Celeste Campo
YOU?
Author Swipe
Beyond PKI: A DNSSEC Delegation Approach for Scalable Dynamic Credential Management in IoT Open
Internet of Things (IoT) systems that manage data across cloud, fog, and edge environments—and the devices that consume those services—face substantial challenges in confidentiality, privacy, and authentication. However, traditional Public…
DNS Query Forgery: A Client-Side Defense Against Mobile App Traffic Profiling Open
Mobile applications generate DNS queries that expose user behavioral patterns to network observers, creating privacy vulnerabilities even when communications are encrypted. Network eavesdroppers and DNS resolvers can analyze domain name se…
DNS Query Forgery: A Client-Side Defense Against Mobile App Traffic Profiling Open
Mobile applications continuously generate DNS queries that can reveal sensitive user behavioral patterns even when communications are encrypted. This paper presents a privacy enhancement framework based on query forgery to protect users ag…
AI Versus IoT Security: Fingerprinting and Defenses Against TLS Handshake-Based IoT Device Classification Open
The number of Internet of Things (IoT) devices in smart homes is steadily increasing, enhancing convenience but also raising security concerns. While secure communication protocols like Transport Layer Security (TLS) are commonly used, att…
Inferring mobile applications usage from DNS traffic Open
In the digital era, our lives are intrinsically linked to the daily use of mobile applications. As a consequence, we generate and transmit a large amount of personal data that puts our privacy in danger. Despite having encrypted communicat…
Reducing DNS Traffic to Enhance Home IoT Device Privacy Open
The deployment of Internet of Things (IoT) devices is widespread in different environments, including homes. Although security is incorporated, homes can become targets for cyberattacks because of their vulnerabilities. IoT devices generat…
Entropy-Based Anomaly Detection in Household Electricity Consumption Open
Energy efficiency is one of the most important current challenges, and its impact at a global level is considerable. To solve current challenges, it is critical that consumers are able to control their energy consumption. In this paper, we…
A hybrid analysis of LBSN data to early detect anomalies in crowd dynamics Open
Undoubtedly, Location-based Social Networks (LBSNs) provide an interesting source of geo-located data that we have previously used to obtain patterns of the dynamics of crowds throughout urban areas. According to our previous results, acti…
INRISCO: INcident monitoRing in Smart COmmunities Open
Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors in motion. Carrying their mobile devices, moving in their connected vehicles or actively participating in social networks, citize…
Performance Evaluation of CoAP and MQTT_SN in an IoT Environment Open
The fast growth of the Internet of Things (IoT) has made this technology one of the most promising paradigms of recent years. Wireless Sensor Networks (WSNs) are one of the most important challenges of the Internet of things. These network…
Experimental demonstration of advanced service management in SDN/NFV fronthaul Open
We demonstrate two advanced services deployed in a novel SDN/NFV optical fronthaul network combining analog radio over fiber (ARoF) and power over fiber (PoF); vertical service management for virtual content delivery networks (vCDNs), and …
Using Entropy of Social Media Location Data for the Detection of Crowd Dynamics Anomalies Open
Evidence of something unusual happening in urban areas can be collected from different data sources, such as police officers, cameras, or specialized physical infrastructures. In this paper, we propose using geotagged posts on location-bas…
Detecting and Reducing Biases in Cellular-Based Mobility Data Sets Open
Correctly estimating the features characterizing human mobility from mobile phone traces is a key factor to improve the performance of mobile networks, as well as for mobility model design and urban planning. Most related works found their…
A Bandwidth-Efficient Dissemination Scheme of Non-Safety Information in Urban VANETs Open
The recent release of standards for vehicular communications will hasten the development of smart cities in the following years. Many applications for vehicular networks, such as blocked road warnings or advertising, will require multi-hop…