Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by Pedro Filipe Pinto

2020

MEC vs MCC: Performance analysis of interactive and real-time applications [MEC vs MCC: Análise do desempenho de aplicações interativas e de tempo real]

Authors
Soares, M; Pinto, P; Mamede, J;

Publication
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao

Abstract
Telecommunication networks evolution is driving the development of new applications for mobile devices. Some of these applications are resource-intensive and push computational and energy demands of mobile devices beyond the mobile hardware capabilities. In this context, Mobile Cloud Computing (MCC) architecture emerges as a solution for offloading mobile devices that allows to execute these applications in cloud datacenters thus reducing the processing demand in mobile devices. However, more demanding applications, e.g. interactive and realtime applications, are sensitive to processing and communications delay. For these applications, Mobile Edge Computing (MEC) can be used as an intermediary technology, providing computing and storage resources in the network edge. This paper presents a study carried out to evaluate the performance of MEC and MCC architectures when executing two applications, Fluid and FaceSwap, representative of real time and computing intensive applications. A set of scenarios were designed to quantify the performance of these architectures in different settings.

2021

A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited

Authors
Araújo, R; Pinto, A; Pinto, P;

Publication
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings

Abstract
Vulnerability scanning tools can help secure the computer networks of organisations. Triggered by the release of the Tsunami vulnerability scanner by Google, the authors analysed and compared the commonly used, free-to-use vulnerability scanners. The performance, accuracy and precision of these scanners are quite disparate and vary accordingly to the target systems. The computational, memory and network resources required be these scanners also differ. We present a recent and detailed comparison of such tools that are available for use by organisations with lower resources such as small and medium-sized enterprises. © 2021, IFIP International Federation for Information Processing.

2021

Security Vulnerabilities in LPWANs-An Attack Vector Analysis for the IoT Ecosystem

Authors
Torres, N; Pinto, P; Lopes, SI;

Publication
APPLIED SCIENCES-BASEL

Abstract
Due to its pervasive nature, the Internet of Things (IoT) is demanding for Low Power Wide Area Networks (LPWAN) since wirelessly connected devices need battery-efficient and long-range communications. Due to its low-cost and high availability (regional/city level scale), this type of network has been widely used in several IoT applications, such as Smart Metering, Smart Grids, Smart Buildings, Intelligent Transportation Systems (ITS), SCADA Systems. By using LPWAN technologies, the IoT devices are less dependent on common and existing infrastructure, can operate using small, inexpensive, and long-lasting batteries (up to 10 years), and can be easily deployed within wide areas, typically above 2 km in urban zones. The starting point of this work was an overview of the security vulnerabilities that exist in LPWANs, followed by a literature review with the main goal of substantiating an attack vector analysis specifically designed for the IoT ecosystem. This methodological approach resulted in three main contributions: (i) a systematic review regarding cybersecurity in LPWANs with a focus on vulnerabilities, threats, and typical defense strategies; (ii) a state-of-the-art review on the most prominent results that have been found in the systematic review, with focus on the last three years; (iii) a security analysis on the recent attack vectors regarding IoT applications using LPWANs. Results have shown that LPWANs communication technologies contain security vulnerabilities that can lead to irreversible harm in critical and non-critical IoT application domains. Also, the conception and implementation of up-to-date defenses are relevant to protect systems, networks, and data.

2021

Smart & Sustainable Mobility on Campus: A secure IoT tracking system for the BIRA Bicycle

Authors
Torres, N; Martins, P; Pinto, P; Lopes, SI;

Publication
PROCEEDINGS OF 2021 16TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2021)

Abstract
Changing mobility behaviors in academia - such as encouraging the use of bicycles - can help to reduce CO2 emissions since trips made by car or motorbikes tend to effectively reduce. Additionally, by obtaining mobility-related data we can infer patterns, optimize mobility and strengthen more sustainable habits within academia. In this paper, we propose a secure LoRa-based tracking system for the BIRA bicycle. The BIRA bicycle is an initiative of Instituto Politecnico de Viana do Castelo (IPVC) that aims to promote bicycle usage on campus, by encouraging the adoption of more sustainable mobility habits within the institution. The proposed system consists of BIRA bicycles equipped with low-cost GPS trackers. The collected data is then transmitted using a LoRaWAN infrastructure to an application server, which is responsible for storing and serving the client application with several contextual information, such as location, route, speed, and battery level. The results have shown that the proposed system is a viable low-cost solution for tracking bicycles and users' habits at a campus or even a city level.

2021

Special Issue "Security Threats and Countermeasures in Cyber-Physical Systems"

Authors
Hammoudeh, M; Watters, P; Epiphaniou, G; Kayes, ASM; Pinto, P;

Publication
JOURNAL OF SENSOR AND ACTUATOR NETWORKS

Abstract
Wireless, sensor and actuator technologies are often central to sensing or communication critical systems [...]

2020

The Use of ARM-Assembly Language and a Raspberry Pi 1 B+ as a Server to Improve Computer Architecture Skills

Authors
Ferreira, VM; Pinto, P; Paiva, S; de Brito, MJA;

Publication
First International Computer Programming Education Conference, ICPEC 2020, June 25-26, 2020, ESMAD, Vila do Conde, Portugal (Virtual Conference).

Abstract
Prompting students' interest and engagement in learning environments is crucial to achieve the best results. Academia and educators in general are constantly adapting materials and methodologies in order to maximise the acquisition of contents by their students. In this case-study, a new teaching/learning methodology is presented and evaluated through a final questionnaire survey. This case-study aims to understand students' efficiency and motivation levels regarding a new teaching/learning methodology adopted in the second module of a Computer Systems and Architectures course attended by first-year Computer Sciences undergraduates. The new teaching/learning methodology relies on a specific programming language-ARMv6 assembly-to improve students' efficiency levels, and an innovative always-visible in-class mobile test scenario, implemented through a low-cost computing platform-Raspberry Pi 1 B+- A s a server, mimicking as much as possible a real-life environment, so that students believe they are working on real hardware, thus enhancing their motivation levels. The results of the questionnaire survey allowed to infer that the use of a specific programming language, such as ARMv6 assembly, coupled with a new always-visible in-class mobile test scenario were in fact efficient in raising the levels of motivation among Computer Sciences students and, consequently, improved their skills in Computer Architecture. 2012 ACM Subject Classification Computer systems organization.

  • 3
  • 11