@incollection {1777, title = {Privacy-Aware Digital Forensics}, booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications}, year = {2019}, month = {09/2019}, publisher = {The Institution of Engineering and Technology (IET) }, organization = {The Institution of Engineering and Technology (IET) }, edition = {Lizhe Wang, Wei Ren, Raymoond Choo and Fatos Xhafa}, address = {United Kingdom}, isbn = {978-1-78561-747-8}, url = {https://www.amazon.es/Security-Privacy-Computing-Applications-Networks/dp/1785617478}, author = {Ana Nieto and Ruben Rios and Javier Lopez} } @incollection {ruben2014a, title = {Location Privacy in WSNs: Solutions, Challenges, and Future Trends}, booktitle = {Foundations of Security Analysis and Design VII}, volume = {8604}, number = {LNCS}, year = {2014}, pages = {244-282}, publisher = {Springer}, organization = {Springer}, abstract = {

Privacy preservation is gaining popularity in Wireless Sensor Network (WSNs) due to its adoption in everyday scenarios. There are a number of research papers in this area many of which concentrate on the location privacy problem. In this paper we review and categorise these solutions based on the information available to the adversary and his capabilities. But first we analyse whether traditional anonymous communication systems conform to the original requirements of location privacy in sensor networks. Finally, we present and discuss a number of challenges and future trends that demand further attention from the research community.

}, keywords = {Location Privacy, survey, traffic analysis, wireless sensor networks}, isbn = {978-3-319-10081-4}, issn = {0302-9743}, doi = {10.1007/978-3-319-10082-1_9}, author = {Ruben Rios and Javier Lopez and Jorge Cuellar} } @incollection {Alcaraz2011_ChapterBook, title = {Digital Home Networking: Standards}, booktitle = {Digital Home Networking}, number = {7130}, year = {2011}, pages = {60-96}, publisher = {John Wiley \& Sons Inc.}, organization = {John Wiley \& Sons Inc.}, address = {Reino Unido}, keywords = {Standards, ZigBee}, issn = {978-1-84821-321-0}, author = {Remi Bars and Jorge Gomez and Mohamed Mahdi and Cristina Alcaraz and Rodrigo Roman}, editor = {Romain Carbou and Ernesto Exposito and Rodrigo Roman and Michel Diaz} } @incollection {Najera_DHNChapter, title = {Network Technologies}, booktitle = {Digital Home Networking}, year = {2011}, pages = {17 - 58}, publisher = {Wiley-ISTE}, organization = {Wiley-ISTE}, isbn = {978-1848213210}, author = {Pablo Najera and Ana Nieto}, editor = {Romain Carbou and Ernesto Exposito and Rodrigo Roman} } @incollection {Moyano_DHNChapter, title = {Security}, booktitle = {Digital Home Networking}, year = {2011}, pages = {139-202}, chapter = {Security}, issn = {9781848213210}, author = {Francisco Moyano and Rodrigo Roman and Anas Abou El Kalam and Marc Lacoste and Mohamed Maachaoui}, editor = {Romain Carbou and Michel Diaz and Ernesto Exposito and Rodrigo Roman} } @incollection {1626, title = {Security in the Developments Process of Mobile Grid Systems}, booktitle = {Advances in Grid Computing}, year = {2011}, pages = {173-198}, publisher = {Intech}, organization = {Intech}, edition = {Zoran Constantinescu}, author = {David G. Rosado and E. Fernandez-Medina and Javier Lopez} } @incollection {Roman2009b, title = {Trust and Reputation Systems for Wireless Sensor Networks}, booktitle = {Security and Privacy in Mobile and Wireless Networking}, year = {2009}, pages = {105-128}, publisher = {Troubador Publishing Ltd}, organization = {Troubador Publishing Ltd}, abstract = {

The concept of trust has become very relevant in the late years as a consequence of the growth of fields such as internet transactions or electronic commerce. In general, trust has become of paramount importance for any kind of distributed networks, such as wireless sensor networks (WSN in the following). In this chapter of the book, we try to give a general overview of the state of the art on trust management systems for WSN and also try to identify the main features of the architectures of these trust management systems.

}, isbn = {978-1905886-906}, author = {Rodrigo Roman and Carmen Fernandez-Gago and Javier Lopez and Hsiao Hwa Chen}, editor = {Stefanos Gritzalis and Tom Karygiannis and Charalabos Skianis} } @incollection {Roman2008, title = {On the Hardware Implementation Efficiency of Cryptographic Primitives}, booktitle = {Wireless Sensor Network Security}, year = {2008}, publisher = {IOS Press}, organization = {IOS Press}, abstract = {

Security has been proven a crucial factor in the provision of data services and especially in the computer-related environments. While wired and wireless networks come to all sectors of everyday life, security tries to satisfy the growing needs for confidentiality, integrity and non-repudiation. There are many instances of security primitives and each one of them has different requirements in terms of processing power, word size, etc. Therefore, it is important to review the functionality of the less resource-demanding encryption algorithms in order to analyze their theoretical suitability to the existent sensor node hardware. Still, the constraints inherent to the sensor nodes advise against the total dependence on software-based implementations, even more in the case of expensive primitives.

}, isbn = {978-1-58603-813-7}, author = {Rodrigo Roman and Cristina Alcaraz and Nicolas Sklavos}, editor = {Javier Lopez and Jianying Zhou} } @incollection {Lopez2007, title = {On the Protection and Technologies of Critical Information Infrastructures.}, booktitle = {On Foundations of Security Analysis and Design IV, FOSAD 2006/2007, Springer}, series = {LNCS}, volume = {4677}, year = {2007}, note = {

10.1007/978-3-540-74810-6_6

}, pages = {160-182}, abstract = {

Critical Infrastructures are complex and highly interconnected systems that are crucial for the well-being of the society. Any type of failure can cause significant damage, affecting one or more sectors due to their inherent interdependency. Not only the infrastructures are critical, but also the information infrastructures that manage, control and supervise them. Due to the seriousness of the consequences, the protection of these critical (information) infrastructures must have the highest priority. It is the purpose of this book chapter to review and discuss about these infrastructures, to explain their elements, and to highlight their research and development issues. This chapter will also discuss the role of Wireless Sensor Network (WSN) technology in the protection of these infrastructures.

}, keywords = {Critical Information Infrastructure Protection, wireless sensor networks}, issn = {0302-9743}, doi = {10.1007/978-3-540-74810-6_6}, url = {http://dx.doi.org/10.1007/978-3-540-74810-6_6}, author = {Javier Lopez and Cristina Alcaraz and Rodrigo Roman} }