@article {najerascn12, title = {User-centric secure integration of personal RFID tags and sensor networks}, journal = {Security and Communication Networks}, volume = {6}, year = {2013}, month = {Oct 2013}, pages = {1177{\textendash}1197}, publisher = {Wiley-Blackwell}, abstract = {

A personal network (PN) should enable the collaboration of user{\textquoteright}s devices and services in a flexible, self-organizing and friendly manner. For such purpose, the PN must securely accommodate heterogeneous technologies with uneven computational and communication resources. In particular, personal RFID tags can enable seamless recognition of user{\textquoteright}s context, provide user authentication and enable novel services enhancing the quality and quantity of data handled by the PN. However, the highly constrained features of common RFID tags and their passive role in the network highlights the need of an adequate secure communication model with personal tags which enables their participation as a member of the PN. In this paper, we present our concept of PN, with special emphasis on the role of RFID and sensor networks, and define a secure architecture for PNs including methods for the secure access to context-aware technologies from both local PN members and the Internet of Things. The PN architecture is designed to support differentiated security mechanisms to maximize the level of security for each type of personal device. Furthermore, we analyze which security solutions available in the literature can be adapted for our architecture, as well as the challenges and security mechanisms still necessary in the secure integration of personal tags.

}, issn = {1939-0114}, doi = {10.1002/sec.684}, url = {http://dx.doi.org/10.1002/sec.684}, author = {Pablo Najera and Rodrigo Roman and Javier Lopez} } @inproceedings {Najera_STM11, title = {Secure architecure for the integration of RFID and sensors in personal networks}, booktitle = {7th International Workshop on Security and Trust Management (STM{\textquoteright}11)}, series = {LNCS}, volume = {7170}, year = {2012}, pages = {207-222}, publisher = {Springer}, organization = {Springer}, address = {Copenhagen, Denmark}, abstract = {

The secure integration of RFID technology into the personal network paradigm, as a context-aware technology which complements body sensor networks, would provide notable benefits to applications and potential services of the PN. RFID security as an independent technology is reaching an adequate maturity level thanks to research in recent years; however, its integration into the PN model, interaction with other network resources, remote users and service providers requires a specific security analysis and a PN architecture prepared to support these resource-constrained pervasive technologies. This paper provides such PN architecture and analysis. Aspects such as the management of personal tags as members of the PN, the authentication and secure communication of PN nodes and remote users with the context-aware technologies, and the enforcement of security and privacy policies are discussed in the architecture.

}, isbn = {978-3-642-29962-9}, doi = {10.1007/978-3-642-29963-6_15}, author = {Pablo Najera and Rodrigo Roman and Javier Lopez} } @inproceedings {Najera_JITEL11, title = {Acceso seguro a nodos RFID en una arquitectura de red personal}, booktitle = {X Jornadas de Ingenier{\'\i}a Telem{\'a}tica (JITEL 2011)}, year = {2011}, month = {09/2011}, pages = {104 - 111}, publisher = {Universidad de Cantabria}, organization = {Universidad de Cantabria}, address = {Santander, Spain}, abstract = {

El paradigma de red personal (PN) permitir\á la interacci\ón y colaboraci\ón del creciente abanico de dispositivos personales. Con tal fin la PN ha de integrar en su seno m\últiples tecnolog\ías heterog\éneas con diversas capacidades computacionales y de comunicaci\ón de forma segura. En particular, la incorporaci\ón de la tecnolog\ía RFID en objetos personales conlleva m\últiples riesgos de seguridad y privacidad que han suscitado un elevado inter\és de la comunidad investigadora en los \últimos a\ños. M\ás all\á de su seguridad de forma aislada, su integraci\ón en la PN y la interacci\ón de \ésta con redes de \área extensa como Internet of Things requieren una arquitectura de red personal adecuada para tal contexto. Este art\ículo proporciona los fundamentos de tal arquitectura segura incluyendo el an\álisis de aspectos como la incorporaci\ón e inicializaci\ón de las restringidas etiquetas RFID en la red personal, la autenticaci\ón tanto de miembros de la PN como de usuarios y servicios remotos en su acceso a las tecnolog\ías de contexto, el control de las pol\íticas de privacidad y el establecimiento de canales seguros de comunicaci\ón supervisados.

}, keywords = {arquitectura software, red personal, Seguridad RFID}, isbn = {978-84-694-5948-5}, author = {Pablo Najera and Rodrigo Roman and Javier Lopez}, editor = {Klaus Hackbarth and Ram{\'o}n Ag{\"u}ero and Roberto Sanz} } @article {Najera2010, title = {Real-time Location and Inpatient Care Systems Based on Passive RFID}, journal = {Journal of Network and Computer Applications}, volume = {34}, year = {2011}, pages = {pp. 980-989}, publisher = {Elsevier}, abstract = {

RFID technology meets identification and tracking requirements in healthcare environments with potential to speed up and increase reliability of involved processes. Due to this, high expectations for this integration have emerged, but hospital and medical centers interested in adoption of RFID technology require prior knowledge on how to squeeze RFID capabilities, real expectations and current challenges. In this paper, we show our lab tested solutions in two specific healthcare scenarios. On the one hand, we analyze the case of a medical equipment tracking system for healthcare facilities enabling both real-time location and theft prevention. Worth-noting aspects such as possible EMI interferences, technology selection and management of RFID data from hospital information system are analyzed. Lab testing of system reliability based on passive UHF RFID is provided for this case. On the other hand, we analyze and provide a solution for care and control of patients in a hospital based on passive HF RFID with the result of a fully functional demonstrator. Our prototype squeezes RFID features in order to provide a backup data source from patient{\textquoteright}s wristband. It also provides an offline working mode aiming to increase application reliability under network fail down and therefore, improving patient{\textquoteright}s safety. Considerations regarding lessons learned and challenges faced are exposed.

}, keywords = {EPC Gen1\&2 performance, Hospital information system, Inpatient management, Medical asset management, Real-time location system}, issn = {1084-8045}, doi = {http://dx.doi.org/10.1016/j.jnca.2010.04.011}, url = {http://www.sciencedirect.com/science/article/B6WKB-5023KSB-1/2/3b970ad38b2ce768888c4eec24ea472a}, author = {Pablo Najera and Javier Lopez} } @article {1633, title = {Securing the Internet of Things}, journal = {IEEE Computer}, volume = {44}, number = {9}, year = {2011}, month = {Sept 2011}, pages = {51 -58}, publisher = {IEEE}, abstract = {

This paper presents security of Internet of things. In the Internet of Things vision, every physical object has a virtual component that can produce and consume services Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use. The Internet and its users are already under continual attack, and a growing economy-replete with business models that undermine the Internet{\textquoteright}s ethical use-is fully focused on exploiting the current version{\textquoteright}s foundational weaknesses.

}, keywords = {business models, computer network security, Internet, Internet of Things, Internet security, IoT, virtual component}, issn = {0018-9162}, doi = {10.1109/MC.2011.291}, url = {http://dx.doi.org/10.1109/MC.2011.291}, author = {Rodrigo Roman and Pablo Najera and Javier Lopez} } @proceedings {1604, title = {Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, journal = {SEC}, volume = {297}, year = {2009}, publisher = {Springer}, isbn = {978-3-642-01243-3}, doi = {10.1007/978-3-642-01244-0}, editor = {Dimitris Gritzalis and Javier Lopez} } @article {Najera2009, title = {Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents}, journal = {Journal of Universal Computer Science}, volume = {15}, year = {2009}, pages = {970-991}, abstract = {

Traditional paper documents are not likely to disappear in the near future as they are present everywhere in daily life, however, paper-based documentation lacks the link with the digital world for agile and automated processing. At the same time it is prone to cloning, alteration and counterfeiting attacks. E-passport defined by ICAO and implemented in 45 countries is the most relevant case of hybrid documentation (i.e. paper format with electronic capabilities) to date, but, as the advantages of hybrid documentation are recognized more and more will undoubtedly appear. In this paper, we present the concept and security requirements of general-use e-documents, analyze the most comprehensive security solution (i.e. ePassport security mechanisms) and its suitability for general-purpose e-documentation. Finally, we propose alternatives for the weakest and less suitable protocol from ePassports: the BAC (Basic Access Control). In particular, an appropriate key management infrastructure for access control to document memory is discussed in conjunction with a prototype implementation.

}, issn = {0948-695X}, doi = {http://dx.doi.org/10.3217/jucs-015-05-0970}, url = {http://www.jucs.org/jucs_15_5/security_mechanisms_and_access}, author = {Pablo Najera and Francisco Moyano and Javier Lopez} } @inproceedings {PNajera2009, title = {Secure Integration of RFID Technology in Personal Documentation for Seamless Identity Validation}, booktitle = {3rd Symposium of Ubiquitous Computing and Ambient Intelligence 2008}, series = {Advances in Soft Computing}, volume = {51/2009}, year = {2008}, month = {October}, pages = {134-138}, publisher = {Springer}, organization = {Springer}, address = {Salamanca (Spain)}, abstract = {

Seamless human identification and authentication in the information system is a fundamental step towards the transparent interaction between the user and its context proposed in ambient intelligence. In this context, the IDENTICA project is aimed to the design and implementation of a distributed authentication platform based on biometrics (i.e. voice and facial image) and personal documentation. In this paper, we present our work in this project focused on the secure integration of RFID technology in personal documentation in order to provide seamless identity validation. Our actual work status, first results and future directions are described in detail.

}, keywords = {Biometry, identity verification, privacy, RFID, security}, isbn = {978-3-540-85866-9}, doi = {http://dx.doi.org/10.1007/978-3-540-85867-6_16}, url = {http://www.springerlink.com/content/bx8t243130k07585/}, author = {Pablo Najera and Francisco Moyano and Javier Lopez} } @incollection {Najera2007, title = {RFID: Technological Issues and Privacy Concerns}, booktitle = {Digital Privacy: Theory, Technologies, and Practices}, year = {2007}, month = {December}, pages = {285-306}, publisher = {Auerbach Publications}, organization = {Auerbach Publications}, isbn = {1420052179}, author = {Pablo Najera and Javier Lopez}, editor = {A. Acquisti and Stefanos Gritzalis and C. Lambrinoudakis and Sabrina De Capitani di Vimercati} } @inproceedings {Najera2006, title = {Aplicaci{\'o}n de la Tecnolog{\'\i}a RFID a Entornos Sanitarios}, booktitle = {2nd International Workshop of Ubiquitous Computing \& Ambient Intelligence (wUCAmI{\textquoteright}06)}, year = {2006}, month = {November}, pages = {83-95}, publisher = {University of Castilla La Mancha}, organization = {University of Castilla La Mancha}, address = {Puertollano, Ciudad Real (Spain)}, abstract = {

La tecnolog\ía RFID, que permite la identificaci\ón \única de cualquier ser u objeto sin necesidad de contacto ni l\ínea de visi\ón directa, se est\á adoptando ampliamente en todo tipo de campos al producir un salto cualitativo en la integraci\ón de la inform\ática con el entorno. En este art\ículo se muestra su estado del arte y se afrontan dos soluciones orientadas a paliar las necesidades en entornos sanitarios. Por un lado, un sistema de seguimiento de dispositivos en el interior de un centro m\édico que permite su localizaci\ón inmediata y la prevenci\ón de hurtos usando RFID pasivo UHF con un testeo de fiabilidad, y por otro, una soluci\ón de control y atenci\ón de pacientes ingresados en planta usando RFID pasivo HF obteni\éndose un demostrador plenamente funcional

}, isbn = {84-6901744-6}, author = {Pablo Najera and Javier Lopez} }