Search Results - "Ramos Hernandez, L"
-
1
Privacy-Preserving Solutions for Blockchain: Review and Challenges
Published in IEEE access (2019)“…Blockchains offer a decentralized, immutable and verifiable ledger that can record transactions of digital assets, provoking a radical change in several…”
Get full text
Journal Article -
2
Toward a Lightweight Authentication and Authorization Framework for Smart Objects
Published in IEEE journal on selected areas in communications (01-04-2015)“…The Internet of Things (IoT) represents the current technology revolution that is intended to transform the current environment into a more pervasive and…”
Get full text
Journal Article -
3
A Survey on Digital Certificates Approaches for the COVID-19 Pandemic
Published in IEEE access (2021)“…Digital COVID-19 certificates serve as reliable proof that an individual was vaccinated, tested negative, or healed from COVID-19, facilitating health,…”
Get full text
Journal Article -
4
Integrating LPWAN Technologies in the 5G Ecosystem: A Survey on Security Challenges and Solutions
Published in IEEE access (2020)“…The convergence of the Internet of Things (IoT) and 5G will open a range of opportunities for the deployment of enhanced sensing, actuating and interactive…”
Get full text
Journal Article -
5
Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles
Published in Symmetry (Basel) (01-09-2020)“…It has been proven in research literature that the analysis of encrypted traffic with statistical analysis and machine learning can reveal the type of…”
Get full text
Journal Article -
6
Defining the Behavior of IoT Devices Through the MUD Standard: Review, Challenges, and Research Directions
Published in IEEE access (2021)“…With the strong development of the Internet of Things (IoT), the definition of IoT devices' intended behavior is key for an effective detection of potential…”
Get full text
Journal Article -
7
A Lightweight and Flexible Encryption Scheme to Protect Sensitive Data in Smart Building Scenarios
Published in IEEE access (01-01-2018)“…Smart buildings represent key environments to encourage the growth of more sustainable and efficient cities. With the strong development of the Internet of…”
Get full text
Journal Article -
8
Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices
Published in Computer standards and interfaces (01-02-2019)“…•The proposed approach is intended to assess the security level of an IoT device.•As one of the main results of the process, a proposed security label is…”
Get full text
Journal Article -
9
Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach
Published in Sensors (Basel, Switzerland) (05-06-2018)“…Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet…”
Get full text
Journal Article -
10
DCapBAC: embedding authorization logic into smart things through ECC optimizations
Published in International journal of computer mathematics (01-02-2016)“…In recent years, the increasing development of wireless communication technologies and IPv6 is enabling a seamless integration of smart objects into the…”
Get full text
Journal Article -
11
Intrusion Detection Based on Privacy-Preserving Federated Learning for the Industrial IoT
Published in IEEE transactions on industrial informatics (01-02-2023)“…Federated learning (FL) has attracted significant interest given its prominent advantages and applicability in many scenarios. However, it has been…”
Get full text
Journal Article -
12
Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things
Published in Sensors (Basel, Switzerland) (01-07-2015)“…As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to…”
Get full text
Journal Article -
13
Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges
Published in Computer networks (Amsterdam, Netherlands : 1999) (11-02-2022)“…The application of Machine Learning (ML) techniques to the well-known intrusion detection systems (IDS) is key to cope with increasingly sophisticated…”
Get full text
Journal Article -
14
Federated Cyberattack Detection for Internet of Things-Enabled Smart Cities
Published in Computer (Long Beach, Calif.) (01-12-2022)“…While attack detection is key to realize trustworthy smart cities, the use of large amounts of network traffic data by machine learning techniques can lead to…”
Get full text
Journal Article -
15
A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy
Published in International journal of distributed sensor networks (01-08-2017)“…Current worldwide energy challenges require the synergy of multidisciplinary actions and activities affecting different stakeholders, such as governments,…”
Get full text
Journal Article -
16
Application Layer Key Establishment for End-to-End Security in IoT
Published in IEEE internet of things journal (01-03-2020)“…In most Internet of Things (IoT) deployments, intermediate entities are usually employed for efficiency and scalability reasons. These intermediate proxies…”
Get full text
Journal Article -
17
IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond
Published in IT professional (01-09-2023)“…The global landscape has been reshaped by the COVID-19 pandemic, causing unprecedented health, economic, and societal disruptions. In this transformative…”
Get full text
Journal Article -
18
Federated Transfer Learning for Energy Efficiency in Smart Buildings
Published in IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (20-05-2023)“…Nowadays, the generation of energy consumption models in buildings needs to address several issues. Indeed, most existing buildings lack the appropriate…”
Get full text
Conference Proceeding -
19
Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts
Published in Security and communication networks (02-06-2022)“…The increase in the interconnection of physical devices and the emergence of the 5 G paradigm foster the generation and distribution of massive amounts of…”
Get full text
Journal Article -
20
Opportunistic smart object aggregation based on clustering and event processing
Published in 2016 IEEE International Conference on Communications (ICC) (01-05-2016)“…In the envisioned Internet of Things ecosystems, Smart objects are intended to create groups of devices in order to provide higher level services to be…”
Get full text
Conference Proceeding