Esther Palomar

Learn More
Widespread adoption of RFID technology is being slowed down because of increasing public concerns about associated security threats. This paper shows that it is possible to enhance the security of RFID systems by requiring readers to perform a computational effort test. Readers must solve a cryptographic puzzle – one of the components of the Weakly Secret(More)
0140-3664/$ see front matter 2011 Elsevier B.V. A doi:10.1016/j.comcom.2011.09.005 ⇑ Corresponding author. Tel.: +49 170 5850635. E-mail address: (A.C. Viana). This work focuses on: (1) understanding the impact of selective forwarding attacks on tree-based routing topologies in wireless sensor networks (WSNs), and (2) investigating(More)
A fundamental feature of Peer-to-Peer (P2P) networks is the honest collaboration among an heterogeneous community of participants. After Napster success –the first P2P file sharing application massively used–, advances in this area have been intense, with the proposal of many newarchitectures and applications for content and computing sharing, and(More)
The design of a secure RFID identification scheme is a thought-provoking challenge, and this paper deals with this problem adopting a groundbreaking approach. The proposed protocol, called Noent, is based on cryptographic puzzles to avoid the indiscriminate disclose of the confidential information stored on tags and on an innovative role reversal(More)
Pure peer-to-peer (P2P) networks are characterized as being extremely decentralized and self-organized, properties which are essential in a number of environments, including teamwork, collaborative, and ad-hoc systems. One of the features offered by P2P networks is the possibility of having several replicas of the same content distributed among multiple(More)
The widespread adoption of autonomous intrusion detection technology is overwhelming current frameworks for network security management. Modern intrusion detection systems (IDSs) and intelligent agents are the most mentioned in literature and news, although other risks such as broad attacks (e.g. very widely spread in a distributed fashion like botnets),(More)
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication, content integrity or access control, presents several difficulties, most of them due to the decentralized nature of these environments and the lack of central authorities. Even(More)
JULIO C. HERNANDEZ-CASTRO, JUAN E. TAPIADOR, ESTHER PALOMAR AND ANGEL ROMERO-GONZALEZ School of Computing University of Portsmouth Hampshire, PO1 2UP UK E-mail: Department of Computer Science University of York York, YO10 5DD UK E-mail: Department of Computer Science Carlos III University of Madrid(More)
Security information and event management (SIEM) is considered to be a promising paradigm to reconcile traditional intrusion detection processes along with most recent advances on artificial intelligence techniques in providing automatic and self–adaptive systems. However, classic management– related flaws still persist, e.g. the fusion of large amounts of(More)