Malaga University

Displaying 1-33 of 33 results

  • White Papers // Nov 2013

    Covert Communications Through Network Configuration Messages

    Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in multi-level security systems in the early 70's they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. In this paper the authors...

    Provided By Malaga University

  • White Papers // Oct 2013

    WASAM: A Dynamic Wide-Area Situational Awareness Model for Critical Domains in Smart Grids

    Control from anywhere and at anytime is nowadays a matter of paramount importance in critical systems. This is the case of the smart grid and its domains which should be monitored through intelligent and dynamic mechanisms able to anticipate detect and respond before disruptions arise within the system. Given this...

    Provided By Malaga University

  • White Papers // Oct 2013

    Smart Control of Operational Threats in Control Substations

    Any deliberate or unsuitable operational action in control tasks of critical infrastructures, such as energy generation, transmission and distribution systems that comprise sub-domains of a smart grid, could have a significant impact on the digital economy: without energy, the digital economy cannot live. In addition, the vast majority of these...

    Provided By Malaga University

  • White Papers // Oct 2013

    Security of Industrial Sensor Network-Based Remote Substations in the Context of the Internet of Things

    The main objective of remote substations is to provide the central system with sensitive information from critical infrastructures, such as generation, distribution or transmission power systems. Wireless sensor networks have been recently applied in this particular context due to their attractive services and inherent benefits, such as simplicity, reliability and...

    Provided By Malaga University

  • White Papers // Oct 2013

    Analysis of Requirements for Critical Control Systems

    Technological convergence in control and acquisition tasks in critical control systems has become a cutting-edge topic in recent years. Modernization not only offers a way of increasing operational performance but it also infers greater security issues and associated risks. Although there currently is an important diversity of studies dealing with...

    Provided By Malaga University

  • White Papers // Oct 2013

    A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms

    Today, mobile platforms are multimedia devices that provide different types of traffic with the consequent particular performance demands and, besides, security concerns (e.g. privacy). However, security and QoS requirements quite often conflict to a large degree; the mobility and heterogeneous paradigm of the future internet makes coexistence even more difficult,...

    Provided By Malaga University

  • White Papers // Oct 2013

    (Un)Suitability of Anonymous Communication Systems to WSN

    Anonymous communication systems have been extensively studied by the research community to prevent the disclosure of sensitive information from the analysis of individuals' traffic patterns. Many remarkable solutions have been developed in this area, most of which have proven to be effective in the protection of user privacy against different...

    Provided By Malaga University

  • White Papers // Sep 2013

    A Framework for Enabling Trust Requirements in Social Cloud Applications

    Cloud applications entail the provision of a huge amount of heterogeneous, geographically-distributed resources managed and shared by many different stakeholders who often do not know each other beforehand. This raises numerous security concerns that, if not addressed carefully, might hinder the adoption of this promising computational model. Appropriately dealing with...

    Provided By Malaga University

  • White Papers // Sep 2013

    Analysis and Taxonomy of Security/QoS Tradeoff Solutions for the Future Internet

    Motivated by the growing convergence of diverse types of networks and the rise of concepts such as Future Internet (FI), in this paper the authors analyze the coexistence of security mechanisms and Quality of Service (QoS) mechanisms in resource-constrained networks that are relevant types of networks within the FI environment....

    Provided By Malaga University

  • White Papers // Apr 2013

    On the Features and Challenges of Security & Privacy in Distributed Internet of Things

    In the internet of things, services can be provisioned using centralized architectures, where central entities acquire, process, and provide information. Alternatively, distributed architectures, where entities at the edge of the network exchange information and collaborate with each other in a dynamic way, can also be used. In order to understand...

    Provided By Malaga University

  • White Papers // Jan 2013

    Automated Throughput Optimization of Cloud Services Via Model-Driven Adaptation

    Cloud computing promises easy access, low entry cost and elasticity. However, elastic service provisioning is usually delivered via service replication, which must be supervised manually, hand-picking, the services to replicate and ensuring their proper load balance. Automated service provisioning, i.e., the function of automatically scaling the services to cope up...

    Provided By Malaga University

  • White Papers // Apr 2011

    Identity Management Challenges for Intercloud Applications

    Intercloud notion is gaining a lot of attention lately from both enterprise and academia, not only because of its benefits and expected results but also due to the challenges that it introduces regarding interoperability and standardisation. Identity management services are one of the main candidates to be outsourced into the...

    Provided By Malaga University

  • White Papers // Apr 2011

    Key Management Systems for Sensor Networks in the Context of the Internet of Things

    If a Wireless Sensor Network (WSN) is to be completely integrated into the Internet as part of the Internet of Things (IoT), it is necessary to consider various security challenges, such as the creation of a secure channel between an Internet host and a sensor node. In order to create...

    Provided By Malaga University

  • White Papers // Apr 2011

    An Evaluation of the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks

    Wireless sensors are battery-powered devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is their main limitation, they require considerable energy to communicate data. Due to this, the energy saving of computationally inexpensive security primitives (like those using symmetric key cryptography) can...

    Provided By Malaga University

  • White Papers // Feb 2011

    Secure Integration of RFID Technology in Personal Documentation for Seamless Identity Validation

    Seamless human identification and authentication in the information system is a fundamental step towards the transparent interaction between the user and its context proposed in ambient intelligence. Due to this, the IDENTICA project is aimed to the design and implementation of a distributed authentication platform based on biometrics (i.e. voice...

    Provided By Malaga University

  • White Papers // Feb 2011

    On the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks

    Wireless sensors are battery-powered devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is their main limitation, they require considerable energy to communicate data. Due to this, it turns out that the energy saving of computationally inexpensive primitives (like symmetric key cryptography)...

    Provided By Malaga University

  • White Papers // Feb 2011

    Trust and Reputation Systems for Wireless Sensor Networks

    The concept of trust has become very relevant in the late years as a consequence of the growth of fields such as internet transactions or electronic commerce. In general, trust has become of paramount importance for any kind of distributed networks, such as Wireless Sensor Networks (WSN in the following)....

    Provided By Malaga University

  • White Papers // Feb 2011

    Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks

    As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can influence the security mechanisms. This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications,...

    Provided By Malaga University

  • White Papers // Feb 2011

    Trust Management Systems for Wireless Sensor Networks: Best Practices

    Wireless Sensor Networks (WSN) have been proven a useful technology for perceiving information about the physical world and as a consequence has been used in many applications such as measurement of temperature, radiation, flow of liquids, etc. The nature of this kind of technology, and also their vulnerabilities to attacks...

    Provided By Malaga University

  • White Papers // Feb 2011

    A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems

    Nowadays, critical control systems are a fundamental component contributing to the overall performance of critical infrastructures in the society, most of which belong to the industrial sector. These complex systems include in their design different types of ICT (Information and Communication Technology) systems, such as Wireless (Mesh) Sensor Networks, to...

    Provided By Malaga University

  • White Papers // Feb 2011

    Integrating Wireless Sensor Networks and the Internet: A Security Analysis

    If a computer system needs to obtain data from a certain environment, one of the tools that may be used is wireless sensor networks, also known as sensor networks or WSN. The elements of these networks, the sensor nodes, can measure various physical properties like temperature and radiation, and produce...

    Provided By Malaga University

  • White Papers // Feb 2011

    The Role of Wireless Sensor Networks in the Area of Critical Information Infrastructure Protection

    Critical Infrastructures, such as energy, banking, and transport, are an essential pillar to the well-being of the national and international economy, security and quality of life. These infrastructures are dependent on a spectrum of highly-interconnected information infrastructures for their smooth, reliable and continuous operation. The field of protecting such Critical...

    Provided By Malaga University

  • White Papers // Jan 2011

    A Service-Oriented Approach to Facilitate Real-Time WSAN Application Development

    Due to the complex nature of developing Wireless Sensor and Actor Network (WSAN) applications it is obvious that new frameworks, tools, middleware and higher level abstractions are needed to make the task of the developers easier. Depending on the WSAN system the authors want to develop, different characteristics must be...

    Provided By Malaga University

  • White Papers // Jan 2011

    Source Location Privacy Considerations in Wireless Sensor Networks

    Wireless sensor networks is considered to be one of the cornerstones of Ambient Intelligence since they can be used in countless applications, where sensors are unobtrusively embedded into the environment to perform operations like monitoring, tracking and reporting. In such scenarios, privacy issues must be carefully considered since the mere...

    Provided By Malaga University

  • White Papers // Oct 2010

    Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?

    Wireless Sensor Networks (WSN) behaves as a digital skin, providing a virtual layer where the information about the physical world can be accessed by any computational system. As a result, they are an invaluable resource for realizing the vision of the Internet of Things (IoT). However, it is necessary to...

    Provided By Malaga University

  • White Papers // Aug 2010

    Robust Stability in Multivariable Neural Network Control Using Harmonic Analysis

    Robust stability and performance are the two most basic features of feedback control systems. The harmonic balance analysis technique enables to analyze the stability of limit cycles arising from a neural network control based system operating over nonlinear plants. In this paper a robust stability analysis based on the harmonic...

    Provided By Malaga University

  • White Papers // Jun 2010

    Analysis of Topology Control Algorithms in Multi-Hop Cellular Networks

    In multi-hop wireless networks, the way the network topology is defined has a strong impact on routing. This paper deals with topology control in cellular networks with relays. Several topology control algorithms taken from ad-hoc networks are adapted to cellular networks. Most of the algorithms considered here are based on...

    Provided By Malaga University

  • White Papers // May 2010

    A Cross-Layer Approach for Integrating Security Mechanisms in Sensor Networks Architectures

    The Wireless Sensor Networks (WSN) paradigm is especially vulnerable against external and internal attacks. Therefore, it is necessary to develop security mechanisms and protocols to protect them. These mechanisms must become an integral part of the software architecture and network stack of a sensor node. A question that remains is...

    Provided By Malaga University

  • White Papers // Dec 2009

    Do Wireless Sensor Networks Need to Be Completely Integrated Into the Internet?

    Wireless sensor networks are considered as an integral part of the Internet of Things paradigm. Not only they provide a virtual presence to elements of the real world, but also allow any computational system to know about the physical state of those elements thanks to the use of embedded sensors....

    Provided By Malaga University

  • White Papers // Oct 2009

    Optimized Gateway Discovery in Hybrid MANETs

    Mobile users are expected to demand access to the Internet anywhere and anytime. In a MANET context, a device which is about to connect to external hosts needs the route to the element which communicates the MANET with the Internet. This element is the Internet Gateway. To inform about its...

    Provided By Malaga University

  • White Papers // Jun 2009

    Software Tools for System Identification and Control Using Neural Networks in Process Engineering

    Neural networks offer an alternative approach both for identification and control of nonlinear processes in process engineering. The lack of software tools for the design of controllers based on neural network models is particularly pronounced in this field. SIMULINK is properly a widely used graphical code development environment which allows...

    Provided By Malaga University

  • White Papers // Jun 2009

    CoSP2P: A Component-Based Service Model for Peer-to-Peer Systems

    The increasing complexity of software development based on peer to peer networks makes necessary the creation of new frameworks in order to simplify the developer's task. Additionally, some applications, e.g. fire detection or security alarms may require real-time constraints and the high level definition of these features eases the application...

    Provided By Malaga University

  • White Papers // Jun 2009

    RTCoord: A Methodology to Design WSAN Applications

    Wireless Sensor and Actor Networks (WSANs) constitute an emerging and pervasive technology that is attracting increasing interest in the research community for a wide range of applications. WSANs have two important requirements: coordination interactions and real-time communication to perform correct and timely actions. This paper introduces a methodology to facilitate...

    Provided By Malaga University

  • White Papers // Jan 2013

    Automated Throughput Optimization of Cloud Services Via Model-Driven Adaptation

    Cloud computing promises easy access, low entry cost and elasticity. However, elastic service provisioning is usually delivered via service replication, which must be supervised manually, hand-picking, the services to replicate and ensuring their proper load balance. Automated service provisioning, i.e., the function of automatically scaling the services to cope up...

    Provided By Malaga University

  • White Papers // Jun 2009

    CoSP2P: A Component-Based Service Model for Peer-to-Peer Systems

    The increasing complexity of software development based on peer to peer networks makes necessary the creation of new frameworks in order to simplify the developer's task. Additionally, some applications, e.g. fire detection or security alarms may require real-time constraints and the high level definition of these features eases the application...

    Provided By Malaga University

  • White Papers // Oct 2009

    Optimized Gateway Discovery in Hybrid MANETs

    Mobile users are expected to demand access to the Internet anywhere and anytime. In a MANET context, a device which is about to connect to external hosts needs the route to the element which communicates the MANET with the Internet. This element is the Internet Gateway. To inform about its...

    Provided By Malaga University

  • White Papers // Aug 2010

    Robust Stability in Multivariable Neural Network Control Using Harmonic Analysis

    Robust stability and performance are the two most basic features of feedback control systems. The harmonic balance analysis technique enables to analyze the stability of limit cycles arising from a neural network control based system operating over nonlinear plants. In this paper a robust stability analysis based on the harmonic...

    Provided By Malaga University

  • White Papers // Jun 2009

    RTCoord: A Methodology to Design WSAN Applications

    Wireless Sensor and Actor Networks (WSANs) constitute an emerging and pervasive technology that is attracting increasing interest in the research community for a wide range of applications. WSANs have two important requirements: coordination interactions and real-time communication to perform correct and timely actions. This paper introduces a methodology to facilitate...

    Provided By Malaga University

  • White Papers // Jun 2009

    Software Tools for System Identification and Control Using Neural Networks in Process Engineering

    Neural networks offer an alternative approach both for identification and control of nonlinear processes in process engineering. The lack of software tools for the design of controllers based on neural network models is particularly pronounced in this field. SIMULINK is properly a widely used graphical code development environment which allows...

    Provided By Malaga University

  • White Papers // Jun 2010

    Analysis of Topology Control Algorithms in Multi-Hop Cellular Networks

    In multi-hop wireless networks, the way the network topology is defined has a strong impact on routing. This paper deals with topology control in cellular networks with relays. Several topology control algorithms taken from ad-hoc networks are adapted to cellular networks. Most of the algorithms considered here are based on...

    Provided By Malaga University

  • White Papers // Oct 2010

    Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?

    Wireless Sensor Networks (WSN) behaves as a digital skin, providing a virtual layer where the information about the physical world can be accessed by any computational system. As a result, they are an invaluable resource for realizing the vision of the Internet of Things (IoT). However, it is necessary to...

    Provided By Malaga University

  • White Papers // Apr 2011

    Key Management Systems for Sensor Networks in the Context of the Internet of Things

    If a Wireless Sensor Network (WSN) is to be completely integrated into the Internet as part of the Internet of Things (IoT), it is necessary to consider various security challenges, such as the creation of a secure channel between an Internet host and a sensor node. In order to create...

    Provided By Malaga University

  • White Papers // May 2010

    A Cross-Layer Approach for Integrating Security Mechanisms in Sensor Networks Architectures

    The Wireless Sensor Networks (WSN) paradigm is especially vulnerable against external and internal attacks. Therefore, it is necessary to develop security mechanisms and protocols to protect them. These mechanisms must become an integral part of the software architecture and network stack of a sensor node. A question that remains is...

    Provided By Malaga University

  • White Papers // Feb 2011

    On the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks

    Wireless sensors are battery-powered devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is their main limitation, they require considerable energy to communicate data. Due to this, it turns out that the energy saving of computationally inexpensive primitives (like symmetric key cryptography)...

    Provided By Malaga University

  • White Papers // Feb 2011

    Trust and Reputation Systems for Wireless Sensor Networks

    The concept of trust has become very relevant in the late years as a consequence of the growth of fields such as internet transactions or electronic commerce. In general, trust has become of paramount importance for any kind of distributed networks, such as Wireless Sensor Networks (WSN in the following)....

    Provided By Malaga University

  • White Papers // Feb 2011

    Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks

    As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can influence the security mechanisms. This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications,...

    Provided By Malaga University

  • White Papers // Jan 2011

    A Service-Oriented Approach to Facilitate Real-Time WSAN Application Development

    Due to the complex nature of developing Wireless Sensor and Actor Network (WSAN) applications it is obvious that new frameworks, tools, middleware and higher level abstractions are needed to make the task of the developers easier. Depending on the WSAN system the authors want to develop, different characteristics must be...

    Provided By Malaga University

  • White Papers // Feb 2011

    Trust Management Systems for Wireless Sensor Networks: Best Practices

    Wireless Sensor Networks (WSN) have been proven a useful technology for perceiving information about the physical world and as a consequence has been used in many applications such as measurement of temperature, radiation, flow of liquids, etc. The nature of this kind of technology, and also their vulnerabilities to attacks...

    Provided By Malaga University

  • White Papers // Feb 2011

    A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems

    Nowadays, critical control systems are a fundamental component contributing to the overall performance of critical infrastructures in the society, most of which belong to the industrial sector. These complex systems include in their design different types of ICT (Information and Communication Technology) systems, such as Wireless (Mesh) Sensor Networks, to...

    Provided By Malaga University

  • White Papers // Feb 2011

    Integrating Wireless Sensor Networks and the Internet: A Security Analysis

    If a computer system needs to obtain data from a certain environment, one of the tools that may be used is wireless sensor networks, also known as sensor networks or WSN. The elements of these networks, the sensor nodes, can measure various physical properties like temperature and radiation, and produce...

    Provided By Malaga University

  • White Papers // Feb 2011

    The Role of Wireless Sensor Networks in the Area of Critical Information Infrastructure Protection

    Critical Infrastructures, such as energy, banking, and transport, are an essential pillar to the well-being of the national and international economy, security and quality of life. These infrastructures are dependent on a spectrum of highly-interconnected information infrastructures for their smooth, reliable and continuous operation. The field of protecting such Critical...

    Provided By Malaga University

  • White Papers // Apr 2011

    Identity Management Challenges for Intercloud Applications

    Intercloud notion is gaining a lot of attention lately from both enterprise and academia, not only because of its benefits and expected results but also due to the challenges that it introduces regarding interoperability and standardisation. Identity management services are one of the main candidates to be outsourced into the...

    Provided By Malaga University

  • White Papers // Jan 2011

    Source Location Privacy Considerations in Wireless Sensor Networks

    Wireless sensor networks is considered to be one of the cornerstones of Ambient Intelligence since they can be used in countless applications, where sensors are unobtrusively embedded into the environment to perform operations like monitoring, tracking and reporting. In such scenarios, privacy issues must be carefully considered since the mere...

    Provided By Malaga University

  • White Papers // Dec 2009

    Do Wireless Sensor Networks Need to Be Completely Integrated Into the Internet?

    Wireless sensor networks are considered as an integral part of the Internet of Things paradigm. Not only they provide a virtual presence to elements of the real world, but also allow any computational system to know about the physical state of those elements thanks to the use of embedded sensors....

    Provided By Malaga University

  • White Papers // Feb 2011

    Secure Integration of RFID Technology in Personal Documentation for Seamless Identity Validation

    Seamless human identification and authentication in the information system is a fundamental step towards the transparent interaction between the user and its context proposed in ambient intelligence. Due to this, the IDENTICA project is aimed to the design and implementation of a distributed authentication platform based on biometrics (i.e. voice...

    Provided By Malaga University

  • White Papers // Apr 2011

    An Evaluation of the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks

    Wireless sensors are battery-powered devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is their main limitation, they require considerable energy to communicate data. Due to this, the energy saving of computationally inexpensive security primitives (like those using symmetric key cryptography) can...

    Provided By Malaga University

  • White Papers // Sep 2013

    A Framework for Enabling Trust Requirements in Social Cloud Applications

    Cloud applications entail the provision of a huge amount of heterogeneous, geographically-distributed resources managed and shared by many different stakeholders who often do not know each other beforehand. This raises numerous security concerns that, if not addressed carefully, might hinder the adoption of this promising computational model. Appropriately dealing with...

    Provided By Malaga University

  • White Papers // Oct 2013

    WASAM: A Dynamic Wide-Area Situational Awareness Model for Critical Domains in Smart Grids

    Control from anywhere and at anytime is nowadays a matter of paramount importance in critical systems. This is the case of the smart grid and its domains which should be monitored through intelligent and dynamic mechanisms able to anticipate detect and respond before disruptions arise within the system. Given this...

    Provided By Malaga University

  • White Papers // Apr 2013

    On the Features and Challenges of Security & Privacy in Distributed Internet of Things

    In the internet of things, services can be provisioned using centralized architectures, where central entities acquire, process, and provide information. Alternatively, distributed architectures, where entities at the edge of the network exchange information and collaborate with each other in a dynamic way, can also be used. In order to understand...

    Provided By Malaga University

  • White Papers // Sep 2013

    Analysis and Taxonomy of Security/QoS Tradeoff Solutions for the Future Internet

    Motivated by the growing convergence of diverse types of networks and the rise of concepts such as Future Internet (FI), in this paper the authors analyze the coexistence of security mechanisms and Quality of Service (QoS) mechanisms in resource-constrained networks that are relevant types of networks within the FI environment....

    Provided By Malaga University

  • White Papers // Oct 2013

    A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms

    Today, mobile platforms are multimedia devices that provide different types of traffic with the consequent particular performance demands and, besides, security concerns (e.g. privacy). However, security and QoS requirements quite often conflict to a large degree; the mobility and heterogeneous paradigm of the future internet makes coexistence even more difficult,...

    Provided By Malaga University

  • White Papers // Oct 2013

    (Un)Suitability of Anonymous Communication Systems to WSN

    Anonymous communication systems have been extensively studied by the research community to prevent the disclosure of sensitive information from the analysis of individuals' traffic patterns. Many remarkable solutions have been developed in this area, most of which have proven to be effective in the protection of user privacy against different...

    Provided By Malaga University

  • White Papers // Nov 2013

    Covert Communications Through Network Configuration Messages

    Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in multi-level security systems in the early 70's they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. In this paper the authors...

    Provided By Malaga University

  • White Papers // Oct 2013

    Smart Control of Operational Threats in Control Substations

    Any deliberate or unsuitable operational action in control tasks of critical infrastructures, such as energy generation, transmission and distribution systems that comprise sub-domains of a smart grid, could have a significant impact on the digital economy: without energy, the digital economy cannot live. In addition, the vast majority of these...

    Provided By Malaga University

  • White Papers // Oct 2013

    Security of Industrial Sensor Network-Based Remote Substations in the Context of the Internet of Things

    The main objective of remote substations is to provide the central system with sensitive information from critical infrastructures, such as generation, distribution or transmission power systems. Wireless sensor networks have been recently applied in this particular context due to their attractive services and inherent benefits, such as simplicity, reliability and...

    Provided By Malaga University

  • White Papers // Oct 2013

    Analysis of Requirements for Critical Control Systems

    Technological convergence in control and acquisition tasks in critical control systems has become a cutting-edge topic in recent years. Modernization not only offers a way of increasing operational performance but it also infers greater security issues and associated risks. Although there currently is an important diversity of studies dealing with...

    Provided By Malaga University