Dan García-Carrillo

ORCID: 0000-0003-0803-1672
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • IoT Networks and Protocols
  • Wireless Body Area Networks
  • Software-Defined Networks and 5G
  • Bluetooth and Wireless Communication Technologies
  • Context-Aware Activity Recognition Systems
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • User Authentication and Security Systems
  • Security in Wireless Sensor Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Genetics, Aging, and Longevity in Model Organisms
  • Cryptography and Data Security
  • Fungal and yeast genetics research
  • Human-Automation Interaction and Safety
  • Digital and Cyber Forensics
  • Biofuel production and bioconversion
  • AI in Service Interactions
  • Traffic control and management
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Memory and Neural Computing
  • Traffic and Road Safety
  • Smart Grid Security and Resilience
  • Technology Use by Older Adults
  • Service-Oriented Architecture and Web Services

Universidad de Oviedo
2022-2024

Universidad de Murcia
1992-2020

The vision of SMARTIE (Secure and sMARter ciTIEs data management) is to create a distributed framework for IoT-based applications storing, sharing processing large volumes heterogeneous information. This envisioned enable end-to-end security trust in information delivery decision-making purposes following the owner's privacy requirements. follows data-centric paradigm, which will offer highly scalable secure smart city applications. heart this paradigm be "information management services"...

10.1109/riot.2015.7104906 article EN 2015-04-01

The increase of Software Defined Networks (SDN) and Network Function Virtualization (NFV) technologies is bringing many security management benefits that can be exploited at the edge Internet Things (IoT) networks to deal with cyber-threats. In this sense, paper presents evaluates a novel policy-based cyber-situational awareness framework for continuous dynamic Authentication, Authorization, Accounting (AAA) as well Channel Protection virtual functions in IoT enabled SDN/NFV. AAA, including...

10.3390/s19020295 article EN cc-by Sensors 2019-01-12

The Internet of Things (IoT) is becoming increasingly important in several fields industrial applications and personal applications, such as medical e-health, smart cities, etc. research into protocols security aspects related to this area continuously advancing making these networks more reliable secure, taking account by design. Bootstrapping a procedure which user obtains key material configuration information, among other parameters, operate an authenticated party domain. Until now...

10.3390/s16030358 article EN cc-by Sensors 2016-03-11

Nowadays the adoption of IoT solutions is gaining high momentum in several fields, including energy, home and environment monitoring, transportation, manufacturing. However, cybersecurity attacks to low-cost end-user devices can severely undermine expected deployment a broad range scenarios. To face these challenges, emerging software-based networking features introduce new security enablers, providing further scalability flexibility required cope with massive IoT. In this paper, we present...

10.1109/cscn.2017.8088617 article EN 2017-09-01

Safety and security in the workplace are extremely important. In industrial sector, with heavy machinery, an accident can have serious if not life-threatening consequences. Industry 4.0 inclusion of paradigms such as Industrial IoT, new technologies help only to improve production process a company but also assist by improving safety workers. Security is sometimes considered add-on or something be applied future, which could lead very expensive complex solutions. this work, we deal scenarios...

10.1016/j.jii.2024.100575 article EN cc-by Journal of Industrial Information Integration 2024-01-17

The convergence of the Internet Things (IoT) and 5G will open a range opportunities for deployment enhanced sensing, actuating interactive systems as well development novel services applications in plethora fields. Given processing communication limitations both IoT devices most transmission technologies, namely, Low Power Wide Area Network (LPWAN), there are notable concerns regarding certain security issues to be overcome order achieve successful integration LPWAN within architectures. In...

10.1109/access.2020.3041057 article EN cc-by IEEE Access 2020-01-01

Security is critical in the deployment and maintenance of novel IoT 5G networks. The process bootstrapping required to establish a secure data exchange between devices data-driven platforms. It entails, among other steps, authentication, authorization, credential management. Nevertheless, there are few efforts dedicated providing service access authentication area constrained connected recent wireless networks such as narrowband (NB-IoT) 5G. Therefore, this paper presents adaptation...

10.3390/s20030882 article EN cc-by Sensors 2020-02-07

Nowadays, the increase in number of vehicles on roads has brought about several problems such as an traffic congestion and, consequently, polluting emissions. These are especially severe urban environments. It is crucial to perform a sustainable mobility plan improve and therefore, reduce negative impacts caused by jams. To this end, paper presents smart that employs collaborative driving strategy. Each vehicle tries infer conditions using its own status information shared other peers. Using...

10.1016/j.vehcom.2024.100746 article EN cc-by-nc Vehicular Communications 2024-02-27

The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), recent set of technologies conforming so-called Low-Power Wide Networks (LP-WAN) offers long-range communications, allowing one send small pieces information at a reduced energy cost, which promotes creation IoT applications and services. However, LP-WAN pose challenges since they have strong limitations in available bandwidth. general, first...

10.3390/s17112646 article EN cc-by Sensors 2017-11-17

Despite the advantages that Internet of Things (IoT) will bring to our daily life, increasing interconnectivity, as well amount and sensitivity data, make IoT devices an attractive target for attackers. To address this issue, recent Manufacturer Usage Description (MUD) standard has been proposed describe network access control policies in manufacturing phase protect device during its operation by restricting communications. In paper, we define architecture process obtain enforce MUD...

10.3390/s20071882 article EN cc-by Sensors 2020-03-28

In the renowned Internet of Things (IoT) networks, it is expected a vast number devices with IP connectivity and constrained capabilities. Due to reduced resources they are target different type attacks providing security has become basic pillar for success evolution IoT. Among specific key aspects authentication, access control distribution data protection. particular, all these included in process bootstrapping, which allows Smart Object join network domain secure fashion. This process,...

10.1109/jiot.2018.2870984 article EN IEEE Internet of Things Journal 2018-09-18

The response of derepressed cells Schizosaccharomyces pombe to the addition glucose included a marked and reversible activation neutral trehalase that was not produced in repressed cells. protein synthesis inhibitor cycloheximide, protonophore 2,4-dinitrophenol or uncoupler sodium azide also enhanced activity provided present incubation assays. However, only cycloheximide able induce Stimulation by these compounds preceded all cases rapid increase adenosine 3′-5′-cyclic monophosphate (cAMP)...

10.1099/00221287-140-6-1467 article EN Microbiology 1994-06-01

Low-Power Wide-Area Networks (LPWAN) are a type of wireless communication technologies that enable efficient data transfer between low-power devices. This article explores the challenges ensuring security in LPWANs and proposes solution combines two key mechanisms: Object Security for Constrained RESTful Environments (OSCORE) Static Context Header Compression (SCHC). increasingly being used Internet Things (IoT) applications, but features endow these with low power consumption long range...

10.1016/j.iot.2023.100899 article EN cc-by Internet of Things 2023-08-16

The integration of physical devices into the Internet infrastructure raises significant security concerns, since many assumptions current cannot be maintained in so-called IoT. Due to scale and requirements these devices, IoT should provide automated self-managing mechanisms coping with during life-cycle smart objects, order foster deployment scenarios. In this direction, work addresses bootstrapping a object as crucial stage its lifecycle, through use extension PANA an protocol, enable...

10.1109/wf-iot.2015.7389153 article EN 2015-12-01

Building Automation (BA) is key to encourage the growth of more sustainable cities and smart homes. However, current BA systems are not able manage new constructions based on Adaptable/Dynamic Envelopes (ADBE) achieving near-zero energy-efficiency. The ADBE buildings integrate Renewable Energy Sources (RES) Envelope Retrofitting (ER) that must be managed by Artificial Intelligence (AI) Internet Things (IoT) through secure protocols. This paper presents PLUG-N-HARVEST architecture cloud AI...

10.3390/s19040843 article EN cc-by Sensors 2019-02-18

The use of remote desktop applications has increased greatly in recent years, mainly because the generalization telecommuting due to COVID-19 pandemic. This process been carried out a very controlled manner some companies, but other organizations it introduced more anarchic way. direct on-premises company computers and resources from internet without necessary protection mechanisms, including VPNs, risk data exfiltration. Apart types exfiltration, there are cases which employees transfer...

10.3390/electronics13081429 article EN Electronics 2024-04-10

This paper proposes a novel policy-based framework to manage Authentication, Authorization and Accounting (AAA) Channel Protection security functions in IoT networks enabled with Software defined Networks (SDN) Network Function Virtualization (NFV) technologies. The virtual AAA, including network authenticators, are deployed as VNF dynamically at the edge, facilitating devices' bootstrapping ruling access control of devices network. enforcement authorization decisions switches is carried out...

10.1109/giots.2018.8534551 article EN 2018-06-01

Security and interoperability are critical factors in Internet of Things (IoT) constrained networks order to boost their fully integration with the Internet. In particular, secure bootstrapping long headers compression, e.g., IPv6, key procedures enable end-to-end security associations robust algorithms among cloud platforms IoT devices. Nevertheless, few efforts being dedicated provide authentication based on prominent Low Power-Wide Area Network (LP-WAN) paradigm such as LoRaWAN. Thereby,...

10.1109/giots49054.2020.9119644 article EN 2020-06-01

The defence-in-depth (DiD) methodology is a defensive approach usually performed by network administrators to implement secure networks layering and segmenting them. Typically, segmentation implemented in the second layer using standard virtual local area (VLANs) or private (PVLANs). Although defence depth manageable small networks, it not easily scalable larger environments. Software-defined (SDNs) are emerging technologies that can be very helpful when performing such In this work,...

10.3390/s23041747 article EN cc-by Sensors 2023-02-04
Coming Soon ...