- Cryptography and Data Security
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- IoT Networks and Protocols
- Advanced Malware Detection Techniques
- Cloud Data Security Solutions
- Wireless Body Area Networks
- Bluetooth and Wireless Communication Technologies
- Scientific Computing and Data Management
- Smart Grid Security and Resilience
- Software Reliability and Analysis Research
- Software Testing and Debugging Techniques
- User Authentication and Security Systems
- Cryptographic Implementations and Security
- Advanced Authentication Protocols Security
- Network Security and Intrusion Detection
- Security in Wireless Sensor Networks
Universidad de Murcia
2016-2020
Ikerlan
2019
Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet Things (IoT) field, a quite recent area where such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include features to guarantee authentication, confidentiality integrity. More Low-Power Wide-Area (LP-WAN), which also consider security, but present initial approaches that further improved. An Long...
In most Internet of Things (IoT) deployments, intermediate entities are usually employed for efficiency and scalability reasons. These proxies break end-to-end security when using even the state-of-the-art transport layer (TLS) solutions. this direction, recent object constrained RESTful environments (OSCORE) has been standardized to enable in presence malicious proxies. article, we focus on key establishment process based application-layer techniques. particular, evaluate ephemeral...
Defining the intended behaviour of IoT devices is considered as a key aspect to detect and mitigate potential security attacks. In this direction, Manufacturer Usage Description (MUD) has been recently standardised reduce attack surface certain device through definition access control policies. However, semantic model only provide network level restrictions for communication such device. order increase expressiveness approach, we propose use an automated testing methodology, so that results...
The inclusion of the Big Data paradigm in our everyday life is giving rise to different IoT scenarios which there a continuous sensitive data sharing (e.g., remote healthcare or domestic automation). For such scenarios, protection key challenge achieve acceptance, by end users, new services and systems oriented these scenarios. In order address this issue, work presents novel approach combining efficiency symmetric cryptography flexibility fine granularity attribute-based cryptography, with...
Smart buildings represent key environments to encourage the growth of more sustainable and efficient cities. With strong development Internet Things (IoT), integration heterogeneous physical devices fosters emergence data-driven services make effective decisions accordingly. However, need for sharing large amounts data could help infer users' sensitive information, such as their daily habits, thus harming privacy. Under these premises, this paper introduces an encryption scheme based on...
The IoT is composed of a global network heterogeneous devices that exchange information with each other. In this kind scenarios, the number smart objects increasingly high, which enhances possibility attacks compromise security, privacy and trust exchanged information. Thus, need to provide duly tested, benchmarked certified security solutions for large-scale arises in order solve these risks. direction, paper presents ARMOUR, research project methodology experiment, validate certify...
Low-Power Wide-Area Networks (LP-WAN) are becoming the cornerstone for IoT connectivity these days, given long range coverage and number of devices that could be interconnected through a single gateway. Among LP-WAN proposals, LoRaWAN (Long Range WideArea Network) is receiving special attention, because its adaptability to actual transmission scenario conditions license-free operation. However, current specifications especially address physical link-level communication requirements,leaving...