2023
Authors
Masouros, D; Soudris, D; Gardikis, G; Katsarou, V; Christopoulou, M; Xilouris, G; Ramón, H; Pastor, A; Scaglione, F; Petrollini, C; Pinto, A; Vilela, JP; Karamatskou, A; Papadakis, N; Angelogianni, A; Giannetsos, T; García Villalba, LJ; Alonso López, JA; Strand, M; Grov, G; Bikos, AN; Ramantas, K; Santos, R; Silva, F; Tsampieris, N;
Publication
Embedded Computer Systems: Architectures, Modeling, and Simulation - 23rd International Conference, SAMOS 2023, Samos, Greece, July 2-6, 2023, Proceedings
Abstract
The advent of 6G networks is anticipated to introduce a myriad of new technology enablers, including heterogeneous radio, RAN softwarization, multi-vendor deployments, and AI-driven network management, which is expected to broaden the existing threat landscape, demanding for more sophisticated security controls. At the same time, privacy forms a fundamental pillar in the EU development activities for 6G. This decentralized and globally connected environment necessitates robust privacy provisions that encompass all layers of the network stack. In this paper, we present PRIVATEER’s approach for enabling “privacy-first” security enablers for 6G networks. PRIVATEER aims to tackle four major privacy challenges associated with 6G security enablers, i.e., i) processing of infrastructure and network usage data, ii) security-aware orchestration, iii) infrastructure and service attestation and iv) cyber threat intelligence sharing. PRIVATEER addresses the above by introducing several innovations, including decentralised robust security analytics, privacy-aware techniques for network slicing and service orchestration and distributed infrastructure and service attestation mechanisms. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2023.
2023
Authors
Martins, O; Vilela, JP; Gomes, M;
Publication
2023 IEEE 24TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM
Abstract
With the recent advancements in wireless networks, Joint Communication and Sensing (JCAS) has become a growing field that is expected to be included in next-generation standards. However, not only is the current performance of the sensing ability still lacking to be used in real-world scenarios, proper security of such privacy-invasive technology has not been fully explored. To this end, we propose the creation of a more robust framework, capable of cross-domain detection and long-term analysis for improved detection, which will also serve as the basis for a security and privacy analysis of the threat landscape and solutions in this field.
2011
Authors
Vilela, JP; Pinto, PC; Barros, J;
Publication
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Abstract
Signal interference and packet collisions are typically viewed as negative factors that hinder wireless communication networks. When security is the primary concern, signal interference may actually be very helpful. Starting with a stochastic network model, we are able to show that packet collisions caused by jamming nodes can indeed be used effectively to attain new levels of secrecy in multiterminal wireless environments. To this effect, we propose a practical jamming protocol that uses the well-known request-to-send/clear-to-send (RTS/CTS) handshake of the IEEE 802.11 standard as a signaling scheme. Various jammer selection strategies are investigated depending on the position of source, destination, and jamming nodes. The goal is to cause asmuch interference as possible to eavesdroppers that are located in unknown positions, while limiting the interference observed by the legitimate receiver. To evaluate the performance of each strategy, we introduce and compute a measure for the secure throughput. Our results show that jamming can increase the levels of secrecy significantly albeit at a substantial cost in terms of energy efficiency.
2011
Authors
Vilela, JP; Bloch, M; Barros, J; McLaughlin, SW;
Publication
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Abstract
Inspired by recent results on information-theoretic security, we consider the transmission of confidential messages over wireless networks, in which the legitimate communication partners are aided by friendly jammers. We characterize the security level of a confined region in a quasi-static fading environment by computing the probability of secrecy outage in connection with two new measures of physical-layer security: the jamming coverage and the jamming efficiency. Our analysis for various jamming strategies based on different levels of channel state information provides insight into the design of optimal jamming configurations and shows that a single jammer is not sufficient to maximize both figures of merit simultaneously. Moreover, a single jammer requires full channel state information to provide security gains in the vicinity of the legitimate receiver.
2007
Authors
Vilela, JP; Barros, J;
Publication
2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS
Abstract
We consider the problem of securing routing information in Mobile Ad-hoc Networks (MANETs). Focusing on the Optimized Link State Routing protocol, we devise a feedback reputation mechanism which assesses the integrity of routing control traffic by correlating local routing data with feedback messages sent by the receivers of control traffic. Based on this assessment, misbehaving nodes are shown to be reliably detected and can be adequately punished in terms of their ability to communicate through the network. To the best of our knowledge, this is the first practical implementation of a reputation mechanism in a standardized proactive routing protocol for MANETs.
2007
Authors
Sargento, S; Sarro, R; Duarte, R; Stupar, P; Gallera, F; Natkaniec, M; Vilela, JP; Barros, J;
Publication
2007 PROCEEDINGS OF THE 16TH IST MOBILE AND WIRELESS COMMUNICATIONS, VOLS 1-3
Abstract
The increasing requirement for ubiquitous access of the users, enable the seamless support of different networks, with different technologies, and also with different types, such as moving networks and ad-hoc networks. This paper describes the Ad-hoc network integration architecture being developed inside the IST project Daidalos II. The main purpose of this architecture is to seamlessly support the movement of nodes between ad-hoc and infrastructure networks, maintaining in the ad-hoc networks all the features being supported in the infrastructure, such as, efficient routing for unicast and multicast flows, distributed QoS mechanisms' security, and seamless mobility, including multihoming support.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.