2019
Autores
Canuto, L; Santos, L; Vieira, L; Goncalves, R; Rabadao, C;
Publicação
2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)
Abstract
The development of technology brought an exponential evolution of IoT networks, and with a number of different devices connected to the Internet, meaning, more IP addresses, traffic and devices susceptible to attacks. These types of networks are characterized by their interoperability and low resources, making it a complex ecosystem and making it difficult to implement management and monitoring measures, leading to a lack of security. Considering the impact that IoT networks have on the market, their protection is essential and, is now one of the themes in constant evolution. With the focus on security, this work aims to characterize a CoAP and CoAPS signatures, through the analysis of a flow in a test scenario and recognize the types of messages of the signature and what is their impact on the network and later creating rules that could help an IDS, in order to save resources and time. When analyzing the flows, it was concluded that it is possible to identify some characteristics of a signature, such as identifying Confirmable and Non-Confirmable messages.
2019
Autores
Leal, R; Santos, L; Vieira, L; Goncalves, R; Rabadao, C;
Publicação
2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)
Abstract
The number of IoT devices and the volume of network traffic has grown continuously during the past years. IoT devices are smart devices designed with simple functions in mind, like collecting the temperature or opening a door. However, IoT devices lack a good security layer due to lack of resources: small memory, processor and/or battery. Consequently, new potential attacks and security problems have arisen. In order to detect and mitigate these security problems Intrusion Detection Systems (IDS) can be used, However, abnormal traffic must be distinguished from normal IoT patterns. In this article, a study was done on characterization of traffic signatures of two typical IoT application protocols - MQTT and MQTTS - with the objective of generating and collecting IP flows of said traffic. An IoT application scenario was simulated and using the traffic collected, an analysis of MQTT and MQTTS flows were elaborated to identify flow-based signatures that could be used to identify the network traffic of IoT application protocols.
2019
Autores
Vieira, L; Santos, L; Goncalves, R; Rabadao, C;
Publicação
2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)
Abstract
At the time of more and more devices being connected to the internet, personal and sensitive information is going around the network more than ever. Thus, security and privacy regarding IoT communications, devices, and data are a concern due to the diversity of the devices and protocols used. Since traditional security mechanisms cannot always be adequate due to the heterogeneity and resource limitations of IoT devices, we conclude that there are still several improvements to be made to the 2nd line of defense mechanisms like Intrusion Detection Systems. Using a collection of IP flows, we can monitor the network and identify properties of the data that goes in and out. Since network flows collection have a smaller footprint than packet capturing, it makes it a better choice towards the Internet of Things networks. This paper aims to study IP flow properties of certain network attacks, with the goal of identifying an attack signature only by observing those properties.
2019
Autores
Matos, P; Rocha, J; Gonçalves, R; Almeida, Ad; Santos, F; Abreu, D; Martins, C;
Publicação
Ambient Intelligence - Software and Applications -,10th International Symposium on Ambient Intelligence, ISAmI 2019, Ávila, Spain, 26-28 June 2019.
Abstract
Over the last decades Information and Communication Technologies (ICTs) are increasingly being used in sports, especially in football, aiming to improve the athletes training and results. However, training systems for young athletes do not have, for the most part, learning abilities in order to adapt, evolve and find new training recommendations, designed specifically for each young athlete. In this paper introduce the Smart Coach user adaptation model, and whose main goal is to present our hybrid recommendation system to help young athletes evolve. This facilitate the interaction between members of a club technical staff and their young athletes, reinforcing the young person counselling, and their potential as an athlete. © Springer Nature Switzerland AG 2020.
2019
Autores
Brandão, A; Mamede, HS; Gonçalves, R;
Publicação
New Knowledge in Information Systems and Technologies - Volume 1, World Conference on Information Systems and Technologies, WorldCIST 2019, Galicia, Spain, 16-19 April, 2019
Abstract
This article presents a literature review and the discussion about the key concepts associated with data markets. Data markets have multiple centralized and decentralized approaches. The main problem is the trust and reliability of supplies, inflows, and suppliers. The proposed study object is the decentralized marketplace data supported by Blockchain technology to ensure confidence in the supply chain of data, in the actors involved in the market and the data sources. The application scenarios are proposed in a model with four levels, data provision, data delivery, rights management, and producer internal sources. That will be done with Blockchain technology, through contracting using smart contracts, the controlled delivery of data by the data producers, the management of flows of data, and access control to data. © 2019, Springer Nature Switzerland AG.
2019
Autores
Carneiro, M; Branco, F; Gonçalves, R; Yong Oliveira, MA; Moreira, F; Martins, J;
Publicação
Learning and Collaboration Technologies. Ubiquitous and Virtual Environments for Learning and Collaboration - 6th International Conference, LCT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings, Part II
Abstract
Today’s society presents a fast development marked by the digital era, where the sharing, disclosure and access to information is made through information and communication technologies. The use of mobile applications is growing exponentially, spreading to the most varied social classes and everyday activity areas. Worldwide, its use in the most variety of services, has been increasing significantly. Given that, it is essential that mobile applications are accessible in a way that allows access conditions and equal opportunities to all the users. With this study we present indicators regarding the state of accessibility in mobile applications through the evaluation of five Portuguese public administration applications. The methodology used was a fully manual evaluation through a proposal of a model of evaluation divided by quantitative and qualitative requirements created by us, as well as the use of functionalities such as VoiceOver and TalkBack. Taking into account that the study initially proposed on accessibility in mobile applications is the first to be carried out in Portugal and one of the few currently worldwide, it is believed that its content may help, in some way, to raise awareness of the state of accessibility in the Portuguese mobile applications, to create measures that make these applications more accessible to all and that this work could be taken into account in future studies of the topic. © 2019, Springer Nature Switzerland AG.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.