Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Interest
Topics
Details

Details

  • Name

    Jaime Dias
  • Role

    Service Manager
  • Since

    01st October 2000
001
Publications

2017

Mistrustful P2P: Deterministic privacy-preserving P2P file sharing model to hide user content interests in untrusted peer-to-peer networks

Authors
da Silva, PM; Dias, J; Ricardo, M;

Publication
COMPUTER NETWORKS

Abstract
P2P networks endowed individuals with the means to easily and efficiently distribute digital media over the Internet, but user legal liability issues may be raised as they also facilitate the unauthorized distribution and reproduction of copyrighted material. Traditional P2P file sharing systems focus on performance and scalability, disregarding any privacy or legal issues that may arise from their use. Lacking alternatives, and unaware of the privacy issues that arise from relaying traffic of insecure applications, users have adopted anonymity systems for P2P file sharing. This work aims at hiding user content interests from malicious peers through plausible deniability. The Mistrustful P2P model is built on the concept of mistrusting all the entities participating in the P2P network, hence its name. It provides a deterministic and configurable privacy protection that relies on cover content downloads to hide user content interests, has no trust requirements, and introduces several mechanisms to prevent user legal liability and reduce network overhead while enabling timely content downloads. We extend previous work on the Mistrustful P2P model by discussing its legal and ethical framework, assessing its feasibility for more use cases, providing a security analysis, comparing it against a traditional P2P file sharing model, and further defining and improving its main mechanisms.

2017

Stub Wireless Multi-hop Networks using self-configurable Wi-Fi Basic Service Set Cascading

Authors
Julio, P; Ribeiro, F; Dias, J; Mamede, J; Campos, R;

Publication
2017 Wireless Days, WD 2017

Abstract
The increasing trend in wireless Internet access has been boosted by IEEE 802.11. However, the application scenarios are still limited by its short radio range. Stub Wireless Multi-hop Networks (WMNs) are a robust, flexible, and cost-effective solution to the problem. Yet, typically, they are formed by single radio mesh nodes and suffer from hidden node, unfairness, and scalability problems. We propose a simple multi-radio, multi-channel WMN solution, named Wi-Fi network Infrastructure eXtension-Dual-Radio (WiFIX-DR), to overcome these problems. WiFIX-DR reuses IEEE 802.11 built-in mechanisms and beacons to form a Stub WMN as a set of self-configurable interconnected Basic Service Sets (BSSs). Experimental results show the improved scalability enabled by the proposed solution when compared to single-radio WMNs. © 2017 IEEE.

2016

Evaluation of an RPL/6LoWPAN/IEEE 802.15.4g Solution for Smart Metering in an Industrial Environment

Authors
Dias, J; Ribeiro, F; Campos, R; Ricardo, M; Martins, L; Gomes, F; Carrapatoso, A;

Publication
2016 12TH ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES (WONS)

Abstract
This paper describes the evaluation of a multi-hop wireless networking solution for Smart Grid metering in an industrial environment. The solution relies on RPL, 6LoWPAN, and IEEE 802.15.4g protocols, and has been implemented using low-power and low-capacity devices. Also, it supports both TCP and UDP protocols to transport traffic from DLMS/COSEM Smart Grid metering applications. The experimental tests took place in an industrial environment during 20 days. The obtained results allowed the characterization and evaluation of the developed solution and can be used as a basis to evaluate other 6LoWPAN/IEEE 802.15.4g networking solutions.

2016

Mistrustful P2P: Privacy-preserving File Sharing Over Untrustworthy Peer-to-Peer Networks

Authors
da Silva, PM; Dias, J; Ricardo, M;

Publication
2016 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS

Abstract
Peer-to-Peer networks are extensively used for largescale file sharing. As more information flows through these networks, people are becoming increasingly concerned about their privacy. Traditional P2P file sharing systems provide performance and scalability at the cost of requiring peers to publicly advertise what they download. Several P2P privacyenhancing systems have been proposed but they still require peers to advertise, either fully or partially, what they download. Lacking alternatives, users have adopted anonymity systems for P2P file sharing, misunderstanding the privacy guarantees provided by such systems, in particular when relaying traffic of insecure applications such as BitTorrent. Our goal is to prevent any malicious peer(s) from ascertaining users' content interests so that plausible deniability always applies. We propose a novel P2P file sharing model, Mistrustful P2P, that (1) supports file sharing over open and untrustworthy P2P networks, (2) requires no trust between users by avoiding the advertisement of what peers download or miss, and (3) still ensures deterministic protection of user's interests against attacks of size up to a configured privacy protection level. We hope that our model can pave the ground for a new generation of privacyenhancing systems that take advantage of the new possibilities it introduces. We validate Mistrustful P2P through simulation, and demonstrate its feasibility.

2015

Storm: Rateless MDS erasure codes

Authors
da Silva, PM; Dias, J; Ricardo, M;

Publication
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

Abstract
Erasure codes have been employed in a wide range of applications to increase content availability, improve channel reliability, or to reduce downloading time. For several applications, such as P2P file sharing, MDS erasure codes are more suitable as the network is typically the most constrained resource, not the CPU. Rateless MDS erasure codes also enable to adjust encoding and decoding algorithms as function of dynamic variables to maximize erasure coding gains. State-of-the-art MDS erasure codes are either fixed-rate or have practical limitations. We propose Storm erasure codes, a rateless MDS construction of Reed- Solomon codes over the finite field (formula presented), where p is a Mersenne prime. To the best of our knowledge, we are the first to propose a rateless construction (n can be increased in steps of k) with (formula presented) encoding time complexity and min (formula presented) upper bound for decoding time complexity. We provide the complexity analysis of encoding and decoding algorithms and evaluate Storm’s performance.

Supervised
thesis

2016

Remote Control of Unmanned Aerial Vehicles Through the Internet and IEEE 802.11

Author
André Filipe Pinto Coelho

Institution
UP-FEUP

2015

SERVIÇO DE CORREIO ELETRÓNICO EM AMBIENTE MARÍTIMO UTILIZANDO REDES TOLERANTES AO ATRASO

Author
JOÃO MIGUEL DIAS RODRIGUES

Institution
IPP-ISEP