Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pablo Velarde-Alvarado is active.

Publication


Featured researches published by Pablo Velarde-Alvarado.


IEEE Communications Letters | 2009

Detecting anomalies in network traffic using the method of remaining elements

Pablo Velarde-Alvarado; Cesar Vargas-Rosales; Deni Torres-Roman; Alberto F. Martínez-Herrera

Attacks, such as port scans, DDoS and worms, threaten the functionality and reliability of IP networks. Early and accurate detection is crucial to mitigate their impact. We use the Method of Remaining Elements (MRE) to detect anomalies based on the characterization of traffic features through a proportional uncertainty measure. MRE has the functionality and performance to detect abnormal behavior and serve as the foundation for next generation network intrusion detection systems.


Wireless Personal Communications | 2015

P2PM-pay: Person to Person Mobile Payment Scheme Controlled by Expiration Date

Rafael Martínez-Peláez; Homero Toral-Cruz; Joel Ruiz; Pablo Velarde-Alvarado

Abstract In this paper, we propose P2PM-pay scheme which provides two key points. The first key point is related with the mobile cash. In P2PM-pay scheme, the mobile cash is controlled by the expiration date. The expiration date is embedded into the mobile cash by partial blind signature during the withdrawal date, and the bank does not hold information about the operation. Moreover, we have considered the effective date and deposit date for administrative purposes. The effective date is when customers use their mobile cash to pay for products, and the deposit date is when merchants receive the funds in their bank account. The other key point is related with the authentication process among participants. Although P2PM-pay uses WTLS protocol, we propose a wireless public key infrastructure with an efficient certificate path validation. Furthermore, the design of the proposed scheme achieves successfully the security requirements described in previous works. Consequently, P2PM-pay is secure against well-known attacks and efficient in terms of processing time.


Journal of Applied Research and Technology | 2013

Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh

Rafael Martínez-Peláez; Francisco Rico-Novella; Jordi Forné; Pablo Velarde-Alvarado

In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The first schemeis a security improvement of Liao et al.’s scheme and the second scheme is a security improvement of Wang etal.’s scheme. In both cases, the authors claimed that their schemes can resist many attacks. However, we find thatboth schemes have security flaws. In addition, their schemes require a verification table and time-synchronization,making the schemes unfeasible and unsecured for electronic services. In order to remedy the security flaws ofSood et al.’s schemes, we propose a robust scheme which resists the well-known attacks and achieves all thedesirable security goals.


Wireless Personal Communications | 2017

PEAL: Power Efficient and Adaptive Latency Hierarchical Routing Protocol for Cluster-Based WSN

Faouzi Hidoussi; Homero Toral-Cruz; Djallel Eddine Boubiche; Rafael Martínez-Peláez; Pablo Velarde-Alvarado; Romeli Barbosa; Freddy Chan

In wireless sensor networks, one of the most important constraints is the low power consumption requirement. For that reason, several hierarchical or cluster-based routing methods have been proposed to provide an efficient way to save energy during communication. However, their main challenge is to have efficient mechanisms to achieve the trade-off between increasing the network lifetime and accomplishing acceptable transmission latency. In this paper, we propose a novel protocol for cluster-based wireless sensor networks called PEAL (Power Efficient and Adaptive Latency). Our simulation results show that PEAL can extend the network lifetime about 47% compared to the classic protocol LEACH (Low-Energy Adaptive Clustering Hierarchy) and introduces an acceptable transmission latency compared to the energy conservation gain.


International Conference on Software Process Improvement | 2016

By Clicking Submit Button, You will Lose Your Privacy and Control Over Your Personal Information

Rafael Martínez-Peláez; Francisco R. Cortes-Martinez; Angel D. Herrera-Candelaria; Yésica Imelda Saavedra-Benítez; Pablo Velarde-Alvarado

Since the beginning, people have perceived privacy and security as the biggest risk related with Internet. As a result, many Internet security solutions have been developed, such as antivirus, authentication mechanism, firewalls, security protocols, and security policies. However, every year organized crime and criminals commit several attacks against innocent people via the Internet. In this paper, we explain how millions of Internet users lost their privacy and control over their personal and financial information by means of the web registration form and social network sites.


Journal of Computational Chemistry | 2014

Information Theory and Data-Mining Techniques for Network Traffic Profiling for Intrusion Detection

Pablo Velarde-Alvarado; Rafael Martínez-Peláez; Joel Ruiz-Ibarra; Victor Morales-Rocha


Journal of Applied Research and Technology | 2010

An Architecture for Intrusion Detection Based on an Extension of the Method of Remaining Elements

Pablo Velarde-Alvarado; Cesar Vargas-Rosales; D. Torres-Roman; Alberto F. Martínez-Herrera


Revista Facultad De Ingenieria-universidad De Antioquia | 2013

Cryptanalysis and improvement of chen-hsiang-shih's remote user authentication scheme using smart cards

Rafael Martínez-Peláez; Francisco Rico-Novella; Pablo Velarde-Alvarado


Archive | 2013

Characterizing Flow-Level Traffic Behavior with Entropy Spaces for Anomaly Detection

Pablo Velarde-Alvarado; Cesar Vargas-Rosales; Homero Toral-Cruz; Julio Ramírez-Pacheco; Raul Hernandez-Aquino


Procedia Technology | 2012

Using Entropy Spaces and Mixtures of Gaussian Distributions to Characterize Traffic Anomalies

Pablo Velarde-Alvarado; Alberto F. Martínez-Herrera; Adalberto Iriarte-Solis

Collaboration


Dive into the Pablo Velarde-Alvarado's collaboration.

Top Co-Authors

Avatar

Rafael Martínez-Peláez

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Homero Toral-Cruz

University of Quintana Roo

View shared research outputs
Top Co-Authors

Avatar

Francisco Rico-Novella

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Jordi Forné

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Victor Morales-Rocha

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Angel D. Herrera-Candelaria

Universidad Autónoma de Ciudad Juárez

View shared research outputs
Top Co-Authors

Avatar

D. Torres-Roman

Instituto Politécnico Nacional

View shared research outputs
Top Co-Authors

Avatar

Francisco R. Cortes-Martinez

Universidad Autónoma de Ciudad Juárez

View shared research outputs
Top Co-Authors

Avatar

Freddy Chan

University of Quintana Roo

View shared research outputs
Researchain Logo
Decentralizing Knowledge