Valério Rosset

ORCID: 0000-0003-0983-0249
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Real-Time Systems Scheduling
  • Mobile Ad Hoc Networks
  • Formal Methods in Verification
  • Software-Defined Networks and 5G
  • Energy Harvesting in Wireless Networks
  • Distributed systems and fault tolerance
  • Opportunistic and Delay-Tolerant Networks
  • Network Security and Intrusion Detection
  • Power Line Communications and Noise
  • IoT and Edge/Fog Computing
  • Advanced Optical Network Technologies
  • Cloud Data Security Solutions
  • Complex Network Analysis Techniques
  • Access Control and Trust
  • Internet Traffic Analysis and Secure E-voting
  • Security in Wireless Sensor Networks
  • Petri Nets in System Modeling
  • Precipitation Measurement and Analysis
  • Air Traffic Management and Optimization
  • IPv6, Mobility, Handover, Networks, Security
  • Embedded Systems Design Techniques
  • Human Mobility and Location-Based Analysis
  • Distributed Control Multi-Agent Systems
  • Wireless Communication Networks Research

Instituto Tecnológico de Aeronáutica
2020-2024

Universidade Federal de São Paulo
2016-2022

Departamento de Ciência e Tecnologia
2019

Universidade de São Paulo
2014

Universidade do Porto
2005-2011

Universidade Federal de Santa Catarina
2003

San Antonio College
2003

Weather events put human lives at risk mostly when people might occupy areas susceptible to natural disasters. Deploying Professional Stations (PWS) in vulnerable is key for monitoring weather with reliable measurements. However, such professional instrumentation notably expensive while remote sensing from a number of stations paramount. This imposes challenges on the large-scale station deployment broad large observation networks as Cemaden—The Brazilian National Center Monitoring and Early...

10.1016/j.dcan.2022.05.002 article EN cc-by-nc-nd Digital Communications and Networks 2022-05-17

This article proposes an architecture for distributing and managing digital contents, combining traditional access control rights management (DRM) aspects, which executes the content usage control. The defines security policies to establish protected licenses use of contents at client side. work also two models: a model authorization distribution entity license creation, entity. Prototypes are implemented using XML-based technologies, facilitate integration different modules architecture.

10.1109/aict.2005.5 article EN 2005-01-01

Finding communities in networks is a commonly used form of network analysis. There myriad community detection algorithms the literature to perform this task. In spite that, number directed much lower than undirected networks. However, evaluation measures estimate quality nowadays have its adaptation as, for example, well-known modularity measure. This paper introduces genetic-based consensus clustering detect with as fitness function. Consensus strategies involve combining computational...

10.1016/j.procs.2016.08.103 article EN Procedia Computer Science 2016-01-01

We present a group membership protocol specially designed for next generation communication systems real-time safety-critical applications such as FlexRay and FTT-CAN.The proposed imposes an overhead of two bits per processor cycle, when the system is in quiescent state, able to tolerate benign failures up half members between consecutive executions.Additionally, it removes faulty within cycles worst case reintegrates at latest after recovers.Compared with protocols developed similar...

10.1109/wfcs.2006.1704119 article EN 2006-01-01

The recent growth in the use of wireless sensor networks (WSNs) many applications leads to raise a core infrastructure for communication and data gathering Cyber-Physical Systems (CPS). strategy most WSNs relies on hierarchical clustering routing protocols due their ad hoc nature. In bulk existing approaches some special nodes, named Cluster-Heads (CHs), have task assembling clusters intermediate between cluster members central entity network, Sink. Therefore, overall efficiency such is...

10.1016/j.procs.2016.08.229 article EN Procedia Computer Science 2016-01-01

In Wireless Sensor Networks (WSNs), routing remains a key issue primarily regarding to the overall energy consumption. Accordingly, conservation has been addressed by few strategies, namely cluster-based hierarchical protocols. Nevertheless, load balancing and network lifetime achieved such strategies strongly depend on even distribution of cluster-heads in network. Therefore, we propose this paper community detection-based protocol for automatically producing evenly distributing clusters We...

10.1109/nca.2014.42 article EN 2014-08-01

In computer networks, multicast routing is that in which a single message transmitted to multiple recipients from subset of devices, called group. To address the problem, it usual model network as graph. line with this, some strategies aim at building tree minimizes total costs transmission between vertices contains group, Steiner tree. However, large scale applications, local-based may be better alternative, since they can also easily adapted tackle distributed systems. literature, extent...

10.1109/tla.2015.7404921 article EN IEEE Latin America Transactions 2015-12-01

<title>Abstract</title> Although the Internet of Things (IoT) is one fastest-growing technology paradigms, efforts in securing this environment do not advance as fast. A classical type network security mechanism Intrusion Detection System (IDS). However, mainly due to their resource limitations, incorporation IoT environments built on top low-end devices easy. To make easier, paper proposes a Distributed Immune Security Architecture (DISA) based Artificial Systems. DISA incorporates modules...

10.21203/rs.3.rs-4137072/v1 preprint EN cc-by Research Square (Research Square) 2024-05-21

Devido a característica de programabilidade das Redes Definidas por Software (SDNs) tanto o software controle como as aplicações rede estão sujeitos ataques, exemplo injeção regras fluxo falsas. Desse modo, existe uma necessidade se investigar soluções alternativas que permitam verificação integridade, autenticidade, corretude e acordo sobre conjunto serem implantadas nos comutadores. Nesse contexto, distribuição segura pode ser implementada meio Registros Distribuídos (DLs), mais...

10.5335/rbca.v16i3.15696 article PT cc-by Revista Brasileira de Computação Aplicada 2024-12-03

We present a family of reliable broadcast protocols designed to take advantage the dual scheduling TDMA (DuST) scheme provided by current state-of-the-art automotive control networks such as FlexRay. These are complement FlexRay's native communication services, which do not provide sufficient fault tolerance for safety-critical applications. A reliability evaluation proposed carried out with help probabilistic model checker PRISM shows that can achieve levels suitable

10.1109/etfa.2009.5347122 article EN 2009-09-01

The usage of the Software-Defined Sensor Networks (SD-WSNs) as support for applications Internet Things (IoT) has been focus recent research to reduce complexity configuration and management. This simplification allows greater flexibility these networks in operating time. However, although more flexible than traditional approaches, existing SD-WSN architectures found literature have limitations mainly with regard reprogramming devices In this article, we propose a novel approach called...

10.1109/tla.2021.9827468 article EN IEEE Latin America Transactions 2022-07-01

Weather events put human lives at risk mostly when people might reside in areas susceptible to natural disasters. monitoring is a pivotal task that accomplished vulnerable with the support of reliable weather stations. Such stations are front-end equipment typically mounted on fixed mast structure set digital and magnetic sensors connected datalogger. While remote sensing from number paramount, cost professional instruments extremely high. This imposes challenge for large-scale deployment...

10.48550/arxiv.2102.04574 preprint EN cc-by arXiv (Cornell University) 2021-01-01

HTTP Digest Access Authentication (DAA) is a security protocol widely used in embedded systems. Historically, the DAA has presented vulnerabilities that motivated revising of its specification, including use mutual authentication and replacing MD5 hash function by SHA-256-512. Despite these improvements, remains vulnerable to some kinds attacks such as Man-in-the-Middle (MitM). For this reason, we introduce paper method for testing access control schemes based on DAA, called Unauthorized...

10.23919/cisti.2017.7975954 article EN 2022 17th Iberian Conference on Information Systems and Technologies (CISTI) 2017-06-01
Coming Soon ...