@article {RomanIoT18, title = {Evolution and Trends in the Security of the Internet of Things}, journal = {IEEE Computer}, volume = {51}, year = {2018}, month = {07/2018}, pages = {16-25}, publisher = {IEEE Computer Society}, address = {New Jersey, USA}, keywords = {Evolution, Internet of Things, IoT, security, Trends}, issn = {0018-9162}, doi = {10.1109/MC.2018.3011051}, url = {https://ieeexplore.ieee.org/document/8423133/}, author = {Rodrigo Roman and Javier Lopez and Stefanos Gritzalis} } @article {Galindo2010, title = {On the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks}, journal = {Wireless Communications and Mobile Computing}, volume = {12}, year = {2012}, month = {Jan 2012}, pages = {133-143}, publisher = {Wiley}, abstract = {

Wireless sensors are battery-powered devices which are highly constrained in terms of computational capabilities, memory and communication bandwidth. While battery life is their main limitation, they require considerable energy to communicate data. Due to this, it turns out that the energy saving of computationally inexpensive primitives (like symmetric key cryptography (SKC)) can be nullified by the bigger amount of data they require to be sent. In this work, we study the energy cost of key agreement protocols between peers in a network using asymmetric key cryptography. Our main concern is to reduce the amount of data to be exchanged, which can be done by using special cryptographic paradigms like identity-based and self-certified cryptography. The main news is that an intensive computational primitive for resource-constrained devices, such as non-interactive identity-based authenticated key exchange, performs comparably or even better than traditional authenticated key exchange (AKE) in a variety of scenarios. Moreover, protocols based in this primitive can provide better security properties in real deployments than other simple protocols based on symmetric cryptography. Our findings illustrate to what extent the latest implementation advancements push the efficiency boundaries of public key cryptography (PKC) in wireless sensor networks (WSNs).

}, keywords = {identity-based key agreement, key distribution, pairings, underwater wireless sensor networks, wireless sensor networks}, issn = {1530-8669}, doi = {10.1002/wcm.894}, url = {http://dx.doi.org/10.1002/wcm.894}, author = {David Galindo and Rodrigo Roman and Javier Lopez} } @article {munoz2012, title = {A performance-oriented monitoring system for security properties in cloud computing applications}, journal = {The Computer Journal}, year = {2012}, publisher = {Oxford Academic}, address = {Reino Unido}, issn = {1460-2067}, author = {Mu{\~n}oz, Antonio}, editor = {Gonz{\'a}lez, Javier} } @article {Roman2008a, title = {Situation Awareness Mechanisms for Wireless Sensor Networks}, journal = {IEEE Communications Magazine}, volume = {46}, number = {4}, year = {2008}, month = {April}, pages = {102-107}, publisher = {IEEE}, abstract = {

A wireless sensor network should be able to operate for long periods of time with little or no external management. There is a requirement for this autonomy: the sensor nodes must be able to configure themselves in the presence of adverse situations. Therefore, the nodes should make use of situation awareness mechanisms to determine the existence of abnormal events in their surroundings. This work approaches the problem by considering the possible abnormal events as diseases, thus making it possible to diagnose them through their symptoms, namely, their side effects. Considering these awareness mechanisms as a foundation for high-level monitoring services, this article also shows how these mechanisms are included in the blueprint of an intrusion detection system.

}, issn = {0163-6804}, doi = {10.1109/MCOM.2008.4481348}, author = {Rodrigo Roman and Javier Lopez and Stefanos Gritzalis} } @article {JoseA.Onieva2007a, title = {Integration of non-repudiation services in mobile DRM scenarios}, journal = {Telecommunications Systems}, volume = {35}, year = {2007}, month = {September}, pages = {161-176}, abstract = {

In any kind of electronic transaction, it is extremely important to assure that any of the parties involved can not deny their participation in the information exchange. This security property, which is called non-repudiation, becomes more important in Digital Rights Management (DRM) scenarios, where a consumer can freely access to certain contents but needs to obtain the proper Right Object (RO) from a vendor in order to process it. Any breach in this process could result on financial loss for any peer, thus it is necessary to provide a service that allows the creation of trusted evidence. Unfortunately, non-repudiation services has not been included so far in DRM specifications due to practical issues and the type of content distributed. In this paper we analyze how to allow the integration of non-repudiation services to a DRM framework, providing a set of protocols that allows the right objects acquisition to be undeniable, alongside with a proof-of-concept implementation and a validation process.

}, keywords = {digital rights management, Mobile applications, Non-repudiation, Secure electronic commerce}, issn = {1572-9451}, author = {Jose A. Onieva and Javier Lopez and Rodrigo Roman and Jianying Zhou and Stefanos Gritzalis} } @article {SigridGuergens2003, title = {Analysis of E-commerce Protocols: Adapting a Traditional Technique}, journal = {International Journal of Information Security}, volume = {2}, number = {1}, year = {2003}, pages = {21-36}, publisher = {Springer}, abstract = {

We present the adaptation of our model for the validation of key distribution and authentication protocols to address some of the specific needs of protocols for electronic commerce. The two models defer in both the threat scenario and in the protocol formalization. We demonstrate the suitability of our adaptation by analyzing a specific version of the Internet Billing Server protocol introduced by Carnegie MellonUniversity. Our analysis shows that, while the security properties a key distribution or authentication protocol shall provide are well understood, it is often not clear which properties an electronic commerce protocol can or shall provide. We use the automatic theorem proving software {\textquoteleft}{\textquoteleft}Otter{\textquoteright}{\textquoteright} developed at Argonne National Laboratories for state space exploration.

}, issn = {1615-5262}, author = {Sigrid Gurgens and Javier Lopez and Rene Peralta} }