Artigos de I&D

Recognizing Entities Across Protocols

R. Ferreira, R. Aguiar, and A. Matos. In Globecom’2013, Atlanta, Georgia, USA, December 2013.

Abstract. The Internet-of-Things vision introduces scenarios composed of many devices and protocols, in order to support real world user interactions. This also brought a fractured vision, since it is hard to extend communication over diverse technologies, even for communication with the same devices. In this paper we propose to address the fractured IoT ecosystem using a UUID based discovery layer that allows recognising entities across different protocols. By using asymmetric keys as the basis for a UUID device identification namespace, we provide a stable identification layer that enables recognizing entities (devices) across protocols and simultaneously retaining a security context over different protocols. We use this identification and discovery layer as the basis for an integrated framework where communication between devices can happen over any available channel or technology. The framework is instantiated in an experimental prototype, used to assess the pragmatic changes and overall impact of using a cross-protocol identification scheme.

Multi-agent framework for negotiation in a closed environment

Conference of Numerical Analysis and Applied Mathematics (ICNAAM 2013), Rhodes, Greece, 2013-09-25, DOI:10.1063/1.4825774, pp. 1385–1388.

Abstract: The goal of this paper is to offer support for small and medium enterprises which cannot or do not want to fulfil a big contract alone. Each organization has limited resources and in order to better accomplish a higher external demand, the managers are forced to outsource parts of their contracts even to concurrent organizations. In this concurrent environment each enterprise wants to preserve its decision autonomy and to disclose as little as possible from its business information. To describe this interaction, our approach is to define a framework for managing parallel and concurrent negotiations among independent organizations acting in the same industrial market. The complexity of our negotiation framework is done by the dynamic environment in which multi-attribute and multi-participant negotiations are racing over the same set of resources. Moreover, the proposed framework helps the organizations within the collaborative networked environment to augment their efficiency and ability to react to unforeseen situations, thus improving their market competitiveness.


An open source software forge for European projects

A. Matos, M. P. de Leon, R. Ferreira, and J. P. Barraca. In Proceedings of the Workshop on Open Source and Design of Communication, OSDOC ’13, ACM, pages 41–45, Lisbon, Portugal, July, 2013. 

Abstract. Open Source is an increasingly interesting vehicle for dissemination of project results within the R&D and ICT FP7 communities. PROSE, an FP7 ICT project, is promoting open source adoption by creating a software forge that provides project management, source code hosting, and development support for the ICT and European open source projects. In this paper we present the key requirements for a software forge resulting from a public consultation of projects in the European space, and the corresponding instantiation of an open source software forge, publicly available at We also discuss the relevance of a centralized collaboration platform for European projects, and the value presented by such an approach as opposed to current source code repositories.


Digital Preservation of Business Assets as a Risk Management Strategy

C. Coutinho, “Digital Preservation of Business Assets as a Risk Management Strategy”, in Proceedings of the Workshop on Open Source and Design of Communication (ACM/OSDOC2013), Lisbon, Portugal, 2013-07-11, DOI:10.1145/2503848.2503858, pp. 46–48.

Abstract: The effect of a new globalised world where technologies and methodologies mature rapidly is a constant change in business paradigms and assets. Tools, technology and formats become easily deprecated and replaced by others, and legal and licensing affairs are subject to constant legislation changes. Hence, a business seeking to preserve its assets for long term becomes very prone to problems of this nature. This paper presents an approach to analyse the risks coming from various sources which may affect enterprise business continuity, discussing the problems and issues relevant to it, and proposing long-term digital preservation as a mitigation action to handle some of these determined risks, and the implementation of a framework to support these concepts, in the context of the Seventh Framework Programme (FP7) TIMBUS project.


Secure User-Friendly WiFi Access Point Joining

J.-M. Seigneur, C. Ballester Lafuente, and A. Matos. In Wireless Communications and Networking Conference (WCNC), 2013 IEEE, pages 4718–4723, April, 2013.

Abstract. In this paper, we discuss the remaining security risk of Wi-Fi AP spoofing with current AP joining approaches and how a new solution has been developed as part of the ULOOP project in order to be more user-friendly and secure. It was an important step for increased security because our evaluation shows that even computer aware users do not know or do not bother about this issue although it is a real risk that current approaches do not solve.


Service-based Negotiation for Advanced Collaboration in Enterprise Networks

C. Coutinho, A. Cretan, C. F. da Silva, P. Ghodous, and R. Jardim-Goncalves, “Service-based Negotiation for Advanced Collaboration in Enterprise Networks”, Journal of Intelligent Manufacturing, January 2014, DOI: 10.1007/s10845-013-0857-4.

Abstract: Information systems support organisations to achieve greater efficiency by automating their activities. Nowadays, in the actual competitive and global business context, the advent of enterprise networking has been challenging collaboration, coordination and continuous interactions among dissimilar information systems to adapt and improve them. Sustainability of interoperability among heterogeneous systems regarding sharing information and knowledge in a collaborative dynamic environment is hard to achieve and maintain. This paper proposes a service-based negotiation framework for advanced collaboration in enterprise networks, as a solution to improve the sustainability of interoperability within enterprise information systems. Validation in industrial scenario is presented and discussed.


Secure hotspot authentication

A. Matos, D. Romao, and P. Trezentos. In IEEE (Selected Topics) Wireless and Mobile Computing, Networking and Communications (WiMob), pp 807–814, October, 2012.

Abstract. We present a Wi-Fi hotspot authentication system that relies on a Near Field Communications (NFC) side-channel to address the security issues of Wi-Fi configuration and access in public locations. The proposed solution defines an architecture that simplifies Wi-Fi access point configuration for the end user, while simultaneously increasing user security and privacy in public networks. This is achieved by embedding network and security information in NFC enabled devices (e.g. tags) that allow the user to connect to secure wireless networks without a pre-established relationship. By using an asymmetric cryptographic system, it is possible to address several security threats such as an evil twin attack, hotspot or captive portal eavesdropping, and even Man-in-the-Middle attacks. We also present an experimental prototype that stores access point information on NFC tags, allowing NFCenabled devices to securely connect to a wireless network and verify the access point’s identity.


Preparing FLOSS for future network paradigms

A. Matos, J. Thomson, and P. Trezentos. In 7th International Conference on Open Source Systems (OSS’2011), Salvador, Brazil, October, 2011.

Abstract. Operating system tools must fulfil the requirements generated by the advances in networking paradigms. To understand the current state of the Free, Libre and Open Source Software (FLOSS) ecosystem, we present a survey on the main tools used to manage and interact with the network, and how they are organized in Linux-based operating systems. Based on the survey results, we present a reference Linux network stack that can serve as the basis for future heterogeneous network environments, contributing towards a standardized approach in Linux. Using this stack, and focusing on dynamic and spontaneous network interactions, we present an evolution path for network related technologies, contributing to Linux as a network research operating system and to FLOSS as a whole.


Instale o Linux Caixa Mágica agora

glqxz9283 sfy39587stf02 mnesdcuix8