Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por Nuno Alexandre Pereira

2016

Smartphone-based transport mode detection for elderly care

Autores
Cardoso N.; Madureira J.; Pereira N.;

Publicação
2016 IEEE 18th International Conference on e-Health Networking, Applications and Services, Healthcom 2016

Abstract
Smartphones are everywhere, and they are a very attractive platform to perform unobtrusive monitoring of users. In this work, we use common features of modern smartphones to build a human activity recognition (HAR) system for elderly care. We have built a classifier that detects the transport mode of the user including whether an individual is inactive, walking, in bus, in car, in train or in metro. We evaluated our approach using over 24 hours of transportation data from a group of 15 individuals. Our tests show that our classifier can detect the transportation mode with over 90% accuracy.

2016

Cyber-physical systems clouds: A survey

Autores
Chaâri, R; Ellouze, F; Koubâa, A; Qureshi, B; Pereira, N; Youssef, H; Tovar, E;

Publicação
Computer Networks

Abstract
Cyber-Physical Systems (CPSs) represent systems where computations are tightly coupled with the physical world, meaning that physical data is the core component that drives computation. Industrial automation systems, wireless sensor networks, mobile robots and vehicular networks are just a sample of cyber-physical systems. Typically, CPSs have limited computation and storage capabilities due to their tiny size and being embedded into larger systems. With the emergence of cloud computing and the Internet-of-Things (IoT), there are several new opportunities for these CPSs to extend their capabilities by taking advantage of the cloud resources in different ways. In this survey paper, we present an overview of research efforts on the integration of cyber-physical systems with cloud computing and categorize them into three areas: (1) remote brain, (2) big data manipulation, (3) and virtualization. In particular, we focus on three major CPSs namely mobile robots, wireless sensor networks and vehicular networks. © 2016 Elsevier B.V.

2018

A Framework for Web Application Integrity

Autores
Fortuna, P; Pereira, N; Butun, I;

Publicação
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY

Abstract
Due to their universal accessibility, interactivity and scaling ease, Web applications relying on client-side code execution are currently the most common form of delivering applications and it is likely that they will continue to enter into less common realms such as IoT-based applications. We reason that modern Web applications should be able to exhibit advanced security protection mechanisms and review the research literature that points to useful partial solutions. Then, we propose a framework to support such characteristics and the features needed to implement them, providing a roadmap for a comprehensive solution to support Web application integrity.

2018

Demystifying Security of LoRaWAN v1.1

Autores
Butun, I; Pereira, N; Gidlund, M;

Publicação

Abstract
LoRa and its upper layers definition LoRaWAN is one of the most promising LPWAN technologies for implementing the Internet of Things (IoT). Although being a popular technology, several works in the literature have revealed various weaknesses regarding the security of LoRaWAN v1.0 (the official 1st draft). By using all these recommendations from the academia and industry, the LoRa-Alliance has worked on the v1.0 to develop an enhanced version and provide more secure and trustable architecture. The result of these efforts ended-up with LoRaWAN v1.1, which was released on Oct 11, 2017. This manuscript aims at demystifying the security aspects and provide a comprehensive Security Risk Analysis related to latest version of LoRaWAN. Besides, it provides several remedies to the recognized vulnerabilities. To the best of authors’ knowledge, this work is one of its first kind by providing a detailed security analysis related to latest version of LoRaWAN. According to our analysis, end-device physical capture, rogue gateway and replay attacks are found to be threating for safety operation of the network. Eventually, v1.1 of LoRaWAN is found to be less vulnerable to attacks compared to v1.0, yet possesses several security implications that need to be addressed and fixed for the upcoming releases.

2018

Analysis of LoRaWAN v1.1 security

Autores
Butun, I; Pereira, N; Gidlund, M;

Publicação
Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects

Abstract

2018

A framework for web application integrity

Autores
Fortuna, P; Pereira, N; Butun, I;

Publicação
ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy

Abstract
Due to their universal accessibility, interactivity and scaling ease, Web applications relying on client-side code execution are currently the most common form of delivering applications and it is likely that they will continue to enter into less common realms such as IoT-based applications. We reason that modern Web applications should be able to exhibit advanced security protection mechanisms and review the research literature that points to useful partial solutions. Then, we propose a framework to support such characteristics and the features needed to implement them, providing a roadmap for a comprehensive solution to support Web application integrity. Copyright

  • 9
  • 11