Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by Ramiro Gonçalves

2019

Flow Monitoring System for IoT Networks

Authors
Santos, L; Rabadão, C; Gonçalves, R;

Publication
New Knowledge in Information Systems and Technologies - Volume 2, World Conference on Information Systems and Technologies, WorldCIST 2019, Galicia, Spain, 16-19 April

Abstract
The big number of Internet of Things (IoT) devices, the lack of interoperability and the low accessibility of many of them in a vast heterogenous landscape will make it very hard to design specific monitor, manage and security measures and apply specific mechanism to IoT networks. Administration tasks like reporting, performance analysis, and anomaly detection also depend on monitoring for decision making. For that purpose, a solution used in IoT networks must be scalable and interoperable. In this work, we are concerned with the design of a real time monitoring system for IoT networks. To do this, after studying the various traditional network monitoring solutions, we concluded that there are still several developments to be made to this type of mechanism. The design proposed will consider the specific architecture of an IoT network, the scalability and heterogeneity of this type of environment, and the minimization of the use of resources. To do so, we considered the various network monitoring methods available and select a flow monitoring solution in an IoT network. After the presentation of a workflow for flow monitoring on IoT networks, the workflow was tested. By doing analysis of flows, rather than packets, we concluded that this type of solution could be more scalable and interoperable than traditional packet-based network monitoring, make it suitable in an IoT environment. © Springer Nature Switzerland AG 2019.

2019

CoAP flow signatures for the Internet of Things

Authors
Canuto, L; Santos, L; Vieira, L; Goncalves, R; Rabadao, C;

Publication
2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)

Abstract
The development of technology brought an exponential evolution of IoT networks, and with a number of different devices connected to the Internet, meaning, more IP addresses, traffic and devices susceptible to attacks. These types of networks are characterized by their interoperability and low resources, making it a complex ecosystem and making it difficult to implement management and monitoring measures, leading to a lack of security. Considering the impact that IoT networks have on the market, their protection is essential and, is now one of the themes in constant evolution. With the focus on security, this work aims to characterize a CoAP and CoAPS signatures, through the analysis of a flow in a test scenario and recognize the types of messages of the signature and what is their impact on the network and later creating rules that could help an IDS, in order to save resources and time. When analyzing the flows, it was concluded that it is possible to identify some characteristics of a signature, such as identifying Confirmable and Non-Confirmable messages.

2019

MQTT flow signatures for the Internet of Things

Authors
Leal, R; Santos, L; Vieira, L; Goncalves, R; Rabadao, C;

Publication
2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)

Abstract
The number of IoT devices and the volume of network traffic has grown continuously during the past years. IoT devices are smart devices designed with simple functions in mind, like collecting the temperature or opening a door. However, IoT devices lack a good security layer due to lack of resources: small memory, processor and/or battery. Consequently, new potential attacks and security problems have arisen. In order to detect and mitigate these security problems Intrusion Detection Systems (IDS) can be used, However, abnormal traffic must be distinguished from normal IoT patterns. In this article, a study was done on characterization of traffic signatures of two typical IoT application protocols - MQTT and MQTTS - with the objective of generating and collecting IP flows of said traffic. An IoT application scenario was simulated and using the traffic collected, an analysis of MQTT and MQTTS flows were elaborated to identify flow-based signatures that could be used to identify the network traffic of IoT application protocols.

2019

Identifying attack signatures for the Internet of Things An IP flow based approach

Authors
Vieira, L; Santos, L; Goncalves, R; Rabadao, C;

Publication
2019 14TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)

Abstract
At the time of more and more devices being connected to the internet, personal and sensitive information is going around the network more than ever. Thus, security and privacy regarding IoT communications, devices, and data are a concern due to the diversity of the devices and protocols used. Since traditional security mechanisms cannot always be adequate due to the heterogeneity and resource limitations of IoT devices, we conclude that there are still several improvements to be made to the 2nd line of defense mechanisms like Intrusion Detection Systems. Using a collection of IP flows, we can monitor the network and identify properties of the data that goes in and out. Since network flows collection have a smaller footprint than packet capturing, it makes it a better choice towards the Internet of Things networks. This paper aims to study IP flow properties of certain network attacks, with the goal of identifying an attack signature only by observing those properties.

2020

BlockU: Extended usage control in and for Blockchain

Authors
Khan, Y; Ali, T; Fariz, M; Moreira, F; Branco, F; Martins, J; Goncalves, R;

Publication
EXPERT SYSTEMS

Abstract
An electronic business transaction among untrusted bodies without consulting a mutually trusted party has remained widely accepted problem. Blockchain resolves this problem by introducing peer-to-peer network with a consensus algorithm and trusted ledger. Blockchain originally introduced for cryptocurrency that came with proof-of-work consensus algorithm. Due to some performance issues, scientists brought concept of permissioned Blockchain. Hyperledger Fabric is a permissioned Blockchain targeting business-oriented problems for industry. It is designed for efficient transaction execution over Blockchain with pluggable consensus model; however, there is limitation of rapid application development. Hyperledger introduced a new layer called Hyperledger Composer on top of the Fabric layer, which provides an abstract layer to model the business application readily and quickly. Composer provides a smart contract to extend the functionality and flexibility of Fabric layer and provides a way of communication with other systems to meet business requirements. Hyperledger Composer uses role-based access control (RBAC) model to secure access to its valuable assets. However, RBAC is not enough because many business deals require continuous assets monitoring. Our proposed model, BlockU, covers all possible access control models required by a business. BlockU can monitor assets continuously during transactions and updates attributes accordingly. Moreover, we incorporate hooks in Hyperledger Composer to implement extended permission model that provides extensive permission management capability on an asset. Subsequently, our proposed enhanced access control model is implemented with a minimal change to existing Composer code base and is backward compatible with the current security mechanism.

2019

Smart Coach - A Recommendation System for Young Football Athletes

Authors
Matos, P; Rocha, J; Gonçalves, R; Almeida, Ad; Santos, F; Abreu, D; Martins, C;

Publication
Ambient Intelligence - Software and Applications -,10th International Symposium on Ambient Intelligence, ISAmI 2019, Ávila, Spain, 26-28 June 2019.

Abstract
Over the last decades Information and Communication Technologies (ICTs) are increasingly being used in sports, especially in football, aiming to improve the athletes training and results. However, training systems for young athletes do not have, for the most part, learning abilities in order to adapt, evolve and find new training recommendations, designed specifically for each young athlete. In this paper introduce the Smart Coach user adaptation model, and whose main goal is to present our hybrid recommendation system to help young athletes evolve. This facilitate the interaction between members of a club technical staff and their young athletes, reinforcing the young person counselling, and their potential as an athlete. © Springer Nature Switzerland AG 2020.

  • 19
  • 35