Pablo Velarde-Alvarado
Autonomous University of Nayarit
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Pablo Velarde-Alvarado.
IEEE Communications Letters | 2009
Pablo Velarde-Alvarado; Cesar Vargas-Rosales; Deni Torres-Roman; Alberto F. Martínez-Herrera
Attacks, such as port scans, DDoS and worms, threaten the functionality and reliability of IP networks. Early and accurate detection is crucial to mitigate their impact. We use the Method of Remaining Elements (MRE) to detect anomalies based on the characterization of traffic features through a proportional uncertainty measure. MRE has the functionality and performance to detect abnormal behavior and serve as the foundation for next generation network intrusion detection systems.
Wireless Personal Communications | 2015
Rafael Martínez-Peláez; Homero Toral-Cruz; Joel Ruiz; Pablo Velarde-Alvarado
Abstract In this paper, we propose P2PM-pay scheme which provides two key points. The first key point is related with the mobile cash. In P2PM-pay scheme, the mobile cash is controlled by the expiration date. The expiration date is embedded into the mobile cash by partial blind signature during the withdrawal date, and the bank does not hold information about the operation. Moreover, we have considered the effective date and deposit date for administrative purposes. The effective date is when customers use their mobile cash to pay for products, and the deposit date is when merchants receive the funds in their bank account. The other key point is related with the authentication process among participants. Although P2PM-pay uses WTLS protocol, we propose a wireless public key infrastructure with an efficient certificate path validation. Furthermore, the design of the proposed scheme achieves successfully the security requirements described in previous works. Consequently, P2PM-pay is secure against well-known attacks and efficient in terms of processing time.
Journal of Applied Research and Technology | 2013
Rafael Martínez-Peláez; Francisco Rico-Novella; Jordi Forné; Pablo Velarde-Alvarado
In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The first schemeis a security improvement of Liao et al.’s scheme and the second scheme is a security improvement of Wang etal.’s scheme. In both cases, the authors claimed that their schemes can resist many attacks. However, we find thatboth schemes have security flaws. In addition, their schemes require a verification table and time-synchronization,making the schemes unfeasible and unsecured for electronic services. In order to remedy the security flaws ofSood et al.’s schemes, we propose a robust scheme which resists the well-known attacks and achieves all thedesirable security goals.
Wireless Personal Communications | 2017
Faouzi Hidoussi; Homero Toral-Cruz; Djallel Eddine Boubiche; Rafael Martínez-Peláez; Pablo Velarde-Alvarado; Romeli Barbosa; Freddy Chan
In wireless sensor networks, one of the most important constraints is the low power consumption requirement. For that reason, several hierarchical or cluster-based routing methods have been proposed to provide an efficient way to save energy during communication. However, their main challenge is to have efficient mechanisms to achieve the trade-off between increasing the network lifetime and accomplishing acceptable transmission latency. In this paper, we propose a novel protocol for cluster-based wireless sensor networks called PEAL (Power Efficient and Adaptive Latency). Our simulation results show that PEAL can extend the network lifetime about 47% compared to the classic protocol LEACH (Low-Energy Adaptive Clustering Hierarchy) and introduces an acceptable transmission latency compared to the energy conservation gain.
International Conference on Software Process Improvement | 2016
Rafael Martínez-Peláez; Francisco R. Cortes-Martinez; Angel D. Herrera-Candelaria; Yésica Imelda Saavedra-Benítez; Pablo Velarde-Alvarado
Since the beginning, people have perceived privacy and security as the biggest risk related with Internet. As a result, many Internet security solutions have been developed, such as antivirus, authentication mechanism, firewalls, security protocols, and security policies. However, every year organized crime and criminals commit several attacks against innocent people via the Internet. In this paper, we explain how millions of Internet users lost their privacy and control over their personal and financial information by means of the web registration form and social network sites.
Journal of Computational Chemistry | 2014
Pablo Velarde-Alvarado; Rafael Martínez-Peláez; Joel Ruiz-Ibarra; Victor Morales-Rocha
Journal of Applied Research and Technology | 2010
Pablo Velarde-Alvarado; Cesar Vargas-Rosales; D. Torres-Roman; Alberto F. Martínez-Herrera
Revista Facultad De Ingenieria-universidad De Antioquia | 2013
Rafael Martínez-Peláez; Francisco Rico-Novella; Pablo Velarde-Alvarado
Archive | 2013
Pablo Velarde-Alvarado; Cesar Vargas-Rosales; Homero Toral-Cruz; Julio Ramírez-Pacheco; Raul Hernandez-Aquino
Procedia Technology | 2012
Pablo Velarde-Alvarado; Alberto F. Martínez-Herrera; Adalberto Iriarte-Solis