- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- IoT and Edge/Fog Computing
- Power Line Communications and Noise
- Wireless Communication Networks Research
- IPv6, Mobility, Handover, Networks, Security
- Blockchain Technology Applications and Security
- Advanced Wireless Network Optimization
- Millimeter-Wave Propagation and Modeling
- Microwave Engineering and Waveguides
- Wireless Networks and Protocols
- Energy Harvesting in Wireless Networks
- Molecular Communication and Nanonetworks
- Cryptographic Implementations and Security
- Cloud Data Security Solutions
- Anomaly Detection Techniques and Applications
- Cognitive Radio Networks and Spectrum Sensing
- Internet Traffic Analysis and Secure E-voting
- Advanced MIMO Systems Optimization
- User Authentication and Security Systems
- Digital and Cyber Forensics
- Privacy, Security, and Data Protection
- Satellite Communication Systems
- Breast Implant and Reconstruction
- Nutrition, Health, and Society Studies
Instituto de Telecomunicações
2012-2024
Hospital de São José
2024
Molecular Networks (Germany)
2023
Hospital de Câncer de Barretos
2020
Hospital São Paulo
2020
University of Bradford
2020
Altice Portugal (Portugal)
2015
Universidade Federal da Bahia
2012
Instituto Politécnico Nacional
2009-2012
Ambiente Italia (Italy)
2012
Over the past few years, healthcare sector is being transformed due to rise of Internet Things (IoT) and introduction Medical (IoMT) technology, whose purpose improvement patient’s quality life. Nevertheless, heterogenous resource-constrained characteristics IoMT networks make them vulnerable a wide range threats. Thus, novel security mechanisms, such as accurate efficient anomaly-based intrusion detection systems (AIDSs), considering inherent limitations networks, need be developed before...
Previous research efforts on developing an Intrusion Detection and Prevention Systems (IDPS) for Android mobile devices rely mostly centralized data collection processing a cloud server. However, this trend is characterized by two major limitations. First, it requires continuous connection between monitored the server, which might be infeasible, due to network's outage or partial coverage. Second, increases risk of sensitive information leakage violation user's privacy. To help alleviate...
Over the past few years, we have witnessed emergence of Internet Things (IoT) and Industrial IoT networks that bring significant benefits to citizens, society, industry. However, their heterogeneous resource-constrained nature makes them vulnerable a wide range threats. Therefore, there is an urgent need for novel security mechanisms such as accurate efficient anomaly-based intrusion detection systems (AIDSs) be developed before these reach full potential. Nevertheless, lack up-to-date,...
The fourth industrial revolution (Industry 4.0) is transforming the next generation of supply chain by making it more agile and efficient compared with traditional chain. However, data communication across partners in Industry 4.0 can be target a wide spectrum attackers exploiting security breaches internal/external environment due to its heterogeneous dynamic nature as well fact that non-professional users issues usually operate their information systems. Attackers compromise between...
Although blockchain is a promising technology that can bring significant benefits into current centralized IoT-based health monitoring systems in order to address security challenges, the resource-constrained IoT devices of these cannot afford complex and heavyweight operations due their limited processing power, storage capacity, battery life. Therefore, this paper, we propose Hyperledger Fabric-based architecture to: i) enhance systems, ii) achieve better handling capacity sensors...
The new IEEE 802.21 standard specifies link layer intelligence and other related network information to upper layers in order optimize handovers between networks of different types, such as WiMAX, Wi-Fi, 3GPP. This paper makes a short description standard, how it is implemented ns-2, the signaling used handover WiMAX Wi-Fi. also proposes novel very simple approach determine expected number an ns-2 simulation evaluates reliability scalability when simulating scenarios with multiple nodes.
Smart grid introduces a wealth of promising applications for upcoming fifth-generation mobile networks (5G), enabling households and utility companies to establish two-way digital communications dialogue, which can benefit both them. The monitor real-time consumption end users take proper measures (e.g., pricing) shape their profile or plan enough supply meet the foreseen demand. On other hand, smart home receive electricity prices adjust its minimize daily expenditure, while meeting energy...
The Internet of Medical Things (IoMT) has risen significantly in recent years and provided better quality life by enabling IoMT-based health monitoring systems. Despite that fact, innovative security mechanisms are required to meet the concerns such systems effectively efficiently. Additionally, industry research community have anticipated blockchain technology will be a disruptive able integrated into solutions for IoMT networks since it potential play big role in: (a) secure data...
Internet of Medical Things (IoMT) have improved individuals' quality life by enabling IoMT-based healthcare monitoring systems to grow dramatically in recent years. Therefore, cutting-edge security techniques are needed address the risks IoMT networks effectively and a timely manner. On other hand, blockchain technology has potential play significant role both securing devices preventing unauthorized access during data transmission it been anticipated industry research community be...
This article describes an experimental testbed that combines wireless microphone sensors with a web-based terrestrial digital video broadcasting geolocation database and program making special events spectrumbooking platform. Software defined radio Internet technologies are the enabling tools in use. The key sensing techniques identified implemented. Test trials real scenario have shown platform was able to receive information from DVB-T PMSE spectrum-booking platform, updating list of...
TV White Spaces (TVWS) technology allows wireless devices to opportunistically use locally-available channels enabled by a geolocation database. The UK regulator Ofcom has initiated pilot of TVWS in the UK. This paper concerns large- scale series trials under that pilot. purposes are test aspects white space technology, including device and database interactions, validity channel availability/powers calculations associated interference effects on primary services, performances devices, among...
In the dawn of 5G era, advances in mobile communications have created a suitable environment for emergence wide spectrum Smart City applications that will play significant role towards improvement citizens' life quality upcoming years. It is expected allow citizens to access numerous and diverse services, provided by third-party Service Providers, through their devices (e.g., smartphones). However, order emerging gain trust all involved stakeholders reach full potential market, many security...
The growing presence of concurrent heterogeneous wireless access networks, together with the increasing service demands from end-users, require re-thinking current selection polices and appropriate management mechanisms, namely concerning quality service, energy efficiency, etc. recent IEEE 802.21 standard introduces link layer intelligence as well related network information to upper layers in order optimise handovers between networks different technologies, such WiMAX, Wi-Fi 3GPP. With...
The rise of the Internet Things (IoT) and Industrial IoT (IIoT), over past few years, has been beneficial for citizens, societies industry. However, their resource-constrained heterogenous nature renders them vulnerable to a wide range threats. Therefore, novel security mechanisms, such as accurate efficient anomaly-based intrusion detection systems (AIDSs), are required be developed before IoT/IIoT networks reach full potential in market. there is lack up-to-date, representative...
Over the past few years, Internet of Things (IoT) is transforming healthcare sector through introduction Medical (IoMT) technology, whose purpose improvement patient's quality life. Nevertheless, IoMT networks are still vulnerable to a wide range threats because their heterogeneity and resource-constrained characteristics. Thus, novel security mechanisms, such as accurate efficient anomaly-based intrusion detection systems (AIDSs), taking into consideration inherent limitations networks,...
This paper presents a characterization of spectrum opportunities in GSM900 downlink bands, for fixed and mobile scenarios. A testbed to analyze coexistence between the licensed system an OFDM based secondary that opportunistically shares same is presented. Coexistence analysis on metrics such as collisions rate throughput. Using this cognitive mechanism classify select stable evaluated realistic
This paper describes a new security framework that will leverage the in cognitive radio cooperative protocols. The architecture uses 802.1X access control mechanism and is supported by Key Distribution Center (KDC) built upon an Authentication Server. KDC used, together with terminal identification policy modified DHCP servers, to provide proper resource allocation message authentication transactions. also used authenticate mappings between layer 2 3 addresses (ARP protocol) distribute...