobre Criptologia y Seguridad de la Informacion
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks

     Vera Del Campo, Juan Victoriano; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    First International Conference on Availability, Reliability and Security
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • A practical solution for distribution rights protection in multicast environments

     Pegueroles Valles, Josep Rafel; Fernandez Muñoz, Marcel; Rico Novella, Francisco Jose; Soriano Ibáñez, Miguel
    The 2006 International Conference on Computational Science and its Applications
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Generación y Optimización de Protocolos Criptográficos Mediante Técnicas de Algoritmos Genéticos

     Zarza, Luis; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel
    IX Reunion Española sobre Criptologia y Seguridad de la Informacion
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques

     Zarza, Luis; Pegueroles Valles, Josep Rafel; Soriano Ibáñez, Miguel; Martínez, Rafael
    International Conference on Security and Cryptography
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • e-Representative

     Forné, Jordi; Soriano Ibáñez, Miguel; Pegueroles Valles, Josep Rafel; Fernandez Muñoz, Marcel; Muñoz Tapia, Jose Luis; Esparza Martin, Oscar
    Participation in a competitive project

     Share