2024
Sánchez-Serrano, Pablo; Rios, Ruben; Agudo, Isaac
Privacy-preserving tabular data generation: Systematic Literature Review Proceedings Article Forthcoming
In: 19th DPM International Workshop on Data Privacy Management (DPM 2024), Springer, Bydgoszcz, Poland, Forthcoming.
@inproceedings{pablo2024dpm,
title = {Privacy-preserving tabular data generation: Systematic Literature Review},
author = {Pablo S\'{a}nchez-Serrano and Ruben Rios and Isaac Agudo},
url = {/wp-content/papers/pablo2024dpm.pdf},
year = {2024},
date = {2024-09-19},
urldate = {2024-09-19},
booktitle = {19th DPM International Workshop on Data Privacy Management (DPM 2024)},
publisher = {Springer},
address = {Bydgoszcz, Poland},
abstract = {There is a wide range of tabular data, such as medical, financial or demographic data, which are of great value to science, economy and social progress. However, this type of data contains sensitive information. Privacy concerns need to be taken into account when sharing such data. Traditional methods, such as anonymisation or pseudo-anonymisation, are based on modifying databases to meet certain privacy guarantees. In recent years, with the growth of AI, the possibility of using generative models has been raised as a way to generate synthetic data that guarantees the privacy of individuals while maintaining their utility. This systematic literature review aims to identify and classify existing privacy-guaranteed tabular generative models to create a taxonomy that classifies them. In addition, we analyze the privacy metrics and techniques they use, and identify possible unexplored lines of research.},
keywords = {},
pubstate = {forthcoming},
tppubtype = {inproceedings}
}
Juaristi, Patxi; Agudo, Isaac; Rios, Ruben; Ricci, Laura
Benchmarking post-quantum cryptography in Ethereum-based blockchains Proceedings Article Forthcoming
In: 8th International Workshop on Cryptocurrencies and Blockchain Technology (CBT 2024), Springer, Bydgoszcz, Poland, Forthcoming.
@inproceedings{agudo2024cbt,
title = {Benchmarking post-quantum cryptography in Ethereum-based blockchains},
author = {Patxi Juaristi and Isaac Agudo and Ruben Rios and Laura Ricci},
url = {/wp-content/papers/agudo2024cbt.pdf},
year = {2024},
date = {2024-09-19},
booktitle = {8th International Workshop on Cryptocurrencies and Blockchain Technology (CBT 2024)},
publisher = {Springer},
address = {Bydgoszcz, Poland},
abstract = {Blockchain technology has significantly transformed various industries by enabling secure and tamper-resistant transactions. However, the rise of quantum computing threatens the cryptographic foundations of blockchain networks, making blockchain vulnerable to signature forgery and transaction manipulation. This raises concerns about the long-term viability of blockchain systems and highlights the need for post-quantum secure solutions.
This paper investigates the feasibility of quantum-resistant blockchain ecosystems. Our research focuses on estimating the cost of the integration of the post-quantum algorithms selected in the NIST standardization competition into Ethereum-based blockchains.},
keywords = {},
pubstate = {forthcoming},
tppubtype = {inproceedings}
}
This paper investigates the feasibility of quantum-resistant blockchain ecosystems. Our research focuses on estimating the cost of the integration of the post-quantum algorithms selected in the NIST standardization competition into Ethereum-based blockchains.
2023
Rios, Ruben; Posegga, Joachim
19th International Workshop on Security and Trust Management (STM 2023) Proceedings
Springer Cham, vol. 14336, 2023, ISBN: 978-3-031-47197-1.
@proceedings{stm2023,
title = {19th International Workshop on Security and Trust Management (STM 2023)},
author = {Ruben Rios and Joachim Posegga},
doi = {10.1007/978-3-031-47198-8},
isbn = {978-3-031-47197-1},
year = {2023},
date = {2023-11-03},
urldate = {2023-11-03},
booktitle = {Security and Trust Management},
volume = {14336},
issue = {LNCS 14336},
publisher = {Springer Cham},
series = {Lecture Notes in Computer Science (LNCS)},
abstract = {This book constitutes the proceedings of the 19th International Workshop on Security and Trust Management, STM 2023, co-located with the 28th European Symposium on Research in Computer Security, ESORICS 2023, held in The Hague, The Netherlands, during September 28th, 2023.},
keywords = {},
pubstate = {published},
tppubtype = {proceedings}
}
Muñoz, Antonio; Rios, Ruben; Roman, Rodrigo; Lopez, Javier
A survey on the (in)security of Trusted Execution Environments Journal Article
In: Computers & Security, pp. 103-180, 2023, ISSN: 0167-4048.
@article{MUNOZ2023103180,
title = {A survey on the (in)security of Trusted Execution Environments},
author = {Antonio Mu\~{n}oz and Ruben Rios and Rodrigo Roman and Javier Lopez},
url = {/wp-content/papers/MUNOZ2023103180.pdf
https://www.sciencedirect.com/science/article/pii/S0167404823000901},
doi = {10.1016/j.cose.2023.103180},
issn = {0167-4048},
year = {2023},
date = {2023-01-01},
urldate = {2023-01-01},
journal = {Computers \& Security},
pages = {103-180},
publisher = {Elsevier},
address = {In Press},
abstract = {As the number of security and privacy attacks continue to grow around the world, there is an ever increasing need to protect our personal devices. As a matter of fact, more and more manufactures are relying on Trusted Execution Environments (TEEs) to shield their devices. In particular, ARM TrustZone (TZ) is being widely used in numerous embedded devices, especially smartphones, and this technology is the basis for secure solutions both in industry and academia. However, as shown in this paper, TEE is not bullet-proof and it has been successfully attacked numerous times and in very different ways. To raise awareness among potential stakeholders interested in this technology, this paper provides an extensive analysis and categorization of existing vulnerabilities in TEEs and highlights the design flaws that led to them. The presented vulnerabilities, which are not only extracted from existing literature but also from publicly available exploits and databases, are accompanied by some effective countermeasures to reduce the likelihood of new attacks. The paper ends with some appealing challenges and open issues.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2022
Ruiz, Manuel; Rios, Ruben; Roman, Rodrigo; Muñoz, Antonio; Martínez, Juan Manuel; Wallace, Jorge
AndroCIES: Automatización de la certificación de seguridad para aplicaciones Android Proceedings Article
In: XVII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2022), pp. 192-197, Ediciones Universidad Cantabria Ediciones Universidad Cantabria, Santander, Spain, 2022.
@inproceedings{2016,
title = {AndroCIES: Automatizaci\'{o}n de la certificaci\'{o}n de seguridad para aplicaciones Android},
author = {Manuel Ruiz and Ruben Rios and Rodrigo Roman and Antonio Mu\~{n}oz and Juan Manuel Mart\'{i}nez and Jorge Wallace},
url = {/wp-content/papers/2016.pdf},
year = {2022},
date = {2022-10-01},
urldate = {2022-10-01},
booktitle = {XVII Reuni\'{o}n Espa\~{n}ola sobre Criptolog\'{i}a y Seguridad de la Informaci\'{o}n (RECSI 2022)},
volume = {265},
pages = {192-197},
publisher = {Ediciones Universidad Cantabria},
address = {Santander, Spain},
organization = {Ediciones Universidad Cantabria},
abstract = {El auge de las plataformas m\'{o}viles est\'{a} impulsando el desarrollo de un gran n\'{u}mero de aplicaciones, muchas de las cuales salen al mercado sin las convenientes comprobaciones de seguridad. Recientemente, Google est\'{a} apostando por hacer este problema m\'{a}s visible y concienciar a los usuarios de la necesidad de instalar aplicaciones verificadas por laboratorios independientes. Sin embargo, la certificaci\'{o}n de aplicaciones suele ser una tarea ardua y no exenta de errores. Por ello, en este trabajo, presentamos la herramienta AndroCIES, que es capaz de automatizar en gran medida las evaluaciones necesarias para la certificaci\'{o}n de aplicaciones m\'{o}viles, reduciendo en torno a un 20% el tiempo empleado en este proceso.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Ruiz, Manuel; Rios, Ruben; Roman, Rodrigo; Lopez, Javier
Privacidad Contextual en entornos Edge Proceedings Article
In: VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2022), pp. 122-129, Bilbao, Spain, 2022, ISBN: 978-84-88734-13-6.
@inproceedings{1979,
title = {Privacidad Contextual en entornos Edge},
author = {Manuel Ruiz and Ruben Rios and Rodrigo Roman and Javier Lopez},
url = {/wp-content/papers/1979.pdf},
isbn = {978-84-88734-13-6},
year = {2022},
date = {2022-06-01},
urldate = {2022-06-01},
booktitle = {VII Jornadas Nacionales de Investigaci\'{o}n en Ciberseguridad (JNIC 2022)},
pages = {122-129},
address = {Bilbao, Spain},
abstract = {La privacidad contextual se refiere a la protecci\'{o}n de toda aquella informaci\'{o}n que puede desprenderse de la interacci\'{o}n entre usuarios y/o servicios, exceptuando los datos que el propio usuario elige transmitir. La localizaci\'{o}n, el tiempo, los patrones de uso y los diferentes par\'{a}metros necesarios para realizar la comunicaci\'{o}n son algunos ejemplos. Este tipo de privacidad es extremadamente importante en la computaci\'{o}n edge debido al acercamiento de los recursos de la infraestructura a los usuarios. Por ello, el objetivo de este trabajo es ofrecer un an\'{a}lisis y clasificaci\'{o}n de las diferentes soluciones propuestas en la literatura respecto a la privacidad contextual en entornos edge, mostrando tanto las capacidades de los mecanismos actuales como los desaf\'{i}os en este campo.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Wang, Xueou; Hou, Xiaolu; Rios, Ruben; Tippenhauer, Nils Ole; Ochoa, Martin
Constrained Proximity Attacks on Mobile Targets Journal Article
In: ACM Transactions on Privacy and Security (TOPS), vol. 25, no. 10, pp. 1 – 29, 2022, ISSN: 2471-2566.
@article{rios2022cpa,
title = {Constrained Proximity Attacks on Mobile Targets},
author = {Xueou Wang and Xiaolu Hou and Ruben Rios and Nils Ole Tippenhauer and Martin Ochoa},
url = {/wp-content/papers/rios2022cpa.pdf},
doi = {10.1145/3498543},
issn = {2471-2566},
year = {2022},
date = {2022-05-01},
urldate = {2022-05-01},
journal = {ACM Transactions on Privacy and Security (TOPS)},
volume = {25},
number = {10},
pages = {1 - 29},
publisher = {Association for Computer Machinery (ACM)},
abstract = {Proximity attacks allow an adversary to uncover the location of a victim by repeatedly issuing queries with fake location data. These attacks have been mostly studied in scenarios where victims remain static and there are no constraints that limit the actions of the attacker. In such a setting, it is not difficult for the attacker to locate a particular victim and quantifying the effort for doing so is straightforward. However, it is far more realistic to consider scenarios where potential victims present a particular mobility pattern. In this paper, we consider abstract (constrained and unconstrained) attacks on services that provide location information on other users in the proximity. We derive strategies for constrained and unconstrained attackers, and show that when unconstrained they can practically achieve success with theoretically optimal effort. We then propose a simple yet effective constraint that may be employed by a proximity service (for example, running in the cloud or using a suitable two-party protocol) as countermeasure to increase the effort for the attacker several orders of magnitude both in simulated and real-world cases.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Rios, Ruben; Onieva, Jose A.; Roman, Rodrigo; Lopez, Javier
Personal IoT Privacy Control at the Edge Journal Article
In: IEEE Security & Privacy, vol. 20, pp. 23 – 32, 2022, ISSN: 1540-7993.
@article{rios2022pmec,
title = {Personal IoT Privacy Control at the Edge},
author = {Ruben Rios and Jose A. Onieva and Rodrigo Roman and Javier Lopez},
url = {/wp-content/papers/rios2022pmec.pdf},
doi = {10.1109/MSEC.2021.3101865},
issn = {1540-7993},
year = {2022},
date = {2022-01-01},
urldate = {2022-01-01},
journal = {IEEE Security \& Privacy},
volume = {20},
pages = {23 - 32},
publisher = {IEEE},
abstract = {This article introduces a privacy manager for IoT data based on Edge Computing. This poses the advantage that privacy is enforced before data leaves the control of the user, who is provided with a tool to express data sharing preferences based on a novel context-aware privacy language.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2021
Rios, Ruben
Recipient Anonymity Book Chapter
In: Jajodia, Sushil; Samarati, Pierangela; Yung, Moti (Ed.): 2021.
BibTeX | Links:
@inbook{Rios2024,
title = {Recipient Anonymity},
author = {Ruben Rios },
editor = {Sushil Jajodia and Pierangela Samarati and Moti Yung},
doi = {10.1007/978-3-642-27739-9},
year = {2021},
date = {2021-12-23},
urldate = {2024-07-12},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
2020
Rubio, Juan E.; Alcaraz, Cristina; Rios, Ruben; Roman, Rodrigo; Lopez, Javier
Distributed Detection of APTs: Consensus vs. Clustering Proceedings Article
In: 25th European Symposium on Research in Computer Security (ESORICS 2020), pp. 174-192, 2020, ISBN: 978-3-030-58951-6.
BibTeX | Links:
@inproceedings{1846,
title = {Distributed Detection of APTs: Consensus vs. Clustering},
author = {Juan E. Rubio and Cristina Alcaraz and Ruben Rios and Rodrigo Roman and Javier Lopez},
url = {/wp-content/papers/1846.pdf},
doi = {10.1007/978-3-030-58951-6_9},
isbn = {978-3-030-58951-6},
year = {2020},
date = {2020-09-01},
urldate = {2020-09-01},
booktitle = {25th European Symposium on Research in Computer Security (ESORICS 2020)},
volume = {12308},
pages = {174-192},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2019
Agudo, Isaac; Rios, Ruben; Nieto, Ana
Personalized Computer Security Tasks with Automatic Evaluation and Feedback Proceedings Article
In: International Conference on Information Systems Education and Research (AIS SIGED 2019), 2019, ISBN: 978-1-7343123-0-0.
BibTeX | Links:
@inproceedings{1835,
title = {Personalized Computer Security Tasks with Automatic Evaluation and Feedback},
author = {Isaac Agudo and Ruben Rios and Ana Nieto},
url = {/wp-content/papers/1835.pdf},
isbn = {978-1-7343123-0-0},
year = {2019},
date = {2019-12-01},
urldate = {2019-12-01},
booktitle = {International Conference on Information Systems Education and Research (AIS SIGED 2019)},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Onieva, Jose A.; Rios, Ruben; Roman, Rodrigo; Lopez, Javier
Edge-Assisted Vehicular Networks Security Journal Article
In: IEEE Internet of Things Journal, vol. 6, pp. 8038-8045, 2019, ISSN: 2327-4662.
@article{onieva2019vec,
title = {Edge-Assisted Vehicular Networks Security},
author = {Jose A. Onieva and Ruben Rios and Rodrigo Roman and Javier Lopez},
url = {/wp-content/papers/onieva2019vec.pdf},
doi = {10.1109/JIOT.2019.2904323},
issn = {2327-4662},
year = {2019},
date = {2019-10-01},
urldate = {2019-10-01},
journal = {IEEE Internet of Things Journal},
volume = {6},
pages = {8038-8045},
publisher = {IEEE Computer Society},
abstract = {Edge Computing paradigms are expected to solve some major problems affecting current application scenarios that rely on Cloud computing resources to operate. These novel paradigms will bring computational resources closer to the users and by doing so they will not only reduce network latency and bandwidth utilization but will also introduce some attractive context-awareness features to these systems. In this paper we show how the enticing features introduced by Edge Computing paradigms can be exploited to improve security and privacy in the critical scenario of vehicular networks (VN), especially existing authentication and revocation issues. In particular, we analyze the security challenges in VN and describe three deployment models for vehicular edge computing, which refrain from using vehicular- to-vehicular communications. The result is that the burden imposed to vehicles is considerably reduced without sacrificing the security or functional features expected in vehicular scenarios.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Nieto, Ana; Rios, Ruben; Lopez, Javier
Privacy-Aware Digital Forensics Book Section
In: Security and Privacy for Big Data, Cloud Computing and Applications, The Institution of Engineering and Technology (IET), United Kingdom, 2019, ISBN: 978-1-78561-747-8.
BibTeX | Links:
@incollection{1777,
title = {Privacy-Aware Digital Forensics},
author = {Ana Nieto and Ruben Rios and Javier Lopez},
url = {/wp-content/papers/1777.pdf
https://www.amazon.es/Security-Privacy-Computing-Applications-Networks/dp/1785617478},
isbn = {978-1-78561-747-8},
year = {2019},
date = {2019-09-01},
urldate = {2019-09-01},
booktitle = {Security and Privacy for Big Data, Cloud Computing and Applications},
publisher = {The Institution of Engineering and Technology (IET)},
address = {United Kingdom},
edition = {Lizhe Wang, Wei Ren, Raymoond Choo and Fatos Xhafa},
organization = {The Institution of Engineering and Technology (IET)},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Roman, Rodrigo; Rios, Ruben; Onieva, Jose A.; Lopez, Javier
Immune System for the Internet of Things using Edge Technologies Journal Article
In: IEEE Internet of Things Journal, vol. 6, pp. 4774-4781, 2019, ISSN: 2327-4662.
@article{roman2018VIS,
title = {Immune System for the Internet of Things using Edge Technologies},
author = {Rodrigo Roman and Ruben Rios and Jose A. Onieva and Javier Lopez},
url = {/wp-content/papers/roman2018VIS.pdf
https://ieeexplore.ieee.org/document/8449989/},
doi = {10.1109/JIOT.2018.2867613},
issn = {2327-4662},
year = {2019},
date = {2019-06-01},
urldate = {2019-06-01},
journal = {IEEE Internet of Things Journal},
volume = {6},
pages = {4774-4781},
publisher = {IEEE Computer Society},
abstract = {The Internet of Things (IoT) and Edge Computing are starting to go hand in hand. By providing cloud services close to end-users, edge paradigms enhance the functionality of IoT deployments, and facilitate the creation of novel services such as augmented systems. Furthermore, the very nature of these paradigms also enables the creation of a proactive defense architecture, an immune system, which allows authorized immune cells (e.g., virtual machines) to traverse edge nodes and analyze the security and consistency of the underlying IoT infrastructure. In this article, we analyze the requirements for the development of an immune system for the IoT, and propose a security architecture that satisfies these requirements. We also describe how such a system can be instantiated in Edge Computing infrastructures using existing technologies. Finally, we explore the potential application of immune systems to other scenarios and purposes.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Nieto, Ana; Rios, Ruben
Cybersecurity Profiles based on Human-Centric IoT Devices Journal Article
In: Human-centric Computing and Information Sciences, vol. 9, no. 1, pp. 1-23, 2019, ISSN: 2192-1962.
BibTeX | Links:
@article{HFNR2019,
title = {Cybersecurity Profiles based on Human-Centric IoT Devices},
author = {Ana Nieto and Ruben Rios},
url = {/wp-content/papers/HFNR2019.pdf},
doi = {10.1186/s13673-019-0200-y},
issn = {2192-1962},
year = {2019},
date = {2019-01-01},
urldate = {2019-01-01},
journal = {Human-centric Computing and Information Sciences},
volume = {9},
number = {1},
pages = {1-23},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2018
Nieto, Ana; Rios, Ruben; Lopez, Javier
IoT-Forensics meets Privacy: Towards Cooperative Digital Investigations Journal Article
In: Sensors, vol. 18, no. 492, 2018, ISSN: 1424-8220.
@article{nrlSensors2018,
title = {IoT-Forensics meets Privacy: Towards Cooperative Digital Investigations},
author = {Ana Nieto and Ruben Rios and Javier Lopez},
url = {/wp-content/papers/nrlSensors2018.pdf
http://www.mdpi.com/1424-8220/18/2/492},
doi = {10.3390/s18020492},
issn = {1424-8220},
year = {2018},
date = {2018-02-01},
urldate = {2018-02-01},
journal = {Sensors},
volume = {18},
number = {492},
publisher = {MDPI},
abstract = {IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Wang, Xueou; Hou, Xiaolu; Rios, Ruben; Hallgren, Per; Tippenhauer, Nils Ole; Ochoa, Martin
Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies Proceedings Article
In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), pp. 373-392, Springer Springer, Barcelona, 2018, ISBN: 978-3-319-98988-4.
@inproceedings{rios2018mob,
title = {Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies},
author = {Xueou Wang and Xiaolu Hou and Ruben Rios and Per Hallgren and Nils Ole Tippenhauer and Martin Ochoa},
url = {/wp-content/papers/rios2018mob.pdf},
doi = {10.1007/978-3-319-98989-1},
isbn = {978-3-319-98988-4},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
booktitle = {23rd European Symposium on Research in Computer Security (ESORICS 2018)},
volume = {11099},
pages = {373-392},
publisher = {Springer},
address = {Barcelona},
organization = {Springer},
series = {LNCS},
abstract = {Location privacy has mostly focused on scenarios where users remain static. However, investigating scenarios where the victims present a particular mobility pattern is more realistic. In this paper, we consider abstract attacks on services that provide location information on other users in the proximity. In that setting, we quantify the required effort of the attacker to localize a particular mobile victim. We prove upper and lower bounds for the effort of an optimal attacker. We experimentally show that a emphLinear Jump Strategy (LJS) practically achieves the upper bounds for almost uniform initial distributions of victims. To improve performance for less uniform distributions known to the attacker, we propose a emphGreedy Updating Attack Strategy (GUAS). Finally, we derive a realistic mobility model from a real-world dataset and discuss the performance of our strategies in that setting.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Rios, Ruben; Fernandez-Gago, Carmen; Lopez, Javier
Modelling Privacy-Aware Trust Negotiations Journal Article
In: Computers & Security, vol. 77, pp. 773-789, 2018, ISSN: 0167-4048.
@article{Ruben2017trust,
title = {Modelling Privacy-Aware Trust Negotiations},
author = {Ruben Rios and Carmen Fernandez-Gago and Javier Lopez},
url = {/wp-content/papers/Ruben2017trust.pdf},
doi = {10.1016/j.cose.2017.09.015},
issn = {0167-4048},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
journal = {Computers \& Security},
volume = {77},
pages = {773-789},
publisher = {Elsevier},
abstract = {Trust negotiations are mechanisms that enable interaction between previously unknown users. After exchanging various pieces of potentially sensitive information, the participants of a negotiation can decide whether or not to trust one another. Therefore, trust negotiations bring about threats to personal privacy if not carefully considered. This paper presents a framework for representing trust negotiations in the early phases of the Software Development Life Cycle (SDLC). The framework can help software engineers to determine the most suitable policies for the system by detecting conflicts between privacy and trust requirements. More precisely, we extend the SI* modelling language and provide a set of predicates for defining trust and privacy policies and a set of rules for describing the dynamics of the system based on the established policies. The formal representation of the model facilitates its automatic verification. The framework has been validated in a distributed social network scenario for connecting drivers with potential passengers willing to share a journey.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Garcia-Alfaro, Joaquin; Herrera-Joancomarti, Jordi; Livraga, Giovanni; Rios, Ruben
13th International Workshop on Data Privacy Management (DPM 2018) Proceedings
Springer International Publishing, Barcelona, Spain, vol. 11025, 2018, ISBN: 978-3-030-00305-0.
@proceedings{rios2018dpm,
title = {13th International Workshop on Data Privacy Management (DPM 2018)},
author = {Joaquin Garcia-Alfaro and Jordi Herrera-Joancomarti and Giovanni Livraga and Ruben Rios},
doi = {10.1007/978-3-030-00305-0},
isbn = {978-3-030-00305-0},
year = {2018},
date = {2018-01-01},
urldate = {2018-01-01},
volume = {11025},
publisher = {Springer International Publishing},
address = {Barcelona, Spain},
edition = {LNCS},
abstract = {ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
keywords = {},
pubstate = {published},
tppubtype = {proceedings}
}
2017
Lopez, Javier; Rios, Ruben; Bao, Feng; Wang, Guilin
Evolving privacy: From sensors to the Internet of Things Journal Article
In: Future Generation Computer Systems, vol. 75, pp. 46–57, 2017, ISSN: 0167-739X.
@article{Lopez2017iotpriv,
title = {Evolving privacy: From sensors to the Internet of Things},
author = {Javier Lopez and Ruben Rios and Feng Bao and Guilin Wang},
url = {/wp-content/papers/Lopez2017iotpriv.pdf},
doi = {10.1016/j.future.2017.04.045},
issn = {0167-739X},
year = {2017},
date = {2017-10-01},
urldate = {2017-10-01},
journal = {Future Generation Computer Systems},
volume = {75},
pages = {46\textendash57},
publisher = {Elsevier},
abstract = {The Internet of Things (IoT) envisions a world covered with billions of smart, interacting things capable of offering all sorts of services to near and remote entities. The benefits and comfort that the IoT will bring about are undeniable, however, these may come at the cost of an unprecedented loss of privacy. In this paper we look at the privacy problems of one of the key enablers of the IoT, namely wireless sensor networks, and analyse how these problems may evolve with the development of this complex paradigm. We also identify further challenges which are not directly associated with already existing privacy risks but will certainly have a major impact in our lives if not taken into serious consideration.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Nieto, Ana; Rios, Ruben; Lopez, Javier
A Methodology for Privacy-Aware IoT-Forensics Proceedings Article
In: 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017), pp. 626-633, IEEE IEEE, Sydney (Australia), 2017, ISSN: 2324-9013.
@inproceedings{1652,
title = {A Methodology for Privacy-Aware IoT-Forensics},
author = {Ana Nieto and Ruben Rios and Javier Lopez},
url = {/wp-content/papers/1652.pdf},
doi = {10.1109/Trustcom/BigDataSE/ICESS.2017.293},
issn = {2324-9013},
year = {2017},
date = {2017-08-01},
urldate = {2017-08-01},
booktitle = {16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017)},
pages = {626-633},
publisher = {IEEE},
address = {Sydney (Australia)},
organization = {IEEE},
abstract = {The Internet of Things (IoT) brings new challenges to digital forensics. Given the number and heterogeneity of devices in such scenarios, it bring extremely difficult to carry out investigations without the cooperation of individuals. Even if they are not directly involved in the offense, their devices can yield digital evidence that might provide useful clarification in an investigation. However, when providing such evidence they may leak sensitive personal information. This paper proposes PRoFIT; a new model for IoT-forensics that takes privacy into consideration by incorporating the requirements of ISO/IEC 29100:2011 throughout the investigation life cycle. PRoFIT is intended to lay the groundwork for the voluntary cooperation of individuals in cyber crime investigations.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Nieto, Ana; Rios, Ruben; Lopez, Javier
Digital Witness and Privacy in IoT: Anonymous Witnessing Approach Proceedings Article
In: 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017), pp. 642-649, IEEE IEEE, Sydney (Australia), 2017, ISSN: 2324-9013.
@inproceedings{1654,
title = {Digital Witness and Privacy in IoT: Anonymous Witnessing Approach},
author = {Ana Nieto and Ruben Rios and Javier Lopez},
url = {/wp-content/papers/1654.pdf},
doi = {10.1109/Trustcom/BigDataSE/ICESS.2017.295},
issn = {2324-9013},
year = {2017},
date = {2017-08-01},
urldate = {2017-08-01},
booktitle = {16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017)},
pages = {642-649},
publisher = {IEEE},
address = {Sydney (Australia)},
organization = {IEEE},
abstract = {The emphdigital witness approach defines the collaboration between IoT devices - from wearables to vehicles - to provide digital evidence through a emphDigital Chain of Custody to an authorised entity. As one of the cores of the digital witness, emphbinding credentials unequivocally identify the user behind the digital witness. The objective of this article is to perform a critical analysis of the digital witness approach from the perspective of privacy, and to propose solutions that help include some notions of privacy in the scheme (for those cases where it is possible). In addition, emphdigital anonymous witnessing as a tradeoff mechanism between the original approach and privacy requirements is proposed. This is a clear challenge in this context given the restriction that the identities of the links in the digital chain of custody should be known.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Rios, Ruben; Roman, Rodrigo; Onieva, Jose A.; Lopez, Javier
From Smog to Fog: A Security Perspective Proceedings Article
In: 2nd IEEE International Conference on Fog and Edge Mobile Computing (FMEC 2017), pp. 56-61, IEEE Computer Society IEEE Computer Society, Valencia, Spain. 8-11 May 2017, 2017, ISBN: 978-1-5386-2859-1.
@inproceedings{Ruben2017smog,
title = {From Smog to Fog: A Security Perspective},
author = {Ruben Rios and Rodrigo Roman and Jose A. Onieva and Javier Lopez},
url = {/wp-content/papers/Ruben2017smog.pdf},
doi = {10.1109/FMEC.2017.7946408},
isbn = {978-1-5386-2859-1},
year = {2017},
date = {2017-06-01},
urldate = {2017-06-01},
booktitle = {2nd IEEE International Conference on Fog and Edge Mobile Computing (FMEC 2017)},
pages = {56-61},
publisher = {IEEE Computer Society},
address = {Valencia, Spain. 8-11 May 2017},
organization = {IEEE Computer Society},
abstract = {Cloud computing has some major limitations that hinder its application to some specific scenarios (e.g., Industrial IoT, and remote surgery) where there are particularly stringent requirements, such as extremely low latency. Fog computing is a specialization of the Cloud that promises to overcome the aforementioned limitations by bringing the Cloud closer to end-users. Despite its potential benefits, Fog Computing is still a developing paradigm which demands further research, especially on security and privacy aspects. This is precisely the focus of this paper: to make evident the urgent need for security mechanisms in Fog computing, as well as to present a research strategy with the necessary steps and processes that are being undertaken within the scope of the SMOG project, in order to enable a trustworthy and resilient Fog ecosystem.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Rios, Ruben; Nuñez, David; Lopez, Javier
Query Privacy in Sensing-as-a-Service Platforms Proceedings Article
In: Vimercati, Sabrina De Capitani; Martinelli, Fabio (Ed.): 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), pp. 141–154, Springer Springer, Roma, Italy, 2017.
@inproceedings{Rios2017query,
title = {Query Privacy in Sensing-as-a-Service Platforms},
author = {Ruben Rios and David Nu\~{n}ez and Javier Lopez},
editor = {Sabrina De Capitani Vimercati and Fabio Martinelli},
url = {/wp-content/papers/Rios2017query.pdf},
doi = {10.1007/978-3-319-58469-0_10},
year = {2017},
date = {2017-05-01},
urldate = {2017-05-01},
booktitle = {32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017)},
volume = {502},
pages = {141\textendash154},
publisher = {Springer},
address = {Roma, Italy},
organization = {Springer},
series = {IFIP Advances in Information and Communication Technology (AICT)},
abstract = {The Internet of Things (IoT) promises to revolutionize the way we interact with the physical world. Even though this paradigm is still far from being completely realized, there already exist Sensing-as-a-Service (S^2aaS) platforms that allow users to query for IoT data. While this model offers tremendous benefits, it also entails increasingly challenging privacy issues. In this paper, we concentrate on the protection of user privacy when querying sensing devices through a semi-trusted S^2aaS platform. In particular, we build on techniques inspired by proxy re-encryption and k-anonymity to tackle two intertwined problems, namely query privacy and query confidentiality. The feasibility of our solution is validated both analytically and empirically.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Nieto, Ana; Rios, Ruben; Lopez, Javier
PRoFIT: modelo forense-IoT con integración de requisitos de privacidad Proceedings Article
In: XIII Jornadas de Ingeniería Telemática (JITEL 2017), pp. 302-309, Editorial Universitat Politècnica de València Editorial Universitat Politècnica de València, Valencia, 2017, ISBN: 978-84-9048-595-8.
BibTeX | Links:
@inproceedings{1655,
title = {PRoFIT: modelo forense-IoT con integraci\'{o}n de requisitos de privacidad},
author = {Ana Nieto and Ruben Rios and Javier Lopez},
url = {/wp-content/papers/1655.pdf
http://jlloret.webs.upv.es/jitel2017/files/ACTASJITEL2017.pdf},
doi = {10.4995/JITEL2017.2017.7061},
isbn = {978-84-9048-595-8},
year = {2017},
date = {2017-01-01},
urldate = {2017-01-01},
booktitle = {XIII Jornadas de Ingenier\'{i}a Telem\'{a}tica (JITEL 2017)},
volume = {Libro de actas},
pages = {302-309},
publisher = {Editorial Universitat Polit\`{e}cnica de Val\`{e}ncia},
address = {Valencia},
organization = {Editorial Universitat Polit\`{e}cnica de Val\`{e}ncia},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Nieto, Ana; Rios, Ruben
Requisitos y soluciones de privacidad para la testificación digital Proceedings Article
In: III Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017), pp. 51-58, Servicio de Publicaciones de la URJC Servicio de Publicaciones de la URJC, Madrid (Spain), 2017, ISBN: 978-84-608-4659-8.
BibTeX | Links:
@inproceedings{1648,
title = {Requisitos y soluciones de privacidad para la testificaci\'{o}n digital},
author = {Ana Nieto and Ruben Rios},
url = {/wp-content/papers/1648.pdf
https://eciencia.urjc.es/handle/10115/14540},
isbn = {978-84-608-4659-8},
year = {2017},
date = {2017-01-01},
urldate = {2017-01-01},
booktitle = {III Jornadas Nacionales de Investigaci\'{o}n en Ciberseguridad (JNIC 2017)},
volume = {Actas del JNIC 2017},
pages = {51-58},
publisher = {Servicio de Publicaciones de la URJC},
address = {Madrid (Spain)},
organization = {Servicio de Publicaciones de la URJC},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2016
Rios, Ruben; Lopez, Javier
Evolución y nuevos desafios de privacidad en la Internet de las Cosas Proceedings Article
In: XIV Reunión Española sobre Criptología y Seguridad de la Información, pp. 209-213, Mahón, Menorca, Islas Baleares, 2016.
@inproceedings{Rios2016a,
title = {Evoluci\'{o}n y nuevos desafios de privacidad en la Internet de las Cosas},
author = {Ruben Rios and Javier Lopez},
url = {/wp-content/papers/Rios2016a.pdf},
year = {2016},
date = {2016-10-01},
urldate = {2016-10-01},
booktitle = {XIV Reuni\'{o}n Espa\~{n}ola sobre Criptolog\'{i}a y Seguridad de la Informaci\'{o}n},
pages = {209-213},
address = {Mah\'{o}n, Menorca, Islas Baleares},
abstract = {La Internet de las Cosas (en ingl\'{e}s, emphInternet of Things (IoT)) es una evoluci\'{o}n de la Internet tal y como lo conocemos. Esta nueva versi\'{o}n de Internet incorpora objetos de la vida cotidiana, rompiendo as\'{i} barrera de los digital y extendi\'{e}ndose al mundo f\'{i}sico. Estos objetos interactuar\'{a}n entre s\'{i} y con otras entidades tanto de manera local como remota, y estar\'{a}n dotados de cierta capacidad computacional y sensores para que sean conscientes de lo que ocurre en su entorno. Esto traer\'{a} consigo un sinf\'{i}n de posibilidades y nuevos servicios, pero tambi\'{e}n dar\'{a} lugar a nuevos y mayores riesgos de privacidad para los ciudadanos. En este art\'{i}culo, estudiamos los problemas de privacidad actuales de una de las tecnolog\'{i}as claves para el desarrollo de este prometedor paradigma, las redes de sensores, y analizamos como pueden evolucionar y surgir nuevos riesgos de privacidad al ser completamente integradas en la Internet.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Rios, Ruben; Fernandez-Gago, Carmen; Lopez, Javier
Privacy-Aware Trust Negotiation Proceedings Article
In: 12th International Workshop on Security and Trust Management (STM), pp. 98-105, Springer Springer, Heraklion, Crete, Greece, 2016, ISSN: 0302-9743.
@inproceedings{rios2016b,
title = {Privacy-Aware Trust Negotiation},
author = {Ruben Rios and Carmen Fernandez-Gago and Javier Lopez},
url = {/wp-content/papers/rios2016b.pdf
http://link.springer.com/chapter/10.1007/978-3-319-46598-2_7, },
doi = {10.1007/978-3-319-46598-2 7},
issn = {0302-9743},
year = {2016},
date = {2016-09-01},
urldate = {2016-09-01},
booktitle = {12th International Workshop on Security and Trust Management (STM)},
volume = {LNCS 9871},
pages = {98-105},
publisher = {Springer},
address = {Heraklion, Crete, Greece},
organization = {Springer},
abstract = {Software engineering and information security have traditionally followed divergent paths but lately some efforts have been made to consider security from the early phases of the Software Development Life Cycle (SDLC). This paper follows this line and concentrates on the incorporation of trust negotiations during the requirements engineering phase. More precisely, we provide an extension to the SI* modelling language, which is further formalised using answer set programming specifications to support the automatic verification of the model and the detection of privacy conflicts caused by trust negotiations.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Rios, Ruben; Lopez, Javier; Cuellar, Jorge
Location Privacy in Wireless Sensor Networks Book
Taylor & Francis, 2016, ISBN: 9781498776332.
BibTeX | Links:
@book{Rios2016,
title = {Location Privacy in Wireless Sensor Networks},
author = {Ruben Rios and Javier Lopez and Jorge Cuellar},
url = {https://www.crcpress.com/Location-Privacy-in-Wireless-Sensor-Networks/Rios-Lopez-Cuellar/p/book/9781498776332},
isbn = {9781498776332},
year = {2016},
date = {2016-01-01},
urldate = {2016-01-01},
publisher = {Taylor \& Francis},
organization = {Taylor \& Francis},
series = {CRC Series in Security, Privacy and Trust},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
2015
Rios, Ruben; Cuellar, Jorge; Lopez, Javier
Probabilistic receiver-location privacy protection in wireless sensor networks Journal Article
In: Information Sciences, vol. 321, pp. 205 – 223, 2015, ISSN: 0020-0255.
@article{rios2015,
title = {Probabilistic receiver-location privacy protection in wireless sensor networks},
author = {Ruben Rios and Jorge Cuellar and Javier Lopez},
url = {/wp-content/papers/rios2015.pdf},
doi = {10.1016/j.ins.2015.01.016},
issn = {0020-0255},
year = {2015},
date = {2015-07-01},
urldate = {2015-07-01},
journal = {Information Sciences},
volume = {321},
pages = {205 - 223},
publisher = {Elsevier},
abstract = {Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among these, the attacks targeted at the base station are the most devastating ones since this essential device processes and analyses all traffic generated in the network. Moreover, this feature can be exploited by a passive adversary to determine its location based on traffic analysis. This receiver-location privacy problem can be reduced by altering the traffic pattern of the network but the adversary may still be able to reach the base station if he gains access to the routing tables of a number of sensor nodes. In this paper we present HISP-NC (Homogenous Injection for Sink Privacy with Node Compromise protection), a receiver-location privacy solution that consists of two complementary schemes which protect the location of the base station in the presence of traffic analysis and node compromise attacks. The HISP-NC data transmission protocol prevents traffic analysis by probabilistically hiding the flow of real traffic with moderate amounts of fake traffic. Moreover, HISP-NC includes a perturbation mechanism that modifies the routing tables of the nodes to introduce some level of uncertainty in attackers capable of retrieving the routing information from the nodes. Our scheme is validated both analytically and experimentally through extensive simulations.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2014
Onieva, Jose A.; Rios, Ruben; Palenciano, Bernardo
Análisis y Desarrollo de un Canal Encubierto en una Red de Sensores Proceedings Article
In: XIII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2014), pp. 333-338, Universidad de Alicante Universidad de Alicante, Alicante, Spain, 2014, ISBN: 978-84-9717-323-0.
@inproceedings{onieva2014,
title = {An\'{a}lisis y Desarrollo de un Canal Encubierto en una Red de Sensores},
author = {Jose A. Onieva and Ruben Rios and Bernardo Palenciano},
url = {/wp-content/papers/onieva2014.pdf},
isbn = {978-84-9717-323-0},
year = {2014},
date = {2014-09-01},
urldate = {2014-09-01},
booktitle = {XIII Reuni\'{o}n Espa\~{n}ola sobre Criptolog\'{i}a y Seguridad de la Informaci\'{o}n (RECSI 2014)},
pages = {333-338},
publisher = {Universidad de Alicante},
address = {Alicante, Spain},
organization = {Universidad de Alicante},
abstract = {Continuamente aparecen nuevos estudios as\'{i} como nuevos desarrollos de canales encubiertos. Como veremos, existen m\'{a}s de cien dise\~{n}os distintos para redes de ordenadores, pero no hemos encontrado en la literatura ning\'{u}n an\'{a}lisis, dise\~{n}o e implementaci\'{o}n de canales encubiertos sobre redes de sensores. En este art\'{i}culo presentamos los resultados del dise\~{n}o e implementaci\'{o}n de un canal multitasa basado en los tiempos de monitorizaci\'{o}n sobre una red de sensores. En este proceso se han establecido las principales propiedades necesarias y, en base a ellas, se desarrolla e implementa el canal encubierto. Se describe el proceso de desarrollo y se analiza su detectabilidad.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Lopez, Javier; Rios, Ruben; Cuellar, Jorge
Preserving Receiver-Location Privacy in Wireless Sensor Networks Proceedings Article
In: Information Security Practice and Experience (ISPEC 2014), pp. 15-27, Springer Springer, Fuzhou, China, 2014, ISSN: 0302-9743.
@inproceedings{Lopez2014prl,
title = {Preserving Receiver-Location Privacy in Wireless Sensor Networks},
author = {Javier Lopez and Ruben Rios and Jorge Cuellar},
url = {/wp-content/papers/Lopez2014prl.pdf
http://link.springer.com/chapter/10.1007/978-3-319-06320-1_3$#$, },
doi = {10.1007/978-3-319-06320-1_3},
issn = {0302-9743},
year = {2014},
date = {2014-05-01},
urldate = {2014-05-01},
booktitle = {Information Security Practice and Experience (ISPEC 2014)},
volume = {8434},
pages = {15-27},
publisher = {Springer},
address = {Fuzhou, China},
organization = {Springer},
abstract = {Wireless sensor networks (WSNs) are exposed to many different types of attacks. Among these, the most devastating attack is to compromise or destroy the base station since all communications are addressed exclusively to it. Moreover, this feature can be exploited by a passive adversary to determine the location of this critical device. This receiver-location privacy problem can be reduced by hindering traffic analysis but the adversary may still obtain location information by capturing a subset of sensor nodes in the field. This paper addresses, for the first time, these two problems together in a single solution},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Rios, Ruben; Lopez, Javier; Cuellar, Jorge
Location Privacy in WSNs: Solutions, Challenges, and Future Trends Book Section
In: Foundations of Security Analysis and Design VII, vol. 8604, pp. 244-282, Springer, 2014, ISSN: 0302-9743.
@incollection{ruben2014a,
title = {Location Privacy in WSNs: Solutions, Challenges, and Future Trends},
author = {Ruben Rios and Javier Lopez and Jorge Cuellar},
url = {/wp-content/papers/ruben2014a.pdf},
doi = {10.1007/978-3-319-10082-1_9},
issn = {0302-9743},
year = {2014},
date = {2014-01-01},
urldate = {2014-01-01},
booktitle = {Foundations of Security Analysis and Design VII},
volume = {8604},
pages = {244-282},
publisher = {Springer},
organization = {Springer},
series = {LNCS},
abstract = {Privacy preservation is gaining popularity in Wireless Sensor Network (WSNs) due to its adoption in everyday scenarios. There are a number of research papers in this area many of which concentrate on the location privacy problem. In this paper we review and categorise these solutions based on the information available to the adversary and his capabilities. But first we analyse whether traditional anonymous communication systems conform to the original requirements of location privacy in sensor networks. Finally, we present and discuss a number of challenges and future trends that demand further attention from the research community.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
2013
Agudo, Isaac; Rios, Ruben; Lopez, Javier
A Privacy-Aware Continuous Authentication Scheme for Proximity-Based Access Control Journal Article
In: Computers & Security, vol. 39 (B), pp. 117-126, 2013, ISSN: 0167-4048.
@article{agudo2013,
title = {A Privacy-Aware Continuous Authentication Scheme for Proximity-Based Access Control},
author = {Isaac Agudo and Ruben Rios and Javier Lopez},
url = {/wp-content/papers/agudo2013.pdf},
doi = {10.1016/j.cose.2013.05.004},
issn = {0167-4048},
year = {2013},
date = {2013-11-01},
urldate = {2013-11-01},
journal = {Computers \& Security},
volume = {39 (B)},
pages = {117-126},
publisher = {Elsevier},
abstract = {Continuous authentication is mainly associated with the use of biometrics to guarantee that a resource is being accessed by the same user throughout the usage period. Wireless devices can also serve as a supporting technology for continuous authentication or even as a complete alternative to biometrics when accessing proximity-based services. In this paper we present the implementation of a secure, non-invasive continuous authentication scheme supported by the use of Wearable Wireless Devices (WWD), which allow users to gain access to proximity-based services while preserving their privacy. Additionally we devise an improved scheme that circumvents some of the limitations of our implementation.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Rios, Ruben; Onieva, Jose A.; Lopez, Javier
Covert Communications through Network Configuration Messages Journal Article
In: Computers & Security, vol. 39, Part A, pp. 34 – 46, 2013, ISSN: 0167-4048.
@article{rios2013a,
title = {Covert Communications through Network Configuration Messages},
author = {Ruben Rios and Jose A. Onieva and Javier Lopez},
url = {/wp-content/papers/rios2013a.pdf},
doi = {10.1016/j.cose.2013.03.004},
issn = {0167-4048},
year = {2013},
date = {2013-11-01},
urldate = {2013-11-01},
journal = {Computers \& Security},
volume = {39, Part A},
pages = {34 - 46},
publisher = {Elsevier},
abstract = {Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in Multi-Level Security systems in the early 70’s they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. In this paper we concentrate on short-range covert channels and analyze the opportunities of concealing data in various extensively used protocols today. From this analysis we observe several features that can be effectively exploited for subliminal data transmission in the Dynamic Host Configuration Protocol (DHCP). The result is a proof-of-concept implementation, HIDE_DHCP, which integrates three different covert channels each of which accommodate to different stealthiness and capacity requirements. Finally, we provide a theoretical and experimental analysis of this tool in terms of its reliability, capacity, and detectability.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Rios, Ruben; Cuellar, Jorge; Lopez, Javier
Ocultación de la estación base en redes inalámbricas de sensores Proceedings Article
In: Verdejo, Jesús E. Díaz; Ortiz, Jorge Navarro; Muñoz, Juan J. Ramos (Ed.): XI Jornadas de Ingeniería Telemática (JITEL 2013), pp. 481-486, Asociación de Telemática Asociación de Telemática, Granada, 2013, ISBN: 978-84-616-5597-7.
@inproceedings{rios2013b,
title = {Ocultaci\'{o}n de la estaci\'{o}n base en redes inal\'{a}mbricas de sensores},
author = {Ruben Rios and Jorge Cuellar and Javier Lopez},
editor = {Jes\'{u}s E. D\'{i}az Verdejo and Jorge Navarro Ortiz and Juan J. Ramos Mu\~{n}oz},
url = {/wp-content/papers/rios2013b.pdf},
isbn = {978-84-616-5597-7},
year = {2013},
date = {2013-10-01},
urldate = {2013-10-01},
booktitle = {XI Jornadas de Ingenier\'{i}a Telem\'{a}tica (JITEL 2013)},
pages = {481-486},
publisher = {Asociaci\'{o}n de Telem\'{a}tica},
address = {Granada},
organization = {Asociaci\'{o}n de Telem\'{a}tica},
abstract = {La estaci\'{o}n base es el elemento m\'{a}s importante en un red de sensores y, por tanto, es necesario evitar que un atacante pueda hacerse con el control de este valioso dispositivo. Para ello, el atacante puede valerse tanto de t\'{e}cnicas de an\'{a}lisis de tr\'{a}fico como de la captura de nodos. En este trabajo presentamos un esquema que consta de dos fases, la primera est\'{a} dedicada a homogeneizar los patrones de tr\'{a}fico y la segunda encargada de perturbar las tablas de rutas de los nodos. Ambas fases permiten mantener a la estaci\'{o}n base fuera del alcance del atacante con un coste computacional insignificante y un consumo energ\'{e}tico moderado. La validez de nuestro esquema ha sido validada anal\'{i}ticamente y a trav\'{e}s de numerosas simulaciones.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Rios, Ruben; Lopez, Javier
(Un)Suitability of Anonymous Communication Systems to WSN Journal Article
In: IEEE Systems Journal, vol. 7, no. 2, pp. 298 – 310, 2013, ISSN: 1932-8184.
@article{Rios2012a,
title = {(Un)Suitability of Anonymous Communication Systems to WSN},
author = {Ruben Rios and Javier Lopez},
url = {/wp-content/papers/Rios2012a.pdf},
doi = {10.1109/JSYST.2012.2221956},
issn = {1932-8184},
year = {2013},
date = {2013-06-01},
urldate = {2013-06-01},
journal = {IEEE Systems Journal},
volume = {7},
number = {2},
pages = {298 - 310},
publisher = {IEEE Systems Council},
abstract = {Anonymous communication systems have been extensively studied by the research community to prevent the disclosure of sensitive information from the analysis of individuals’ traffic patterns. Many remarkable solutions have been developed in this area, most of which have proven to be effective in the protection of user privacy against different types of attacks. Recently, the privacy preservation problem has also been considered in the realm of wireless sensor networks (WSNs) due to their imminent adoption in real-world scenarios. A special challenge that arises from the analysis of the flow of sensor nodes’ communications is the location privacy problem. In this work we concentrate on analyzing the suitability of traditional anonymous communication systems originally designed for the Internet to the original scenario of sensor networks. The results show that, in most cases, traditional solutions do not provide the adequate protection means for the particular problem of location privacy, while other solutions are too resource-consuming for the restricted capabilities of sensor nodes.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2012
Rios, Ruben; Lopez, Javier
Adecuación de soluciones de anonimato al problema de la privacidad de localización en WSN Proceedings Article
In: Zurutuza, Urko; Uribeetxeberria, Roberto; Arenaza-Nuño, Ignacio (Ed.): XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2012), pp. 309-314, Donostia-San Sebastián, 2012, ISBN: 978-84-615-9933-2.
@inproceedings{Rios2012b,
title = {Adecuaci\'{o}n de soluciones de anonimato al problema de la privacidad de localizaci\'{o}n en WSN},
author = {Ruben Rios and Javier Lopez},
editor = {Urko Zurutuza and Roberto Uribeetxeberria and Ignacio Arenaza-Nu\~{n}o},
url = {/wp-content/papers/Rios2012b.pdf},
isbn = {978-84-615-9933-2},
year = {2012},
date = {2012-09-01},
urldate = {2012-09-01},
booktitle = {XII Reuni\'{o}n Espa\~{n}ola sobre Criptolog\'{i}a y Seguridad de la Informaci\'{o}n (RECSI 2012)},
pages = {309-314},
address = {Donostia-San Sebasti\'{a}n},
abstract = {Los patrones de tr\'{a}fico caracter\'{i}sticos de las redes inal\'{a}mbricas de sensores (WSNs) dan lugar al problema de la privacidad de localizaci\'{o}n. De manera similar, el tr\'{a}fico de los usuarios en Internet revela informaci\'{o}n sensible que puede ser protegida mediante sistemas de comunicaci\'{o}n an\'{o}nima (ACS). Por ello, este trabajo analiza la posibilidad de adaptar las soluciones de anonimato tradicionales al problema particular de las redes de sensores. Hasta el momento estas soluciones hab\'{i}an sido rechazadas sin un an\'{a}lisis riguroso, argumentando simplemente que eran demasiado exigentes computacionalmente para los nodos sensores. Nuestros resultados demuestran que, en general, algunos ACS no cumplen los requisitos de privacidad necesarios en WSNs mientras que otros, que si los cumplen, se valen de una cantidad de recursos que superan la capacidad de los sensores.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Rios, Ruben; Cuellar, Jorge; Lopez, Javier
Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN Proceedings Article
In: Foresti, Sara; Yung, Moti; Martinelli, Fabio (Ed.): 17th European Symposium on Research in Computer Security (ESORICS 2012), pp. 163-180, Springer Springer, Pisa, Italy, 2012, ISSN: 0302-9743.
@inproceedings{Rios2012d,
title = {Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN},
author = {Ruben Rios and Jorge Cuellar and Javier Lopez},
editor = {Sara Foresti and Moti Yung and Fabio Martinelli},
url = {/wp-content/papers/Rios2012d.pdf},
doi = {10.1007/978-3-642-33167-1_10},
issn = {0302-9743},
year = {2012},
date = {2012-09-01},
urldate = {2012-09-01},
booktitle = {17th European Symposium on Research in Computer Security (ESORICS 2012)},
volume = {7459},
pages = {163-180},
publisher = {Springer},
address = {Pisa, Italy},
organization = {Springer},
series = {LNCS},
abstract = {The singular communication model in wireless sensor networks (WSNs) originate pronounced traffic patterns that allow a local observer to deduce the location of the base station, which must be kept secret for both strategical and security reasons. In this work we present a new receiver-location privacy solution called HISP (Homogenous Injection for Sink Privacy). Our scheme is based on the idea of hiding the flow of real traffic by carefully injecting fake traffic to homogenize the transmissions from a node to its neighbors. This process is guided by a lightweight probabilistic approach ensuring that the adversary cannot decide with sufficient precision in which direction to move while maintaining a moderate amount of fake traffic. Our system is both validated analytically and experimentally through simulations.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Rios, Ruben; Onieva, Jose A.; Lopez, Javier
HIDE_DHCP: Covert Communications Through Network Configuration Messages Proceedings Article
In: Gritzalis, Dimitris; Furnell, Steven; Theoharidou, Marianthi (Ed.): Proceedings of the 27th IFIP TC 11 International Information Security and Privacy Conference (SEC 2012), pp. 162-173, Springer Boston Springer Boston, Heraklion, Crete, Greece, 2012, ISSN: 1868-4238.
@inproceedings{Rios2012,
title = {HIDE_DHCP: Covert Communications Through Network Configuration Messages},
author = {Ruben Rios and Jose A. Onieva and Javier Lopez},
editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou},
url = {/wp-content/papers/Rios2012.pdf},
doi = {10.1007/978-3-642-30436-1_14},
issn = {1868-4238},
year = {2012},
date = {2012-06-01},
urldate = {2012-06-01},
booktitle = {Proceedings of the 27th IFIP TC 11 International Information Security and Privacy Conference (SEC 2012)},
volume = {376},
pages = {162-173},
publisher = {Springer Boston},
address = {Heraklion, Crete, Greece},
organization = {Springer Boston},
series = {IFIP AICT},
abstract = {Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in multilevel security systems in the early 70’s they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. We analyze a protocol extensively used today, the Dynamic Host Configuration Protocol (DHCP), in search of new forms of covert communication. From this analysis we observe several features that can be effectively exploited for subliminal data transmission. This results in the implementation of HIDE_DHCP, which integrates three covert channels that accommodate to different stealthiness and bandwidth requirements},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Cuellar, Jorge; Ochoa, Martin; Rios, Ruben
Indistinguishable Regions in Geographic Privacy Proceedings Article
In: Ossowski, Sascha; Lecca, Paola (Ed.): Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC 2012), pp. 1463-1469, ACM ACM, Riva del Garda (Trento), Italy, 2012, ISBN: 978-1-4503-0857-1.
@inproceedings{Cuellar2012,
title = {Indistinguishable Regions in Geographic Privacy},
author = {Jorge Cuellar and Martin Ochoa and Ruben Rios},
editor = {Sascha Ossowski and Paola Lecca},
url = {/wp-content/papers/Cuellar2012.pdf},
doi = {10.1145/2245276.2232010},
isbn = {978-1-4503-0857-1},
year = {2012},
date = {2012-03-01},
urldate = {2012-03-01},
booktitle = {Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC 2012)},
pages = {1463-1469},
publisher = {ACM},
address = {Riva del Garda (Trento), Italy},
organization = {ACM},
abstract = {The ubiquity of positioning devices poses a natural security challenge: users want to take advantage of location-related services as well as social sharing of their position but at the same time have security concerns about how much information should be shared about their exact position. This paper discusses different location-privacy problems, their formalization and the novel notion of indistinguishability regions that allows one to proof that a given obfuscation function provides a good trade-off between location sharing and privacy.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2011
Rios, Ruben; Lopez, Javier
Analysis of Location Privacy Solutions in Wireless Sensor Networks Journal Article
In: IET Communications, vol. 5, pp. 2518 – 2532, 2011, ISSN: 1751-8628.
@article{Rios2011a,
title = {Analysis of Location Privacy Solutions in Wireless Sensor Networks},
author = {Ruben Rios and Javier Lopez},
url = {/wp-content/papers/Rios2011a.pdf},
doi = {10.1049/iet-com.2010.0825},
issn = {1751-8628},
year = {2011},
date = {2011-11-01},
urldate = {2011-11-01},
journal = {IET Communications},
volume = {5},
pages = {2518 - 2532},
publisher = {Institution of Engineering and Technology},
abstract = {Extensive work has been done on the protection of Wireless Sensor Networks (WSNs) from the hardware to the application layer. However, only recently, the privacy preservation problem has drawn the attention of the research community because of its challenging nature. This problem is exacerbated in the domain of WSNs due to the extreme resource limitation of sensor nodes. In this paper we focus on the location privacy problem in WSNs, which allows an adversary to determine the location of nodes of interest to him. We provide a taxonomy of solutions based on the power of the adversary and the main techniques proposed by the various solutions. In addition, we describe and analyse the advantages and disadvantages of different approaches. Finally, we discuss some open challenges and future directions of research.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Rios, Ruben; Lopez, Javier
Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks Journal Article
In: The Computer Journal, vol. 54, pp. 1603-1615, 2011, ISSN: 0010-4620.
@article{Rios2011b,
title = {Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks},
author = {Ruben Rios and Javier Lopez},
url = {/wp-content/papers/Rios2011b.pdf},
doi = {10.1093/comjnl/bxr055},
issn = {0010-4620},
year = {2011},
date = {2011-09-01},
urldate = {2011-09-01},
journal = {The Computer Journal},
volume = {54},
pages = {1603-1615},
publisher = {Oxford University Press},
abstract = {The source-location privacy problem in Wireless Sensor Networks has been traditionally tackled by the creation of random routes for every packet transmitted from the source nodes to the base station. These schemes provide a considerable protection level at a high cost in terms of message delivery time and energy consumption. This overhead is due to the fact that the data routing process is done in a blind way, without knowledge about the location of the attacker. In this work we propose the Context-Aware Location Privacy (CALP) approach, which takes advantage of the ability of sensor nodes to perceive the presence of a mobile adversary in their vicinity in order to transmit data packets in a more energy-efficient and privacy-preserving manner. In particular, we apply the concepts of CALP to the development of a shortest-path CALP routing algorithm. A permissive and a strict version of the protocol are studied for different adversarial models and the proposed schemes are evaluated through simulation experiments in terms of privacy protection and energy consumption. Finally, we present the conclusions of the paper as well as possible extensions of this work.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2010
Rios, Ruben; Agudo, Isaac; Gonzalez, Jose L.
Implementación de un esquema de localización privada y segura para interiores Proceedings Article
In: Dimitriadis, Yannis; Pérez, María Jesús Verdú (Ed.): IX Jornadas de Ingeniería Telemática (JITEL’10), pp. 237 – 244, Valladolid (Spain), 2010, ISBN: 978-84-693-5398-1.
@inproceedings{Rios2010a,
title = {Implementaci\'{o}n de un esquema de localizaci\'{o}n privada y segura para interiores},
author = {Ruben Rios and Isaac Agudo and Jose L. Gonzalez},
editor = {Yannis Dimitriadis and Mar\'{i}a Jes\'{u}s Verd\'{u} P\'{e}rez},
url = {/wp-content/papers/Rios2010a.pdf},
isbn = {978-84-693-5398-1},
year = {2010},
date = {2010-09-01},
urldate = {2010-09-01},
booktitle = {IX Jornadas de Ingenier\'{i}a Telem\'{a}tica (JITEL’10)},
pages = {237 - 244},
address = {Valladolid (Spain)},
abstract = {Las aplicaciones basadas en localizaci\'{o}n proporcionan a los usuarios servicios personalizados dependiendo de su ubicaci\'{o}n. Las estimaciones prev\'{e}n que estos servicios se extender\'{a}n enormemente en los pr\'{o}ximos a\~{n}os reportando grandes beneficios tanto a la industria como a los usuarios finales. Sin embargo, para que estos avances sean posibles se hace necesario analizar en profundidad las distintas implicaciones de seguridad y privacidad que la utilizaci\'{o}n de tales servicios pueden traer consigo a los usuarios. En este trabajo proponemos un sistema de localizaci\'{o}n que da soporte a la provisi\'{o}n de servicios basados en localizaci\'{o}n para entornos indoor y que se fundamenta en la tecnolog\'{i}a de redes de sensores inal\'{a}mbricos. En este esquema hemos tenido en cuenta diversos aspectos de seguridad y privacidad, prestando especial atenci\'{o}n a la limitaci\'{o}n extrema de recursos caracter\'{i}stica de las redes de sensores. Finalmente hemos desarrollado una prueba de concepto para comprobar la viabilidad de nuestro esquema dentro del \'{a}mbito del proyecto OSAmI.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Rios, Ruben; Lopez, Javier
Source Location Privacy Considerations in Wireless Sensor Networks Proceedings Article
In: Fuentes, Lidia; Gámez, Nadia; Bravo, José (Ed.): 4th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAmI’10), pp. 29 – 38, IBERGARCETA PUBLICACIONES, S.L. IBERGARCETA PUBLICACIONES, S.L., Valencia (Spain), 2010, ISBN: 978-84-92812-61-5.
@inproceedings{Rios2010,
title = {Source Location Privacy Considerations in Wireless Sensor Networks},
author = {Ruben Rios and Javier Lopez},
editor = {Lidia Fuentes and Nadia G\'{a}mez and Jos\'{e} Bravo},
url = {/wp-content/papers/Rios2010.pdf},
isbn = {978-84-92812-61-5},
year = {2010},
date = {2010-09-01},
urldate = {2010-09-01},
booktitle = {4th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAmI’10)},
pages = {29 - 38},
publisher = {IBERGARCETA PUBLICACIONES, S.L.},
address = {Valencia (Spain)},
organization = {IBERGARCETA PUBLICACIONES, S.L.},
abstract = {Wireless Sensor Networks are considered to be one of the cornerstones of Ambient Intelligence since they can be used in countless applications, where sensors are unobtrusively embedded into the environment to perform operations like monitoring, tracking and reporting. In such scenarios, privacy issues must be carefully considered since the mere observation of the network operation might reveal great amounts of private information to unauthorised parties. One of the problems that is gaining more attention in the realm of privacy, is the location privacy problem, which aims to prevent an attacker from obtaining the location of specific nodes of interest to him. In this paper we provide a general overview of the proposed solutions to counter this threat. Finally, we will also discuss some open challenges and future directions of research for a convenient management of privacy issues in smart environments.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2008
Rios, Ruben; Onieva, Jose A.
Clasificación de canales encubiertos. Un nuevo canal: Covert_DHCP Proceedings Article
In: Encinas, Luis Hernández; Rey, Angel Martin (Ed.): X Reunión Española de Criptología y Seguridad de la Información (RECSI’08), pp. 325-336, Salamanca (Spain), 2008, ISBN: 978-84-691-5158-7.
@inproceedings{Rios2008,
title = {Clasificaci\'{o}n de canales encubiertos. Un nuevo canal: Covert_DHCP},
author = {Ruben Rios and Jose A. Onieva},
editor = {Luis Hern\'{a}ndez Encinas and Angel Martin Rey},
url = {/wp-content/papers/Rios2008.pdf},
isbn = {978-84-691-5158-7},
year = {2008},
date = {2008-09-01},
urldate = {2008-09-01},
booktitle = {X Reuni\'{o}n Espa\~{n}ola de Criptolog\'{i}a y Seguridad de la Informaci\'{o}n (RECSI’08)},
pages = {325-336},
address = {Salamanca (Spain)},
abstract = {Los canales encubiertos son una forma de comunicaci\'{o}n oculta que puede vulnerar la integridad de los sistemas. Desde sus inicios en sistemas de seguridad multinivel a principios de los a\~{n}os 70 han evolucionado considerablemente, apareciendo soluciones para redes de computadores debido a la especificaci\'{o}n de algunos protocolos. Por este motivo, se hace un estudio sobre las t\'{e}cnicas que se han utilizado para crear los canales, as\'{i} como sobre las distintos obst\'{a}culos que han tratado de mermar su actividad. Asimismo, se presenta una nueva clasificaci\'{o}n que trata de albergar la mayor cantidad de canales encubiertos existentes en la actualidad. Por \'{u}ltimo, se analiza un protocolo ampliamente extendido en la actualidad, DHCP, en busca de posibilidades de albergar informaci\'{o}n encubierta. A partir de este an\'{a}lisis se implementan distintas versiones de un canal encubierto haciendo uso de este protocolo.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}