2021
Autores
Cohen, A; Esfahanizadeh, H; Sousa, B; Vilela, JP; Luis, M; Raposo, D; Michel, F; Sargento, S; Medard, M;
Publicação
IEEE COMMUNICATIONS MAGAZINE
Abstract
Modern communications have moved away from point-to-point models to increasingly heterogeneous network models. In this article, we propose a novel controller-based architecture to deploy adaptive causal network coding in heterogeneous and highly meshed communication networks. Specifically, we consider using the software-defined network as the main controller. We first present an architecture for highly meshed heterogeneous multi-source multi-destination networks that represent the practical communication networks encountered in the fifth generation of wireless networks and beyond. Next, we present a promising solution to deploy network coding over the new architecture. We also present a new controller-based setting with which network coding modules communicate to attain the required information. Finally, we briefly discuss how the proposed architecture and network coding solution provide a good opportunity for future technologies.
2021
Autores
Silva, C; Sousa, B; Vilela, JP;
Publicação
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I
Abstract
Software Defined Networking (SDN) facilitates the orchestration and configuration of network resources in a flexible and scalable form, where policies are managed by controller components that interact with network elements through multiple interfaces. The ubiquitous adoption of SDN leads to the availability of multiple SDN controllers, which have different characteristics in terms of performance and security support. SDN controllers are a common target in network attacks since their compromise leads to the capability of impairing the entire network. Thus, the choice of a SDN controller must be a meticulous process from early phases (design to production). CROCUS, herein proposed, provides a mechanism to enable an objective assessment of the security support of SDN controllers. CROCUS relies on the information provided by the Common Vulnerability Scoring System (CVSS) and considers security features derived from scenarios with stringent security requirements. Considering a vehicular communication scenario supported by multiple technologies, we narrow the selection of SDN controllers to OpenDayLight and ONOS choices. The results put in evidence that both controllers have security features relevant for demanding scenarios with ONOS excelling in some aspects.
2021
Autores
Giddens, S; Gomes, MAC; Vilela, JP; Santos, JL; Harrison, WK;
Publicação
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021)
Abstract
Current methods for optimization of low-density parity-check (LDPC) codes analyze the degree distribution pair asymptotically as block length approaches infinity. This effectively ignores the discrete nature of the space of valid degree distribution pairs for LDPC codes of finite block length. While large codes are likely to conform reasonably well to the infinite block length analysis, shorter codes have no such guarantee. We present and analyze an algorithm for completely enumerating the space of all valid degree distribution pairs for a given block length, code rate, maximum variable node degree, and maximum check node degree. We then demonstrate this algorithm on an example LDPC code of finite block length. Finally, we discuss how the result of this algorithm can be utilized by discrete optimization routines to form novel methods for the optimization of small block length LDPC codes.
2021
Autores
Cunha, M;
Publicação
SenSys 2021 - Proceedings of the 2021 19th ACM Conference on Embedded Networked Sensor Systems
Abstract
Due to the pervasiveness of Interconnected devices, large amounts of heterogeneous data types are being continuously collected. Regardless of the benefits that come from sharing data, exposing sensitive and private information arises serious privacy concerns. To prevent unwanted disclosures and, hence, to protect users' privacy, several privacy-preserving mechanisms have been proposed. However, the data heterogeneity and the inherent correlations among the different data types have been disregarded when developing such mechanisms. Our goal is to develop privacy-preserving mechanisms that are suitable for data heterogeneity and data correlation. These aspects will also be considered to develop mechanisms to achieve private learning. © 2021 Owner/Author.
2020
Autores
Shehu, AS; Pinto, A; Correia, ME;
Publicação
PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1
Abstract
The evolutionary growth of information technology has enabled us with platforms that eases access to a wide range of electronic services. Typically, access to these services requires users to authenticate their identity, which involves the release, dissemination and processing of personal data by third parties such as service and identity providers. The involvement of these and other entities in managing and processing personal identifiable data has continued to raise concerns on privacy of personal information. Identity management systems (IdMs) emerged as a promising solution to address major access control and privacy issues, however most research works are focused on securing service providers (SPs) and the services provided, with little emphases on users privacy. In order to optimise users privacy and ensure that personal information are used only for intended purposes, there is need for authorisation systems that controls who may access what and under what conditions. However, for adoption data owners perspective must not be neglected. To address these issues, this paper introduces the concept of IdM and access control framework which operates with RESTful based services. The proposal provides a new level of abstraction and logic in access management, while giving data owner a decisive control over access to personal data using smartphone. The framework utilises Attribute based access control (ABAC) method to authenticate and authorise users, Open ID Connect (OIDC) protocol for data owner authorisation and Public-key cryptography to achieve perfect forward secrecy communication. The solution enables data owner to attain the responsibility of granting or denying access to their data, from a secured communication with an identity provider using a digitally signed token.
2020
Autores
Carreira, R; Pinto, P; Pinto, A;
Publicação
BLOCKCHAIN
Abstract
Payments using cryptocurrencies may require that the user is able to provide proof of ownership and proof of provenance for a specific transaction. In this paper an innovative web based solution is proposed as a framework that issues reports, on request, pertaining proof of ownership and proof of provenance. The proposed framework provides proof of ownership by using micro-payments and, when used recursively, it can produce provenance reports up to a defined granularity level of transactions. A proof of concept prototype of the proposed framework was implemented and its operation and output is presented and explained. Some limitations and future work directions are also identified.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.