Luiz Albini - Academia.edu (original) (raw)
Papers by Luiz Albini
Smart innovation, systems and technologies, Dec 16, 2020
Journal of Network and Computer Applications, Aug 1, 2014
Security solutions are not easily adapted to the DTN paradigm, for example, traditional key manag... more Security solutions are not easily adapted to the DTN paradigm, for example, traditional key management solutions cannot be applied in such environments. A key management scheme for DTNs must consider the dynamic topology, be self-organized and distributed and be effective in the presence of intermittent connections. There are just a few key management scheme for DTNs. Nevertheless, all of them have serious issues. They generate a huge overhead, have a single point of failure, are centralized or do not provide any security against very simple attacks. This work introduces a new key management scheme for DTNs based on chains of digital signatures (DSC-KM - Digital Signature Chains Key Management Scheme). It is decentralized, fully distributed, and does not have a single point of failure. It allows nodes to leave and joint the network at any time, works in the presence of intermittent connections, has a very small communication and memory overhead. It is based on chains of digital signatures and on a very simple chain exchange mechanism. According to simulation results, it is able to correctly and securely disseminate all certificates through the network in a short period, while maintaining the size of the chains very small. Moreover, it is able to resist to several attacks to the key management infrastructure.
Design Automation for Embedded Systems, Jan 5, 2019
Simulation is one of the main tools used to analyze and test new proposals in the Network-on-Chip... more Simulation is one of the main tools used to analyze and test new proposals in the Network-on-Chip field. Several simulators can be found in the literature, among them the Noxim simulator stands out. It is being used by many researchers due to the wireless support and open-source availability. An important issue at the simulation phase is the choice of workload, as it may affect testing the system and its features. The correct workload can lead to rapid and efficient system development, while the wrong one may compromise the entire system evaluation. To ensure a more realistic simulation, simulators usually relies on real workloads by using a trace-driven approach. Although Noxim provides a simple support for input traces, it is very limited to a general behavior of the system, accepting only a generic injection rate parameter over time. Another important part of the simulator is the ability to consider the Processing Elements processing time. We propose in this paper an extension of the Noxim simulator to address these issues. Consequently, results are more realistic and may be possible to predict the total execution time very accurately. This extension is demonstrated and evaluated using the NAS-NPB workload. Keywords Network-on-Chip • Simulation • Processing time • Trace 1 Introduction Network-on-Chip (NoC) [7] is the current interconnection paradigm to design all large-scale chips. It is scalable and can be adapted to several computational paradigms and applicable to This work was partially supported by CNPq and CAPES.
Journal of Information and Data Management, Sep 12, 2022
Nefarious users or attackers may target vehicular networks for malicious objectives, such as unla... more Nefarious users or attackers may target vehicular networks for malicious objectives, such as unlawfully collecting data or tampering with communications. There are several coun-termeasures to these challenges in the literature; however, they are tailored to a specific scenario with infrastructure or focused on new routing protocols. To mitigate the effects of malicious attacks on vehicular network communications, this work proposes the development of a group-based security framework, which is independent of the routing protocol with vehicular-to-vehicular communication and capable of forming groups with trusted nodes and adding security to vehicular network communications between group members. This framework should be able to work in connected network settings while ensuring the security and integrity of the information transferred over it. To employ a hybrid cryptography system, the framework needs to have a trust management method for forming groups and establishing group-shared keys in a decentralized manner.
The query processing cost in distributed database systems is directly associated with transferrin... more The query processing cost in distributed database systems is directly associated with transferring data cost over the network. The Software-Defined Wide-Area Network (SD-WAN) allows (re)program network devices via software. The programmability of this architecture provides new possibilities for dynamically manage the network topology, also enabling the data processing on these devices. This paper presents an evaluation of the distributed processing of the hash join operation to the database and network devices, using an cost model. Our results show that processing the hash join operation using network switches could achieve competing results compared to traditional servers with similar data traffic.
Energy consumption is one of the major challenges on the big data processing infrastructure. The ... more Energy consumption is one of the major challenges on the big data processing infrastructure. The energy expenses are even higher than hardware, accounting for 75% of the total cost of nowadays data centers. Narrowing, approximately 30% of all data center energy is consumed by the network switches. Energy Efficient Ethernet is a recent standard aiming at reduce network power consumption, notwithstanding the current practice in industry is to disable it in production use, since it can cause network overloads and performance loss. This paper provides an overview on how Apache Hadoop 3.x, the current version, behaves with Energy Efficient Ethernet enabled for links from 1GbE up to 400GbE links. Presented results show that there is significant energy savings with little or no performance loss for connections up to 40GbE. Nevertheless, connections of 100GbE and 400GbE present significant performance losses due to link wake up to single transmissions. These results demonstrate the effectiveness of EEE and indicate a possible research field on the ultra high speed networks energy efficiency.
Journal of computer and communications, 2020
Anais do XVIII Simpósio Brasileiro de Sistemas Colaborativos (SBSC 2023)
Este artigo apresenta um Mapeamento Sistemático Multivocal que visa identificar aplicativos desen... more Este artigo apresenta um Mapeamento Sistemático Multivocal que visa identificar aplicativos desenvolvidos para o contexto da pandemia de Covid-19, bem como os métodos de rastreamento de contatos utilizados por eles e suas principais funcionalidades. O MLM foi conduzido na literatura branca e cinza, totalizando 73 aplicações, sendo 70 aplicativos móveis e três protocolos. Os resultados apontam que os métodos mais utilizados são: bluetooth para rastreamento de contato; notificação pelo usuário para identificar casos positivos; troca de ID temporária para o estabelecimento da rede de contato; e notificação de exposição pelo próprio aplicativo.
Computers and Electronics in Agriculture
Anais do XX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2020)
O Android é o sistema operacional mais utilizado por dispositivos móveis no mundo. Esse fato tem ... more O Android é o sistema operacional mais utilizado por dispositivos móveis no mundo. Esse fato tem atraído cada vez mais desenvolvedores para a plataforma devido a sua característica opensource e desenvolvimento gratuito de aplicativos. Um problema que surgiu a partir disso são os aplicativos maliciosos, que visam prejudicar o usuário final e que muitas vezes são difíceis de identificar, o que tem levado autores a propor soluções para diferenciá-los dos benignos. Nesse sentido, neste trabalho será apresentado o DroiDiagnosis, uma solução que utiliza aprendizado de máquina e que classifica 80% das amostras entre benignas e maliciosas baseada em suas características dinâmicas e estáticas.
Proceedings of the 14th CONTECSI International Conference on Information Systems and Technology Management, 2017
Anais do Computer on the Beach, 2018
O roteamento em redes Delay-Tolerant Networks(DTN) e um desafio devido aos frequentes e longos pe... more O roteamento em redes Delay-Tolerant Networks(DTN) e um desafio devido aos frequentes e longos periodos de nao conectividade. O comportamento da rede depende de uma variedade de parâmetros que mudam ao longo do tempo e geram desafios importantes na comunicacao e no roteamento. Varios protocolos de roteamento em DTN podem ser encontrados na literatura, baseados em estrategias que vao desde inundacoes ate abordagens oportunistas. Todos esses protocolos tem pontos fortes e fracos dependendo do cenario de uso. Neste estudo, foram avaliados os protocolos Epidemic, PRoPHET, Spray-and-Wait e RAPID atraves de simulacoes, a fim de verificar seus desempenhos, considerando alguns parâmetros criticos.
International Journal of Wireless Information Networks, 2017
Smart innovation, systems and technologies, Dec 16, 2020
Journal of Network and Computer Applications, Aug 1, 2014
Security solutions are not easily adapted to the DTN paradigm, for example, traditional key manag... more Security solutions are not easily adapted to the DTN paradigm, for example, traditional key management solutions cannot be applied in such environments. A key management scheme for DTNs must consider the dynamic topology, be self-organized and distributed and be effective in the presence of intermittent connections. There are just a few key management scheme for DTNs. Nevertheless, all of them have serious issues. They generate a huge overhead, have a single point of failure, are centralized or do not provide any security against very simple attacks. This work introduces a new key management scheme for DTNs based on chains of digital signatures (DSC-KM - Digital Signature Chains Key Management Scheme). It is decentralized, fully distributed, and does not have a single point of failure. It allows nodes to leave and joint the network at any time, works in the presence of intermittent connections, has a very small communication and memory overhead. It is based on chains of digital signatures and on a very simple chain exchange mechanism. According to simulation results, it is able to correctly and securely disseminate all certificates through the network in a short period, while maintaining the size of the chains very small. Moreover, it is able to resist to several attacks to the key management infrastructure.
Design Automation for Embedded Systems, Jan 5, 2019
Simulation is one of the main tools used to analyze and test new proposals in the Network-on-Chip... more Simulation is one of the main tools used to analyze and test new proposals in the Network-on-Chip field. Several simulators can be found in the literature, among them the Noxim simulator stands out. It is being used by many researchers due to the wireless support and open-source availability. An important issue at the simulation phase is the choice of workload, as it may affect testing the system and its features. The correct workload can lead to rapid and efficient system development, while the wrong one may compromise the entire system evaluation. To ensure a more realistic simulation, simulators usually relies on real workloads by using a trace-driven approach. Although Noxim provides a simple support for input traces, it is very limited to a general behavior of the system, accepting only a generic injection rate parameter over time. Another important part of the simulator is the ability to consider the Processing Elements processing time. We propose in this paper an extension of the Noxim simulator to address these issues. Consequently, results are more realistic and may be possible to predict the total execution time very accurately. This extension is demonstrated and evaluated using the NAS-NPB workload. Keywords Network-on-Chip • Simulation • Processing time • Trace 1 Introduction Network-on-Chip (NoC) [7] is the current interconnection paradigm to design all large-scale chips. It is scalable and can be adapted to several computational paradigms and applicable to This work was partially supported by CNPq and CAPES.
Journal of Information and Data Management, Sep 12, 2022
Nefarious users or attackers may target vehicular networks for malicious objectives, such as unla... more Nefarious users or attackers may target vehicular networks for malicious objectives, such as unlawfully collecting data or tampering with communications. There are several coun-termeasures to these challenges in the literature; however, they are tailored to a specific scenario with infrastructure or focused on new routing protocols. To mitigate the effects of malicious attacks on vehicular network communications, this work proposes the development of a group-based security framework, which is independent of the routing protocol with vehicular-to-vehicular communication and capable of forming groups with trusted nodes and adding security to vehicular network communications between group members. This framework should be able to work in connected network settings while ensuring the security and integrity of the information transferred over it. To employ a hybrid cryptography system, the framework needs to have a trust management method for forming groups and establishing group-shared keys in a decentralized manner.
The query processing cost in distributed database systems is directly associated with transferrin... more The query processing cost in distributed database systems is directly associated with transferring data cost over the network. The Software-Defined Wide-Area Network (SD-WAN) allows (re)program network devices via software. The programmability of this architecture provides new possibilities for dynamically manage the network topology, also enabling the data processing on these devices. This paper presents an evaluation of the distributed processing of the hash join operation to the database and network devices, using an cost model. Our results show that processing the hash join operation using network switches could achieve competing results compared to traditional servers with similar data traffic.
Energy consumption is one of the major challenges on the big data processing infrastructure. The ... more Energy consumption is one of the major challenges on the big data processing infrastructure. The energy expenses are even higher than hardware, accounting for 75% of the total cost of nowadays data centers. Narrowing, approximately 30% of all data center energy is consumed by the network switches. Energy Efficient Ethernet is a recent standard aiming at reduce network power consumption, notwithstanding the current practice in industry is to disable it in production use, since it can cause network overloads and performance loss. This paper provides an overview on how Apache Hadoop 3.x, the current version, behaves with Energy Efficient Ethernet enabled for links from 1GbE up to 400GbE links. Presented results show that there is significant energy savings with little or no performance loss for connections up to 40GbE. Nevertheless, connections of 100GbE and 400GbE present significant performance losses due to link wake up to single transmissions. These results demonstrate the effectiveness of EEE and indicate a possible research field on the ultra high speed networks energy efficiency.
Journal of computer and communications, 2020
Anais do XVIII Simpósio Brasileiro de Sistemas Colaborativos (SBSC 2023)
Este artigo apresenta um Mapeamento Sistemático Multivocal que visa identificar aplicativos desen... more Este artigo apresenta um Mapeamento Sistemático Multivocal que visa identificar aplicativos desenvolvidos para o contexto da pandemia de Covid-19, bem como os métodos de rastreamento de contatos utilizados por eles e suas principais funcionalidades. O MLM foi conduzido na literatura branca e cinza, totalizando 73 aplicações, sendo 70 aplicativos móveis e três protocolos. Os resultados apontam que os métodos mais utilizados são: bluetooth para rastreamento de contato; notificação pelo usuário para identificar casos positivos; troca de ID temporária para o estabelecimento da rede de contato; e notificação de exposição pelo próprio aplicativo.
Computers and Electronics in Agriculture
Anais do XX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2020)
O Android é o sistema operacional mais utilizado por dispositivos móveis no mundo. Esse fato tem ... more O Android é o sistema operacional mais utilizado por dispositivos móveis no mundo. Esse fato tem atraído cada vez mais desenvolvedores para a plataforma devido a sua característica opensource e desenvolvimento gratuito de aplicativos. Um problema que surgiu a partir disso são os aplicativos maliciosos, que visam prejudicar o usuário final e que muitas vezes são difíceis de identificar, o que tem levado autores a propor soluções para diferenciá-los dos benignos. Nesse sentido, neste trabalho será apresentado o DroiDiagnosis, uma solução que utiliza aprendizado de máquina e que classifica 80% das amostras entre benignas e maliciosas baseada em suas características dinâmicas e estáticas.
Proceedings of the 14th CONTECSI International Conference on Information Systems and Technology Management, 2017
Anais do Computer on the Beach, 2018
O roteamento em redes Delay-Tolerant Networks(DTN) e um desafio devido aos frequentes e longos pe... more O roteamento em redes Delay-Tolerant Networks(DTN) e um desafio devido aos frequentes e longos periodos de nao conectividade. O comportamento da rede depende de uma variedade de parâmetros que mudam ao longo do tempo e geram desafios importantes na comunicacao e no roteamento. Varios protocolos de roteamento em DTN podem ser encontrados na literatura, baseados em estrategias que vao desde inundacoes ate abordagens oportunistas. Todos esses protocolos tem pontos fortes e fracos dependendo do cenario de uso. Neste estudo, foram avaliados os protocolos Epidemic, PRoPHET, Spray-and-Wait e RAPID atraves de simulacoes, a fim de verificar seus desempenhos, considerando alguns parâmetros criticos.
International Journal of Wireless Information Networks, 2017