Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pablo Najera is active.

Publication


Featured researches published by Pablo Najera.


IEEE Computer | 2011

Securing the Internet of Things

Rodrigo Roman; Pablo Najera; Javier Lopez

This paper presents security of Internet of things. In the Internet of Things vision, every physical object has a virtual component that can produce and consume services Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use. The Internet and its users are already under continual attack, and a growing economy-replete with business models that undermine the Internets ethical use-is fully focused on exploiting the current versions foundational weaknesses.


Journal of Network and Computer Applications | 2011

Real-time location and inpatient care systems based on passive RFID

Pablo Najera; Javier Lopez; Rodrigo Roman

Abstract RFID technology meets identification and tracking requirements in healthcare environments with potential to speed up and increase reliability of involved processes. Due to this, high expectations for this integration have emerged, but hospital and medical centers interested in adoption of RFID technology require prior knowledge on how to squeeze RFID capabilities, real expectations and current challenges. In this paper, we show our lab tested solutions in two specific healthcare scenarios. On the one hand, we analyze the case of a medical equipment tracking system for healthcare facilities enabling both real-time location and theft prevention. Worth-noting aspects such as possible EMI interferences, technology selection and management of RFID data from hospital information system are analyzed. Lab testing of system reliability based on passive UHF RFID is provided for this case. On the other hand, we analyze and provide a solution for care and control of patients in a hospital based on passive HF RFID with the result of a fully functional demonstrator. Our prototype squeezes RFID features in order to provide a backup data source from patients wristband. It also provides an offline working mode aiming to increase application reliability under network fail down and therefore, improving patients safety. Considerations regarding lessons learned and challenges faced are exposed.


ad hoc networks | 2013

Security of industrial sensor network-based remote substations in the context of the Internet of Things

Cristina Alcaraz; Rodrigo Roman; Pablo Najera; Javier Lopez

The main objective of remote substations is to provide the central system with sensitive information from critical infrastructures, such as generation, distribution or transmission power systems. Wireless sensor networks have been recently applied in this particular context due to their attractive services and inherent benefits, such as simplicity, reliability and cost savings. However, as the number of control and data acquisition systems that use the Internet infrastructure to connect to substations increases, it is necessary to consider what connectivity model the sensor infrastructure should follow: either completely isolated from the Internet or integrated with it as part of the Internet of Things paradigm. This paper therefore addresses this question by providing a thorough analysis of both security requirements and infrastructural requirements corresponding to all those TCP/IP integration strategies that can be applicable to networks with constrained computational resources.


communications and mobile computing | 2011

A cross-layer approach for integrating security mechanisms in sensor networks architectures

Rodrigo Roman; Javier Lopez; Pablo Najera

The wireless sensor networks (WSN) paradigm is especially vulnerable against external and internal attacks. Therefore, it is necessary to develop security mechanisms and protocols to protect them. These mechanisms must become an integral part of the software architecture and network stack of a sensor node. A question that remains is how to achieve this integration. In this paper we check how both academic and industrial solutions tackle this issue, and we present the concept of a transversal layer, where all the different security mechanisms could be contained. This way, all the elements of the architecture can interact with the security mechanisms, and the security mechanisms can have a holistic point of view of the whole architecture. We discuss the advantages of this approach, and also present how the transversal layer concept was applied to a real middleware architecture. Copyright


Security and Communication Networks | 2013

User-centric secure integration of personal RFID tags and sensor networks

Pablo Najera; Rodrigo Roman; Javier Lopez

A personal network (PN) should enable the collaboration of users devices and services in a flexible, self-organizing, and friendly manner. For such purpose, the PN must securely accommodate heterogeneous technologies with uneven computational and communication resources. In particular, personal radio frequency identification (RFID) tags can enable seamless recognition of users context, provide user authentication, and enable novel services enhancing the quality and quantity of data handled by the PN. However, the highly constrained features of common RFID tags and their passive role in the network highlights the need of an adequate secure communication model with personal tags, which enables their participation as a member of the PN. In this paper, we present our concept of PN, with special emphasis on the role of RFID and sensor networks, and define a secure architecture for PNs including methods for the secure access to context-aware technologies from both local PN members and the Internet of Things. The PN architecture is designed to support differentiated security mechanisms to maximize the level of security for each type of personal device. Furthermore, we analyze which security solutions available in the literature can be adapted for our architecture, as well as the challenges and security mechanisms still necessary in the secure integration of personal tags. Copyright


international workshop on security | 2011

Secure architecure for the integration of RFID and sensors in personal networks

Pablo Najera; Rodrigo Roman; Javier Lopez

The secure integration of RFID technology into the personal network paradigm, as a context-aware technology which complements body sensor networks, would provide notable benefits to applications and potential services of the personal network (PN). RFID security as an independent technology is reaching an adequate maturity level thanks to research in recent years; however, its integration into the PN model, interaction with other network resources, remote users and service providers requires a specific security analysis and an architecture prepared to support these resource-constrained pervasive technologies. This paper provides such PN architecture and analysis. Aspects such as the management of personal tags as members of the PN, the authentication and secure communication of PN nodes and remote users with the context-aware technologies, and the enforcement of security and privacy policies are discussed in the architecture.


ubiquitous computing | 2009

Secure Integration of RFID Technology in Personal Documentation for Seamless Identity Validation

Pablo Najera; Francisco Moyano; Javier Lopez

Seamless human identification and authentication in the information system is a fundamental step towards the transparent interaction between the user and its context proposed in ambient intelligence. In this context, the IDENTICA project is aimed to the design and implementation of a distributed authentication platform based on biometrics (i.e. voice and facial image) and personal documentation. In this paper, we present our work in this project focused on the secure integration of RFID technology in personal documentation in order to provide seamless identity validation. Our actual work status, first results and future directions are described in detail.


international workshop on security | 2010

Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?

Cristina Alcaraz; Pablo Najera; Javier Lopez; Rodrigo Roman


Journal of Universal Computer Science | 2009

Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents

Pablo Najera; Francisco Moyano; Javier Lopez


Digital Privacy: Theory, Technologies, and Practices | 2007

RFID: Technological Issues and Privacy Concerns

Pablo Najera; Javier Lopez; Alessandro Acquisti; Stefanos Gritzalis; Costas Lambrinoudakis; Sabrina De Capitani di Vimercati

Collaboration


Dive into the Pablo Najera's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Roberto Sanz

University of Cantabria

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge